Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategy-proof matching with regional minimum quotas., , , , , , and . AAMAS, page 1225-1232. IFAAMAS/ACM, (2014)False-name-proofness in online mechanisms., , , and . AAMAS, page 753-762. IFAAMAS, (2012)Handling negative value rules in MC-net-based coalition structure generation., , , , , and . AAMAS, page 795-804. IFAAMAS, (2012)How is Cooperation/collusion Sustained in Repeated Multimarket Contact with Observation Errors?: (Extended Abstract)., , , and . AAMAS, page 1369-1370. ACM, (2016)Approximately Stable Matchings with Budget Constraints., and . CoRR, (2017)False-name-proof Mechanisms for Hiring a Team, , , and . CoRR, (2011)Further improving security of Vector Stream Cipher., and . CoRR, (2016)Secure (M+1) st-Price Auction with Automatic Tie-Break., , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 422-437. Springer, (2014)Simulating a N-person Multi-stage Game for Making a State., , and . SEAL, volume 1585 of Lecture Notes in Computer Science, page 309-316. Springer, (1998)Characterizing false-name-proof allocation rules in combinatorial auctions., , , and . AAMAS (1), page 265-272. IFAAMAS, (2009)