Author of the publication

Characterizing Truthful Market Design.

, , and . WINE, volume 4858 of Lecture Notes in Computer Science, page 590-595. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymity without 'Cryptography'., and . Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, page 108-126. Springer, (2001)E-Voting Without 'Cryptography'., , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 1-15. Springer, (2002)Supporting Privacy in Decentralized Additive Reputation Systems., , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 108-119. Springer, (2004)An Efficient PAC Algorithm for Reconstructing a Mixture of Lines., , and . ALT, volume 2533 of Lecture Notes in Computer Science, page 351-364. Springer, (2002)Mechanisms for a spatially distributed market., , and . EC, page 9-20. ACM, (2004)Impersonation-Based Mechanisms., , and . AAAI, page 592-597. AAAI Press, (2006)Towards Virtualization of On-Demand Web Service Composition Using an Improved Ranking Algorithm., , , and . International Conference on Internet Computing, page 817-823. CSREA Press, (2004)An incentive-compatible multi-armed bandit mechanism., and . PODC, page 362-363. ACM, (2007)Generalized trade reduction mechanisms., , and . EC, page 20-29. ACM, (2007)Development of a solar updraft aeration system for pond aquaculture in resource-constrained environments., , , and . GHTC, page 306-313. IEEE, (2015)