Evaluating Resistance to False-Name Manipulations in Elections
暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Makoto Yokoo,et al. The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..
[3] Makoto Yokoo,et al. False-name-proof mechanism design without money , 2011, AAMAS.
[4] Vincent Conitzer,et al. Using a Memory Test to Limit a User to One Account , 2008, AMEC/TADA.
[5] Vincent Conitzer,et al. Using Mechanism Design to Prevent False-Name Manipulations , 2010, AI Mag..
[6] Vincent Conitzer,et al. Anonymity-Proof Voting Rules , 2008, WINE.
[7] Vincent Conitzer,et al. False-Name-Proofness in Social Networks , 2010, WINE.
[8] Vincent Conitzer,et al. Optimal False-Name-Proof Voting Rules with Costly Voting , 2008, AAAI.
[9] R. Durrett. Probability: Theory and Examples , 1993 .
[10] Giuseppe Persiano,et al. Special Issue on Algorithmic Game Theory , 2013, Theory of Computing Systems.
[11] Makoto Yokoo,et al. Robust Combinatorial Auction Protocol against False-Name Bids , 2000, AAAI/IAAI.