Approximately optimal mechanism design via differential privacy
暂无分享,去创建一个
Moshe Tennenholtz | Kobbi Nissim | Rann Smorodinsky | Moshe Tennenholtz | Kobbi Nissim | Rann Smorodinsky
[1] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[2] E. H. Clarke. Multipart pricing of public goods , 1971 .
[3] Theodore Groves,et al. Incentives in Teams , 1973 .
[4] A. Gibbard. Manipulation of Voting Schemes: A General Result , 1973 .
[5] M. Satterthwaite. Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .
[6] D. J. Roberts,et al. THE INCENTIVES FOR PRICE-TAKING BEHAVIOR IN LARGE EXCHANGE ECONOMIES , 1976 .
[7] M. Satterthwaite,et al. Strategy-proofness and single-peakedness , 1976 .
[8] H. Moulin. On strategy-proofness and single peakedness , 1980 .
[9] Hitoshi Matsushima. A new approach to the implementation problem , 1988 .
[10] Steven R. Williams,et al. The Rate of Convergence to Efficiency in the Buyer's Bid Double Auction as the Market Becomes Large , 1989 .
[11] R. Rob. Pollution claim settlements under private information , 1989 .
[12] Andrew Postlewaite,et al. Asymmetric Information Bargaining Problems with Many Agents , 1990 .
[13] Dilip Abreu,et al. Subgame perfect implementation: A necessary and almost sufficient condition , 1990 .
[14] Hitoshi Matsushima,et al. Virtual implementation in iteratively undominated strategies: complete information , 1992 .
[15] Steven R. Williams,et al. Convergence to Efficiency in a Simple Market with Incomplete Information , 1994 .
[16] D. Levine,et al. When Are Agents Negligible , 1995 .
[17] A. Mas-Colell,et al. Microeconomic Theory , 1995 .
[18] D. Fudenberg,et al. When Are Nonanonymous Players Negligible , 1996 .
[19] John Duggan. Virtual Bayesian Implementation , 1997 .
[20] Noam Nisan,et al. Algorithmic mechanism design (extended abstract) , 1999, STOC '99.
[21] J. Schummer. Almost-dominant Strategy Implementation , 1999 .
[22] Rann Smorodinsky,et al. Pivotal Players and the Characterization of Influence , 2000, J. Econ. Theory.
[23] Jeroen M. Swinkels. Efficiency of Large Private Value Auctions , 2001 .
[24] R. Serrano,et al. Some limitations of virtual Bayesian implementation , 2001 .
[25] Richard P. McLean,et al. Informational Size and Incentive Compatibility , 2001 .
[26] Rakesh V. Vohra,et al. Strategy-proof Location on a Network , 2002, J. Econ. Theory.
[27] Richard P. McLean,et al. Informational Size and Incentive Compatibility with Aggregate Uncertainty , 2003 .
[28] Roberto Serrano,et al. A Characterization of Virtual Bayesian Implementation , 2002, Games Econ. Behav..
[29] Maria-Florina Balcan,et al. Mechanism design via machine learning , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[30] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[31] Rudolf Müller,et al. Mini special issue: Electronic Market Design , 2006, Games Econ. Behav..
[32] Michele Bugliesi,et al. Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (Lecture Notes in Computer Science) , 2006 .
[33] Anna R. Karlin,et al. Competitive auctions , 2006, Games Econ. Behav..
[34] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[35] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[36] R. Vohra,et al. Algorithmic Game Theory: Mechanism Design without Money , 2007 .
[37] Rann Smorodinsky,et al. The efficiency of competitive mechanisms under private information , 2007, J. Econ. Theory.
[38] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[39] Moshe Tennenholtz,et al. Approximate mechanism design without money , 2009, EC '09.
[40] Noga Alon,et al. Strategyproof Approximation Mechanisms for Location on Networks , 2009, ArXiv.
[41] Cynthia Dwork,et al. The Differential Privacy Frontier (Extended Abstract) , 2009, TCC.
[42] Moshe Babaioff,et al. Single-value combinatorial auctions and algorithmic implementation in undominated strategies , 2009, JACM.
[43] Christos Tzamos,et al. Winner-imposing strategyproof mechanisms for multiple Facility Location games , 2010, Theor. Comput. Sci..
[44] Cynthia Dwork,et al. Differential privacy in new settings , 2010, SODA '10.
[45] Noga Alon,et al. Strategyproof Approximation of the Minimax on Networks , 2010, Math. Oper. Res..
[46] Zeyuan Allen Zhu,et al. Asymptotically optimal strategy-proof mechanisms for two-facility games , 2010, EC '10.
[47] S. Boicheva. Mechanism Design without Money , 2012 .
[48] Ariel D. Procaccia,et al. Approximate Mechanism Design without Money , 2013, TEAC.
[49] David Xiao,et al. Is privacy compatible with truthfulness? , 2013, ITCS '13.