Author of the publication

False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values.

, and . Syst. Comput. Jpn., 37 (13): 89-98 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiency in Truthful Auctions via a Social Network., , , and . CoRR, (2019)Adaptive price update in distributed Lagrangian relaxation protocol., , and . AAMAS (2), page 1033-1040. IFAAMAS, (2009)Directed soft arc consistency in pseudo trees., , , , and . AAMAS (2), page 1065-1072. IFAAMAS, (2009)Secure Generalized Vickrey Auction without Third-party Servers., and . Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 132-146. Springer, (2004)Solving Satisfiability Problems on FPGAs Using Experimental Unit Propagation., , and . CP, volume 1713 of Lecture Notes in Computer Science, page 434-445. Springer, (1999)Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information., , and . CP, volume 2470 of Lecture Notes in Computer Science, page 387-401. Springer, (2002)False-Name-Proof Mechanisms for Hiring a Team., , , , and . WINE, volume 4858 of Lecture Notes in Computer Science, page 245-256. Springer, (2007)Generalized Vickrey Auction.. Encyclopedia of Algorithms, Springer, (2008)Complexity and Approximations in Robust Coalition Formation via Max-Min k-Partitioning., , , , and . AAMAS, page 2036-2038. International Foundation for Autonomous Agents and Multiagent Systems, (2019)Attachment centrality: Measure for connectivity in networks., , , and . Artif. Intell., (2019)