Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manipulations in Two-Agent Sequential Allocation with Random Sequences., , and . AAMAS, page 141-149. ACM, (2016)False-name-proof mechanism design without money., , and . AAMAS, page 651-658. IFAAMAS, (2011)Coexistence of utilitarian efficiency and false-name-proofness in social choice., , and . AAMAS, page 1201-1208. IFAAMAS/ACM, (2014)Characterization of Strategy-Proof, Revenue Monotone Combinatorial Auction Mechanisms and Connection with False-Name-Proofness., , and . WINE, volume 5929 of Lecture Notes in Computer Science, page 561-568. Springer, (2009)A Complexity Approach for Core-Selecting Exchange with Multiple Indivisible Goods under Lexicographic Preferences., , , , and . AAAI, page 907-913. AAAI Press, (2015)Split Manipulations in Cost Sharing of Minimum Cost Spanning Tree., and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 219-226. IOS Press, (2020)Characterization of Revenue Monotonicity in Combinatorial Auctions., , and . IAT, page 383-390. IEEE Computer Society Press, (2010)978-0-7695-4191-4.False-Name-Proofness in Facility Location Problem on the Real Line., , and . WINE, volume 6484 of Lecture Notes in Computer Science, page 559-562. Springer, (2010)Generalizing Envy-Freeness toward Group of Agents., , , , , and . IJCAI, page 386-392. IJCAI/AAAI, (2011)Characteristics of Sustainable OSS Projects: A Theoretical and Empirical Study., , , and . CHASE@ICSE, page 15-21. IEEE Computer Society, (2015)