-
1
-
-
77951693261
-
An O(log n/ log log n)-approximation algorithm for the asymmetric traveling salesman problem
-
ACM-SIAM
-
A. Asadpour, M.X. Goemans, A. Madry, S.O. Gharan, and A. Saberi. An O(log n/ log log n)-approximation algorithm for the asymmetric traveling salesman problem. In SODA, pages 379-389. ACM-SIAM, 2010.
-
(2010)
SODA
, pp. 379-389
-
-
Asadpour, A.1
Goemans, M.X.2
Madry, A.3
Gharan, S.O.4
Saberi, A.5
-
2
-
-
77954724843
-
Truthful mechanisms with implicit payment computation
-
ACM
-
M. Babaioff, R.D. Kleinberg, and A. Slivkins. Truthful mechanisms with implicit payment computation. In EC, pages 43-52. ACM, 2010.
-
(2010)
EC
, pp. 43-52
-
-
Babaioff, M.1
Kleinberg, R.D.2
Slivkins, A.3
-
3
-
-
79955727359
-
Bayesian incentive compatibility via fractional assignments
-
ACM-SIAM
-
X. Bei and Z. Huang. Bayesian incentive compatibility via fractional assignments. In SODA. ACM-SIAM, 2011.
-
(2011)
SODA
-
-
Bei, X.1
Huang, Z.2
-
4
-
-
77954736985
-
Budget constrained auctions with heterogeneous items
-
ACM
-
S. Bhattacharya, G. Goel, S. Gollapudi, and K. Munagala. Budget constrained auctions with heterogeneous items. In STOC, pages 379-388. ACM, 2010.
-
(2010)
STOC
, pp. 379-388
-
-
Bhattacharya, S.1
Goel, G.2
Gollapudi, S.3
Munagala, K.4
-
5
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
ACM
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618. ACM, 2008.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
6
-
-
58449096780
-
Auctions for structured procurement
-
ACM-SIAM
-
M.C. Cary, A.D. Flaxman, J.D. Hartline, and A.R. Karlin. Auctions for structured procurement. In SODA, pages 304-313. ACM-SIAM, 2008.
-
(2008)
SODA
, pp. 304-313
-
-
Cary, M.C.1
Flaxman, A.D.2
Hartline, J.D.3
Karlin, A.R.4
-
7
-
-
77954699102
-
Sequential posted pricing and multi-parameter mechanism design
-
ACM
-
S. Chawla, J. Hartline, D. Malec, and B. Sivan. Sequential posted pricing and multi-parameter mechanism design. In STOC, pages 311-320. ACM, 2010.
-
(2010)
STOC
, pp. 311-320
-
-
Chawla, S.1
Hartline, J.2
Malec, D.3
Sivan, B.4
-
8
-
-
77952327039
-
On the power of randomization in algorithmic mechanism design
-
IEEE
-
S. Dobzinski and S. Dughmi. On the power of randomization in algorithmic mechanism design. In FOCS, pages 505-514. IEEE, 2009.
-
(2009)
FOCS
, pp. 505-514
-
-
Dobzinski, S.1
Dughmi, S.2
-
9
-
-
79959592600
-
A truthful randomized mechanism for combinatorial public projects via convex optimization
-
ACM
-
S. Dughmi. A truthful randomized mechanism for combinatorial public projects via convex optimization. In EC, pages 263-272. ACM, 2011.
-
(2011)
EC
, pp. 263-272
-
-
Dughmi, S.1
-
10
-
-
84863311520
-
Limitations of randomized mechanisms for combinatorial auctions
-
IEEE
-
S. Dughmi et al. Limitations of randomized mechanisms for combinatorial auctions. In FOCS, pages 502-511. IEEE, 2011.
-
(2011)
FOCS
, pp. 502-511
-
-
Dughmi, S.1
-
11
-
-
78751564971
-
Black-box randomized reductions in algorithmic mechanism design
-
IEEE
-
S. Dughmi and T. Roughgarden. Black-box randomized reductions in algorithmic mechanism design. In FOCS, pages 775-784. IEEE, 2010.
-
(2010)
FOCS
, pp. 775-784
-
-
Dughmi, S.1
Roughgarden, T.2
-
12
-
-
79959753563
-
From convex optimization to randomized mechanisms: Toward optimal combinatorial auctions
-
ACM
-
S. Dughmi, T. Roughgarden, and Q. Yan. From convex optimization to randomized mechanisms: toward optimal combinatorial auctions. In STOC, pages 149-158. ACM, 2011.
-
(2011)
STOC
, pp. 149-158
-
-
Dughmi, S.1
Roughgarden, T.2
Yan, Q.3
-
13
-
-
77955323302
-
A firm foundation for private data analysis
-
to appear
-
C. Dwork. A firm foundation for private data analysis. Communications of the ACM, to appear.
-
Communications of the ACM
-
-
Dwork, C.1
-
14
-
-
70349305273
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
-
(2008)
TAMC
, pp. 1-19
-
-
Dwork, C.1
-
15
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. Theory of Cryptography, pages 265-284, 2006.
-
(2006)
Theory of Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
16
-
-
79959622530
-
Selling privacy at auction
-
ACM
-
A. Ghosh and A. Roth. Selling privacy at auction. In EC, pages 199-208. ACM, 2011.
-
(2011)
EC
, pp. 199-208
-
-
Ghosh, A.1
Roth, A.2
-
17
-
-
79955735615
-
Bayesian incentive compatibility via matchings
-
ACM-SIAM
-
J. Hartline, R. Kleinberg, and A. Malekian. Bayesian incentive compatibility via matchings. In SODA. ACM-SIAM, 2011.
-
(2011)
SODA
-
-
Hartline, J.1
Kleinberg, R.2
Malekian, A.3
-
19
-
-
84871977695
-
-
Personal communication
-
R.D. Kleinberg. Personal communication.
-
-
-
Kleinberg, R.D.1
-
20
-
-
38249019127
-
Generating random combinatorial objects
-
V.G. Kulkarni. Generating random combinatorial objects. Journal of Algorithms, 11(2):185-207, 1990.
-
(1990)
Journal of Algorithms
, vol.11
, Issue.2
, pp. 185-207
-
-
Kulkarni, V.G.1
-
21
-
-
78349305779
-
Introduction to (generalized) Gibbs measures
-
A. Le Ny. Introduction to (generalized) Gibbs measures. Ensaios Matemáticos, 15:1-126, 2008.
-
(2008)
Ensaios Matemáticos
, vol.15
, pp. 1-126
-
-
Le Ny, A.1
-
22
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, 2007.
-
(2007)
FOCS
-
-
McSherry, F.1
Talwar, K.2
-
24
-
-
84856434218
-
Approximately optimal mechanism design via differential privacy
-
K. Nissim, R. Smorodinsky, and M. Tennenholtz. Approximately optimal mechanism design via differential privacy. ITCS, 2012.
-
(2012)
ITCS
-
-
Nissim, K.1
Smorodinsky, R.2
Tennenholtz, M.3
-
25
-
-
57949083485
-
On the hardness of being truthful
-
IEEE
-
C. Papadimitriou, M. Schapira, and Y. Singer. On the hardness of being truthful. In FOCS, pages 250-259. IEEE, 2008.
-
(2008)
FOCS
, pp. 250-259
-
-
Papadimitriou, C.1
Schapira, M.2
Singer, Y.3
-
26
-
-
0010812548
-
A necessary and sufficient condition for rationalizability in a quasi-linear context
-
J.C. Rochet. A necessary and sufficient condition for rationalizability in a quasi-linear context. Journal of Mathematical Economics, 16(2):191-200, 1987.
-
(1987)
Journal of Mathematical Economics
, vol.16
, Issue.2
, pp. 191-200
-
-
Rochet, J.C.1
-
27
-
-
77951678087
-
Differentially private combinatorial optimization
-
ACM-SIAM
-
K. Talwar, A. Gupta, K. Ligett, F. McSherry, and A. Roth. Differentially private combinatorial optimization. In SODA. ACM-SIAM, 2010.
-
(2010)
SODA
-
-
Talwar, K.1
Gupta, A.2
Ligett, K.3
McSherry, F.4
Roth, A.5
-
28
-
-
84863536399
-
Is privacy compatible with truthfulness?
-
ePrint Technical Report, 2011/005
-
D. Xiao. Is privacy compatible with truthfulness? In Cryptology ePrint Technical Report, 2011/005, 2011.
-
(2011)
Cryptology
-
-
Xiao, D.1
|