메뉴 건너뛰기




Volumn , Issue , 2012, Pages 140-149

The exponential mechanism for social welfare: Private, truthful, and nearly optimal

Author keywords

differential privacy; exponential mechanism; mechanism design

Indexed keywords

DIFFERENTIAL PRIVACIES; GENERAL TOOLS; MECHANISM DESIGN; SOCIAL WELFARE; TRUTHFUL MECHANISMS; VCG MECHANISM;

EID: 84871966152     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2012.36     Document Type: Conference Paper
Times cited : (82)

References (28)
  • 1
    • 77951693261 scopus 로고    scopus 로고
    • An O(log n/ log log n)-approximation algorithm for the asymmetric traveling salesman problem
    • ACM-SIAM
    • A. Asadpour, M.X. Goemans, A. Madry, S.O. Gharan, and A. Saberi. An O(log n/ log log n)-approximation algorithm for the asymmetric traveling salesman problem. In SODA, pages 379-389. ACM-SIAM, 2010.
    • (2010) SODA , pp. 379-389
    • Asadpour, A.1    Goemans, M.X.2    Madry, A.3    Gharan, S.O.4    Saberi, A.5
  • 2
    • 77954724843 scopus 로고    scopus 로고
    • Truthful mechanisms with implicit payment computation
    • ACM
    • M. Babaioff, R.D. Kleinberg, and A. Slivkins. Truthful mechanisms with implicit payment computation. In EC, pages 43-52. ACM, 2010.
    • (2010) EC , pp. 43-52
    • Babaioff, M.1    Kleinberg, R.D.2    Slivkins, A.3
  • 3
    • 79955727359 scopus 로고    scopus 로고
    • Bayesian incentive compatibility via fractional assignments
    • ACM-SIAM
    • X. Bei and Z. Huang. Bayesian incentive compatibility via fractional assignments. In SODA. ACM-SIAM, 2011.
    • (2011) SODA
    • Bei, X.1    Huang, Z.2
  • 4
    • 77954736985 scopus 로고    scopus 로고
    • Budget constrained auctions with heterogeneous items
    • ACM
    • S. Bhattacharya, G. Goel, S. Gollapudi, and K. Munagala. Budget constrained auctions with heterogeneous items. In STOC, pages 379-388. ACM, 2010.
    • (2010) STOC , pp. 379-388
    • Bhattacharya, S.1    Goel, G.2    Gollapudi, S.3    Munagala, K.4
  • 5
    • 57049136138 scopus 로고    scopus 로고
    • A learning theory approach to non-interactive database privacy
    • ACM
    • A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618. ACM, 2008.
    • (2008) STOC , pp. 609-618
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 6
    • 58449096780 scopus 로고    scopus 로고
    • Auctions for structured procurement
    • ACM-SIAM
    • M.C. Cary, A.D. Flaxman, J.D. Hartline, and A.R. Karlin. Auctions for structured procurement. In SODA, pages 304-313. ACM-SIAM, 2008.
    • (2008) SODA , pp. 304-313
    • Cary, M.C.1    Flaxman, A.D.2    Hartline, J.D.3    Karlin, A.R.4
  • 7
    • 77954699102 scopus 로고    scopus 로고
    • Sequential posted pricing and multi-parameter mechanism design
    • ACM
    • S. Chawla, J. Hartline, D. Malec, and B. Sivan. Sequential posted pricing and multi-parameter mechanism design. In STOC, pages 311-320. ACM, 2010.
    • (2010) STOC , pp. 311-320
    • Chawla, S.1    Hartline, J.2    Malec, D.3    Sivan, B.4
  • 8
    • 77952327039 scopus 로고    scopus 로고
    • On the power of randomization in algorithmic mechanism design
    • IEEE
    • S. Dobzinski and S. Dughmi. On the power of randomization in algorithmic mechanism design. In FOCS, pages 505-514. IEEE, 2009.
    • (2009) FOCS , pp. 505-514
    • Dobzinski, S.1    Dughmi, S.2
  • 9
    • 79959592600 scopus 로고    scopus 로고
    • A truthful randomized mechanism for combinatorial public projects via convex optimization
    • ACM
    • S. Dughmi. A truthful randomized mechanism for combinatorial public projects via convex optimization. In EC, pages 263-272. ACM, 2011.
    • (2011) EC , pp. 263-272
    • Dughmi, S.1
  • 10
    • 84863311520 scopus 로고    scopus 로고
    • Limitations of randomized mechanisms for combinatorial auctions
    • IEEE
    • S. Dughmi et al. Limitations of randomized mechanisms for combinatorial auctions. In FOCS, pages 502-511. IEEE, 2011.
    • (2011) FOCS , pp. 502-511
    • Dughmi, S.1
  • 11
    • 78751564971 scopus 로고    scopus 로고
    • Black-box randomized reductions in algorithmic mechanism design
    • IEEE
    • S. Dughmi and T. Roughgarden. Black-box randomized reductions in algorithmic mechanism design. In FOCS, pages 775-784. IEEE, 2010.
    • (2010) FOCS , pp. 775-784
    • Dughmi, S.1    Roughgarden, T.2
  • 12
    • 79959753563 scopus 로고    scopus 로고
    • From convex optimization to randomized mechanisms: Toward optimal combinatorial auctions
    • ACM
    • S. Dughmi, T. Roughgarden, and Q. Yan. From convex optimization to randomized mechanisms: toward optimal combinatorial auctions. In STOC, pages 149-158. ACM, 2011.
    • (2011) STOC , pp. 149-158
    • Dughmi, S.1    Roughgarden, T.2    Yan, Q.3
  • 13
    • 77955323302 scopus 로고    scopus 로고
    • A firm foundation for private data analysis
    • to appear
    • C. Dwork. A firm foundation for private data analysis. Communications of the ACM, to appear.
    • Communications of the ACM
    • Dwork, C.1
  • 14
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
    • (2008) TAMC , pp. 1-19
    • Dwork, C.1
  • 16
    • 79959622530 scopus 로고    scopus 로고
    • Selling privacy at auction
    • ACM
    • A. Ghosh and A. Roth. Selling privacy at auction. In EC, pages 199-208. ACM, 2011.
    • (2011) EC , pp. 199-208
    • Ghosh, A.1    Roth, A.2
  • 17
    • 79955735615 scopus 로고    scopus 로고
    • Bayesian incentive compatibility via matchings
    • ACM-SIAM
    • J. Hartline, R. Kleinberg, and A. Malekian. Bayesian incentive compatibility via matchings. In SODA. ACM-SIAM, 2011.
    • (2011) SODA
    • Hartline, J.1    Kleinberg, R.2    Malekian, A.3
  • 19
    • 84871977695 scopus 로고    scopus 로고
    • Personal communication
    • R.D. Kleinberg. Personal communication.
    • Kleinberg, R.D.1
  • 20
    • 38249019127 scopus 로고
    • Generating random combinatorial objects
    • V.G. Kulkarni. Generating random combinatorial objects. Journal of Algorithms, 11(2):185-207, 1990.
    • (1990) Journal of Algorithms , vol.11 , Issue.2 , pp. 185-207
    • Kulkarni, V.G.1
  • 21
    • 78349305779 scopus 로고    scopus 로고
    • Introduction to (generalized) Gibbs measures
    • A. Le Ny. Introduction to (generalized) Gibbs measures. Ensaios Matemáticos, 15:1-126, 2008.
    • (2008) Ensaios Matemáticos , vol.15 , pp. 1-126
    • Le Ny, A.1
  • 22
    • 46749128577 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, 2007.
    • (2007) FOCS
    • McSherry, F.1    Talwar, K.2
  • 24
    • 84856434218 scopus 로고    scopus 로고
    • Approximately optimal mechanism design via differential privacy
    • K. Nissim, R. Smorodinsky, and M. Tennenholtz. Approximately optimal mechanism design via differential privacy. ITCS, 2012.
    • (2012) ITCS
    • Nissim, K.1    Smorodinsky, R.2    Tennenholtz, M.3
  • 25
    • 57949083485 scopus 로고    scopus 로고
    • On the hardness of being truthful
    • IEEE
    • C. Papadimitriou, M. Schapira, and Y. Singer. On the hardness of being truthful. In FOCS, pages 250-259. IEEE, 2008.
    • (2008) FOCS , pp. 250-259
    • Papadimitriou, C.1    Schapira, M.2    Singer, Y.3
  • 26
    • 0010812548 scopus 로고
    • A necessary and sufficient condition for rationalizability in a quasi-linear context
    • J.C. Rochet. A necessary and sufficient condition for rationalizability in a quasi-linear context. Journal of Mathematical Economics, 16(2):191-200, 1987.
    • (1987) Journal of Mathematical Economics , vol.16 , Issue.2 , pp. 191-200
    • Rochet, J.C.1
  • 27
    • 77951678087 scopus 로고    scopus 로고
    • Differentially private combinatorial optimization
    • ACM-SIAM
    • K. Talwar, A. Gupta, K. Ligett, F. McSherry, and A. Roth. Differentially private combinatorial optimization. In SODA. ACM-SIAM, 2010.
    • (2010) SODA
    • Talwar, K.1    Gupta, A.2    Ligett, K.3    McSherry, F.4    Roth, A.5
  • 28
    • 84863536399 scopus 로고    scopus 로고
    • Is privacy compatible with truthfulness?
    • ePrint Technical Report, 2011/005
    • D. Xiao. Is privacy compatible with truthfulness? In Cryptology ePrint Technical Report, 2011/005, 2011.
    • (2011) Cryptology
    • Xiao, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.