{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T13:05:38Z","timestamp":1744376738492},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438588"},{"type":"electronic","value":"9783540454489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45448-9_25","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T17:03:25Z","timestamp":1179767005000},"page":"335-347","source":"Crossref","is-referenced-by-count":17,"title":["Antisocial Agents and Vickrey Auctions"],"prefix":"10.1007","author":[{"given":"Felix","family":"Brandt","sequence":"first","affiliation":[]},{"given":"Gerhard","family":"Wei\u00df","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"25_CR1","unstructured":"F. Brandt. Antisocial Bidding in Repeated Vickrey Auctions. Technical Report FKI-241-00, Institut f\u00fcr Informatik, Technische Universit\u00e4t M\u00fcnchen, 2000."},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"F. Brandt. Cryptographic protocols for secure second-price auctions. In M. Klusch and F. Zambonelli, editors, Cooperative Information Agents V, volume 2182 of Lecture Notes in Artificial Intelligence, pages 154\u2013165, Berlin et al., 2001. Springer.","DOI":"10.1007\/3-540-44799-7_16"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"F. Brandt, W. Brauer, and G. Wei\u00df. Task assignment in multiagent systems based on Vickrey-type auctioning and leveled commitment contracting. In M. Klusch and L. Kerschberg, editors, Cooperative Information Agents IV, volume 1860 of Lecture Notes in Artificial Intelligence, pages 95\u2013106, Berlin et al., 2000. Springer.","DOI":"10.1007\/978-3-540-45012-2_10"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"K. Danielsen and M. Weiss. User control modes and IP allocation. http:\/\/www.press.umich.edu\/jep\/works\/DanieContr.html , 1995. presented at MIT Workshop on Internet Economics.","DOI":"10.3998\/3336451.0002.112"},{"key":"25_CR5","unstructured":"K.E. Drexler and M.S. Miller. Incentive engineering for computational resource management. In B.A. Huberman, editor, The Ecology of Computation. The Netherlands, 1988."},{"key":"25_CR6","unstructured":"B. Huberman and S.H. Clearwater. A multiagent system for controlling building environments. In Proceedings of the 1st International Conference on Multiagent Systems (ICMAS-95), pages 171\u2013176, Menlo Park, CA, 1995. AAAI Press."},{"key":"25_CR7","first-page":"814","volume":"86","author":"P. Jehiel","year":"1996","unstructured":"P. Jehiel, B. Moldovanu, and E. Stacchetti. How (not) to sell nuclear weapons. American Economic Review, 86:814\u2013829, 1996.","journal-title":"American Economic Review"},{"key":"25_CR8","unstructured":"J.K. MacKie-Mason and H.R. Varian. Pricing the internet. In Proceedings of the Public Access to the Internet Conference. JFK School of Government, 1993."},{"key":"25_CR9","first-page":"699","volume":"25","author":"R.P. McAfee","year":"1987","unstructured":"R.P. McAfee and J. McMillan. Auctions and Bidding. Journal of Economic Literature, 25:699\u2013738, 1987.","journal-title":"Journal of Economic Literature"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.2307\/1911865","volume":"50","author":"P.R. Milgrom","year":"1982","unstructured":"P.R. Milgrom and R.J. Weber. A Theory of Auctions and Competitive Bidding. Econometrica, 50:1089\u20131122, 1982.","journal-title":"Econometrica"},{"key":"25_CR11","unstructured":"E. Rasmusen. Games and Information. Basil Blackwell, 1995."},{"issue":"2","key":"25_CR12","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1086\/296663","volume":"68","author":"M.H. Rothkopf","year":"1995","unstructured":"M.H. Rothkopf and R.M. Harstad. Two models of bid-taker cheating in Vickrey auctions. Journal of Business, 68(2):257\u2013267, 1995.","journal-title":"Journal of Business"},{"issue":"1","key":"25_CR13","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1086\/261670","volume":"98","author":"M.H. Rothkopf","year":"1990","unstructured":"M.H. Rothkopf, T.J. Teisberg, and E.P. Kahn. Why are Vickrey auctions rare? Journal of Political Economy, 98(1):94\u2013109, 1990.","journal-title":"Journal of Political Economy"},{"key":"25_CR14","unstructured":"T.W. Sandholm. Limitations of the Vickrey auction in computational multiagent systems. In Proceedings of the 2nd International Conference on Multiagent Systems (ICMAS-96), Menlo Park, CA, 1996. AAAI Press."},{"key":"25_CR15","unstructured":"T.W. Sandholm and V.R. Lesser. Issues in automated negotiation and electronic commerce: Extending the contract net framework. In Proceedings of the First International Conference on Multi-Agent Systems (ICMAS-95), pages 328\u2013335, 1995."},{"key":"25_CR16","unstructured":"T.W. Sandholm and V.R. Lesser. Advantages of a leveled commitment contracting protocol. In Proceedings of the 13th National Conference on Artificial Intelligence (AAAI-96), pages 126\u2013133, 1996."},{"key":"25_CR17","unstructured":"Sun Microsystems. Webmart: Managing shared resources by market mechanisms. http:\/\/www.sun.com:80\/960201\/cover\/webmart.html , 1996."},{"issue":"1","key":"25_CR18","doi-asserted-by":"publisher","first-page":"8","DOI":"10.2307\/2977633","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"W. Vickrey. Counter speculation, auctions, and competitive sealed tenders. Journal of Finance, 16(1):8\u201337, 1961.","journal-title":"Journal of Finance"},{"issue":"2","key":"25_CR19","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/32.121753","volume":"18","author":"C.A. Waldspurger","year":"1992","unstructured":"C.A. Waldspurger, T. Hogg, B. Huberman, J.O. Kephart, and W.S. Stornetta. Spawn: A distributed computational economy. IEEE Transactions on Software Engineering, 18(2): 103\u2013117, 1992.","journal-title":"IEEE Transactions on Software Engineering"},{"volume-title":"Multiagent Systems. A Modern Approach to Distributed Artificial Intelligence","year":"1999","key":"25_CR20","unstructured":"G. Wei\u00df, editor. Multiagent Systems. A Modern Approach to Distributed Artificial Intelligence. The MIT Press, Cambridge, MA, 1999."}],"container-title":["Lecture Notes in Computer Science","Intelligent Agents VIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45448-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:40:13Z","timestamp":1556433613000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45448-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438588","9783540454489"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-45448-9_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}