{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:44:40Z","timestamp":1740141880269,"version":"3.37.3"},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T00:00:00Z","timestamp":1534464000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632017","11301475"],"award-info":[{"award-number":["61632017","11301475"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61761146005","61502300."],"award-info":[{"award-number":["61761146005","61502300."]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71771161","71471091"],"award-info":[{"award-number":["71771161","71471091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["4OR-Q J Oper Res"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s10288-018-0385-3","type":"journal-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T09:32:42Z","timestamp":1534498362000},"page":"231-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Recent studies of agent incentives in internet resource allocation and pricing"],"prefix":"10.1007","volume":"16","author":[{"given":"Yukun","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5282-6467","authenticated-orcid":false,"given":"Xiaotie","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Scheder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,17]]},"reference":[{"key":"385_CR1","unstructured":"Adams E, Dormans J (2012) Game mechanics: advanced game design. New Riders"},{"key":"385_CR2","doi-asserted-by":"crossref","unstructured":"Adsul B, Babu S, Garg J, Mehta R, Sohoni M (2010) Nash equilibria in Fisher market. In: Proeceedings of the 3rd international symposium on algorithmic game theory (SAGT), pp 30\u201341","DOI":"10.1007\/978-3-642-16170-4_4"},{"key":"385_CR3","doi-asserted-by":"crossref","unstructured":"Adsul B, Garg J, Mehta R, Sohoni MA (2011) Rank-1 bimatrix games: a homeomorphism and a polynomial time algorithm. In: Proceedings of the 43rd ACM symposium on theory of computing (STOC), pp 195\u2013204","DOI":"10.1145\/1993636.1993664"},{"key":"385_CR4","doi-asserted-by":"crossref","unstructured":"Anshelevich E, Kar K, Sekar S (2015) Envy-free pricing in large markets: approximating revenue and welfare. In: Proceedings of the 42th international colloquium on automata, languages, and programming (ICALP), pp 52\u201364","DOI":"10.1007\/978-3-662-47672-7_5"},{"issue":"4","key":"385_CR5","first-page":"50","volume":"53","author":"M Armbrust","year":"2009","unstructured":"Armbrust M (2009) Above the clouds: a berkeley view of cloud computing. Science 53(4):50\u201358","journal-title":"Science"},{"key":"385_CR6","doi-asserted-by":"publisher","first-page":"265","DOI":"10.2307\/1907353","volume":"22","author":"KJ Arrow","year":"1954","unstructured":"Arrow KJ, Debreu G (1954) Existence of an equilibrium for a competitive economy. Econometrica 22:265\u2013290","journal-title":"Econometrica"},{"issue":"1","key":"385_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S0899-8256(05)80015-6","volume":"8","author":"RJ Aumann","year":"1995","unstructured":"Aumann RJ (1995) Backward induction and common knowledge of rationality. Games Econ Behav 8(1):6\u201319","journal-title":"Games Econ Behav"},{"key":"385_CR8","unstructured":"Azevedo EM, Budish E (2012) Strategy proofness in the large as a desideratum for market design. In: Proceedings of the 13th ACM conference on electronic commerce (EC), pp 55\u201355"},{"key":"385_CR9","doi-asserted-by":"crossref","unstructured":"Babaioff M, Lucier B, Nisan N, Leme RP (2014) On the efficiency of the Walrasian mechanism. In: Proceedings of the 15th ACM conference on electronic commerce (EC), pp 783\u2013800","DOI":"10.1145\/2600057.2602850"},{"issue":"4","key":"385_CR10","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1086\/432138","volume":"113","author":"P Bajari","year":"2005","unstructured":"Bajari P, Hortacsu A (2005) Are structural estimates of auction models reasonable? Evidence from experimental data. J Polit Econ 113(4):703\u2013741","journal-title":"J Polit Econ"},{"issue":"1","key":"385_CR11","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/2951697","volume":"63","author":"S Barber\u00e0","year":"1995","unstructured":"Barber\u00e0 S, Jackson M (1995) Strategy-proof exchange. Econometrica 63(1):51\u201387","journal-title":"Econometrica"},{"key":"385_CR12","doi-asserted-by":"crossref","unstructured":"Br\u00e2nzei S, Chen Y, Deng X, Filos-Ratsikas A, Kristoffer S, Frederiksen S, Zhang J (2014) The fisher market game: equilibrium and welfare. In: Proceedings of the 28th conference on artificial intelligence (AAAI), pp 587\u2013593","DOI":"10.1609\/aaai.v28i1.8807"},{"issue":"3","key":"385_CR13","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1162\/0033553041502225","volume":"119","author":"C Camerer","year":"2004","unstructured":"Camerer C, Ho T, Chong J (2004) A cognitive hierarchy theory of one-shot games. Q J Econ 119(3):861\u2013898","journal-title":"Q J Econ"},{"key":"385_CR14","doi-asserted-by":"crossref","unstructured":"Chen Z, Cheng Y, Deng X, Qi Q, Yan X (2017) Agent incentives of strategic behavior in resource exchange. in: Proceedings of the 9th international symposium on algorithmic game theory (SAGT), pp 227\u2013239","DOI":"10.1007\/978-3-319-66700-3_18"},{"key":"385_CR15","doi-asserted-by":"crossref","unstructured":"Chen Z, Cheng Y, Deng X, Qi Q, Yan X (2017) Limiting user\u2019s Sybil attack in resource sharing. In: Proceedings of the 13th international workshop on internet and network economics (WINE), pp 103\u2013119","DOI":"10.1007\/978-3-319-71924-5_8"},{"key":"385_CR16","doi-asserted-by":"crossref","unstructured":"Chen Z, Cheng Y, Qi Q, Yan X (2017) Incentive ratios of a proportional sharing mechanism in resource sharing. In: Proceedings of 23rd international computing and combinatorics conference (COCOON), pp 137\u2013149","DOI":"10.1007\/978-3-319-62389-4_12"},{"key":"385_CR17","unstructured":"Chen N, Deng X (2011) On Nash dynamics of matching market equilibria, CoRR abs\/1103.4196"},{"key":"385_CR18","doi-asserted-by":"crossref","unstructured":"Chen N, Deng X, Tang B, Zhang H (2016) Incentives for strategic behavior in fisher market games. In: Proceedings of the 30th conference on artificial intelligence (AAAI), pp 453\u2013459","DOI":"10.1609\/aaai.v30i1.10044"},{"key":"385_CR19","doi-asserted-by":"crossref","unstructured":"Chen N, Deng X, Zhang J (2011) How profitable are strategic behaviors in a market? In: Proceedings of European symposium on algorithms (ESA), pp 106\u2013118","DOI":"10.1007\/978-3-642-23719-5_10"},{"key":"385_CR20","doi-asserted-by":"crossref","unstructured":"Chen N, Deng X, Zhang XH, Zhang J (2012) Incentive ratios of fisher markets. In: Proceedings of the 39th international colloquium on automata, languages, and programming (ICALP), pp 464\u2013475","DOI":"10.1007\/978-3-642-31585-5_42"},{"key":"385_CR21","doi-asserted-by":"crossref","unstructured":"Cheng Y, Deng X, Pi Y, Yan X (2015) Can bandwidth sharing be truthful? In: Proceedings of the 7th international symposium on algorithmic game theory (SAGT), pp 190\u2013202","DOI":"10.1007\/978-3-662-48433-3_15"},{"key":"385_CR22","unstructured":"Cheng Y, Deng X, Qi Q, Yan X (2016) Truthfulness of a proportional sharing mechanism in resource exchange. In: Proceedings of the 25th international joint conference on artificial intelligence (IJCAI), pp 187\u2013193"},{"issue":"1","key":"385_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BF01726210","volume":"11","author":"E Clarke","year":"1971","unstructured":"Clarke E (1971) Multipart pricing of public goods. Public Choice 11(1):17\u201333","journal-title":"Public Choice"},{"key":"385_CR24","unstructured":"Cohen M, Sundararajan A (2015) Self-regulation and innovation in the peer-to-peer sharing economy. University of Chicago Law Review Dialogue, 116"},{"key":"385_CR25","unstructured":"Deng X (2015) Game theoretic understanding of social economic system design. Keynote speech, The 7th Asian Conference on Machine Learning (ACML)"},{"key":"385_CR26","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s00453-007-0064-9","volume":"48","author":"X Deng","year":"2007","unstructured":"Deng X, Huang L, Li M (2007) On Walrasian price of CPU time. Algorithmica 48:159\u2013172","journal-title":"Algorithmica"},{"issue":"3","key":"385_CR27","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/JSAC.2017.2672318","volume":"35","author":"X Deng","year":"2017","unstructured":"Deng X, Wang J, Wang J (2017) How to design a common telecom infrastructure for competitors to be individually rational and collectively optimal. IEEE J Sel Areas Commun 35(3):736\u2013750","journal-title":"IEEE J Sel Areas Commun"},{"key":"385_CR28","doi-asserted-by":"crossref","unstructured":"Deng X, Xiao T, Zhu K (2017) Learn to play maximum revenue auction. IEEE Trans Cloud Comput, appeared on-line","DOI":"10.1109\/TCC.2017.2712142"},{"key":"385_CR29","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1257\/aer.97.1.242","volume":"97","author":"B Edelman","year":"2007","unstructured":"Edelman B, Ostrovsky M, Schwarz M (2007) Internet advertising and the generalized second-price auction: selling billions of dollars worth of keywords. Am Econ Rev 97:242\u2013259","journal-title":"Am Econ Rev"},{"key":"385_CR30","unstructured":"Edelman B, Schwarz M (2006) Optimal auction design in a multi-unit environment: the case of sponsored search auctions. Unpublished Manuscript"},{"key":"385_CR31","unstructured":"Eldering CA (2003) Advertisement selection system supporting discretionary target market characteristics. US6560578"},{"key":"385_CR32","doi-asserted-by":"crossref","unstructured":"Feldman M, Lai K, Stoica I (2004) Robust incentive techniques for peer-to-peer networks. In: Proceedings of the 5th ACM conference on electronic commerce (EC), pp 102\u2013111","DOI":"10.1145\/988772.988788"},{"key":"385_CR33","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1287\/ijoc.1050.0135","volume":"19","author":"J Feng","year":"2007","unstructured":"Feng J, Bhargava HK, Pennock D (2007) Implementing sponsored search in web search engines: computational evaluation of alternative mechanisms. INFORMS J Comput 19:137\u2013148","journal-title":"INFORMS J Comput"},{"key":"385_CR34","first-page":"22","volume":"1","author":"I Foster","year":"2002","unstructured":"Foster I (2002) What is a grid? A three point checklist. Grid Today 1:22\u201325","journal-title":"Grid Today"},{"key":"385_CR35","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/00029890.1962.11989827","volume":"69","author":"D Gale","year":"1962","unstructured":"Gale D, Shapley L (1962) College admissions and the stability of marriage. Am Math Mon 69:9\u201315","journal-title":"Am Math Mon"},{"key":"385_CR36","doi-asserted-by":"crossref","unstructured":"Georgiadis L, Iosifidi G, Tassiulas L (2015). Exchange of services in networks: competition, cooperation, and fairness. In: Proceedings of the 2015 ACM international conference on measurement and modeling of computer systems (SIGMETRICS), pp 43\u201356","DOI":"10.1145\/2745844.2745860"},{"key":"385_CR37","unstructured":"Ghodsi A, Zaharia M, Hindman B, Konwinski A, Shenker S, Stoica I (2011) Dominant resource fairness: fair allocation of multiple resource types. (NSDI), pp 323\u2013336"},{"key":"385_CR38","unstructured":"Goldberg AV, Hartline JD, Wright A (2001) Competitive auctions and digital goods. In: Proceedings of the 12th ACM-SIAM symposium on discrete algorithms (SODA), vol 55, no 2, pp 735\u2013744"},{"key":"385_CR39","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1086\/257655","volume":"63","author":"DF Gordon","year":"1955","unstructured":"Gordon DF (1955) Operational proposition in economic theory. J Polit Econ 63:150\u2013161","journal-title":"J Polit Econ"},{"key":"385_CR40","doi-asserted-by":"crossref","unstructured":"Gradwohl R, Reingold O (2008) Fault tolerance in large games. In: Proceedings of the 9th ACM conference on electronic commerce (EC), pp 274\u2013283","DOI":"10.1145\/1386790.1386833"},{"issue":"4","key":"385_CR41","doi-asserted-by":"publisher","first-page":"617","DOI":"10.2307\/1914085","volume":"41","author":"T Groves","year":"1973","unstructured":"Groves T (1973) Incentives in teams. Econometrica 41(4):617\u2013631","journal-title":"Econometrica"},{"key":"385_CR42","unstructured":"Guruswami V, Hartline J, Karlin A, Kempe D, Kenyon C, McSherry F (2005) On profit-maximizing envy-free pricing. In: Proceedings of 16th ACM-SIAM symposium on discrete algorithms (SODA), pp 1164\u20131173"},{"key":"385_CR43","unstructured":"Hahn R, Metcalfe R (2017) The Ridesharing revolution: economic survey and synthesis. In: Kominers SD, Teytelboym A (eds) More equal by design: economic design responses to inequality, volume IV. Oxford University Press, Oxford"},{"key":"385_CR44","unstructured":"Hindman B, Konwinski A, Zaharia M, Ghodsi A, Joseph AD, Katz R, Shenker S, Stoica I (2011) Mesos:a platform for fine-grained resource sharing in the data center. In: Proceedings of the 8th networked systems design and implementation (NSDI), pp 295\u2013308"},{"key":"385_CR45","unstructured":"Hurwicz L (1972) On informationally decentralized systems. In: McGuire CB, Radner R (eds) Decision and organization: a volume in honor of Jacob Marshak (North-Holland), pp 297\u2013336"},{"key":"385_CR46","unstructured":"Hurwicz L (2007) But who guide the guidians?. L. Hurwicz, Nobel Prize Lecture"},{"key":"385_CR47","unstructured":"Immorlica N, Mahdian M (2005) Marriage, honesty and stability. In: Proceedings of the 22th international symposium on theoretical aspects of computer science (STACS), pp 641\u2013653"},{"key":"385_CR48","unstructured":"Iwasaki A, Katsuragi A, Yokoo M (2011) False-name bidding in first-price combinatorial auctions with incomplete information. In: Proceedings of international conference on autonomous agents and multiagent systems (AAMAS), pp 541\u2013548"},{"key":"385_CR49","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/0165-1765(92)90008-M","volume":"40","author":"MO Jackson","year":"1992","unstructured":"Jackson MO (1992) Incentive compatibility and competitive allocations. Econ Lett 40:299\u2013302","journal-title":"Econ Lett"},{"issue":"2","key":"385_CR50","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1504\/IJEB.2008.018068","volume":"6","author":"B Jansen","year":"2008","unstructured":"Jansen B, Mullen T (2008) Sponsored search: an overview of the concept, history, and technology. Int J Electron Bus 6(2):114\u2013131","journal-title":"Int J Electron Bus"},{"key":"385_CR51","doi-asserted-by":"crossref","unstructured":"Jian L, Jeffrey K, MacKie M (2012) Incentive-centered design for user-contributed content. The Oxford Handbook of The Digital Economy","DOI":"10.1093\/oxfordhb\/9780195397840.013.0015"},{"issue":"1","key":"385_CR52","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling LP, Littman ML, Moore AW (1996) Reinforcement learning: a survey. J Artif Intell Res 4(1):237\u2013285","journal-title":"J Artif Intell Res"},{"issue":"1","key":"385_CR53","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1257\/aer.97.1.242","volume":"97","author":"M King","year":"2007","unstructured":"King M, Atkins J, Schwarz M (2007) Internet advertising and the generalized second-price auction: selling billions of dollars worth of keywords. Am Econ Rev 97(1):242\u2013259","journal-title":"Am Econ Rev"},{"key":"385_CR54","doi-asserted-by":"crossref","unstructured":"Koutsoupias E, Papadimitriou CH (1999) Worst-case equilibria. In: Proceedings of the 16th international symposium on theoretical aspects of computer science (STACS), pp 404\u2013413","DOI":"10.1007\/3-540-49116-3_38"},{"issue":"2","key":"385_CR55","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.dss.2004.07.005","volume":"41","author":"O Kwon","year":"2006","unstructured":"Kwon O (2006) Multi-agent system approach to context-aware coordinated web services under general market mechanism. Decision Support Syst 41(2):380\u2013399","journal-title":"Decision Support Syst"},{"issue":"2","key":"385_CR56","first-page":"21","volume":"52","author":"S LaValle","year":"2011","unstructured":"LaValle S, Lesser E, Shockley R, Hopkins MS, Kruschwitz N (2011) Big data, analytics and the path from insights to value. MIT Sloan Manag Rev 52(2):21\u201332","journal-title":"MIT Sloan Manag Rev"},{"key":"385_CR57","doi-asserted-by":"crossref","unstructured":"Marbach P, Berry R (2002) Downlink resource allocation and pricing for wireless networks. In: Proceedings of the 21st annual joint conference of the IEEE computer and communications societies (INFOCOM), vol 3, pp 1470\u20131479","DOI":"10.1109\/INFCOM.2002.1019398"},{"issue":"2","key":"385_CR58","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2307\/1907539","volume":"22","author":"L McKenzie","year":"1954","unstructured":"McKenzie L (1954) On equilibrium in Graham\u2019s model of world trade and other competitive systems. Econometrica 22(2):147\u2013161","journal-title":"Econometrica"},{"key":"385_CR59","doi-asserted-by":"crossref","unstructured":"Mehta R, Sohoni M (2013) Exchange markets: strategy meets supply-awareness. In: Proceedings of the 9th international workshop on internet and network economics (WINE), pp 361\u2013362","DOI":"10.1007\/978-3-642-45046-4_29"},{"key":"385_CR60","unstructured":"Michahelles F (ed) (2009) Business aspects of the internet of things. Seminar of advanced topics, FS"},{"key":"385_CR61","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D, Rusu A, Veness J, Bellemare MG, Graves A, Riedmiller M, Fidjeland AK, Ostrovski G, Petersen S, Beattie C, Sadik A, Antonoglou I, King H, Kumaran D, Wierstra D, Legg S, Hassabis D (2015) Human-level control through deep reinforcement learning. Nature 518:1529","journal-title":"Nature"},{"key":"385_CR62","doi-asserted-by":"publisher","first-page":"61","DOI":"10.2307\/1912346","volume":"47","author":"R Myerson","year":"1979","unstructured":"Myerson R (1979) Incentive-compatibility and the bargaining problem. Econometrica 47:61\u201373","journal-title":"Econometrica"},{"issue":"1","key":"385_CR63","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1287\/moor.6.1.58","volume":"6","author":"R Myerson","year":"1981","unstructured":"Myerson R (1981) Optimal auction design. Math Oper Res 6(1):58\u201373","journal-title":"Math Oper Res"},{"issue":"1","key":"385_CR64","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"J Nash","year":"1950","unstructured":"Nash J (1950) Equilibrium points in n-person games. Proc Natl Acad Sci USA 36(1):48\u201349","journal-title":"Proc Natl Acad Sci USA"},{"issue":"1","key":"385_CR65","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/0022-0531(82)90014-X","volume":"27","author":"Y Otani","year":"1982","unstructured":"Otani Y, Sicilian J (1982) Equilibrium aloptlocations of walrasian preference games. J Econ Theory 27(1):47\u201368","journal-title":"J Econ Theory"},{"key":"385_CR66","doi-asserted-by":"crossref","unstructured":"Polak I (2016) The incentive ratio in exchange economies. In: Proceedings of the 10th international conference on combinatorial optimization and applications (COCOA), pp 685\u2013692","DOI":"10.1007\/978-3-319-48749-6_49"},{"issue":"2","key":"385_CR67","doi-asserted-by":"publisher","first-page":"255","DOI":"10.2307\/2297049","volume":"46","author":"A Postlewaite","year":"1979","unstructured":"Postlewaite A (1979) Manipulation via endowments. Rev Econ Stud 46(2):255\u2013262","journal-title":"Rev Econ Stud"},{"key":"385_CR68","doi-asserted-by":"publisher","first-page":"115","DOI":"10.2307\/1911385","volume":"44","author":"DJ Roberts","year":"1976","unstructured":"Roberts DJ, Postlewaite A (1976) The incentives for price taking behaviour in large exchange economies. Econometrica 44:115\u2013127","journal-title":"Econometrica"},{"issue":"2","key":"385_CR69","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/506147.506153","volume":"49","author":"T Roughgarden","year":"2002","unstructured":"Roughgarden T, Tardos E (2002) How bad is selfish routing. J ACM 49(2):236\u2013259","journal-title":"J ACM"},{"issue":"3","key":"385_CR70","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/j.2326-1951.1969.tb02529.x","volume":"9","author":"TC Schelling","year":"1969","unstructured":"Schelling TC (1969) The strategy of conflict. Sciences 9(3):3\u20138","journal-title":"Sciences"},{"key":"385_CR71","unstructured":"Schollmeier R (2001) A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the 1st international conference on peer-to-peer computing, pp 101\u2013102"},{"issue":"1","key":"385_CR72","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/BF01753437","volume":"1","author":"L Shapley","year":"1971","unstructured":"Shapley L, Shubik M (1971) The assignment game I: the core. Int J Game Theory 1(1):111\u2013130","journal-title":"Int J Game Theory"},{"key":"385_CR73","unstructured":"Simon HA (1957) A behavioral model of rational choice. Models of man, social and rational: mathematical essays on rational human behavior in a social setting. Wiley, New York, pp 241\u2013260"},{"issue":"1","key":"385_CR74","doi-asserted-by":"publisher","first-page":"99","DOI":"10.2307\/1884852","volume":"69","author":"HA Simon","year":"1953","unstructured":"Simon HA (1953) A behavioral model of rational choice. Q J Econ 69(1):99\u2013118","journal-title":"Q J Econ"},{"key":"385_CR75","doi-asserted-by":"publisher","DOI":"10.1093\/oseo\/instance.00043218","volume-title":"An inquiry into the nature and causes of the wealth of nations","author":"A Smith","year":"1776","unstructured":"Smith A (1776) An inquiry into the nature and causes of the wealth of nations. University of Chicago Press, Chicago"},{"key":"385_CR76","doi-asserted-by":"publisher","first-page":"65","DOI":"10.2307\/1884513","volume":"70","author":"RM Solow","year":"1956","unstructured":"Solow RM (1956) A contribution to the theory of economic growth. Q J Econ 70:65\u201394","journal-title":"Q J Econ"},{"key":"385_CR77","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/S0165-1765(03)00037-5","volume":"79","author":"R Strausz","year":"2003","unstructured":"Strausz R (2003) Deterministic mechanisms and the revelation principle. Econ Let 79:333\u2013337","journal-title":"Econ Let"},{"key":"385_CR78","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.ejor.2009.07.033","volume":"203","author":"J Str\u00f6sser","year":"2010","unstructured":"Str\u00f6sser J, Neumann D, Weinhardt C (2010) Market-based pricing in grids: on strategic manipulation and computational cost. Eur J Oper Res 203:464\u2013475","journal-title":"Eur J Oper Res"},{"key":"385_CR79","unstructured":"Tang P, Zeng Y (2016) How to manipulate truthful prior-dependent mechanisms? CoRR, abs\/1606.02409"},{"key":"385_CR80","doi-asserted-by":"crossref","unstructured":"Teng F, Magoules F (2010) Resource pricing and equilibrium allocation policy in cloud computing. In: Proceedings of IEEE 10th international conference on computer and information technology (CIT), pp 195\u2013202","DOI":"10.1109\/CIT.2010.70"},{"key":"385_CR81","unstructured":"Turner DA, Ross KW (2004) A lightweight currency paradigm for the P2P resource market. Proc. electronic commerce research"},{"key":"385_CR82","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1016\/j.ijindorg.2006.10.002","volume":"25","author":"HR Varian","year":"2006","unstructured":"Varian HR (2006) Position auctions. Int J Ind Organ 25:1163\u20131178","journal-title":"Int J Ind Organ"},{"key":"385_CR83","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey W (1961) Counterspeculation, auctions and competitive sealed tenders. J Finance 16:8\u201337","journal-title":"J Finance"},{"key":"385_CR84","unstructured":"Walras L (1874) \u00c9l\u00e9ments d\u2019\u00e9conomie politique pure. ou th\u00e9orie de la richesse sociale"},{"key":"385_CR85","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.tre.2016.05.011","volume":"93","author":"X Wang","year":"2016","unstructured":"Wang X, He F, Yang H, Gao HO (2016) Pricing strategies for a taxi-hailing platform. Transp Res Part E: Logist Transp Rev 93:212\u2013237","journal-title":"Transp Res Part E: Logist Transp Rev"},{"issue":"2","key":"385_CR86","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1111\/j.1468-0262.2005.00589.x","volume":"73","author":"T Wiseman","year":"2005","unstructured":"Wiseman T (2005) A partial folk theorem for games with unknown payoff distributions. Econometrica 73(2):629\u2013645","journal-title":"Econometrica"},{"issue":"3","key":"385_CR87","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1177\/109434200101500305","volume":"15","author":"R Wolski","year":"2001","unstructured":"Wolski R, Plank JS, Brevik J, Bryan T (2001) Analyzing market-based resource allocation strategies for the computational grid. Int J High Perform Comput Appl 15(3):258\u2013281","journal-title":"Int J High Perform Comput Appl"},{"key":"385_CR88","doi-asserted-by":"crossref","unstructured":"Wu F, Zhang L (2007) Proportional response dynamics leads to market equilibrium. In: Proceedings of the 39th ACM symposium on theory of computing (STOC), pp 354\u2013363","DOI":"10.1145\/1250790.1250844"},{"issue":"4","key":"385_CR89","doi-asserted-by":"publisher","first-page":"817","DOI":"10.2307\/2297836","volume":"58","author":"G Yi","year":"1991","unstructured":"Yi G (1991) Manipulation via withholding: a generalization. Rev Econ Stud 58(4):817\u2013820","journal-title":"Rev Econ Stud"},{"key":"385_CR90","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/S0899-8256(03)00045-9","volume":"46","author":"M Yokoo","year":"2004","unstructured":"Yokoo M, Sakurai Y, Matsubara S (2004) The effect of false-name bids in combinatorial auctions: new fraud in Internet auctions. Games Econ Behav 46:174\u2013188","journal-title":"Games Econ Behav"}],"container-title":["4OR"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10288-018-0385-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10288-018-0385-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10288-018-0385-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T16:22:14Z","timestamp":1661790134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10288-018-0385-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,17]]},"references-count":90,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["385"],"URL":"https:\/\/doi.org\/10.1007\/s10288-018-0385-3","relation":{},"ISSN":["1619-4500","1614-2411"],"issn-type":[{"type":"print","value":"1619-4500"},{"type":"electronic","value":"1614-2411"}],"subject":[],"published":{"date-parts":[[2018,8,17]]},"assertion":[{"value":"5 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2018","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"This is a theoretical research therefore there is no human nor animal subjects is involved.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal participation"}},{"value":"There is no conflict of interest to any other work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}