{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:45:02Z","timestamp":1744159502431},"reference-count":436,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,7,19]],"date-time":"2008-07-19T00:00:00Z","timestamp":1216425600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1007\/s10479-008-0328-z","type":"journal-article","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T19:54:11Z","timestamp":1216410851000},"page":"209-253","source":"Crossref","is-referenced-by-count":14,"title":["Computer science and decision theory"],"prefix":"10.1007","volume":"163","author":[{"given":"Fred S.","family":"Roberts","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,7,19]]},"reference":[{"key":"328_CR1","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Preda, M., & Cobena, G. (2003). Adaptive on-line page importance computation. In Proceedings WWW2003.","DOI":"10.1145\/775152.775192"},{"key":"328_CR2","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/0022-247X(90)90193-J","volume":"150","author":"J. Acz\u00e9l","year":"1990","unstructured":"Acz\u00e9l, J. (1990). Determining merged relative scores. Journal of Mathematical Analysis and Applications, 150, 20\u201340.","journal-title":"Journal of Mathematical Analysis and Applications"},{"key":"328_CR3","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/0165-4896(89)90054-1","volume":"17","author":"J. Acz\u00e9l","year":"1989","unstructured":"Acz\u00e9l, J., & Roberts, F. S. (1989). On the possible merging functions. Mathematical Social Sciences, 17, 205\u2013243.","journal-title":"Mathematical Social Sciences"},{"key":"328_CR4","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/0022-247X(86)90162-9","volume":"119","author":"J. Acz\u00e9l","year":"1986","unstructured":"Acz\u00e9l, J., Roberts, F. S., & Rosenbaum, Z. (1986). On scientific laws without dimensional constants. Journal of Mathematical Analysis and Applications, 119, 389\u2013416.","journal-title":"Journal of Mathematical Analysis and Applications"},{"key":"328_CR5","unstructured":"Ailon, N., Charikar, M., & Newman, A. (2005). Aggregating inconsistent information: ranking and clustering. In: STOC 2005 (pp. 684\u2013693)."},{"key":"328_CR6","doi-asserted-by":"crossref","first-page":"510","DOI":"10.2307\/2274239","volume":"50","author":"C. Alchourron","year":"1985","unstructured":"Alchourron, C., G\u00e4rdenfors, P., & Makinson, D. (1985). On the logic of theory change: partial meet contraction and revision functions. Journal of Symbolic Logic, 50, 510\u2013530.","journal-title":"Journal of Symbolic Logic"},{"key":"328_CR7","series-title":"Lecture notes in computer science","volume-title":"Intelligence and security informatics, proceedings of ISI-2006","author":"S. Anand","year":"2006","unstructured":"Anand, S., Madigan, D., Mammone, R., Pathak, S., & Roberts, F. S. (2006). Experimental analysis of sequential decision making algorithms for port of entry inspection procedures. In D. Mehrotra, D. Zeng, H. Chen, B. Thuraisingham, & F.-X. Wang (Eds.), Lecture notes in computer science : Vol. 3975. Intelligence and security informatics, proceedings of ISI-2006. New York: Springer."},{"key":"328_CR8","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.2307\/2171773","volume":"63","author":"L. Anderlini","year":"1975","unstructured":"Anderlini, L., & Sabourian, H. (1975). Cooperation and effective computability. Econometrica, 63, 1337\u20131369.","journal-title":"Econometrica"},{"key":"328_CR9","doi-asserted-by":"crossref","unstructured":"Andersen, R., Borgs, C., Chayes, J., Feige, U., Flaxman, A., Kalai, A., Mirrokni, V., & Tennenholtz, M. (2008). Trust-based recommendation systems: an axiomatic approach. In Proceedings of the 17th international conference on world wide web (WWW).","DOI":"10.1145\/1367497.1367525"},{"key":"328_CR10","doi-asserted-by":"crossref","unstructured":"Andersson, A., Tenhungen, M., & Ygge, F. (2000). Integer programming for combinatorial auction winner determination. In: Proceedings 4th international conference on multi-agent systems (ICMAS00) (pp.\u00a039\u201346).","DOI":"10.1109\/ICMAS.2000.858429"},{"key":"328_CR11","volume-title":"The eleventh text retrieval conference","author":"A. Anghelescu","year":"2002","unstructured":"Anghelescu, A., Boros, E., Fradkin, D., Lewis, D., Menkov, V., Neu, D., Ng, K.-B., & Kantor, P. (2002). Rutgers filtering work at TREC 2002: adaptive and batch. In D. Harman & E. Voorhees (Eds.), The eleventh text retrieval conference. Washington: US Department of Commerce (NIST special publication, SP500-251)."},{"key":"328_CR12","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/138027.138061","volume":"40","author":"D. Angluin","year":"1993","unstructured":"Angluin, D., Hellerstein, L., & Karpinski, M. (1993). Learning read-once formulas with queries. Journal of the Association for Computing Machinery, 40, 185\u2013210.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"328_CR13","unstructured":"Arseneau, L. (1996). Optimal testing strategies for s,t-series parallel systems. Master\u2019s thesis, University of Waterloo."},{"key":"328_CR14","doi-asserted-by":"crossref","unstructured":"Asokan, N., Shoup, V., & Waidner, M. (1998). Fair exchange of digital signatures. In Eurocrypt\u201998 (pp.\u00a0591\u2013606).","DOI":"10.1007\/BFb0054156"},{"key":"328_CR15","unstructured":"Aumann, R. (1981). Survey of repeated games. In Essays in game theory and mathematical economics in honor of Oskar Morgenstern (pp. 11\u201342) Zurich."},{"key":"328_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/1911154","volume":"55","author":"R. J. Aumann","year":"1987","unstructured":"Aumann, R. J. (1987). Correlated equilibrium as an expression of Bayesian rationality. Econometrica, 55, 1\u201318.","journal-title":"Econometrica"},{"key":"328_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/0899-8256(89)90003-1","volume":"1","author":"R. Aumann","year":"1989","unstructured":"Aumann, R., & Sorin, S. (1989). Cooperation and bounded recall. Games and Economic Behavior, 1, 5\u201339.","journal-title":"Games and Economic Behavior"},{"key":"328_CR18","unstructured":"Aviv, Y. & Pazgal, A. (2005). Pricing of short life-cycle products through active learning. Preprint, Olin School of Business, Washington University, St. Louis."},{"key":"328_CR19","volume-title":"Proceedings of the 19th conference on uncertainty and artificial intelligence","author":"D. Azari","year":"2003","unstructured":"Azari, D., Horvitz, E., Dumais, S., & Brill, E. (2003). A decision making perspective on web question answering. In Proceedings of the 19th conference on uncertainty and artificial intelligence. San Francisco: Morgan Kaufmann."},{"key":"328_CR20","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/245108.245124","volume":"40","author":"M. Balabanovic","year":"1997","unstructured":"Balabanovic, M., & Shoham, Y. (1997). Fab: Content based, collaborative recommendation. Communications of the ACM, 40, 66\u201372.","journal-title":"Communications of the ACM"},{"key":"328_CR21","doi-asserted-by":"crossref","unstructured":"Balasubramaniyan, J. S., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E. H., & Zamboni, D. (1998). An architecture for intrusion detection using autonomous agents. In Proceedings 14th IEEE conference on computer security applications, December 1998.","DOI":"10.1109\/CSAC.1998.738563"},{"key":"328_CR22","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1111\/j.1467-8640.1992.tb00337.x","volume":"8","author":"C. Baral","year":"1992","unstructured":"Baral, C., Kraus, S., Minker, J., & Subrahmanian, V. S. (1992). Combining knowledge bases consisting of first order theories. Computational Intelligence, 8, 45\u201371.","journal-title":"Computational Intelligence"},{"key":"328_CR23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1006\/inco.1995.1101","volume":"120","author":"A. Bar-Noy","year":"1995","unstructured":"Bar-Noy, A., Deng, X., Garay, J. A., & Kameda, T. (1995). Optimal amortized distributed consensus. Information and Computation, 120, 93\u2013100.","journal-title":"Information and Computation"},{"key":"328_CR24","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/BF00295861","volume":"6","author":"J. J. Bartholdi","year":"1989","unstructured":"Bartholdi, J. J., Tovey, C. A., & Trick, M. A. (1989a). The computational difficulty of manipulating an election. Social Choice and Welfare, 6, 227\u2013241.","journal-title":"Social Choice and Welfare"},{"key":"328_CR25","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF00303169","volume":"6","author":"J. J. Bartholdi","year":"1989","unstructured":"Bartholdi, J. J., Tovey, C. A., & Trick, M. A. (1989b). Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare, 6, 157\u2013165.","journal-title":"Social Choice and Welfare"},{"key":"328_CR26","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/0895-7177(92)90085-Y","volume":"16","author":"J. J. Bartholdi","year":"1992","unstructured":"Bartholdi, J. J., Tovey, C. A., & Trick, M. A. (1992). How hard is it to control an election. Mathematical and Computer Modelling, 16, 27\u201340.","journal-title":"Mathematical and Computer Modelling"},{"key":"328_CR27","doi-asserted-by":"crossref","unstructured":"Benaloh, J., & Yung, M. (1986). Distributing the power of a government to enhance the privacy of the voters. In ACM symposium on principles of distributed computing (pp. 52\u201362).","DOI":"10.1145\/10590.10595"},{"key":"328_CR28","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1287\/mnsc.27.12.1410","volume":"27","author":"Y. Ben-Dov","year":"1981","unstructured":"Ben-Dov, Y. (1981). Optimal testing procedures for special structures of coherent systems. Management Science, 27, 1410\u20131420.","journal-title":"Management Science"},{"key":"328_CR29","first-page":"421","volume-title":"Proceedings of the 8th international conference on knowledge representation and reasoning, KR\u201902","author":"S. Benferhat","year":"2002","unstructured":"Benferhat, S., Dubois, D., Kaci, S., & Prade, H. (2002a). Bipolar representation and fusion of preferences in the possibilistic logic framework. In Proceedings of the 8th international conference on knowledge representation and reasoning, KR\u201902 (pp. 421\u2013432). San Francisco: Morgan Kauffman."},{"key":"328_CR30","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1023\/A:1014446411602","volume":"34","author":"S. Benferhat","year":"2002","unstructured":"Benferhat, S., Dubois, D., Kaci, S., & Prade, H. (2002b). Possibilistic merging and distance-based fusion of propositional information. Annals of Mathematics and Artificial Intelligence, 34, 217\u2013252.","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"328_CR31","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., & Wigderson, A. (1988). Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th symposium on theory of computing (pp.\u00a01\u201310).","DOI":"10.1145\/62212.62213"},{"key":"328_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0899-8256(90)90010-R","volume":"2","author":"E. Ben-Porath","year":"1990","unstructured":"Ben-Porath, E. (1990). The complexity of computing a best response automaton in repeated games with mixed strategies. Games and Economic Behavior, 2, 1\u201312.","journal-title":"Games and Economic Behavior"},{"key":"328_CR33","unstructured":"Bergemann, D., & Valimaki, J. (2007). Dynamic marginal contribution mechanism. Cowles Foundation Discussion Paper No. 1616, Cowles Foundation for Research in Economics, Yale University, July 2007."},{"key":"328_CR34","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF01187072","volume":"26","author":"P. Berman","year":"1993","unstructured":"Berman, P., & Garay, J. A. (1993). Cloture votes: n\/4-resilient distributed consensus in t+1 rounds. Mathematical Systems Theory, 26, 3\u201320.","journal-title":"Mathematical Systems Theory"},{"key":"328_CR35","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Ferrari, E., & Perlasca, P. (2001). A logical framework for reasoning about access control models. In Proceedings of the 6th ACM symposium on access control models and technologies (pp. 41\u201352), Chantilly, VA.","DOI":"10.1145\/373256.373261"},{"key":"328_CR36","volume-title":"Research perspectives and case studies in system test and diagnosis","author":"A. Biasizzo","year":"1998","unstructured":"Biasizzo, A., Zuzek, A., & Novak, F. (1998). Enhanced sequential diagnosis. In J. W. Sheppard & W. R. Simpson (Eds.), Research perspectives and case studies in system test and diagnosis. Dordrecht: Kluwer Academic."},{"key":"328_CR37","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1023\/A:1016626919680","volume":"9","author":"M. J. Blin","year":"2001","unstructured":"Blin, M. J., & Tsouki\u00e0s, A. (2001). Multicriteria methodology contribution to software quality evaluations. Software Quality Journal, 9, 113\u2013132.","journal-title":"Software Quality Journal"},{"key":"328_CR38","unstructured":"Blum, A., Sandholm, T., & Zinkevich, M. (2002). Online algorithms for market clearing. In Proceedings of the ACM-SIAM symposium on discrete algorithms (SODA) (pp. 971\u2013980). San Francisco, CA, January 2002."},{"key":"328_CR39","volume-title":"Characteristics of software quality","author":"B. W. Boehm","year":"1978","unstructured":"Boehm, B. W., Brown, J. R., Kaspar, J. R., Lipow, M., McLeod, G., & Merritt, M. (1978). Characteristics of software quality. Amsterdam: North Holland."},{"key":"328_CR40","unstructured":"Boros, E., & Kantor, P. (2007). Deceptive detection methods for optimal security with inadequate budgets: the screening power index (RUTCOR Research Report 26-2007). Rutgers University, New Brunswick, NJ."},{"key":"328_CR41","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1023\/A:1018958928835","volume":"26","author":"E. Boros","year":"1999","unstructured":"Boros, E., & \u00dcnl\u00fcyurt, T. (1999). Diagnosing double regular systems. Annals of Mathematics and Artificial Intelligence, 26, 171\u2013191.","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"328_CR42","doi-asserted-by":"crossref","unstructured":"Boros, E., & \u00dcnl\u00fcyurt, T. (2000). Sequential testing of series-parallel systems of small depth. In M. Laguna & J. L. Gonz\u00e1les Velarde (Eds.), OR computing tools for the new millennium, proceedings conference of the INFORMS computing society (pp. 39\u201374), Cancun, Mexico, 5\u20137 January 2000.","DOI":"10.1007\/978-1-4615-4567-5_3"},{"key":"328_CR43","doi-asserted-by":"crossref","unstructured":"Boros, E., Elsayed, E., Kantor, P., Roberts, F. S., & Xie, M. (2008a, to appear). Optimization problems for port-of-entry detection systems. In H. Chen & C. C. Yang (Eds.), Intelligence and security informatics: techniques and applications. Berlin: Springer.","DOI":"10.1007\/978-3-540-69209-6_17"},{"key":"328_CR44","unstructured":"Boros, E., Fedzhora, L., Kantor, P. B., Saeger, K., & Stroud, P. (2008b, to appear). Large scale LP model for finding optimal container inspection strategies. Naval Research Logistics Quarterly. Preprint at http:\/\/rutcor.rutgers.edu\/pub\/rrr\/reports2006\/26_2006.pdf ."},{"key":"328_CR45","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/B978-1-4832-1452-8.50104-4","volume-title":"Proceedings of the 4th international conference on knowledge representation and reasoning, KR\u201994","author":"C. Boutilier","year":"1994","unstructured":"Boutilier, C. (1994). Toward a logic for qualitative decision theory. In Proceedings of the 4th international conference on knowledge representation and reasoning, KR\u201994 (pp. 75\u201386). San Francisco: Morgan Kaufmann."},{"key":"328_CR46","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/3-540-48317-9_5","volume-title":"Artificial intelligence today. recent trends and developments","author":"C. Boutilier","year":"1999","unstructured":"Boutilier, C. (1999). Knowledge representation for stochastic decision processes. In M. J. Wooldridge & M. Veloso (Eds.), Artificial intelligence today. recent trends and developments (pp. 111\u2013152). Berlin: Springer."},{"key":"328_CR47","first-page":"1145","volume-title":"Proceedings of the 17th national conference on artificial intelligence, AAAI-2000","author":"C. Boutilier","year":"2000","unstructured":"Boutilier, C. (2000). Decision making under uncertainty: operations research meets AI (again). In Proceedings of the 17th national conference on artificial intelligence, AAAI-2000 (pp. 1145\u20131150). Menlo Park: AAAI Press."},{"key":"328_CR48","first-page":"71","volume-title":"Proceedings of the 15th conference on uncertainty in artificial intelligence, UAI\u201999","author":"C. Boutilier","year":"1999","unstructured":"Boutilier, C., Brafman, R. I., Hoos, H. H., & Poole, D. (1999a). Reasoning with condition ceteris paribus preference statements. In Proceedings of the 15th conference on uncertainty in artificial intelligence, UAI\u201999 (pp. 71\u201380). San Francisco: Morgan Kaufmann."},{"key":"328_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1613\/jair.575","volume":"11","author":"C. Boutilier","year":"1999","unstructured":"Boutilier, C., Dean, T., & Hanks, S. (1999b). Decision-theoretic planning: structural assumptions and computational leverage. Journal of Artificial Intelligence Research, 11, 1\u201394.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"328_CR50","unstructured":"Boutilier, C., Goldszmidt, M., & Sabata, B. (1999c). Continuous value function approximation for sequential bidding policies. In Proceedings of the 15th conference on uncertainty in artificial intelligence."},{"key":"328_CR51","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1111\/j.0824-7935.2004.00234.x","volume":"20","author":"C. Boutilier","year":"2004","unstructured":"Boutilier, C., Brafman, R. I., Doomshlak, C., Hoos, H., & Poole, D. (2004). Preference-based constrained optimization with CP-nets. Computational Intelligence, 20, 137\u2013157.","journal-title":"Computational Intelligence"},{"key":"328_CR52","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/0377-2217(92)90333-5","volume":"60","author":"D. Bouyssou","year":"1992","unstructured":"Bouyssou, D. (1992). Ranking methods based on valued preference relations: a characterization of the net flow method. European Journal of Operational Research, 60, 61\u201368.","journal-title":"European Journal of Operational Research"},{"key":"328_CR53","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1002\/(SICI)1099-1360(199606)5:2<99::AID-MCDA97>3.0.CO;2-8","volume":"5","author":"D. Bouyssou","year":"1996","unstructured":"Bouyssou, D. (1996). Outranking relations: do they have special properties? Journal of Multi-Criteria Decision Analysis, 5, 99\u2013111.","journal-title":"Journal of Multi-Criteria Decision Analysis"},{"key":"328_CR54","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/0377-2217(92)90279-I","volume":"61","author":"D. Bouyssou","year":"1992","unstructured":"Bouyssou, D., & Perny, P. (1992). Ranking methods for valued preference relations: a characterization of a method based on entering and leaving flows. European Journal of Operational Research, 61, 186\u2013194.","journal-title":"European Journal of Operational Research"},{"key":"328_CR55","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-1-4615-0843-4_6","volume-title":"Aiding decisions with multiple criteria\u2014essays in honor of Bernard Roy","author":"D. Bouyssou","year":"2002","unstructured":"Bouyssou, D., & Pirlot, M. (2002a). A characterization of strict concordance relations. In D. Bouyssou, E. Jacquet-Lagr\u00e8ze, P. Perny, R. S\u0142owi\u0144ski, D. Vanderpooten, & Ph. Vincke (Eds.), Aiding decisions with multiple criteria\u2014essays in honor of Bernard Roy (pp. 121\u2013146). Dordrecht: Kluwer Academic."},{"key":"328_CR56","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1006\/jmps.2002.1419","volume":"46","author":"D. Bouyssou","year":"2002","unstructured":"Bouyssou, D., & Pirlot, M. (2002b). Non-transitive decomposable conjoint measurement. Journal of Mathematical Psychology, 46, 677\u2013703.","journal-title":"Journal of Mathematical Psychology"},{"key":"328_CR57","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1002\/(SICI)1099-1360(199703)6:2<77::AID-MCDA144>3.0.CO;2-I","volume":"6","author":"D. Bouyssou","year":"1997","unstructured":"Bouyssou, D., & Vincke, P. (1997). Ranking alternatives on the basis of preference relations: a progress report with special emphasis on outranking. Journal of Multi-Criteria Decision Analysis, 6, 77\u201385.","journal-title":"Journal of Multi-Criteria Decision Analysis"},{"key":"328_CR58","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1593-7","volume-title":"Evaluation and decision models: a critical perspective","author":"D. Bouyssou","year":"2000","unstructured":"Bouyssou, D., Marchant, T., Pirlot, M., Perny, P., Tsouki\u00e0s, A., & Vincke, Ph. (2000). Evaluation and decision models: a critical perspective. Dordrecht: Kluwer Academic."},{"key":"328_CR59","volume-title":"Evaluation and decision models: stepping stones for the analyst","author":"D. Bouyssou","year":"2006","unstructured":"Bouyssou, D., Marchant, T., Pirlot, M., Perny, P., Tsouki\u00e0s, A., & Vincke, Ph. (2006). Evaluation and decision models: stepping stones for the analyst. Berlin: Springer."},{"key":"328_CR60","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1111\/j.0824-7935.2004.00236.x","volume":"20","author":"R. Brafman","year":"2004","unstructured":"Brafman, R., & Dimopoulos, Y. (2004). Extended semantics and optimization algorithms for CP-networks. Computational Intelligence, 20, 219\u2013245.","journal-title":"Computational Intelligence"},{"key":"328_CR61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0004-3702(01)00140-0","volume":"133","author":"R. I. Brafman","year":"2001","unstructured":"Brafman, R. I., & Friedman, N. (2001). On decision-theoretic foundations for defaults. Artificial Intelligence, 133, 1\u201333.","journal-title":"Artificial Intelligence"},{"key":"328_CR62","first-page":"1291","volume-title":"Proceedings of the 13th national conference on artificial intelligence, AAAI96","author":"R. I. Brafman","year":"1996","unstructured":"Brafman, R. I., & Tennenholtz, M. (1996). On the foundations of qualitative decision theory. In Proceedings of the 13th national conference on artificial intelligence, AAAI96 (pp. 1291\u20131296). Cambridge: MIT Press."},{"key":"328_CR63","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/S0004-3702(97)00024-6","volume":"94","author":"R. I. Brafman","year":"1997","unstructured":"Brafman, R. I., & Tennenholtz, M. (1997). Modeling agents as qualitative decision makers. Artificial Intelligence, 94, 217\u2013268.","journal-title":"Artificial Intelligence"},{"key":"328_CR64","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0004-3702(00)00039-4","volume":"121","author":"R. I. Brafman","year":"2000","unstructured":"Brafman, R. I., & Tennenholz, M. (2000a). A near-optimal polynomial time algorithm for learning in certain classes of stochastic games. Artificial Intelligence, 121, 31\u201347.","journal-title":"Artificial Intelligence"},{"key":"328_CR65","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1145\/337244.337251","volume":"47","author":"R. I. Brafman","year":"2000","unstructured":"Brafman, R. I., & Tennenholtz, M. (2000b). An axiomatic treatment of three qualitative decision criteria. Journal of the ACM, 47, 452\u2013482.","journal-title":"Journal of the ACM"},{"key":"328_CR66","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/00029890.1995.11990526","volume":"102","author":"S. J. Brams","year":"1995","unstructured":"Brams, S. J., & Taylor, A. D. (1995). An envy-free cake division protocol. The Americal Mathematical Monthly, 102, 9\u201318.","journal-title":"The Americal Mathematical Monthly"},{"key":"328_CR67","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/0377-2217(86)90044-5","volume":"24","author":"J. P. Brans","year":"1986","unstructured":"Brans, J. P., Vincke, P., & Mareschal, B. (1986). How to select and how to rank projects: the PROMETHEE method. European Journal of Operational Research, 24, 228\u2013238.","journal-title":"European Journal of Operational Research"},{"key":"328_CR68","unstructured":"Breese, J., Heckerman., D., & Kadie, C. (1998). Empirical analysis of predictive algorithms for collaborative filtering. In Proceedings of the fourteenth conference on uncertainty in artificial intelligence, Madison, WI, July 1998."},{"key":"328_CR69","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s001990050242","volume":"13","author":"P. J. Brewer","year":"1999","unstructured":"Brewer, P. J. (1999). Decentralized computation procurement and computational robustness in a smart market. Economic Theory, 13, 41\u201392.","journal-title":"Economic Theory"},{"key":"328_CR70","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/IRE-PGRQC.1960.5007262","volume":"RQC-9","author":"J. D. Brule","year":"1960","unstructured":"Brule, J. D., Johnson, R. A., & Kletsky, E. J. (1960). Diagnosis of equipment failures. IRE Transactions on Reliability and Quality Control, RQC-9, 23\u201334.","journal-title":"IRE Transactions on Reliability and Quality Control"},{"key":"328_CR71","doi-asserted-by":"crossref","unstructured":"Brunken, J. N., Mager, R., & Putzke, R. A. (1989). NEMOS\u2014the network management system for the AT&T long distance network. In Proceedings of the 1989 IEEE international conference on communications (Vol.\u00a03, pp.\u00a01193\u20131197).","DOI":"10.1109\/ICC.1989.49871"},{"key":"328_CR72","volume-title":"Database security III: status and prospects, results of IFIP WG 11.3 workshop on database security","author":"L. J. Buczkowski","year":"1990","unstructured":"Buczkowski, L. J. (1990). Database inference controller. In C. E. Landwehr (Ed.), Database security III: status and prospects, results of IFIP WG 11.3 workshop on database security. Amsterdam: North-Holland."},{"key":"328_CR73","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1287\/opre.20.2.335","volume":"20","author":"R. Butterworth","year":"1972","unstructured":"Butterworth, R. (1972). Some reliability fault testing models. Operations Research, 20, 335\u2013343.","journal-title":"Operations Research"},{"key":"328_CR74","first-page":"203","volume":"5","author":"R. A. Caldentey","year":"2002","unstructured":"Caldentey, R. A., & Bitran, G. (2002). An overview of models for revenue management. Manufacturing and Service Operations Management, 5, 203\u2013229.","journal-title":"Manufacturing and Service Operations Management"},{"key":"328_CR75","unstructured":"California Department of State Internet Voting Task Force. (2000). A report on the feasibility of Internet voting, January 2000. http:\/\/www.ss.ca.gov\/executive\/ivote\/final_report.pdf ."},{"key":"328_CR76","volume-title":"Behavioral game theory","author":"C. F. Camerer","year":"2003","unstructured":"Camerer, C. F. (2003). Behavioral game theory. Princeton: Princeton University Press."},{"key":"328_CR77","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1257\/000282803321947038","volume":"93","author":"C. F. Camerer","year":"2003","unstructured":"Camerer, C. F., Ho, T. H., & Chong, K. (2003). Models of thinking, learning and teaching in games. American Economical Review Papers and Proceedings, 93, 192\u2013195.","journal-title":"American Economical Review Papers and Proceedings"},{"key":"328_CR78","doi-asserted-by":"crossref","first-page":"964","DOI":"10.2307\/2533849","volume":"54","author":"B. P. Carlin","year":"1998","unstructured":"Carlin, B. P., Kadane, J. B., & Gelfand, A. E. (1998). Approaches for optimal sequential decision analysis in clinical trials. Biometrics, 54, 964\u2013975.","journal-title":"Biometrics"},{"key":"328_CR79","doi-asserted-by":"crossref","unstructured":"Chakrabarti, A., Chazelle, B., Gum, B., & Lvov, A. (1999). Searching for an approximate nearest neighbor on the Hamming cube: a lower bound. In Proceedings of the 31st annual ACM symposium on the theory of computing (pp. 305\u2013311).","DOI":"10.1145\/301250.301325"},{"key":"328_CR80","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/0004-3702(71)90006-3","volume":"2","author":"C. L. Chang","year":"1971","unstructured":"Chang, C. L., & Slage, J. R. (1971). An admissible and optimal algorithm for searching and-or graphs. Artificial Intelligence, 2, 117\u2013128.","journal-title":"Artificial Intelligence"},{"key":"328_CR81","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24, 84\u201388.","journal-title":"Communications of the ACM"},{"key":"328_CR82","doi-asserted-by":"crossref","unstructured":"Chaum, D., Cr\u00e9peau, C., & Damg\u00e5rd, I. (1988). Multiparty unconditionally secure protocols. In Proceedings of the 20th symposium on theory of computing (pp.\u00a011\u201319).","DOI":"10.1145\/62212.62214"},{"key":"328_CR83","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1287\/opre.1070.0429","volume":"55","author":"X. Chen","year":"2007","unstructured":"Chen, X., Sim, M., Simchi-Levi, D., & Sun, P. (2007). Risk aversion in inventory management. Operations Research, 55, 828\u2013842.","journal-title":"Operations Research"},{"key":"328_CR84","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/S0951-8320(96)00076-2","volume":"54","author":"S. Y. Chiu","year":"1996","unstructured":"Chiu, S. Y., Cox, L. A., & Sun, X. (1996). Least-cost failure diagnosis in uncertain reliability systems. Reliability Engineering and System Safety, 54, 203\u2013216.","journal-title":"Reliability Engineering and System Safety"},{"key":"328_CR85","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/BFb0035614","volume-title":"Proceedings of the 4th European conference on symbolic and quantitative approaches to reasoning with uncertainty, ECSQARU\u201997","author":"L. Cholvy","year":"1997","unstructured":"Cholvy, L., & Hunter, T. (1997). Fusion in logic: a brief overview. In Lecture notes in computer science : Vol. 1244. Proceedings of the 4th European conference on symbolic and quantitative approaches to reasoning with uncertainty, ECSQARU\u201997 (pp. 86\u201395). Berlin: Springer."},{"key":"328_CR86","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/958942.958946","volume":"28","author":"J. Chomicki","year":"2003","unstructured":"Chomicki, J. (2003). Preference formulas in relations queries. ACM Transactions on Database Systems, 28, 1\u201339.","journal-title":"ACM Transactions on Database Systems"},{"key":"328_CR87","doi-asserted-by":"crossref","first-page":"387","DOI":"10.2307\/3316023","volume":"32","author":"J. A. Christen","year":"2004","unstructured":"Christen, J. A., Mueller, P., Wathen, K., & Wolf, J. (2004). A Bayesian randomized clinical trial: a decision theoretic sequential design. Canadian Journal of Statistics, 32, 387\u2013402.","journal-title":"Canadian Journal of Statistics"},{"key":"328_CR88","first-page":"372","volume-title":"Proceedings of 26th symposium on foundations of computer science","author":"J. Cohen","year":"1985","unstructured":"Cohen, J., & Fischer, M. (1985). A robust and verifiable cryptographically secure election scheme. In Proceedings of 26th symposium on foundations of computer science. (pp. 372\u2013382), Portland, OR, October 1985. New York: IEEE."},{"key":"328_CR89","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1613\/jair.587","volume":"10","author":"W. W. Cohen","year":"1999","unstructured":"Cohen, W. W., Schapire, R. E., & Singer, Y. (1999). Learning to order things. Journal of Artificial Intelligence Research, 10, 243\u2013270.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"328_CR90","unstructured":"Conen, W., & Sandholm, T. (2001). Minimal preference elicitation in combinatorial auctions. In Proceedings of the international joint conference on artificial intelligence (IJCAI), workshop on economic agents, models, and mechanisms, Seattle, WA, 6 August 2001."},{"key":"328_CR91","doi-asserted-by":"crossref","unstructured":"Cormode, G., & Muthukrishnan, S. (2004). What\u2019s new: finding significant differences in network data streams. In INFOCOM04.","DOI":"10.1109\/INFCOM.2004.1354567"},{"key":"328_CR92","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1145\/1061318.1061325","volume":"30","author":"G. Cormode","year":"2005","unstructured":"Cormode, G., & Muthukrishnan, S. (2005a). What\u2019s hot and what\u2019s not: tracking most frequent items dynamically. ACM Transactions on Database Systems, 30, 249\u2013278.","journal-title":"ACM Transactions on Database Systems"},{"key":"328_CR93","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","volume":"55","author":"G. Cormode","year":"2005","unstructured":"Cormode, G., & Muthukrishnan, S. (2005b). An improved data stream summary: the Count-Min sketch and its applications. Journal of Algorithms, 55, 58\u201375.","journal-title":"Journal of Algorithms"},{"key":"328_CR94","doi-asserted-by":"crossref","unstructured":"Cormode, G., & Muthukrishnan, S. (2005c). Summarizing and mining skewed data streams. In SIAM conference on data mining (SDM).","DOI":"10.1137\/1.9781611972757.5"},{"key":"328_CR95","doi-asserted-by":"crossref","unstructured":"Cormode, G., Korn, F., Muthukrishnan, S., & Srivastava, D. (2003). Finding hierarchical heavy hitters in data streams. In VLDB03 (pp.\u00a0464\u2013475).","DOI":"10.1016\/B978-012722442-8\/50048-3"},{"key":"328_CR96","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1111\/1468-0262.00239","volume":"69","author":"M. Costa Gomes","year":"2001","unstructured":"Costa Gomes, M., Crawford, V., & Broseta, B. (2001). Experimental studies of strategic sophistication and cognition in normal-form games. Econometrica, 69, 1193\u20131235.","journal-title":"Econometrica"},{"key":"328_CR97","volume-title":"Database security: status and prospects","author":"L. H. Cox","year":"1988","unstructured":"Cox, L. H. (1988). Modeling and controlling user inference. In C. E. Landwehr (Ed.), Database security: status and prospects. Amsterdam: North-Holland."},{"key":"328_CR98","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1002\/1520-6750(199410)41:6<771::AID-NAV3220410607>3.0.CO;2-0","volume":"41","author":"L. A. Cox Jr.","year":"1994","unstructured":"Cox, L. A. Jr., & Qiu, Y. (1994). Optimal inspection and repair of renewable coherent systems with independent components and constant failure rates. Naval Research Logistics, 41, 771\u2013788.","journal-title":"Naval Research Logistics"},{"key":"328_CR99","volume-title":"Combinatorial auctions","year":"2006","unstructured":"Cramton, P., Shoham, Y., & Steinberg, R. (Eds.). (2006). Combinatorial auctions. Cambridge: MIT Press."},{"key":"328_CR100","first-page":"71","volume-title":"Proceedings of 38th ACM symposium on theory of computing","author":"C. Daskalakis","year":"2006","unstructured":"Daskalakis, C., Goldberg, P. W., & Papadimitriou, C. H. (2006). The complexity of computing a Nash equilibrium. In Proceedings of 38th ACM symposium on theory of computing (pp. 71\u201378). New York: ACM."},{"key":"328_CR101","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1111\/j.1751-5823.2002.tb00354.x","volume":"70","author":"A. P. Dawid","year":"2002","unstructured":"Dawid, A. P. (2002). Influence diagrams for causal modelling and inference. International Statistical Review, 70, 161\u2013189.","journal-title":"International Statistical Review"},{"key":"328_CR102","unstructured":"Day, W. H. E. (1995). The sequence analysis and comparison bibliography. http:\/\/www.pitt.edu\/~csna\/day.html ."},{"key":"328_CR103","doi-asserted-by":"crossref","DOI":"10.1137\/1.9780898717501","volume-title":"Axiomatic consensus theory in group choice and biomathematics","author":"W. H. E. Day","year":"2003","unstructured":"Day, W. H. E., & McMorris, F. R. (2003). Axiomatic consensus theory in group choice and biomathematics. Philadelphia: SIAM."},{"key":"328_CR104","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1080\/01621459.1974.10480137","volume":"69","author":"M. H. Degroot","year":"1974","unstructured":"Degroot, M. H. (1974). Teaching a consensus. Journal of the American Statistical Association, 69, 167\u2013182.","journal-title":"Journal of the American Statistical Association"},{"key":"328_CR105","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/S0167-6377(99)00013-9","volume":"24","author":"F. Della Croce","year":"1999","unstructured":"Della Croce, F., Paschos, V. T., & Tsouki\u00e0s, A. (1999). An improved general procedure for lexicographic bottleneck problems. Operations Research Letters, 24, 187\u2013194.","journal-title":"Operations Research Letters"},{"key":"328_CR106","first-page":"291","volume":"2","author":"H. Delugach","year":"1994","unstructured":"Delugach, H., & Hinke, T. H. (1994). Using conceptual graphs to represent database inference security analysis. Journal of Computing and Information Technology, 2, 291\u2013307.","journal-title":"Journal of Computing and Information Technology"},{"key":"328_CR107","first-page":"1","volume-title":"Symposium proceedings on communications architectures and protocols","author":"A. Demers","year":"1989","unstructured":"Demers, A., Keshav, S., & Shenker, S. (1989). Analysis and simulation of a fair queuing algorithm. In Symposium proceedings on communications architectures and protocols (pp. 1\u201312). New York: ACM."},{"key":"328_CR108","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1287\/ijoc.15.3.284.16077","volume":"15","author":"S. DeVries","year":"2003","unstructured":"DeVries, S., & Vohra, R. V. (2003). Combinatorial auctions: a survey. INFORMS Journal of Computing, 15, 284\u2013309.","journal-title":"INFORMS Journal of Computing"},{"key":"328_CR109","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0304-4068(01)00064-7","volume":"36","author":"A. Waegenaere De","year":"2001","unstructured":"De Waegenaere, A., & Wakker, P. P. (2001). Nonmonotonic Choquet integrals. Journal of Mathematical Economics, 36, 45\u201360.","journal-title":"Journal of Mathematical Economics"},{"key":"328_CR110","unstructured":"DIMACS. (2000). DIMACS workshop and working group meeting on bioconsensus, October 2000. http:\/\/dimacs.rutgers.edu\/Workshops\/Bioconsensus\/ ."},{"key":"328_CR111","unstructured":"DIMACS. (2001). DIMACS tutorial and workshop on bioconsensus II, October 2001. http:\/\/dimacs.rutgers.edu\/Workshops\/BioconII\/ ."},{"key":"328_CR112","unstructured":"DIMACS. (2003). DIMACS workshop on applications of lattices and ordered sets to computer science, July 2003. http:\/\/dimacs.rutgers.edu\/Workshops\/Lattices\/ ."},{"key":"328_CR113","unstructured":"DIMACS. (2004). DIMACS workshop on electronic voting\u2014theory and practice. May 2004. http:\/\/dimacs.rutgers.edu\/Workshops\/Voting\/ ."},{"key":"328_CR114","unstructured":"DIMACS. (2005a). DIMACS workshop on markets as predictive devices (information markets). February 2005. http:\/\/dimacs.rutgers.edu\/Workshops\/Markets\/ ."},{"key":"328_CR115","unstructured":"DIMACS. (2005b). DIMACS workshop on yield management and dynamic pricing. August 2005. http:\/\/dimacs.rutgers.edu\/Workshops\/Yield\/"},{"key":"328_CR116","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/3-540-44598-6_7","volume-title":"Advances in cryptology\u2014Crypto2000 proceedings","author":"Y. Dodis","year":"2000","unstructured":"Dodis, Y., Halevi, S., & Rabin, T. (2000). A cryptographic solution to a game theoretic problem. In Lecture notes in computer science : Vol. 80. Advances in cryptology\u2014Crypto2000 proceedings (pp. 112\u2013130). Berlin: Springer."},{"key":"328_CR117","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/BF02295838","volume":"69","author":"J.-P. Doignon","year":"2004","unstructured":"Doignon, J.-P., Peke\u010d, A., & Regenwetter, M. (2004). The repeated insertion model for rankings: missing link between two subset choice models. Psychometrika, 69, 33\u201354.","journal-title":"Psychometrika"},{"key":"328_CR118","first-page":"121","volume-title":"Proceedings of KR-2002","author":"C. Domshlak","year":"2002","unstructured":"Domshlak, C. & Brafman, R. (2002). CP-nets: reasoning and consistency testing. In Proceedings of KR-2002 (pp. 121\u2013132). San Francisco: Morgan Kaufmann."},{"key":"328_CR119","first-page":"87","volume-title":"Proceedings of the 9th international joint conference on artificial intelligence, IJCAI85","author":"J. Doyle","year":"1985","unstructured":"Doyle, J. (1985). Reasoned assumptions and Pareto optimality. In Proceedings of the 9th international joint conference on artificial intelligence, IJCAI85 (pp. 87\u201390). San Francisco: Morgan Kaufmann."},{"key":"328_CR120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1467-8640.1989.tb00311.x","volume":"5","author":"J. Doyle","year":"1989","unstructured":"Doyle, J. (1989). Constructive belief and rational representation. Computational Intelligence, 5, 1\u201311.","journal-title":"Computational Intelligence"},{"key":"328_CR121","first-page":"1093","volume-title":"Proceedings of the 8th national conference on artificial intelligence (AAAI\u201990)","author":"J. Doyle","year":"1990","unstructured":"Doyle, J. (1990). Rationality and its roles in reasoning. In Proceedings of the 8th national conference on artificial intelligence (AAAI\u201990) (pp. 1093\u20131100). Cambridge: MIT Press."},{"key":"328_CR122","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/FI-1994-201232","volume":"20","author":"J. Doyle","year":"1994","unstructured":"Doyle, J. (1994). Reasoned assumptions and rational psychology. Fundamenta Informaticae, 20, 35\u201373.","journal-title":"Fundamenta Informaticae"},{"key":"328_CR123","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.0824-7935.2004.00233.x","volume":"20","author":"J. Doyle","year":"2004","unstructured":"Doyle, J. (2004). Prospects for preferences. Computational Intelligence, 20, 111\u2013136.","journal-title":"Computational Intelligence"},{"key":"328_CR124","first-page":"55","volume":"20","author":"J. Doyle","year":"1999","unstructured":"Doyle, J., & Thomason, R. H. (1999). Background to qualitative decision theory. AI Magazine, 20, 55\u201368.","journal-title":"AI Magazine"},{"key":"328_CR125","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/0004-3702(91)90007-7","volume":"49","author":"J. Doyle","year":"1991","unstructured":"Doyle, J., & Wellman, M. P. (1991). Impediments to universal preference-based default theories. Artificial Intelligence, 49, 97\u2013128.","journal-title":"Artificial Intelligence"},{"key":"328_CR126","first-page":"69","volume-title":"Decision-theoretic planning: papers from the 1994 spring AAAI symposium","author":"J. Doyle","year":"1994","unstructured":"Doyle, J., & Wellman, M. P. (1994). Representing preferences as ceteris paribus comparatives. In Decision-theoretic planning: papers from the 1994 spring AAAI symposium (pp. 69\u201375). Menlo Park: AAAI Press."},{"key":"328_CR127","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/3-540-54563-8_65","volume-title":"Methodologies for intelligent systems, 6th international symposium, ISMIS 91","author":"J. Doyle","year":"1991","unstructured":"Doyle, J., Shoham, Y., & Wellman, M. P. (1991). A logic of relative desire. In Methodologies for intelligent systems, 6th international symposium, ISMIS 91 (pp. 16\u201331). Berlin: Springer."},{"key":"328_CR128","unstructured":"Dreyer, P. (2000). Applications and variations of domination in graphs. PhD thesis Department of Mathematics, Rutgers University, September 2000."},{"key":"328_CR129","unstructured":"Dreyer, P. A., Jr., & Roberts, F. S. (2008, to appear). Irreversible k-threshold processes: graph-theoretical threshold models of the spread of disease and of opinion. Discrete Applied Mathematics."},{"key":"328_CR130","first-page":"1924","volume-title":"Proceedings of the 14th international joint conference on artificial intelligence, IJCAI95","author":"D. Dubois","year":"1995","unstructured":"Dubois, D., & Prade, H. (1995). Possibility theory as a basis for qualitative decision theory. In Proceedings of the 14th international joint conference on artificial intelligence, IJCAI95 (pp. 1924\u20131930). San Francisco: Morgan Kaufmann."},{"key":"328_CR131","first-page":"133","volume-title":"Proceedings of the 8th international conference on knowledge representation and reasoning, KR02","author":"D. Dubois","year":"2002","unstructured":"Dubois, D., Fargier, H., Perny, P., & Prade, H. (2002a). On the limitation of ordinal approaches to decision making. In Proceedings of the 8th international conference on knowledge representation and reasoning, KR02 (pp. 133\u2013144). San Francisco: Morgan Kauffman."},{"key":"328_CR132","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1145\/581771.581772","volume":"49","author":"D. Dubois","year":"2002","unstructured":"Dubois, D., Fargier, H., Perny, P., & Prade, H. (2002b). Qualitative decision theory: from Savage\u2019s axioms to non-monotonic reasoning. Journal of the ACM, 49, 455\u2013495.","journal-title":"Journal of the ACM"},{"key":"328_CR133","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/BF00939736","volume":"67","author":"S. O. Duffuaa","year":"1990","unstructured":"Duffuaa, S. O., & Raouf, A. (1990). An optimal sequence in multicharacteristics inspection. Journal of Optimization Theory and Applications, 67, 79\u201387.","journal-title":"Journal of Optimization Theory and Applications"},{"key":"328_CR134","unstructured":"Dwork, C., Kumar, R., Naor, M., & Sivakumar, D. (2000). Rank aggregation, spam resistance, and social choice. Preprint, theory.stanford.edu\/muri\/reports\/1999-2000\/cynthia2.ps ."},{"key":"328_CR135","doi-asserted-by":"crossref","unstructured":"Dwork, C., Kumar, R., Naor, M., & Sivakumar, D. (2001). Rank aggregation methods for the web. In Proceedings WWW10.","DOI":"10.1145\/371920.372165"},{"key":"328_CR136","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/11602613_22","volume-title":"The 16th annual international symposium on algorithms and computation, ISAAC 2005","author":"E. Elkind","year":"2005","unstructured":"Elkind, E., & Lipmaa, H. (2005). Hybrid voting protocols and hardness of manipulation. In X. Deng & D.-Z. Du (Eds.), Lecture notes in computer science : Vol. 3827. The 16th annual international symposium on algorithms and computation, ISAAC 2005 (pp. 206\u2013215). Berlin: Springer."},{"key":"328_CR137","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1037\/0033-295X.112.4.912","volume":"112","author":"I. Erev","year":"2005","unstructured":"Erev, I., & Barron, G. (2005). On adaptation, maximization and reinforcement learning among cognitive strategies. Psychological Review, 112, 912\u2013931.","journal-title":"Psychological Review"},{"key":"328_CR138","doi-asserted-by":"crossref","unstructured":"Etzioni, O., Hanks, S., Jiang, T., Karp, R. M., Madani, O., & Waarts, O. (1996). Efficient information gathering on the Internet. In 37th annual symposium on foundations of computer science.","DOI":"10.1109\/SFCS.1996.548482"},{"key":"328_CR139","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0166-218X(84)90005-2","volume":"7","author":"S. Even","year":"1984","unstructured":"Even, S., & Paz, A. (1984). A note on cake cutting. Discrete Applied Mathematics, 7, 285\u2013296.","journal-title":"Discrete Applied Mathematics"},{"key":"328_CR140","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1007\/3-540-48224-5_75","volume-title":"Proceedings 28th international colloquium on automata, languages and programming (ICALP 2001)","author":"J. Feigenbaum","year":"2001","unstructured":"Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M. J., & Wright, R. N. (2001a). Secure multiparty computation of approximations. In Lecture notes in computer science : Vol. 2076. Proceedings 28th international colloquium on automata, languages and programming (ICALP 2001) (pp. 927\u2013938). Berlin: Springer."},{"key":"328_CR141","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1006\/jcss.2001.1754","volume":"63","author":"J. Feigenbaum","year":"2001","unstructured":"Feigenbaum, J., Papadimitriou, C. H., & Shenker, S. (2001b). Sharing the cost of multicast transmissions. Journal of Computer and System Sciences, 63, 21\u201341. See also Proceedings 32nd ACM symposium on theory of computing, 2000.","journal-title":"Journal of Computer and System Sciences"},{"key":"328_CR142","volume-title":"Software metrics","author":"N. A. Fenton","year":"1997","unstructured":"Fenton, N. A., & Pfleeger, S. L. (1997). Software metrics, (2nd ed.). Boston: PWS.","edition":"2"},{"key":"328_CR143","doi-asserted-by":"crossref","DOI":"10.21236\/AD0708563","volume-title":"Utility theory for decision making","author":"P. C. Fishburn","year":"1970","unstructured":"Fishburn, P. C. (1970). Utility theory for decision making. New York: Wiley."},{"key":"328_CR144","volume-title":"Interval orders and interval graphs","author":"P. C. Fishburn","year":"1985","unstructured":"Fishburn, P. C. (1985). Interval orders and interval graphs. New York: Wiley-Interscience."},{"key":"328_CR145","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/0022-2496(89)90026-6","volume":"33","author":"P. C. Fishburn","year":"1989","unstructured":"Fishburn, P. C., & Roberts, F. S. (1989). Axioms for unique subjective probability on finite sets. Journal of Mathematical Psychology, 33, 117\u2013130.","journal-title":"Journal of Mathematical Psychology"},{"key":"328_CR146","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1287\/moor.27.1.227.339","volume":"27","author":"P. C. Fishburn","year":"2002","unstructured":"Fishburn, P. C., Peke\u010d, A., & Reeds, J. A. (2002). Subset comparisons for additive linear orders. Mathematics of Operations Research, 27, 227\u2013243.","journal-title":"Mathematics of Operations Research"},{"key":"328_CR147","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1145\/5666.5673","volume":"29","author":"P. J. Fleming","year":"1986","unstructured":"Fleming, P. J., & Wallace, J. J. (1986). How not to lie with statistics: the correct way to summarize benchmark results. Communications of ACM, 29, 218\u2013221.","journal-title":"Communications of ACM"},{"key":"328_CR148","unstructured":"Forbes, J., & Andre, D. (2000). Real-time reinforcement learning in continuous domains. In AAAI spring symposium on real-time autonomous systems."},{"key":"328_CR149","first-page":"225","volume-title":"Proceedings of the 7th conference on theoretical aspects of rationality and knowledge","author":"L. Fortnow","year":"1998","unstructured":"Fortnow, L., & Kimmel, P. (1998). Beating a finite automaton in the big match. In Proceedings of the 7th conference on theoretical aspects of rationality and knowledge (pp. 225\u2013234). San Francisco: Morgan Kaufmann."},{"key":"328_CR150","first-page":"741","volume-title":"Proceedings 26th symposium on the theory of computing","author":"L. Fortnow","year":"1994","unstructured":"Fortnow, L., & Whang, D. (1994). Optimality and domination in repeated games with bounded players. In Proceedings 26th symposium on the theory of computing (pp. 741\u2013749). New York: ACM."},{"key":"328_CR151","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0167-2681(99)00027-X","volume":"39","author":"R. Forsythe","year":"1999","unstructured":"Forsythe, R., Rietz, T. A., & Ross, T. W. (1999). Wishes, expectations, and actions: a survey on price formation in election stock markets. Jornal of Economic Behavior and Organization, 39, 83\u2013110.","journal-title":"Jornal of Economic Behavior and Organization"},{"key":"328_CR152","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1006\/game.1997.0595","volume":"21","author":"D. Foster","year":"1997","unstructured":"Foster, D., & Vohra, R. (1997). Calibrated learning and correlated equilibrium. Games and Economic Behavior, 21, 40\u201355.","journal-title":"Games and Economic Behavior"},{"key":"328_CR153","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1006\/game.1999.0740","volume":"29","author":"D. Foster","year":"1999","unstructured":"Foster, D., & Vohra, R. (1999). Regret in the on-line decision problem. Games and Economic Behavior, 29, 7\u201335.","journal-title":"Games and Economic Behavior"},{"key":"328_CR154","unstructured":"Fradkin, D., & Littman, M. (2005). Exploration approaches to adaptive filtering (DIMACS Technical Report 2005-01). DIMACS Center, Rutgers University, Piscataway, NJ."},{"key":"328_CR155","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1037\/h0046123","volume":"63","author":"J. R. P. French Jr.","year":"1956","unstructured":"French, J. R. P. Jr. (1956). A formal theory of social power. Psychological Review, 63, 181\u2013194.","journal-title":"Psychological Review"},{"key":"328_CR156","doi-asserted-by":"crossref","unstructured":"Freund, Y., Kearns, M., & Mansour, Y. (1995). Efficient algorithms for learning to play repeated games against computationally bounded adversaries. In Proceedings 36th symposium on foundations of computer science, November 1995.","DOI":"10.1109\/SFCS.1995.492489"},{"key":"328_CR157","unstructured":"Freund, Y., Kearns, M., Mansour, Y., Ron, D., Rubinfeld, R., & Schapire, R. (1996). Efficient algorithms for learning to play repeated games against computationally bounded adversaries. In: Proceedings of the thirty seventh annual symposium on foundations of computer science (pp.\u00a0332\u2013341)."},{"key":"328_CR158","first-page":"933","volume":"4","author":"Y. Freund","year":"2003","unstructured":"Freund, Y., Iyer, R., Schapire, R. E., & Singer, Y. (2003). An efficient boosting algorithm for combining preferences. Journal of Machine Learning Research, 4, 933\u2013969.","journal-title":"Journal of Machine Learning Research"},{"key":"328_CR159","unstructured":"Friedman, E. J., & Shenker, S. (1998). Learning and implementation on the Internet. Department of Economics, Rutgers University, Working Paper Series."},{"key":"328_CR160","volume-title":"The theory of learning in games","author":"D. Fudenberg","year":"1999","unstructured":"Fudenberg, D., & Levine, D. (1999). The theory of learning in games. Cambridge: MIT Press."},{"key":"328_CR161","volume-title":"Game theory","author":"D. Fudenberg","year":"1991","unstructured":"Fudenberg, D., & Tirole, J. (1991). Game theory. Cambridge: MIT Press."},{"key":"328_CR162","unstructured":"Fujioka, A., Okamoto, T., & Ohta, K. (1992). A practical secret voting scheme for large scale elections. In Auscrypt \u201992 (pp.\u00a0244\u2013251)."},{"key":"328_CR163","unstructured":"Fujishima, Y., Leyton-Brown, K., & Shoham, Y. (1999). Taming the computational complexity of combinatorial auctions: optimal and approximate approaches. In Proceedings of international joint conference on artificial intelligence (IJCAI) (pp.\u00a0548\u2013553), Stockholm, Sweden."},{"key":"328_CR164","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1287\/mnsc.40.8.999","volume":"40","author":"G. Gallego","year":"1993","unstructured":"Gallego, G., & van Ryzin, G. (1993). Optimal dynamic pricing of inventories with stochastic demand over finite horizons. Management Science, 40, 999\u20131020.","journal-title":"Management Science"},{"key":"328_CR165","unstructured":"Gallien, J., & Wein, L. M. (2000). Design and analysis of a smart market for industrial procurement. Working paper, Sloan School of Management, MIT."},{"key":"328_CR166","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1137\/0218003","volume":"18","author":"G. Gallo","year":"1989","unstructured":"Gallo, G., Grigoriadis, M. D., & Tarjan, R. E. (1989). A fast parametric maximum flow algorithm and applications. SIAM Journal on Computing, 18, 30\u201355.","journal-title":"SIAM Journal on Computing"},{"key":"328_CR167","doi-asserted-by":"crossref","unstructured":"Garay, J., Jakobsson, M., & MacKenzie, P. (1999). Abuse-free optimistic contract signing. CRYPTO-99 (pp.\u00a0449\u2013466).","DOI":"10.1007\/3-540-48405-1_29"},{"key":"328_CR168","volume-title":"Knowledge in flux","author":"P. G\u00e4rdenfors","year":"1988","unstructured":"G\u00e4rdenfors, P. (1988). Knowledge in flux. Cambridge: MIT Press."},{"key":"328_CR169","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/0004-3702(94)90017-5","volume":"65","author":"P. G. G\u00e4rdenfors","year":"1994","unstructured":"G\u00e4rdenfors, P. G., & Makinson, D. (1994). Nonmonotonic inference based on expectations. Artificial Intelligence, 65, 197\u2013245.","journal-title":"Artificial Intelligence"},{"key":"328_CR170","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/TC.1972.5009013","volume":"21","author":"M. R. Garey","year":"1972","unstructured":"Garey, M. R. (1972). Simple binary identification problems. IEEE Transactions on Computers, 21, 588\u2013590.","journal-title":"IEEE Transactions on Computers"},{"key":"328_CR171","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/0012-365X(73)90113-1","volume":"4","author":"M. R. Garey","year":"1973","unstructured":"Garey, M. R. (1973). Optimal task sequencing with precedence constraints. Discrete Mathematics, 4, 37\u201356.","journal-title":"Discrete Mathematics"},{"key":"328_CR172","first-page":"363","volume-title":"Database security V: status and prospects, results of the 5th IFIP WG 11.3 working group conference on database security","author":"T. D. Garvey","year":"1991","unstructured":"Garvey, T. D., & Lunt, T. F. (1991). Cover stories for database security. In C. E. Landwehr & S. Jajodia (Eds.), Database security V: status and prospects, results of the 5th IFIP WG 11.3 working group conference on database security (pp. 363\u2013380). Amsterdam: North-Holland."},{"key":"328_CR173","first-page":"441","volume-title":"AAAI91","author":"D. Geiger","year":"1991","unstructured":"Geiger, D., & Barnett, J. A. (1991). Optimal satisficing tree searches. In AAAI91 (pp. 441\u2013445). Anaheim: Morgan Kaufmann."},{"key":"328_CR174","doi-asserted-by":"crossref","DOI":"10.1201\/9780429258480","volume-title":"Bayesian data analysis","author":"A. Gelman","year":"2003","unstructured":"Gelman, A., Carlin, J. B., Stern, H. S., & Rubin, D. B. (2003). Bayesian data analysis (2nd ed.). London: Chapman and Hall.","edition":"2"},{"key":"328_CR175","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/0899-8256(89)90009-2","volume":"1","author":"I. Gilboa","year":"1989","unstructured":"Gilboa, I., & Samet, D. (1989). Bounded versus unbounded rationality: the tyranny of the weak. Games and Economic Behavior, 1, 213\u2013221.","journal-title":"Games and Economic Behavior"},{"key":"328_CR176","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/0899-8256(89)90006-7","volume":"1","author":"I. Gilboa","year":"1989","unstructured":"Gilboa, I., & Zemel, E. (1989). Nash and correlated equilibria: some complexity considerations. Games and Economic Behavior, 1, 80\u201393.","journal-title":"Games and Economic Behavior"},{"key":"328_CR177","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1287\/moor.18.3.553","volume":"18","author":"I. Gilboa","year":"1993","unstructured":"Gilboa, I., Kalai, E., & Zemel, E. (1993). The complexity of eliminating dominated strategies. Mathematics of Operations Research, 18, 553\u2013563.","journal-title":"Mathematics of Operations Research"},{"key":"328_CR178","unstructured":"Goldreich, O., Micali, S., & Wigderson, A. (1987). How to play any mental game\u2014a completeness theorem for protocols for honest majority. In: Proceedings 19th symposium on theory of computing (pp.\u00a0218\u2013229)."},{"key":"328_CR179","unstructured":"Goldsmith, J., Lang, J., Truszczy\u0144ski, M., & Wilson, N. (2005). The computational complexity of dominance and consistency in CP-nets. In IJCAI \u201905."},{"key":"328_CR180","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-2578-9","volume-title":"Statistical physics, automata networks, and dynamical systems","author":"E. Goles","year":"1992","unstructured":"Goles, E., & Martinez, S. (1992). Statistical physics, automata networks, and dynamical systems. Dordrecht: Kluwer Academic."},{"key":"328_CR181","unstructured":"Gordon, G., Greenwald, A., Marks, C., & Zinkevich, M. (2007). No-regret learning in convex games (Technical Report CS-07-10). Department of Computer Science, Brown University, October 2007."},{"key":"328_CR182","first-page":"224","volume-title":"Proceedings of KR-2004","author":"C. Gonzalez","year":"2004","unstructured":"Gonzalez, C., & Perny, P. (2004). GAI networks for utility elicitation. In Proceedings of KR-2004 (pp. 224\u2013234). San Francisco: Morgan Kaufmann."},{"key":"328_CR183","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1007\/0-387-23081-5_14","volume-title":"Multiple criteria decision analysis: state of the art surveys","author":"M. Grabisch","year":"2005","unstructured":"Grabisch, M., & Labreuche, C. (2005). Fuzzy measures and integrals in MCDA. In J. Figueira, S. Greco, & M. Ehrgott (Eds.), Multiple criteria decision analysis: state of the art surveys (pp. 563\u2013608). Boston: Springer."},{"key":"328_CR184","volume-title":"Fuzzy measures and integrals. Theory and applications","author":"M. Grabisch","year":"2000","unstructured":"Grabisch, M., Murofushi, T., Sugeno, M., & Kacprzyk, J. (2000). Fuzzy measures and integrals. Theory and applications. Berlin: Physica."},{"key":"328_CR185","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1006\/game.2000.0835","volume":"35","author":"A. Greenwald","year":"2001","unstructured":"Greenwald, A., Friedman, E. J., & Shenker, S. (2001). Learning in network contexts: experimental results from simulations. Games and Economic Behavior, 35, 80\u2013123.","journal-title":"Games and Economic Behavior"},{"key":"328_CR186","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0167-6377(95)00032-0","volume":"18","author":"M. D. Grigoriadis","year":"1995","unstructured":"Grigoriadis, M. D., & Khachiyan, L. G. (1995). A sublinear-time randomized approximation algorithm for matrix games. Operations Research Letters, 18, 53\u201358.","journal-title":"Operations Research Letters"},{"key":"328_CR187","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1287\/moor.21.2.321","volume":"21","author":"M. D. Grigoriadis","year":"1996","unstructured":"Grigoriadis, M. D., & Khachiyan, L. G. (1996). Coordination complexity of parallel price-directive decomposition. Mathematics of Operations Research, 21, 321\u2013340.","journal-title":"Mathematics of Operations Research"},{"key":"328_CR188","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1287\/opre.22.6.1267","volume":"22","author":"J. Y. Halpern","year":"1974","unstructured":"Halpern, J. Y. (1974). Fault testing for a k\u2212out-of-n system. Operations Research, 22, 1267\u20131271.","journal-title":"Operations Research"},{"key":"328_CR189","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1287\/moor.21.1.195","volume":"21","author":"P. Hansen","year":"1996","unstructured":"Hansen, P., & Roberts, F. S. (1996). An impossibility result in axiomatic location theory. Mathematics of Operations Research, 21, 195\u2013208.","journal-title":"Mathematics of Operations Research"},{"key":"328_CR190","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1023\/A:1022058209073","volume":"5","author":"R. Hanson","year":"2003","unstructured":"Hanson, R. (2003). Combinatorial information market design. Information Systems Frontiers, 5, 105\u2013119.","journal-title":"Information Systems Frontiers"},{"key":"328_CR191","first-page":"307","volume":"425","author":"S. O. Hansson","year":"1996","unstructured":"Hansson, S. O. (1996). What is ceteris paribus preference? Journal of Philosophical Logic, 425, 307\u2013332.","journal-title":"Journal of Philosophical Logic"},{"key":"328_CR192","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1086\/261684","volume":"98","author":"R. M. Harstad","year":"1990","unstructured":"Harstad, R. M. (1990a). Alternative common-value auction procedures: revenue comparisons with free entry. Journal of Political Economy, 98, 421\u2013429.","journal-title":"Journal of Political Economy"},{"key":"328_CR193","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1023\/A:1011476619484","volume":"3","author":"R. M. Harstad","year":"1990","unstructured":"Harstad, R. M. (1990b). Dominant strategy adoption, efficiency, and bidder\u2019s experience with pricing rules. Experimental Economics, 3, 261\u2013280.","journal-title":"Experimental Economics"},{"key":"328_CR194","unstructured":"Harstad, R. (2007). Endogenous competition alters the structure of optimal auctions. In: DIMACS workshop on auctions with transaction costs, DIMACS Center, Rutgers University, March 2007."},{"key":"328_CR195","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/0165-1765(90)90197-9","volume":"33","author":"R. M. Harstad","year":"1990","unstructured":"Harstad, R. M., Kagel, J. H., & Levin, D. (1990). Equilibrium bid functions for auctions with an uncertain number of bidders. Economics Letters, 33, 35\u201340.","journal-title":"Economics Letters"},{"key":"328_CR196","unstructured":"Hartke, S. (2004). Graph-theoretic models of spread and competition. PhD thesis, Department of Mathematics, Rutgers University, October 2004."},{"key":"328_CR197","doi-asserted-by":"crossref","unstructured":"Hassin, Y., & Peleg, D. (1999). Distributed probabilistic polling and applications to proportionate agreement. In Proceedings 26th international colloqium on automata, languages and programming ICALP (pp.\u00a0402\u2013411).","DOI":"10.1007\/3-540-48523-6_37"},{"key":"328_CR198","unstructured":"Hazon, N., Aumann, Y., Kraus, S., & Wooldridge, M. (2008). Evaluation of election outcomes under uncertainty. In Proceedings of seventh international conference on autonomous agents and multiagent systems (AAMAS-08)."},{"key":"328_CR199","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/90.650144","volume":"5","author":"S. Herzog","year":"1997","unstructured":"Herzog, S., Shenker, S., & Estrin, D. (1997). Sharing the \u201ccost\u201d of multicast trees: an axiomatic analysis. IEEE\/ACM Transactions on Networking, 5, 847\u2013860.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"328_CR200","doi-asserted-by":"crossref","unstructured":"Hinke, T. H. (1988a). Inference aggregation detection in database management systems. In IEEE symposium on security and privacy, Oakland, CA.","DOI":"10.1109\/SECPRI.1988.8101"},{"key":"328_CR201","volume-title":"Database security II: status and prospects, IFIP WG 11.3 workshop on database security","author":"T. H. Hinke","year":"1988","unstructured":"Hinke, T. H. (1988b). Database inference engine design approach. In C. E. Landwehr (Ed.), Database security II: status and prospects, IFIP WG 11.3 workshop on database security. Amsterdam: North-Holland."},{"key":"328_CR202","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/S0167-4048(97)87607-9","volume":"16","author":"T. H. Hinke","year":"1997","unstructured":"Hinke, T. H., Delugach, H. S., & Wolf, R. P. (1997). Protecting databases from inference attacks. Computers and Security, 16, 687\u2013708.","journal-title":"Computers and Security"},{"key":"328_CR203","volume-title":"Readings in the principles and applications of decision analysis","author":"R. A. Howard","year":"1984","unstructured":"Howard, R. A., & Matheson, J. E. (1984). Influence diagrams. In R. A. Howard & J. E. Matheson (Eds.), Readings in the principles and applications of decision analysis. Menlo Park: Strategic Decisions Group."},{"key":"328_CR204","unstructured":"Horvitz, E. J. (1987). Reasoning about beliefs and actions under computational resource constraints. In Proceedings of the 1987 workshop on uncertainty in artificial intelligence."},{"key":"328_CR205","first-page":"175","volume-title":"Proceedings of the 7th ACM conference on information and knowledge management","author":"E. J. Horvitz","year":"1998","unstructured":"Horvitz, E. J. (1998). Continual computation policies for utility-directed prefetching. In Proceedings of the 7th ACM conference on information and knowledge management (pp. 175\u2013184). New York: ACM."},{"key":"328_CR206","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/S0004-3702(00)00082-5","volume":"126","author":"E. J. Horvitz","year":"2001","unstructured":"Horvitz, E. J. (2001). Principles and applications of continual computation. Artificial Intelligence Journal, 126, 159\u2013196.","journal-title":"Artificial Intelligence Journal"},{"key":"328_CR207","first-page":"296","volume-title":"Proceedings of the 11th conference on uncertainty in artificial intelligence","author":"E. Horvitz","year":"1995","unstructured":"Horvitz, E., & Barry, M. (1995). Display of information for time-critical decision making. In Proceedings of the 11th conference on uncertainty in artificial intelligence (pp. 296\u2013305). San Francisco: Morgan Kaufmann."},{"key":"328_CR208","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/0888-613X(88)90120-X","volume":"2","author":"E. Horvitz","year":"1988","unstructured":"Horvitz, E., Breese, J., & Henrion, M. (1988). Decision theory in expert systems and artificial intelligence. Journal of Approximate Reasoning, Special Issue on Uncertainty in Artificial Intelligence, 2, 247\u2013302.","journal-title":"Journal of Approximate Reasoning, Special Issue on Uncertainty in Artificial Intelligence"},{"key":"328_CR209","first-page":"1121","volume-title":"Proceedings of the eleventh international joint conference on artificial intelligence","author":"E. Horvitz","year":"1989","unstructured":"Horvitz, E., Cooper, G., & Heckerman, D. (1989). Reflection and action under scarce resources: theoretical principles and empirical study. In Proceedings of the eleventh international joint conference on artificial intelligence (pp. 1121\u20131127), Detroit, MI, August 1989. San Mateo: Morgan Kaufmann."},{"key":"328_CR210","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/636772.636798","volume":"46","author":"E. Horvitz","year":"2003","unstructured":"Horvitz, E., Kadie, C. M., Paek, T. E., & Hovel, D. (2003). Models of attention in computing and communications: from principles to applications. Communications of the ACM, 46, 52\u201359.","journal-title":"Communications of the ACM"},{"key":"328_CR211","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0020-0190(76)90095-8","volume":"5","author":"L. Hyafil","year":"1976","unstructured":"Hyafil, L., & Rivest, R. L. (1976). Constructing optimal binary decision trees is NP-complete. Information Processing Letters, 5, 15\u201317.","journal-title":"Information Processing Letters"},{"key":"328_CR212","doi-asserted-by":"crossref","unstructured":"Ibraev, U., Ng, K.-B., & Kantor, P. (2002). Exploration of a geometric model of data fusion. In Proceedings of the 2002 conference of the American society for information science and technology.","DOI":"10.1002\/meet.1450390114"},{"key":"328_CR213","unstructured":"Internet Policy Institute. (2001). Report of the national workshop on Internet voting: issues and research agenda (Technical report), March 2001."},{"key":"328_CR214","doi-asserted-by":"crossref","first-page":"1611","DOI":"10.1111\/j.1540-6261.1996.tb05219.x","volume":"51","author":"J. C. Jackwerth","year":"1996","unstructured":"Jackwerth, J. C., & Rubinstein, M. (1996). Recovering probability distributions from options prices. Journal of Finance, 51, 1611\u20131631.","journal-title":"Journal of Finance"},{"key":"328_CR215","unstructured":"Jain, K., & Vazirani, V. (2000). Applications of approximation algorithms to cooperative game theory. In Proceedings of symposium on theory of computing."},{"key":"328_CR216","doi-asserted-by":"crossref","unstructured":"Jakobsson, M. (1999). Flash mixing. In PODC \u201999 (pp.\u00a083\u201389).","DOI":"10.1145\/301308.301333"},{"key":"328_CR217","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., & Juels, A. (2000). Mix and match: secure function evaluation via ciphertexts. In Asiacrypt \u201900 (pp.\u00a0162\u2013177).","DOI":"10.1007\/3-540-44448-3_13"},{"key":"328_CR218","unstructured":"Jakobsson, M., Juels, A., & Rivest, R. L. (2002). Making mix nets robust for electronic voting by randomized partial checking. In USENIX security symposium (pp.\u00a0339\u2013353)."},{"key":"328_CR219","first-page":"25","volume-title":"Statistical image processing and graphics","author":"M. Janowitz","year":"1986","unstructured":"Janowitz, M. (1986). Ordinal filtering in digital image processing. In E. Wegman & D. DePriest (Eds.), Statistical image processing and graphics (pp. 25\u201341). New York: Marcel Dekker."},{"key":"328_CR220","series-title":"DIMACS series","volume-title":"Bioconsensus","year":"2003","unstructured":"Janowitz, M., LaPointe, F.-J., McMorris, F. R., Mirkin, B., & Roberts, F. S. (Eds.). (2003). DIMACS series : Vol.\u00a061. Bioconsensus. Providence: American Mathematical Society."},{"key":"328_CR221","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/TR.1983.5221476","volume":"R-32","author":"P. Jedrzejowicz","year":"1983","unstructured":"Jedrzejowicz, P. (1983). Minimizing the average cost of testing coherent systems: complexity and approximate algorithms. IEEE Transactions on Reliability, R-32, 66\u201370.","journal-title":"IEEE Transactions on Reliability"},{"key":"328_CR222","unstructured":"Jeh, G., & Widom, J. (2002). Scaling personalized Web search (Technical report). Stanford University."},{"key":"328_CR223","doi-asserted-by":"crossref","DOI":"10.1201\/9781584888581","volume-title":"Group sequential methods with applications to clinical trials","author":"C. Jennison","year":"1999","unstructured":"Jennison, C., & Turnbull, B. W. (1999). Group sequential methods with applications to clinical trials. London: Chapman and Hall."},{"key":"328_CR224","volume-title":"Proceedings of the ACM conference on knowledge discovery and data mining (KDD)","author":"T. Joachims","year":"2002","unstructured":"Joachims, T. (2002). Optimizing search engines using clickthrough data. In Proceedings of the ACM conference on knowledge discovery and data mining (KDD). New York: ACM."},{"key":"328_CR225","unstructured":"Johnson, D., Papadimitriou, C., Wigderson, A., & Yannakakis, M. (2000). Challenges for theoretical computer science. Report, June 2000. http:\/\/www.research.att.com\/~dsj\/nsflist.html ."},{"key":"328_CR226","unstructured":"Johnson, T., Cormode, G., Korn, F., Muthukrishnan, S., Spatscheck, O., & Srivastava, D. (2004). Holistic UDAFs at streaming speeds. In SIGMOD04."},{"key":"328_CR227","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/0022-247X(69)90140-1","volume":"27","author":"J. B. Kadane","year":"1969","unstructured":"Kadane, J. B. (1969). Quiz show problems. Journal of Mathematical Analysis and Applications, 27, 609\u2013623.","journal-title":"Journal of Mathematical Analysis and Applications"},{"key":"328_CR228","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/S0004-3702(98)00023-X","volume":"101","author":"L. P. Kaelbling","year":"1998","unstructured":"Kaelbling, L. P., Littman, M. L., & Cassandra, A. R. (1998). Planning and acting in partially observable stochastic domains. Artificial Intelligence, 101, 99\u2013134.","journal-title":"Artificial Intelligence"},{"key":"328_CR229","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/779928.779934","volume-title":"Proceedings of the 4th ACM conference on electronic commerce","author":"S. Kakade","year":"2003","unstructured":"Kakade, S., Kearns, M., Langford, J., & Ortiz, L. (2003). Correlated equilibria in graphical games. In Proceedings of the 4th ACM conference on electronic commerce (pp. 42\u201347). San Diego: ACM."},{"key":"328_CR230","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/B978-0-12-370182-4.50010-6","volume-title":"Game theory and applications","author":"E. Kalai","year":"1990","unstructured":"Kalai, E. (1990). Bounded rationality and strategic complexity in repeated games. In T. Ichiishi, A. Neyman, & Y. Tauman (Eds.), Game theory and applications (pp. 131\u2013157). New York: Academic Press."},{"key":"328_CR231","doi-asserted-by":"crossref","first-page":"1631","DOI":"10.1111\/j.1468-0262.2004.00549.x","volume":"72","author":"E. Kalai","year":"2004","unstructured":"Kalai, E. (2004). Large robust games. Econometrica, 72, 1631\u20131665.","journal-title":"Econometrica"},{"key":"328_CR232","unstructured":"Kantor, P. B., & Roberts, F. S. (2007). Monitoring message streams: algorithmic methods for automatic processing of messages. Jornal of Intelligence Community Research and Development. February 2007. See http:\/\/www.datalaundering.com\/download\/fredpoul.pdf ."},{"key":"328_CR233","series-title":"Lecture notes in computer science","first-page":"393","volume-title":"Advances in cryptology, EUROCRYPT\u201995","author":"S. Kazue","year":"1995","unstructured":"Kazue, S., & Killian, J. (1995). Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth. In Lecture notes in computer science : Vol. 921. Advances in cryptology, EUROCRYPT\u201995 (pp. 393\u2013403). Berlin: Springer."},{"key":"328_CR234","unstructured":"Kearns, M., & Mansour, Y. (2002). Efficient Nash computation in large population games with bounded influence. In Proceedings of UAI 2002 (pp.\u00a0259\u2013266)."},{"key":"328_CR235","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1023\/A:1017984413808","volume":"49","author":"M. J. Kearns","year":"2002","unstructured":"Kearns, M. J., & Singh, S. P. (2002). Near-optimal reinforcement learning in polynomial time. Machine Learning, 49, 209\u2013232.","journal-title":"Machine Learning"},{"key":"328_CR236","unstructured":"Kearns, M., Mansour, Y., & Singh, S. (2000). Fast planning in stochastic games. In Proceedings of UAI (pp.\u00a0309\u2013316)."},{"key":"328_CR237","unstructured":"Kearns, M., Littman, M., & Singh, S. (2001). Graphical models for game theory. In Proceedings of the 17th conference on uncertainty in artificial intelligence (UAI) (pp.\u00a0253\u2013260)."},{"key":"328_CR238","volume-title":"Decisions with multiple objectives: preferences and value tradeoffs","author":"R. Keeney","year":"1976","unstructured":"Keeney, R., & Raiffa, H. (1976). Decisions with multiple objectives: preferences and value tradeoffs. New York: Wiley."},{"key":"328_CR239","first-page":"575","volume":"88","author":"J. G. Kemeny","year":"1959","unstructured":"Kemeny, J. G. (1959). Mathematics without numbers. Daedalus, 88, 575\u2013591.","journal-title":"Daedalus"},{"key":"328_CR240","volume-title":"Mathematical models in the social sciences","author":"J. G. Kemeny","year":"1962","unstructured":"Kemeny, J. G., & Snell, J. L. (1962). Mathematical models in the social sciences. New York: Blaisdell. Reprinted by MIT Press, Cambridge, 1972."},{"key":"328_CR241","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/0167-6377(88)90075-2","volume":"7","author":"D. C. Knuth","year":"1988","unstructured":"Knuth, D. C., Papadimitriou, C., & Tsitsiklis, N. (1988). A note on strategy elimination in bimatrix games. Operations Research Letters, 7, 103\u2013108.","journal-title":"Operations Research Letters"},{"key":"328_CR242","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/0899-8256(92)90035-Q","volume":"4","author":"D. Koller","year":"1992","unstructured":"Koller, D., & Megiddo, N. (1992). The complexity of two-person zero-sum games in extensive form. Games and Economic Behavior, 4, 528\u2013552.","journal-title":"Games and Economic Behavior"},{"key":"328_CR243","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/BF01254386","volume":"25","author":"D. Koller","year":"1996","unstructured":"Koller, D., & Megiddo, N. (1996). Finding mixed strategies with small supports in extensive form games. International Journal of Game Theory, 25, 73\u201392.","journal-title":"International Journal of Game Theory"},{"key":"328_CR244","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1093\/logcom\/12.5.773","volume":"12","author":"S. Konieczny","year":"2002","unstructured":"Konieczny, S., & Perez, R. P. (2002). Merging information under constraints: a logical framework. Journal of Logic and Computation, 12, 772\u2013808.","journal-title":"Journal of Logic and Computation"},{"key":"328_CR245","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1016\/j.ejor.2003.06.039","volume":"160","author":"S. Konieczny","year":"2005","unstructured":"Konieczny, S., & Perez, R. P. (2005). Propositional belief base merging or how to merge beliefs\/goals coming from several sources and some links to social choice theory. European Journal of Operational Research, 160, 785\u2013802.","journal-title":"European Journal of Operational Research"},{"key":"328_CR246","unstructured":"Koppius, O. (2007). The need for speed: non-price considerations in auction design at the Dutch flower auctions. In DIMACS workshop on auctions with transaction costs, DIMACS Center, Rutgers University, March 2007."},{"key":"328_CR247","first-page":"181","volume-title":"Machine intelligence","author":"R. Kowalski","year":"1969","unstructured":"Kowalski, R. (1969). Search strategies for theorem proving. In B. Meltzer & D. Mitchie (Eds.), Machine intelligence (Vol.\u00a05, pp. 181\u2013201). Edinburgh: Edinburgh University Press."},{"key":"328_CR248","first-page":"167","volume-title":"Machine intelligence","author":"R. Kowalski","year":"1972","unstructured":"Kowalski, R. (1972). And-or graphs, theorem proving graphs and bi-directional search. In B. Meltzer & D. Mitchie (Eds.), Machine intelligence (Vol.\u00a07, pp. 167\u2013194). Edinburgh: Edinburgh University Press."},{"key":"328_CR249","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0004-3702(90)90101-5","volume":"44","author":"S. Kraus","year":"1990","unstructured":"Kraus, S., Lehmann, D., & Magidor, M. (1990). Nonmonotonic reasoning, preferential models and cumulative logics. Artificial Intelligence, 44, 167\u2013207.","journal-title":"Artificial Intelligence"},{"key":"328_CR250","doi-asserted-by":"crossref","unstructured":"Kum, H.-C., Pei, J., Wang, W., & Duncan, D. (2003a). ApproxMAP: approximate mining of consensus sequential patterns. In Proceedings of the 3rd SIAM international conference on data mining, San Francisco, CA.","DOI":"10.1137\/1.9781611972733.36"},{"key":"328_CR251","unstructured":"Kum, H.-C., Duncan, D., Flair, K., & Wang, W. (2003b). Social welfare program administration and evaluation and policy analysis using knowledge discovery and data mining (KDD) on administrative data. In Proceedings of the NSF national conference on digital government research (DG. O) (pp.\u00a039\u201344)."},{"key":"328_CR252","unstructured":"LAMSADE. (2003). Constructive preference elicitation for multiple criteria decision aid (MCDA). Decision Aiding Research Area, LAMSADE, January 23, 2003. http:\/\/www.lamsade.dauphine.fr\/mcda\/siteTheme\/p4.html ."},{"key":"328_CR253","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1145\/1160633.1160844","volume-title":"Proceedings of the fifth international joint conference on autonomous agents and multiagent systems","author":"K. Larson","year":"2006","unstructured":"Larson, K. (2006). Reducing costly information acquisition in auctions. In Proceedings of the fifth international joint conference on autonomous agents and multiagent systems (pp. 1167\u20131174). New York: ACM."},{"key":"328_CR254","first-page":"48","volume-title":"Proceedings of the 17th national conference on artificial intelligence","author":"K. Larson","year":"2000","unstructured":"Larson, K., & Sandholm, T. (2000). Deliberation in equilibrium: bargaining in computationally complex problems. In Proceedings of the 17th national conference on artificial intelligence (pp. 48\u201355). Menlo Park: AAAI Press."},{"key":"328_CR255","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/S0004-3702(01)00132-1","volume":"132","author":"K. Larson","year":"2001","unstructured":"Larson, K., & Sandholm, T. (2001a). Bargaining with limited computation: deliberation equilibrium. Artificial Intelligence, 132, 183\u2013217.","journal-title":"Artificial Intelligence"},{"key":"328_CR256","unstructured":"Larson, K., & Sandholm, T. (2001b). Costly valuation computation in auctions. In TARK (pp.\u00a0169\u2013182)."},{"key":"328_CR257","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198522195.001.0001","volume-title":"Graphical models","author":"S. L. Lauritzen","year":"1996","unstructured":"Lauritzen, S. L. (1996). Graphical models. Oxford: Clarendon."},{"key":"328_CR258","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1287\/mnsc.47.9.1235.9779","volume":"47","author":"S. L. Lauritzen","year":"2001","unstructured":"Lauritzen, S. L., & Nilsson, D. (2001). Representing and solving decision problems with limited information. Management Science, 47, 1238\u20131251.","journal-title":"Management Science"},{"key":"328_CR259","unstructured":"Lebanon, G., & Lafferty, J. (2002). Cranking: Combining rankings using conditional probability models on permutations. In Machine learning: proceedings of the nineteenth international conference."},{"key":"328_CR260","first-page":"381","volume-title":"Proceedings of the 12th conference on uncertainty in artificial intelligence, UAI96","author":"D. Lehmann","year":"1996","unstructured":"Lehmann, D. (1996). Generalized qualitative probability: Savage revisited. In Proceedings of the 12th conference on uncertainty in artificial intelligence, UAI96 (pp. 381\u2013388). San Francisco: Morgan Kaufmann."},{"key":"328_CR261","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1006\/game.1998.0787","volume":"35","author":"D. Lehmann","year":"2001","unstructured":"Lehmann, D. (2001a). Expected qualitative utility maximization. Games and Economic Behavior, 35, 54\u201379.","journal-title":"Games and Economic Behavior"},{"key":"328_CR262","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1093\/logcom\/11.2.229","volume":"11","author":"D. Lehmann","year":"2001","unstructured":"Lehmann, D. (2001b). Nonmonotonic logics and semantics. Journal of Logic and Computation, 11, 229\u2013256.","journal-title":"Journal of Logic and Computation"},{"key":"328_CR263","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/0022-0531(88)90153-6","volume":"46","author":"E. Lehrer","year":"1988","unstructured":"Lehrer, E. (1988). Repeated games with stationary bounded recall strategies. Journal of Economic Theory, 46, 130\u2013144.","journal-title":"Journal of Economic Theory"},{"key":"328_CR264","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1006\/game.1994.1058","volume":"7","author":"E. Lehrer","year":"1994","unstructured":"Lehrer, E. (1994). Finitely many players with bounded recall in infinitely repeated games. Games and Economic Behavior, 7, 390\u2013405.","journal-title":"Games and Economic Behavior"},{"key":"328_CR265","doi-asserted-by":"crossref","first-page":"1784","DOI":"10.1109\/50.633555","volume":"15","author":"C.-S. Li","year":"1997","unstructured":"Li, C.-S., & Ramaswami, R. (1997). Automatic fault detection, isolation, and recovery in transparent all-optical networks. Journal of Lightwave Technology, 15, 1784\u20131793.","journal-title":"Journal of Lightwave Technology"},{"key":"328_CR266","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/0004-3702(95)00019-4","volume":"83","author":"J. Lin","year":"1986","unstructured":"Lin, J. (1986). Integration of weighted knowledge bases. Artificial Intelligence, 83, 363\u2013378.","journal-title":"Artificial Intelligence"},{"key":"328_CR267","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1142\/S0218843098000040","volume":"7","author":"J. Lin","year":"1998","unstructured":"Lin, J., & Mendelzon, A. O. (1998). Merging databases under constraints. International Journal of Cooperative Information Systems, 7, 55\u201376.","journal-title":"International Journal of Cooperative Information Systems"},{"key":"328_CR268","doi-asserted-by":"crossref","unstructured":"Linial, N. (1994). Game-theoretic aspects of computing. In R.\u00a0J. Aumann & S. Hart (Eds.), Handbook of game theory with economic applications (Vol.\u00a0II, pp.\u00a01340\u20131395).","DOI":"10.1016\/S1574-0005(05)80070-0"},{"key":"328_CR269","doi-asserted-by":"crossref","unstructured":"Linial, N., Peleg, D., Rabinovitch, Y., & Saks, M. (1993). Sphere packing and local majorities in graphs. In Proceedings of the 2nd ISTCS (pp.\u00a0141\u2013149).","DOI":"10.1109\/ISTCS.1993.253475"},{"key":"328_CR270","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.dss.2004.08.007","volume":"39","author":"M. L. Littman","year":"2005","unstructured":"Littman, M. L., & Stone, P. (2005). A polynomial-time (Nash) equilibrium algorithm for repeated games. Decision Support Systems, 39, 55\u201366.","journal-title":"Decision Support Systems"},{"key":"328_CR271","first-page":"817","volume":"14","author":"M. Littman","year":"2002","unstructured":"Littman, M., Kearns, M., & Singh, S. (2002). An efficient algorithm for singly connected games. Advances in Neural Information Processing Systems, 14, 817\u2013823.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"328_CR272","unstructured":"Littman, M. L., Ravi, N., Fenson, E., & Howard, R. (2004). An instance-based state representation for network repair. In Proceedings of the nineteenth national conference on artificial intelligence (AAAI) (pp.\u00a0287\u2013292)."},{"key":"328_CR273","unstructured":"Lobo, M., & Boyd, S. (2003). Pricing and learning with uncertain demand. Preprint, Fuqua School of Business, Duke University."},{"key":"328_CR274","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1177\/109114217400200205","volume":"2","author":"E. Loehman","year":"1974","unstructured":"Loehman, E., & Whinston, A. (1974). An axiomatic approach to cost allocation for public investment. Public Finance Quarterly, 2, 236\u2013251.","journal-title":"Public Finance Quarterly"},{"key":"328_CR275","first-page":"19","volume-title":"Proceedings of symposia in applied mathematics","author":"W. F. Lucas","year":"1981","unstructured":"Lucas, W. F. (1981). Applications of cooperative games to equitable allocations. In Proceedings of symposia in applied mathematics (pp. 19\u201336). Providence: American Mathematical Society."},{"key":"328_CR276","first-page":"1","volume-title":"Proceedings of the IEEE international conference on intelligence and security informatics (ISI-2007)","author":"D. Madigan","year":"2007","unstructured":"Madigan, D., Mittal, S., & Roberts, F. S. (2007). Sequential decision making algorithms for port of entry inspection: overcoming computational challenges. In G. Muresan, T. Altiok, B. Melamed, & D. Zeng (Eds.), Proceedings of the IEEE international conference on intelligence and security informatics (ISI-2007) (pp. 1\u20137). New York: IEEE Press."},{"key":"328_CR277","unstructured":"Madigan, D., Mittal, S., & Roberts, F. S. (2008). Efficient sequential decision making algorithms for container inspection operations. Preprint, DIMACS Center, Rutgers University."},{"key":"328_CR278","series-title":"DIMACS series","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1090\/dimacs\/061\/06","volume-title":"Bioconsensus","author":"N. V. R. Mahadev","year":"2003","unstructured":"Mahadev, N. V. R., & Roberts, F. S. (2003). Consensus list colorings of graphs and physical mapping of DNA. In M. Janowitz, F.-J. Lapointe, F. R. McMorris, B. Mirkin, & F. S. Roberts (Eds.), DIMACS series : Vol.\u00a061. Bioconsensus (pp. 83\u201395). Providence: American Mathematical Society."},{"key":"328_CR279","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S0895-7177(97)00080-0","volume":"25","author":"N. V. R. Mahadev","year":"1997","unstructured":"Mahadev, N. V. R., Peke\u010d, A., & Roberts, F. S. (1997). Effect of change of scale on optimality in a scheduling model with priorities and earliness\/tardiness penalties. Mathematical and Computer Modelling, 25, 9\u201322.","journal-title":"Mathematical and Computer Modelling"},{"key":"328_CR280","doi-asserted-by":"crossref","first-page":"S120","DOI":"10.1287\/opre.46.3.S120","volume":"46","author":"N. V. R. Mahadev","year":"1998","unstructured":"Mahadev, N. V. R., Peke\u010d, A., & Roberts, F. S. (1998). On the meaningfulness of optimal solutions to scheduling problems: Can an optimal solution be non-optimal? Operations Research, 46, S120\u2013S134.","journal-title":"Operations Research"},{"key":"328_CR281","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1287\/opre.49.5.646.10603","volume":"49","author":"S. Mahajan","year":"2001","unstructured":"Mahajan, S., & van Ryzin, G. J. (2001a). Inventory competition under dynamic consumer substitution. Operations Research, 49, 646\u2013657.","journal-title":"Operations Research"},{"key":"328_CR282","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/opre.49.3.334.11210","volume":"49","author":"S. Mahajan","year":"2001","unstructured":"Mahajan, S., & van Ryzin, G. J. (2001b). Stocking retail assortments under dynamic consumer substitution. Operations Research, 49, 334\u2013351.","journal-title":"Operations Research"},{"key":"328_CR283","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/S0022-0531(02)00036-4","volume":"109","author":"F. Maniquet","year":"2003","unstructured":"Maniquet, F. (2003). A characterization of the Shapley value in queuing problems. Journal of Economic Theory, 109, 90\u2013103.","journal-title":"Journal of Economic Theory"},{"key":"328_CR284","unstructured":"Mannor, S., Simister, D. I., Sun, P., & Tsitsiklis, J. N. (2004). Biases and variances in value function estimates. Fuqua School of Business, Duke University, Faculty Research paper FRPS05-199, August 2004. Preliminary version: Bias and variance in value function estimation. In Proceedings of the 21st international conference on machine learning, Banff, Canada, 2004."},{"key":"328_CR285","first-page":"395","volume":"43","author":"P. Marcotorchino","year":"1981","unstructured":"Marcotorchino, P., & Michaud, P. (1981). Heuristic approach of the similarity aggregation problem. Methods of Operations Research, 43, 395\u2013404.","journal-title":"Methods of Operations Research"},{"key":"328_CR286","unstructured":"McCall, J. A., Richards, P. K., & Walters, G. F. (1977). Factors in software quality (RADC TR-77-369). Also in US Rome Air Development Center Reports NTIS AD\/A-049 014, 015, 055, I, II, III, 1977."},{"key":"328_CR287","first-page":"387","volume-title":"Proceedings of the 12th international conference on machine learning","author":"R. A. McCallum","year":"1995","unstructured":"McCallum, R. A. (1995). Instance-based utile distinctions for reinforcement learning with hidden state. In Proceedings of the 12th international conference on machine learning (pp. 387\u2013395). San Francisco: Morgan Kaufmann."},{"key":"328_CR288","unstructured":"McGaley, M. (2004). Report on DIMACS workshop on electronic voting\u2014theory and practice. December 2004. http:\/\/dimacs.rutgers.edu\/Workshops\/Voting\/e-voting-final.pdf ."},{"key":"328_CR289","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1287\/trsc.33.2.233","volume":"33","author":"J. McGill","year":"1999","unstructured":"McGill, J., & van Ryzin, G. J. (1999). Revenue management: research overview and prospects. Transportation Science, 33, 233\u2013256.","journal-title":"Transportation Science"},{"key":"328_CR290","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/S0166-218X(98)00003-1","volume":"84","author":"F. R. McMorris","year":"1998","unstructured":"McMorris, F. R., Mulder, M., & Roberts, F. S. (1998). The median procedure on median graphs. Discrete Applied Mathematics, 84, 165\u2013181.","journal-title":"Discrete Applied Mathematics"},{"key":"328_CR291","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1002\/net.1027","volume":"38","author":"F. R. McMorris","year":"2001","unstructured":"McMorris, F. R., Roberts, F. S., & Wang, C. (2001). The center function on trees. Networks, 38, 84\u201387.","journal-title":"Networks"},{"key":"328_CR292","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/B978-0-934613-04-0.50022-3","volume-title":"Reasoning about knowledge","author":"N. Megiddo","year":"1986","unstructured":"Megiddo, N., & Wigderson, A. (1986). On play by means of computing machines. In J. Halpern (Ed.), Reasoning about knowledge (pp. 259\u2013274). Los Altos: Kaufman."},{"key":"328_CR293","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1007\/BF02460669","volume":"55","author":"B. Mirkin","year":"1993","unstructured":"Mirkin, B., & Roberts, F. S. (1993). Consensus functions and patterns in molecular sequences. Bulletin of Mathematical Biology, 55, 695\u2013713.","journal-title":"Bulletin of Mathematical Biology"},{"key":"328_CR294","doi-asserted-by":"crossref","unstructured":"Mirrokni, V. S., & Vetta, A. (2004). Convergence issues in competitive games. In RANDOM-APPROX 2004.","DOI":"10.1007\/978-3-540-27821-4_17"},{"key":"328_CR295","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/12.8736","volume":"38","author":"M. Miyakawa","year":"1989","unstructured":"Miyakawa, M. (1989). Criteria for selecting a variable in the construction of efficient trees. IEEE Transactions on Computers, 38, 130\u2013141.","journal-title":"IEEE Transactions on Computers"},{"key":"328_CR296","doi-asserted-by":"crossref","unstructured":"Mizuta, H., & Steiglitz, K. (2000). Agent-based simulation of dynamic online auctions. In Winter simulation conference, Orlando, FL, December 2000.","DOI":"10.1109\/WSC.2000.899168"},{"key":"328_CR297","doi-asserted-by":"crossref","unstructured":"Moffet, J. D., & Lupu, E. C. (1999). The uses of role hierarchies in access control. In Proceedings 4th ACM workshop on role-based access control (pp.\u00a0153\u2013160), Fairfax, VA.","DOI":"10.1145\/319171.319186"},{"key":"328_CR298","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1023\/A:1005150001309","volume":"124","author":"P. Mongin","year":"2000","unstructured":"Mongin, P. (2000). Does optimization imply rationality? Synthese, 124, 73\u2013111.","journal-title":"Synthese"},{"key":"328_CR299","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1287\/moor.4.3.215","volume":"4","author":"C. L. Monma","year":"1979","unstructured":"Monma, C. L., & Sidney, J. B. (1979). Optimal sequencing via modular decomposition: characterization of sequencing functions. Mathematics of Operations Research, 4, 215\u2013224.","journal-title":"Mathematics of Operations Research"},{"key":"328_CR300","volume-title":"Proceedings SIGMOD ACM special interest group on management of data","author":"M. Morgenstern","year":"1987","unstructured":"Morgenstern, M. (1987). Security and inference in multilevel database and knowledge-base systems. In Proceedings SIGMOD ACM special interest group on management of data. New York: ACM."},{"key":"328_CR301","doi-asserted-by":"crossref","unstructured":"Morgenstern, M. (1988). Controlling logical inference in multilevel database systems. In IEEE symposium on security and privacy, Oakland, CA.","DOI":"10.1109\/SECPRI.1988.8116"},{"key":"328_CR302","unstructured":"Moore, A. W., Atkeson, C. G., & Schaal, S. (1995). Memory-based learning for control (Technical Report CMU-RI-TR-95-18). CMU Robotics Institute."},{"key":"328_CR303","first-page":"276","volume-title":"Proceedings of the first international conference on multi-agent systems ICMAS-95","author":"Y. Mor","year":"1995","unstructured":"Mor, Y., & Rosenschein, J. (1995). Time and the prisoner\u2019s dilemma. In Proceedings of the first international conference on multi-agent systems ICMAS-95 (pp. 276\u2013292). Menlo Park: AAAI Press."},{"key":"328_CR304","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1049\/ip-sen:19971350","volume":"144","author":"M. Morisio","year":"1997","unstructured":"Morisio, M., & Tsouki\u00e0s, A. (1997). IUSWARE: a formal methodology for software evaluation and selection. IEEE Proceedings on Software Engineering, 144, 162\u2013174.","journal-title":"IEEE Proceedings on Software Engineering"},{"key":"328_CR305","first-page":"811","volume-title":"Proceedings of the SEKE-02 conference","author":"M. Morisio","year":"2002","unstructured":"Morisio, M., Stamelos, I., & Tsouki\u00e0s, A. (2002). A new method to evaluate software artifacts against predefined profiles. In Proceedings of the SEKE-02 conference (pp. 811\u2013818). New York: ACM."},{"key":"328_CR306","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF01756289","volume":"16","author":"H. Moulin","year":"1987","unstructured":"Moulin, H. (1987). Equal or proportional division of a surplus, and other methods. International Journal of Game Theory, 16, 161\u2013186.","journal-title":"International Journal of Game Theory"},{"key":"328_CR307","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s003550050145","volume":"16","author":"H. Moulin","year":"1999","unstructured":"Moulin, H. (1999). Incremental cost sharing: characterization by coalition strategy-proofness. Social Choice and Welfare, 16, 279\u2013320.","journal-title":"Social Choice and Welfare"},{"key":"328_CR308","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/PL00004200","volume":"18","author":"H. Moulin","year":"2001","unstructured":"Moulin, H., & Shenker, S. (2001). Strategyproof sharing of submodular costs: budget balance versus efficiency. Economic Theory, 18, 511\u2013533.","journal-title":"Economic Theory"},{"key":"328_CR309","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/moor.27.1.1.336","volume":"27","author":"H. Moulin","year":"2002","unstructured":"Moulin, H., & Stong, R. (2002). Fair queuing and other probabilistic allocation methods. Mathematics of Operations Research, 27, 1\u201330.","journal-title":"Mathematics of Operations Research"},{"key":"328_CR310","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/0304-3975(89)90150-3","volume":"66","author":"D. Mundici","year":"1989","unstructured":"Mundici, D. (1989). Functions computed by monotone boolean formulas with no repeated variables. Theoretical Computer Science, 66, 113\u2013114.","journal-title":"Theoretical Computer Science"},{"key":"328_CR311","volume-title":"Game theory","author":"R. Myerson","year":"1991","unstructured":"Myerson, R. (1991). Game theory. Cambridge: Harvard University Press."},{"key":"328_CR312","unstructured":"Natarajan, K. S. (1986). Optimizing depth-first search of AND-OR trees (Technical report). IBM T.J. Watson Research Center, Yorktown Heights, NY."},{"key":"328_CR313","volume-title":"Problem-solving methods in artificial intelligence","author":"N. J. Nilsson","year":"1971","unstructured":"Nilsson, N. J. (1971). Problem-solving methods in artificial intelligence. New York: McGraw-Hill."},{"key":"328_CR314","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B., & Sumner, R. (1999). Privacy preserving auctions and mechanism design. In Proceedings 1st ACM conference on electronic commerce, Denver, CO, November 1999.","DOI":"10.1145\/336992.337028"},{"key":"328_CR315","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/0165-1765(85)90026-6","volume":"19","author":"A. Neyman","year":"1985","unstructured":"Neyman, A. (1985). Bounded complexity justifies cooperation in finitely repeated prisoner\u2019s dilemma. Economics Letters, 19, 227\u2013229.","journal-title":"Economics Letters"},{"key":"328_CR316","unstructured":"Neyman, A. (1997). Cooperation, repetition, and automata. In S. Hart & A. Mas-Colell (Eds.), NATO ASI series F: Vol.\u00a0155. Cooperation: game theoretic approaches. (pp.\u00a0233\u2013255)."},{"key":"328_CR317","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1287\/moor.23.3.513","volume":"23","author":"A. Neyman","year":"1999","unstructured":"Neyman, A. (1999). Finitely repeated games with finite automata. Mathematics of Operations Research, 23, 513\u2013552.","journal-title":"Mathematics of Operations Research"},{"key":"328_CR318","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1006\/game.1998.0674","volume":"29","author":"A. Neyman","year":"1999","unstructured":"Neyman, A., & Okada, D. (1999). Strategic entropy and complexity in repeated games. Games and Economic Behavior, 29, 191\u2013223.","journal-title":"Games and Economic Behavior"},{"key":"328_CR319","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1006\/game.1999.0725","volume":"30","author":"A. Neyman","year":"2000","unstructured":"Neyman, A., & Okada, D. (2000a). Repeated games with bounded entropy. Games and Economic Behavior, 30, 228\u2013247.","journal-title":"Games and Economic Behavior"},{"key":"328_CR320","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s001820000040","volume":"29","author":"A. Neyman","year":"2000","unstructured":"Neyman, A., & Okada, D. (2000b). Two person repeated games with finite automata. International Journal of Game Theory, 29, 309\u2013325.","journal-title":"International Journal of Game Theory"},{"key":"328_CR321","unstructured":"Ng, K.-B. (1998). An investigation of the conditions for effective data fusion in information retrieval. PhD thesis, Rutgers University, New Brunswick, NJ."},{"key":"328_CR322","series-title":"Lectures notes in computer science","first-page":"164","volume-title":"Advances in cryptology, ASIACRYPT\u201994","author":"V. Niemi","year":"1994","unstructured":"Niemi, V., & Renvall, A. (1994). How to prevent buying of votes in computer elections. In Lectures notes in computer science : Vol. 917. Advances in cryptology, ASIACRYPT\u201994 (pp. 164\u2013170). Berlin: Springer."},{"key":"328_CR323","series-title":"Lecture notes in computer science","first-page":"1","volume-title":"Proceedings of the 16th symposium on theoretical aspects of computer science, STACS99","author":"N. Nisan","year":"1999","unstructured":"Nisan, N. (1999). Algorithms for selfish agents. In Lecture notes in computer science : Vol. 1563. Proceedings of the 16th symposium on theoretical aspects of computer science, STACS99 (pp. 1\u201317). Berlin: Springer."},{"key":"328_CR324","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1145\/352871.352898","volume-title":"Proceedings ACM conference on electronic commerce","author":"N. Nisan","year":"2000","unstructured":"Nisan, N., & Ronen, A. (2000). Computationally feasible VCG mechanisms. In Proceedings ACM conference on electronic commerce (pp. 242\u2013252). New York: ACM Press."},{"key":"328_CR325","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1006\/game.1999.0790","volume":"35","author":"N. Nisan","year":"2001","unstructured":"Nisan, N., & Ronen, A. (2001). Algorithmic mechanism design. Games and Economic Behavior, 35, 166\u2013196.","journal-title":"Games and Economic Behavior"},{"key":"328_CR326","unstructured":"Nyanchama, M., & Osborn, S. (1995). The role graph model. In Proceedings of the 1st ACM workshop on role-based access control (p. 12), Gaithersburg, MD."},{"key":"328_CR327","first-page":"361","volume":"18","author":"N. Okada","year":"1982","unstructured":"Okada, N., Hashimoto, T., & Young, P. (1982). Cost allocation in water resources development. Water Resources Research, 18, 361\u2013373.","journal-title":"Water Resources Research"},{"key":"328_CR328","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.ejor.2003.12.011","volume":"164","author":"R. P. O\u2019Neill","year":"2005","unstructured":"O\u2019Neill, R. P., Sotkiewicz, P. M., Hobbs, B. F., Rothkopf, M. H., & Stewart, W. R. (2005). Efficient market-clearing prices in markets with nonconvexities. European Journal of Operations Research, 164, 269\u2013285.","journal-title":"European Journal of Operations Research"},{"key":"328_CR329","unstructured":"Osada, R., Funkhouser, R., Chazelle, B., & Dobkin, D. (2002). Matching 3D models with shape distributions. In Shape modeling international (pp.\u00a0154-166)."},{"key":"328_CR330","doi-asserted-by":"crossref","unstructured":"Osborn, S., & Guo, Y. (2000). Modeling users in role-based access control. In Proceedings of the 5th ACM workshop on role-based access control (pp.\u00a031\u201337), Berlin.","DOI":"10.1145\/344287.344299"},{"key":"328_CR331","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S. Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., & Munawer, Q. (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Tranactions on Information and System Security TISSEC, 3, 85\u2013106.","journal-title":"ACM Tranactions on Information and System Security TISSEC"},{"key":"328_CR332","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/0899-8256(92)90008-G","volume":"4","author":"C. Papadimitriou","year":"1992","unstructured":"Papadimitriou, C. (1992). On players with a bounded number of states. Games and Economic Behavior, 4, 122\u2013131.","journal-title":"Games and Economic Behavior"},{"key":"328_CR333","doi-asserted-by":"crossref","unstructured":"Papadimitriou, C. H. (2001). Algorithms, games, and the Internet. In Proceedings of symposium on theory of computing, STOC.","DOI":"10.1145\/380752.380883"},{"key":"328_CR334","doi-asserted-by":"crossref","unstructured":"Papadimitriou, C. H., & Yannakakis, M. (1991). On the value of information in distributed decision-making. In PODC 91.","DOI":"10.1145\/112600.112606"},{"key":"328_CR335","doi-asserted-by":"crossref","unstructured":"Papadimitriou, C., & Yannakakis, M. (1994). On complexity as bounded rationality. In STOC-94 (pp.\u00a0726\u2013733).","DOI":"10.1145\/195058.195445"},{"key":"328_CR336","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.ejor.2003.08.057","volume":"161","author":"S. Park","year":"2005","unstructured":"Park, S., & Rothkopf, M. (2005). Auctions with bidder-determined allowable combinations. European Journal of Operational Research, 161, 399\u2013415.","journal-title":"European Journal of Operational Research"},{"key":"328_CR337","unstructured":"Park, C., Itoh, K., & Kurosawa, K. (1993). All\/nothing election scheme and anonymous channel. In Eurocrypt \u201993 (pp.\u00a0248\u2013259)."},{"key":"328_CR338","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1002\/1099-1360(200009)9:5<205::AID-MCDA277>3.0.CO;2-O","volume":"9","author":"E. Paschetta","year":"2000","unstructured":"Paschetta, E., & Tsouki\u00e0s, A. (2000). A real world mcda application: evaluating software. Journal of Multi-Criteria Decision Analysis, 9, 205\u2013226.","journal-title":"Journal of Multi-Criteria Decision Analysis"},{"key":"328_CR339","volume-title":"Rough sets\u2014theoretical aspects of reasoning about data","author":"Z. Pawlak","year":"1991","unstructured":"Pawlak, Z. (1991). Rough sets\u2014theoretical aspects of reasoning about data. Dordrecht: Kluwer Academic."},{"key":"328_CR340","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., & Lamport, L. (1980). Reaching agreement in the presence of faults. Journal of the ACM, 27, 228\u2013234.","journal-title":"Journal of the ACM"},{"key":"328_CR341","unstructured":"Peke\u010d, A. (2000). How to design a second-price combinational auction. In INFORMS 2000."},{"key":"328_CR342","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1287\/mnsc.49.11.1485.20585","volume":"49","author":"A. Peke\u010d","year":"2003","unstructured":"Peke\u010d, A., & Rothkopf, M. H. (2003). Combinatorial auction design. Management Science, 49, 1485\u20131503.","journal-title":"Management Science"},{"key":"328_CR343","unstructured":"Peleg, D. (1996). Local majority voting, small coalitions and controlling monopolies in graphs: a review. In Proceedings of the 3rd colloqiun on structural information and communication complexity (pp.\u00a0170\u2013179)."},{"key":"328_CR344","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/S0166-218X(98)00043-2","volume":"86","author":"D. Peleg","year":"1998","unstructured":"Peleg, D. (1998). Size bounds for dynamic monopolies. Discrete Applied Mathematics, 86, 263\u2013273.","journal-title":"Discrete Applied Mathematics"},{"key":"328_CR345","first-page":"729","volume-title":"Proceedings of the 17th national conference on artificial intelligence, AAAI-2000","author":"D. M. Pennock","year":"2000","unstructured":"Pennock, D. M., Horvitz, E., & Giles, C. L. (2000a). Social choice theory and recommender systems: analysis of the axiomatic foundations of collaborative filtering. In Proceedings of the 17th national conference on artificial intelligence, AAAI-2000 (pp. 729\u2013734). Menlo Park: AAAI Press."},{"key":"328_CR346","first-page":"735","volume-title":"Proceedings 17th international conference on machine learning (ICML-2000)","author":"D. M. Pennock","year":"2000","unstructured":"Pennock, D. M., Maynard-Reid, P., Giles, C. L., & Horvitz, E. (2000b). A normative examination of ensemble learning algorithms. In Proceedings 17th international conference on machine learning (ICML-2000) (pp. 735\u2013742). San Mateo: Morgan Kauffmann."},{"key":"328_CR347","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1023\/A:1018907729570","volume":"80","author":"P. Perny","year":"1998","unstructured":"Perny, P. (1998). Multicriteria filtering methods based on concordance\/non-discordance principles. Annals of Operations Research, 80, 137\u2013167.","journal-title":"Annals of Operations Research"},{"key":"328_CR348","unstructured":"Perny, P., & Spanjaard, O. (2002). Preference-based search in state space graphs. In Proceedings of the AAAI\u20192002 conference (pp.\u00a0751\u2013756), Edmonton, Canada, July 2002."},{"key":"328_CR349","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.ejor.2003.12.013","volume":"162","author":"P. Perny","year":"2005","unstructured":"Perny, P., & Spanjaard, O. (2005). A preference-based approach to spanning trees and shortest paths problems. European Journal of Operational Research, 162, 584\u2013601.","journal-title":"European Journal of Operational Research"},{"key":"328_CR350","first-page":"9","volume":"1","author":"P. Perny","year":"2001","unstructured":"Perny, P., & Zucker, J. D. (2001). Preference-based search and machine learning for collaborative filtering: The \u2018film-conseil\u2019 recommender system. Information, Interaction, Intelligence, 1, 9\u201348.","journal-title":"Information, Interaction, Intelligence"},{"key":"328_CR351","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1080\/00029890.2000.12005263","volume":"107","author":"O. Pikhurko","year":"2000","unstructured":"Pikhurko, O. (2000). On envy-free cake division. The American Mathematical Monthly, 107, 736\u2013738.","journal-title":"The American Mathematical Monthly"},{"key":"328_CR352","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-8883-6","volume-title":"Semiorders: properties, representations, applications","author":"M. Pirlot","year":"1997","unstructured":"Pirlot, M., & Vincke, P. (1997). Semiorders: properties, representations, applications. Dordrecht: Kluwer Academic."},{"key":"328_CR353","first-page":"127","volume-title":"Machine intelligence","author":"I. Pohl","year":"1971","unstructured":"Pohl, I. (1971). Bi-directional search. In B. Meltzer & D. Mitchie (Eds.), Machine intelligence (Vol.\u00a06, pp.\u00a0127\u2013140). Edinburgh: Edinburgh University Press."},{"key":"328_CR354","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/BF02579347","volume":"3","author":"S. Poljak","year":"1983","unstructured":"Poljak, S., & Sura, M. (1983). On periodical behavior in society with symmetric influences. Combinatorica, 3, 119\u2013121.","journal-title":"Combinatorica"},{"key":"328_CR355","first-page":"190","volume-title":"Proceedings of the ninth biennial conference of the Canadian society for computational studies of intelligence","author":"D. Poole","year":"1992","unstructured":"Poole, D. (1992). Decision-theoretic defaults. In Proceedings of the ninth biennial conference of the Canadian society for computational studies of intelligence (pp. 190\u2013197). San Francisco: Morgan Kaufmann."},{"key":"328_CR356","first-page":"219","volume-title":"Handbook of philosophical logic","author":"H. Prakken","year":"2002","unstructured":"Prakken, H., & Vreeswijk, G. (2002). Logics for defeasible argumentation. In D. Gabbay & F. Guenthner (Eds.), Handbook of philosophical logic (Vol.\u00a04, pp. 219\u2013318). Dordrecht: Kluwer Academic."},{"key":"328_CR357","first-page":"81","volume":"1","author":"J. R. Quinlan","year":"1986","unstructured":"Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1, 81\u2013106.","journal-title":"Machine Learning"},{"key":"328_CR358","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.2202\/1534-5963.1261","volume":"6","author":"E. Rasmusen","year":"2006","unstructured":"Rasmusen, E. (2006). Strategic implications of uncertainty over one\u2019s own private value in auctions. Advances in Theoretical Economics, 6, 1261.","journal-title":"Advances in Theoretical Economics"},{"key":"328_CR359","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1145\/321341.321343","volume":"13","author":"L. T. Reinwald","year":"1966","unstructured":"Reinwald, L. T., & Soland, R. M. (1966). Conversion of limited-entry decision tables to optimal computer programs I: Minimum average processing time. Journal of the Association for Computing Machinery, 13, 339\u2013358.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"328_CR360","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P. Resnick","year":"1997","unstructured":"Resnick, P., & Varian, H. R. (1997). Recommender systems. Communications of the ACM, 40, 56\u201358.","journal-title":"Communications of the ACM"},{"key":"328_CR361","volume-title":"Discrete mathematical models, with applications to social, biological, and environmental problems","author":"F. S. Roberts","year":"1976","unstructured":"Roberts, F. S. (1976). Discrete mathematical models, with applications to social, biological, and environmental problems. Englewood Cliffs: Prentice-Hall."},{"key":"328_CR362","volume-title":"Measurement theory, with applications to decisionmaking, utility, and the social sciences","author":"F. S. Roberts","year":"1979","unstructured":"Roberts, F. S. (1979). Measurement theory, with applications to decisionmaking, utility, and the social sciences. Reading: Addison-Wesley."},{"key":"328_CR363","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/0022-2496(85)90011-2","volume":"29","author":"F. S. Roberts","year":"1985","unstructured":"Roberts, F. S. (1985). Applications of the theory of meaningfulness to psychology. Journal of Mathematical Psychology, 29, 311\u2013332.","journal-title":"Journal of Mathematical Psychology"},{"key":"328_CR364","series-title":"IMA volumes in mathematics and its applications","volume-title":"Applications of combinatorics and graph theory in the biological and social sciences","year":"1989","unstructured":"Roberts, F. S. (Ed.). (1989). IMA volumes in mathematics and its applications. Applications of combinatorics and graph theory in the biological and social sciences. New York: Springer"},{"key":"328_CR365","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/0022-247X(90)90382-P","volume":"147","author":"F. S. Roberts","year":"1990","unstructured":"Roberts, F. S. (1990). Merging relative scores. Journal of Mathematical Analysis and Applications, 147, 30\u201352.","journal-title":"Journal of Mathematical Analysis and Applications"},{"key":"328_CR366","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/0165-4896(91)90074-2","volume":"21","author":"F. S. Roberts","year":"1991","unstructured":"Roberts, F. S. (1991a). Characterizations of the plurality function. Mathematical Social Sciences, 21, 101\u2013127.","journal-title":"Mathematical Social Sciences"},{"key":"328_CR367","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/0165-4896(91)90005-C","volume":"22","author":"F. S. Roberts","year":"1991","unstructured":"Roberts, F. S. (1991b). On the indicator function of the plurality function. Mathematical Social Sciences, 22, 163\u2013174.","journal-title":"Mathematical Social Sciences"},{"key":"328_CR368","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/S0927-0507(05)80099-4","volume-title":"Operations research and the public sector","author":"F. S. Roberts","year":"1994","unstructured":"Roberts, F. S. (1994). Limitations on conclusions using scales of measurement. In A. Barnett, S. M. Pollock, & M. H. Rothkopf (Eds.), Operations research and the public sector (pp. 621\u2013671). Amsterdam: Elsevier."},{"key":"328_CR369","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/0895-7177(95)00009-Q","volume":"21","author":"F. S. Roberts","year":"1995","unstructured":"Roberts, F. S. (1995). A functional equation that arises in problems of scheduling with priorities and lateness\/earliness penalties. Mathematical and Computer Modelling, 21, 77\u201383.","journal-title":"Mathematical and Computer Modelling"},{"key":"328_CR370","series-title":"SIAM frontiers in applied mathematics series","first-page":"1","volume-title":"Mathematical and modeling approaches in homeland security","author":"F. S. Roberts","year":"2003","unstructured":"Roberts, F. S. (2003). Challenges for discrete mathematics and theoretical computer science in the defense against bioterrorism. In C. Castillo-Chavez & H. T. Banks (Eds.), SIAM frontiers in applied mathematics series. Mathematical and modeling approaches in homeland security (pp. 1\u201334). Philadelphia: SIAM."},{"key":"328_CR371","unstructured":"Roberts, F. S. (2005). Decision support algorithms for port-of-entry inspection. In Working together: research and development partnerships in homeland security, proceedings of DHS\/IEEE conference, Boston."},{"key":"328_CR372","first-page":"97","volume":"45","author":"J. M. Robertson","year":"1997","unstructured":"Robertson, J. M., & Webb, A. (1997). Near exact and envy-free cake division. Ars Combinatoria, 45, 97\u2013108.","journal-title":"Ars Combinatoria"},{"key":"328_CR373","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1287\/mnsc.44.8.1131","volume":"44","author":"M. H. Rothkopf","year":"1998","unstructured":"Rothkopf, M. H., Peke\u010d, A., & Harstad, R. M. (1998). Computationally manageable combinatorial auctions. Management Science, 44, 1131\u20131147.","journal-title":"Management Science"},{"key":"328_CR374","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/0022-0531(74)90066-0","volume":"9","author":"M. Rothschild","year":"1974","unstructured":"Rothschild, M. (1974). A two-armed bandit theory of market pricing. Journal of Economic Theory, 9, 185\u2013202.","journal-title":"Journal of Economic Theory"},{"key":"328_CR375","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/S0022-0000(03)00044-8","volume":"67","author":"T. Roughgarden","year":"2003","unstructured":"Roughgarden, T. (2003). The price of anarchy is independent of the network topology. Journal of Computer and System Sciences, 67, 341\u2013364.","journal-title":"Journal of Computer and System Sciences"},{"key":"328_CR376","volume-title":"Selfish routing and the price of anarchy","author":"T. Roughgarden","year":"2005","unstructured":"Roughgarden, T. (2005). Selfish routing and the price of anarchy. Cambridge: MIT Press."},{"key":"328_CR377","doi-asserted-by":"crossref","unstructured":"Roughgarden, T., & Tard\u0151s, E. (2000). How bad is selfish routing? In Proceedings of IEEE foundations of computer science.","DOI":"10.1109\/SFCS.2000.892069"},{"key":"328_CR378","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/585597.585599","volume":"45","author":"A. Rubin","year":"2002","unstructured":"Rubin, A. (2002). Security considerations for remote electronic voting. Communications of the ACM, 45, 39\u201344.","journal-title":"Communications of the ACM"},{"key":"328_CR379","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/0022-0531(86)90021-9","volume":"39","author":"A. Rubinstein","year":"1986","unstructured":"Rubinstein, A. (1986). Finite automata play the repeated prisoner\u2019s dilemma. Juornal of Economic Theory, 39, 83\u201396.","journal-title":"Juornal of Economic Theory"},{"key":"328_CR380","first-page":"385","volume":"79","author":"A. Rubinstein","year":"1989","unstructured":"Rubinstein, A. (1989). The electronic mail game: a game with almost common knowledge. American Economic Review, 79, 385\u2013391.","journal-title":"American Economic Review"},{"key":"328_CR381","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4702.001.0001","volume-title":"Modeling bounded rationality","author":"A. Rubinstein","year":"1998","unstructured":"Rubinstein, A. (1998). Modeling bounded rationality. Cambridge: MIT Press."},{"key":"328_CR382","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0952-1976(01)00007-0","volume":"14","author":"R. Sabbadin","year":"2001","unstructured":"Sabbadin, R. (2001). Possibilistic Markov decision processes. Engineering Applications of Artificial Intelligence, 14, 287\u2013300.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"328_CR383","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/S0888-613X(98)10019-1","volume":"19","author":"R. Sabbadin","year":"1998","unstructured":"Sabbadin, R., Fargier, H., & Lang, J. (1998). Towards qualitative approaches to multi-stage decision making. International Journal of Approximate Reasoning, 19, 441\u2013471.","journal-title":"International Journal of Approximate Reasoning"},{"key":"328_CR384","doi-asserted-by":"crossref","unstructured":"Sako, K., & Kilian, J. (1995). Receipt-free mix-type voting scheme. In Eurocrypt \u201995 (pp.\u00a0393\u2013403).","DOI":"10.1007\/3-540-49264-X_32"},{"key":"328_CR385","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/0022-247X(84)90064-7","volume":"101","author":"S. Salloum","year":"1984","unstructured":"Salloum, S., & Breuer, M. A. (1984). An optimum testing algorithm for some symmetric coherent systems. Journal of Mathematical Analysis and Applications, 101, 170\u2013194.","journal-title":"Journal of Mathematical Analysis and Applications"},{"key":"328_CR386","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0004-3702(01)00159-X","volume":"135","author":"T. Sandholm","year":"2002","unstructured":"Sandholm, T. (2002). Algorithm for optimal winner determination in combinatorial auctions. Artificial Intelligence, 135, 1\u201354.","journal-title":"Artificial Intelligence"},{"key":"328_CR387","unstructured":"Sandholm, T., & Suri, S. (2001). Side constraints and non-price attributes in markets. In International joint conference on artificial intelligence (IJCAI), proceedings of the workshop on distributed constraint reasoning, Seattle, WA, 4 August 2001."},{"key":"328_CR388","doi-asserted-by":"crossref","unstructured":"Sandholm, T., & Suri, S. (2002). Optimal clearing of supply\/demand curves. In Proceedings of the 13th annual international symposium on algorithms and computation (ISAAC), Vancouver, Canada.","DOI":"10.1007\/3-540-36136-7_52"},{"key":"328_CR389","doi-asserted-by":"crossref","unstructured":"Sandhu, R., & Munawer, Q. (1998). How to do discretionary access control using roles. In Proceedings of the 3rd ACM workshop on role-based access control (pp.\u00a047\u201354), Fairfax, VA.","DOI":"10.1145\/286884.286893"},{"key":"328_CR390","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1287\/opre.34.6.871","volume":"34","author":"R. D. Shachter","year":"1986","unstructured":"Shachter, R. D. (1986). Evaluating influence diagrams. Operations Research, 34, 871\u2013882.","journal-title":"Operations Research"},{"key":"328_CR391","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1214\/aos\/1024691352","volume":"26","author":"R. E. Schapire","year":"1998","unstructured":"Schapire, R. E., Freund, Y., Bartlett, P., & Lee, W. S. (1998). Boosting the margin: a new explanation for the effectiveness of voting methods. The Annals of Statistics, 26, 1651\u20131686.","journal-title":"The Annals of Statistics"},{"key":"328_CR392","doi-asserted-by":"crossref","unstructured":"Schuba, C. L., Krsul, I., Kuhn, M. G., Spafford, E. G., Sundaram, A., & Zamboni, D. (1997). Analysis of a denial of service attack on TCP. In Proceedings of the 1997 IEEE symposium on security and privacy (pp.\u00a0208\u2013233).","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"328_CR393","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1007\/978-94-009-7798-3_22","volume-title":"Ordered sets","author":"D. Scott","year":"1982","unstructured":"Scott, D. (1982). Some ordered sets in computer science. In I. Rival (Ed.), Ordered sets (pp. 677\u2013718). Dordrecht: Reidel."},{"key":"328_CR394","series-title":"Handbook in operations research and management science","volume-title":"Network routing","author":"W. Sharkey","year":"1995","unstructured":"Sharkey, W. (1995). Network models in economics. In M. O. Ball et al. (Eds.), Handbook in operations research and management science : Vol. 8. Network routing. Amsterdam: North-Holland."},{"key":"328_CR395","first-page":"388","volume-title":"Proceedings of the 10th international joint conference in artificial intelligence, IJCAI87","author":"Y. Shoham","year":"1987","unstructured":"Shoham, Y. (1987). Nonmonotonic logic: meaning and utility. In Proceedings of the 10th international joint conference in artificial intelligence, IJCAI87 (pp. 388\u2013393). San Francisco: Morgan Kaufmann."},{"key":"328_CR396","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1287\/mnsc.8.3.325","volume":"8","author":"M. Shubik","year":"1962","unstructured":"Shubik, M. (1962). Incentives, decentralized controls, the assignment of joint costs and internal pricing. Management Science, 8, 325\u2013343.","journal-title":"Management Science"},{"key":"328_CR397","volume-title":"Models of bounded rationality","author":"H. A. Simon","year":"1982","unstructured":"Simon, H. A. (1982). Models of bounded rationality (Vol. 2). Cambridge: MIT Press."},{"key":"328_CR398","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/0004-3702(75)90002-8","volume":"6","author":"H. A. Simon","year":"1975","unstructured":"Simon, H. A., & Kadane, J. B. (1975). Optimal problem-solving search: all-or-none solutions. Artificial Intelligence, 6, 235\u2013247.","journal-title":"Artificial Intelligence"},{"key":"328_CR399","unstructured":"Singh, S., Kearns, M., & Mansour, Y. (2000). Nash convergence of gradient dynamics in general-sum games. In UAI 2000."},{"key":"328_CR400","unstructured":"Smart, W. D., & Kaelbling, L. P. (2000). Practical reinforcement learning in continuous spaces. In Proceedings of the 17th international conference on machine learning (ICML 2000) (pp.\u00a0903\u2013910)."},{"key":"328_CR401","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0004-3702(89)90025-8","volume":"39","author":"D. E. Smith","year":"1989","unstructured":"Smith, D. E. (1989). Controlling backward inference. Artificial Intelligence, 39, 145\u2013208.","journal-title":"Artificial Intelligence"},{"key":"328_CR402","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1006\/game.1995.1031","volume":"10","author":"D. Stahl","year":"1995","unstructured":"Stahl, D., & Wilson, P. (1995). On players\u2019 models of other players\u2014theory and experimental evidence. Games and Economic Behavior, 10, 218\u2013254.","journal-title":"Games and Economic Behavior"},{"key":"328_CR403","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1111\/j.0006-341X.1999.00971.x","volume":"55","author":"N. Stallard","year":"1999","unstructured":"Stallard, N., Thall, P. F., & Whitehead, J. (1999). Decision theoretic designs for phase II clinical trials with multiple outcomes. Biometrics, 55, 971\u2013977.","journal-title":"Biometrics"},{"key":"328_CR404","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1111\/0824-7935.00162","volume":"17","author":"J. Stefanowski","year":"2001","unstructured":"Stefanowski, J., & Tsouki\u00e0s, A. (2001a). Incomplete information tables and rough classification. Computational Intelligence, 17, 454\u2013466.","journal-title":"Computational Intelligence"},{"key":"328_CR405","series-title":"Lecture notes in artificial intelligence","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/3-540-45554-X_25","volume-title":"Rough sets and current trends in computing","author":"J. Stefanowski","year":"2001","unstructured":"Stefanowski, J., & Tsouki\u00e0s, A. (2001b). Valued tolerance and decision rules. In W. Ziarko & Y. Yao (Eds.), Lecture notes in artificial intelligence : Vol. 2005. Rough sets and current trends in computing (pp.\u00a0212\u2013219). Berlin: Springer."},{"key":"328_CR406","series-title":"Lecture notes in artificial intelligence","first-page":"271","volume-title":"Proceedings of the RSCTC 2002 conference","author":"J. Stefanowski","year":"2002","unstructured":"Stefanowski, J., & Tsouki\u00e0s, A. (2002). Induction of decision rules and classification in the valued tolerance approach. In J. J. Alpigini, J. F. Peters, A. Skoeron, & N. Zhong (Eds.), Lecture notes in artificial intelligence : Vol. 2475. Proceedings of the RSCTC 2002 conference (pp. 271\u2013278). Berlin: Springer."},{"key":"328_CR407","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1002\/1098-111X(200101)16:1<13::AID-INT3>3.0.CO;2-M","volume":"16","author":"J. Stefanowski","year":"2001","unstructured":"Stefanowski, J., & Vanderpooten, D. (2001). Induction of decision rules in classification and discovery-oriented perspectives. International Journal on Intelligent Systems, 16, 13\u201327.","journal-title":"International Journal on Intelligent Systems"},{"key":"328_CR408","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/BF01770069","volume":"10","author":"P. D. Straffin","year":"1981","unstructured":"Straffin, P. D., & Heaney, J. P. (1981). Game theory and the Tennessee Valley Authority. International Journal of Game Theory, 10, 35\u201343.","journal-title":"International Journal of Game Theory"},{"key":"328_CR409","unstructured":"Stroud, P. D., & Saeger, K. J. (2003). Enumeration of increasing boolean expressions and alternative digraph implementations for diagnostic applications. In H. Chu, J. Ferrer, T. Nguyen & Y. Yu (Eds.), Proceedings volume IV, computer, communication and control technologies (Vol.\u00a0I, pp.\u00a0328\u2013333), International Institute of Informatics and Systematics, Orlando, FL."},{"key":"328_CR410","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1287\/mnsc.44.11.1577","volume":"44","author":"K. Talluri","year":"1998","unstructured":"Talluri, K., & van Ryzin, G. J. (1998). An analysis of bid-price controls for network revenue management. Management Science, 44, 1577\u20131593.","journal-title":"Management Science"},{"key":"328_CR411","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1287\/trsc.33.2.207","volume":"33","author":"K. Talluri","year":"1999","unstructured":"Talluri, K., & van Ryzin, G. J. (1999). A randomized linear programming method for computing network bid prices. Transportation Science, 33, 207\u2013216.","journal-title":"Transportation Science"},{"key":"328_CR412","first-page":"928","volume-title":"Proceedings of the 12th national conference on artificial intelligence, AAAI94","author":"S. W. Tan","year":"1994","unstructured":"Tan, S. W., & Pearl, J. (1994). Qualitative decision theory. In Proceedings of the 12th national conference on artificial intelligence, AAAI94 (pp. 928\u2013933). Cambridge: MIT Press."},{"key":"328_CR413","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/S0165-4896(02)00014-8","volume":"44","author":"A. Tasn\u00e1di","year":"2002","unstructured":"Tasn\u00e1di, A. (2002). On probabilistic rationing methods. Mathematical Social Sciences, 44, 211\u2013221.","journal-title":"Mathematical Social Sciences"},{"key":"328_CR414","series-title":"Arthur Andersen and company lecture series","volume-title":"A behavioral analysis of joint cost allocation and transfer pricing","author":"A. Thomas","year":"1980","unstructured":"Thomas, A. (1980). In Arthur Andersen and company lecture series. A behavioral analysis of joint cost allocation and transfer pricing. Champaign: Stipes."},{"key":"328_CR415","first-page":"333","volume-title":"Database security V: status and prospects, results of the 5th IFIP WG 11.3 working group conference on database security","author":"B. Thuraisingham","year":"1991","unstructured":"Thuraisingham, B. (1991). The use of conceptual structures for handling the inference problem. In C. E. Landwehr & S. Jajodia (Eds.), Database security V: status and prospects, results of the 5th IFIP WG 11.3 working group conference on database security (pp. 333\u2013362). Amsterdam: North-Holland."},{"key":"328_CR416","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/0169-023X(93)90025-K","volume":"11","author":"B. Thuraisingham","year":"1993","unstructured":"Thuraisingham, B., Ford, W., Collins, M., & O\u2019Keefe, J. (1993). Design and implementation of a database inference controller. Data and Knowledge Engineering, 11, 271\u2013298.","journal-title":"Data and Knowledge Engineering"},{"key":"328_CR417","doi-asserted-by":"crossref","DOI":"10.56021\/9780801844256","volume-title":"Combinatorics and partially ordered sets: dimension theory","author":"W. T. Trotter","year":"1992","unstructured":"Trotter, W. T. (1992). Combinatorics and partially ordered sets: dimension theory. Baltimore: The Johns Hopkins University Press."},{"key":"328_CR418","unstructured":"Tsouki\u00e0s, A. (2003). From decision theory to decision aiding methodology (DIMACS Technical Report 2003-21). DIMACS Center, Rutgers University, Piscataway, NJ."},{"key":"328_CR419","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/S0166-218X(02)00256-1","volume":"127","author":"A. Tsouki\u00e0s","year":"2003","unstructured":"Tsouki\u00e0s, A., & Vincke, P. (2003). A characterization of PQI interval orders. Discrete Applied Mathematics, 127, 387\u2013397.","journal-title":"Discrete Applied Mathematics"},{"key":"328_CR420","doi-asserted-by":"crossref","unstructured":"Tzafestas, S. G., & Dalianis, P. J. (1994). Fault diagnosis in complex systems using artificial neural networks. In Proceedings of the 3rd IEEE conference on control applications (Vol.\u00a02, pp.\u00a0877\u2013882).","DOI":"10.1109\/CCA.1994.381206"},{"key":"328_CR421","unstructured":"Vickrey, D., & Koller, D. (2002). Multi-agent algorithms for solving graphical games. In Proceedings of the national conference on artificial intelligence (AAAI)."},{"key":"328_CR422","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/BF00134150","volume":"32","author":"P. Vincke","year":"1992","unstructured":"Vincke, P. (1992a). Exploitation of a crisp relation in a ranking problem. Theory and Decision, 32, 221\u2013240.","journal-title":"Theory and Decision"},{"key":"328_CR423","volume-title":"Multicriteria decision-aid","author":"P. Vincke","year":"1992","unstructured":"Vincke, P. (1992b). Multicriteria decision-aid. New York: Wiley."},{"key":"328_CR424","unstructured":"Wakabayashi, Y. (1986). Aggregation of binary relations: algorithmic and polyhedral investigations. Thesis, Augsburg."},{"key":"328_CR425","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/BF01531084","volume":"1","author":"J. Wang","year":"1990","unstructured":"Wang, J., & Vande Vate, J. (1990). Question asking strategies for Horn clause systems. Annals of Mathematics and Artificial Intelligence, 1, 359\u2013370.","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"328_CR426","volume-title":"The complexity of Boolean functions","author":"I. Wegener","year":"1987","unstructured":"Wegener, I. (1987). The complexity of Boolean functions. New York: Wiley-Teubner."},{"key":"328_CR427","volume-title":"Evolutionary game theory","author":"J. Weibull","year":"1995","unstructured":"Weibull, J. (1995). Evolutionary game theory. Cambridge: MIT Press."},{"key":"328_CR428","first-page":"698","volume-title":"Proceedings of the 9th national conference on artificial intelligence, AAAI91","author":"M. P. Wellman","year":"1991","unstructured":"Wellman, M. P., & Doyle, J. (1991). Preferential semantics for goals. In Proceedings of the 9th national conference on artificial intelligence, AAAI91 (pp. 698\u2013703). Menlo Park: AAAI Press."},{"key":"328_CR429","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/BF00124943","volume":"42","author":"J. A. Weymark","year":"1984","unstructured":"Weymark, J. A. (1984). Arrow\u2019s theorem with social quasi-orderings. Public Choice, 42, 235\u2013246.","journal-title":"Public Choice"},{"key":"328_CR430","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/1467-8586.00069","volume":"51","author":"L. V. Williams","year":"1999","unstructured":"Williams, L. V. (1999). Information efficiency in betting markets: a survey. Bulletin of Economic Research, 51, 1\u201330.","journal-title":"Bulletin of Economic Research"},{"key":"328_CR431","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1109\/25.728514","volume":"47","author":"A. Yener","year":"1998","unstructured":"Yener, A., & Rose, C. (1998). Highly mobile users and paging: optimal polling strategies. IEEE Transactions on Vehicular Technology, 47, 1251\u20131257.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"328_CR432","unstructured":"Yilankaya, O., & Celik, G. (2005). Optimal auctions with simultaneous and costly participation. Micro Theory Working Papers celik-05-05-09-03-55-40."},{"key":"328_CR433","volume-title":"Cost allocation: methods, principles, applications","author":"H. P. Young","year":"1985","unstructured":"Young, H. P. (1985). Cost allocation: methods, principles, applications. Amsterdam: North-Holland."},{"key":"328_CR434","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/0888-613X(94)90026-4","volume":"11","author":"N. L. Zhang","year":"1994","unstructured":"Zhang, N. L., Qi, R., & Poole, D. (1994). A computational theory of decision networks. International Journal of Approximate Reasoning, 11, 83\u2013158.","journal-title":"International Journal of Approximate Reasoning"},{"key":"328_CR435","unstructured":"Zhang, Y., Xu, W., & Callan, J. (2003). Exploration and exploitation in adaptive filtering based on Bayesian active learning. In Proceedings of the twentieth international conference on machine learning (ICML-2003)."},{"key":"328_CR436","unstructured":"Zhang, H., Schroepfer, C., & Elsayed, E. A. (2006). Sensor thresholds in port-of-entry inspection systems. In Proceedings of the 12th ISSAT international conference on reliability and quality in design (pp.\u00a0172\u2013176), Chicago, IL, USA, 3\u20135 August 2006."}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-008-0328-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-008-0328-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-008-0328-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T13:02:31Z","timestamp":1709125351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-008-0328-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,19]]},"references-count":436,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["328"],"URL":"https:\/\/doi.org\/10.1007\/s10479-008-0328-z","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,7,19]]}}}