{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T11:20:41Z","timestamp":1760440841281},"reference-count":24,"publisher":"World Scientific Pub Co Pte Lt","issue":"03n04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2009,9]]},"abstract":"<jats:p> This paper presents a constructive solution to the classic problem of land division. It is the first solution that enables the allocation of higher-dimensional resources without degenerating them first into a series of one-dimensional resource allocation problems. We base our allocation procedure on the topology of overlaps among the regions of interest of different agents. Our result is an algorithm suitable for computer implementation, unlike earlier ones that were only existential in nature. It uses the notion of degree of partial overlap to create a sufficiency condition for the existence of a solution, and proposes a procedure to find the overlaps in such a case. The proposed solution is fair, strategy-proof, non-existential, and does not explicitly need the resource to be measurable. The agents do not have to reveal their private utility functions. We extend our earlier result for one-dimensional resource allocation to this two-dimensional one and explain the distinctive issues involved. <\/jats:p>","DOI":"10.1142\/s0218843009002051","type":"journal-article","created":{"date-parts":[[2009,12,30]],"date-time":"2009-12-30T06:43:21Z","timestamp":1262155401000},"page":"381-422","source":"Crossref","is-referenced-by-count":7,"title":["A PROCEDURE FOR THE ALLOCATION OF TWO-DIMENSIONAL RESOURCES IN A MULTIAGENT SYSTEM"],"prefix":"10.1142","volume":"18","author":[{"given":"KARTHIK","family":"IYER","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, USA"}]},{"given":"MICHAEL N.","family":"HUHNS","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, USA"}]}],"member":"219","published-online":{"date-parts":[[2012,4,6]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-0539-5"},{"key":"rf2","volume-title":"Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers","author":"Rosenschein J. S.","year":"1994"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(83)90015-2"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511598975"},{"key":"rf5","volume-title":"Negotiation Criteria for Multiagent Resource Allocation","author":"Iyer K.","year":"2007"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.2307\/3616548"},{"key":"rf9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6479.001.0001","volume-title":"Strategic Negotiation in Multiagent Environments","author":"Kraus S.","year":"2001"},{"key":"rf10","first-page":"3","volume":"30","author":"Chevaleyre Y.","journal-title":"Informatica"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0363-7"},{"key":"rf12","volume-title":"Combinatorial Auctions","author":"Cramton P. C.","year":"2006"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1070.0384"},{"key":"rf14","first-page":"101","volume":"16","author":"Steinhaus H.","journal-title":"Econometrica"},{"key":"rf16","first-page":"1","volume":"4","author":"Tasn\u00e1di A.","journal-title":"Economics Bulletin"},{"key":"rf17","doi-asserted-by":"crossref","DOI":"10.1201\/9781439863855","volume-title":"Cake Cutting Algorithms","author":"Robertson J.","year":"1998"},{"key":"rf18","first-page":"112","author":"Stewart I.","journal-title":"Scientific American"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1109\/4236.780967"},{"key":"rf20","first-page":"212","volume":"66","author":"Hill T. P.","journal-title":"Mathematical Gazette"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.2307\/2311357"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.2307\/2322417"},{"key":"rf23","doi-asserted-by":"publisher","DOI":"10.1016\/S0195-6698(13)80129-1"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.1007\/s003550200192"},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1002\/9781118164471"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2004.04.008"},{"key":"rf28","volume-title":"Utilitarianism","author":"Mill J. S.","year":"2002"}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218843009002051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T16:15:41Z","timestamp":1565108141000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218843009002051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":24,"journal-issue":{"issue":"03n04","published-online":{"date-parts":[[2012,4,6]]},"published-print":{"date-parts":[[2009,9]]}},"alternative-id":["10.1142\/S0218843009002051"],"URL":"https:\/\/doi.org\/10.1142\/s0218843009002051","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"value":"0218-8430","type":"print"},{"value":"1793-6365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}