{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:16:11Z","timestamp":1773083771305,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,5]],"date-time":"2011-06-05T00:00:00Z","timestamp":1307232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,5]]},"DOI":"10.1145\/1993574.1993606","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T11:53:52Z","timestamp":1307361232000},"page":"209-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Mechanisms for multi-level marketing"],"prefix":"10.1145","author":[{"given":"Yuval","family":"Emek","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Ron","family":"Karidi","sequence":"additional","affiliation":[{"name":"Microsoft Israel Innovation Lab, Herzeliya, Israel"}]},{"given":"Moshe","family":"Tennenholtz","sequence":"additional","affiliation":[{"name":"Microsoft Israel R&amp;D Center and Technion--Israel Institute of Technology, Herzeliya, Israel"}]},{"given":"Aviv","family":"Zohar","sequence":"additional","affiliation":[{"name":"Microsoft Research Silicon Valley Lab, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DARPA network challenge. http:\/\/balloon.media.mit.edu\/mit\/rules\/.  DARPA network challenge. http:\/\/balloon.media.mit.edu\/mit\/rules\/."},{"key":"e_1_3_2_1_2_1","first-page":"145","volume-title":"AAMAS","author":"\u00c5gotnes T.","year":"2009","unstructured":"T. \u00c5gotnes , W. van der Hoek, M. Tennenholtz, and M. Wooldridge. Power in normative systems . In AAMAS , pages 145 -- 152 , 2009 . T. \u00c5gotnes, W. van der Hoek, M. Tennenholtz, and M. Wooldridge. Power in normative systems. In AAMAS, pages 145--152, 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10841-9_11"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1329125.1329433"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/08073617X"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080202"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1086\/226707"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367524"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481.026"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.63"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/moor.3.3.189"},{"key":"e_1_3_2_1_14_1","first-page":"137","article-title":"Contagion","volume":"67","author":"Morris S.","year":"2003","unstructured":"S. Morris . Contagion . Review of Economic Studies , 67 : 137 -- 146 , 2003 . S. Morris. Contagion. Review of Economic Studies, 67:137--146, 2003.","journal-title":"Review of Economic Studies"},{"key":"e_1_3_2_1_15_1","volume-title":"Micromotives and Macrobehavior","author":"Schelling T.","year":"1978","unstructured":"T. Schelling . Micromotives and Macrobehavior . Norton, London : Penguin , 1978 . T. Schelling. Micromotives and Macrobehavior. Norton, London: Penguin, 1978."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00028-3"},{"issue":"4","key":"e_1_3_2_1_17_1","first-page":"259","article-title":"Convention Evolution","volume":"2","author":"Tennenholtz M.","year":"1996","unstructured":"M. Tennenholtz . Convention Evolution in Organizations and Markets. Computational and Mathematical Organization Thoery , 2 ( 4 ): 259 -- 283 , 1996 . M. Tennenholtz. Convention Evolution in Organizations and Markets. Computational and Mathematical Organization Thoery, 2(4):259--283, 1996.","journal-title":"Organizations and Markets. Computational and Mathematical Organization Thoery"},{"key":"e_1_3_2_1_18_1","first-page":"265","volume-title":"Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems -","volume":"1","author":"Todo T.","year":"2009","unstructured":"T. Todo , A. Iwasaki , M. Yokoo , and Y. Sakurai . Characterizing false-name-proof allocation rules in combinatorial auctions . In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1 , AAMAS '09, pages 265 -- 272 , Richland, SC , 2009 . International Foundation for Autonomous Agents and Multiagent Systems. T. Todo, A. Iwasaki, M. Yokoo, and Y. Sakurai. Characterizing false-name-proof allocation rules in combinatorial auctions. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, AAMAS '09, pages 265--272, Richland, SC, 2009. International Foundation for Autonomous Agents and Multiagent Systems."},{"key":"e_1_3_2_1_19_1","first-page":"190","volume-title":"Proceedings of the 23rd national conference on Artificial intelligence -","volume":"1","author":"Wagman L.","year":"2008","unstructured":"L. Wagman and V. Conitzer . Optimal false-name-proof voting rules with costly voting . In Proceedings of the 23rd national conference on Artificial intelligence - Volume 1 , pages 190 -- 195 . AAAI Press , 2008 . L. Wagman and V. Conitzer. Optimal false-name-proof voting rules with costly voting. In Proceedings of the 23rd national conference on Artificial intelligence - Volume 1, pages 190--195. AAAI Press, 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214252","volume-title":"Individual Strategy and Social Structure: An Evolutionary Theory of Institutions","author":"Young P.","year":"1998","unstructured":"P. Young . Individual Strategy and Social Structure: An Evolutionary Theory of Institutions . Princeton University Press , 1998 . P. Young. Individual Strategy and Social Structure: An Evolutionary Theory of Institutions. Princeton University Press, 1998."}],"event":{"name":"EC '11: ACM Conference on Electronic Commerce","location":"San Jose California USA","acronym":"EC '11","sponsor":["SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the 12th ACM conference on Electronic commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993574.1993606","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993574.1993606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:05Z","timestamp":1750244405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993574.1993606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,5]]},"references-count":20,"alternative-id":["10.1145\/1993574.1993606","10.1145\/1993574"],"URL":"https:\/\/doi.org\/10.1145\/1993574.1993606","relation":{},"subject":[],"published":{"date-parts":[[2011,6,5]]},"assertion":[{"value":"2011-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}