Proceedings. 13th International Workshop on Database and Expert Systems Applications
DOI: 10.1109/dexa.2002.1045932
|View full text |Cite
|
Sign up to set email alerts
|

Private auctions with multiple rounds and multiple items

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Most works done so far on multi-unit auctions are extensions of Vickrey auction [12] with somewhat strong assumptions. First, bidders in these auctions always look for bundle of units [11] and thus multi-unit Vickrey auctions become the optimal choice for solving the winner determination problem. Second, a major part of the literature assumes the objects in the multi-object auctions to have a common value.…”
Section: Introductionmentioning
confidence: 99%
“…Most works done so far on multi-unit auctions are extensions of Vickrey auction [12] with somewhat strong assumptions. First, bidders in these auctions always look for bundle of units [11] and thus multi-unit Vickrey auctions become the optimal choice for solving the winner determination problem. Second, a major part of the literature assumes the objects in the multi-object auctions to have a common value.…”
Section: Introductionmentioning
confidence: 99%
“…They also demand for a deposit of digital cash for each player to ensure non-repudiation in their cryptographic auction scheme. Sadeghi, Schunter, and Steinbrecher [28] presented a combinatorial auction, that sells multiple interdependent items by proceeding multiple rounds. They consider the German UMTS auction as an example, where every winner had to win at least two licenses.…”
Section: Related Work Concerning Electronic Auction Systemsmentioning
confidence: 99%
“…To address this huge variety of possible auction settings and to achieve different security and efficiency properties numerous protocols have been developed, e.g. [4,11,19,20,21,22,23] and references therein.…”
Section: Introductionmentioning
confidence: 99%