Computational social choice

F Brandt, V Conitzer, U Endriss - Multiagent systems, 2012 - books.google.com
Social choice theory concerns the design and formal analysis of methods for aggregating
the preferences of multiple agents. Examples of such methods include voting procedures …

Diffusion auction design

B Li, D Hao, H Gao, D Zhao - Artificial Intelligence, 2022 - Elsevier
This paper studies an auction design problem for a seller to sell a single commodity in a
social network, where each individual (the seller or a buyer) can only communicate with her …

Using mechanism design to prevent false-name manipulations

V Conitzer, M Yokoo - AI magazine, 2010 - ojs.aaai.org
The basic notion of false-name-proofness allows for useful mechanisms under certain
circumstances, but in general there are impossibility results that show that false-name-proof …

Sybil-resilient reality-aware social choice

G Shahaf, E Shapiro, N Talmon - arXiv preprint arXiv:1807.11105, 2018 - arxiv.org
Sybil attacks, in which fake or duplicate identities (\emph {sybils}) infiltrate an online
community, pose a serious threat to such communities, as they might tilt community-wide …

Sybil-proof answer querying mechanism

Y Zhang, X Zhang, D Zhao - arXiv preprint arXiv:2005.13224, 2020 - arxiv.org
We study a question answering problem on a social network, where a requester is seeking
an answer from the agents on the network. The goal is to design reward mechanisms to …

Multi-winner contests for strategic diffusion in social networks

W Shen, Y Feng, CV Lopes - Proceedings of the AAAI Conference on …, 2019 - ojs.aaai.org
Strategic diffusion encourages participants to take active roles in promoting stakeholders'
agendas by rewarding successful referrals. As social media continues to transform the way …

Sybil-resilient social choice with low voter turnout

R Meir, N Talmon, G Shahaf, E Shapiro - European Conference on Multi …, 2022 - Springer
We address social choice in the presence of sybils (fake or duplicate votes) and low turnout,
two behaviors that may each distort the will of the society. To do so we assume the status …

Computational voting theory: game-theoretic and combinatorial aspects

L Xia - 2011 - search.proquest.com
For at least two thousand years, voting has been used as one of the most effective ways to
aggregate people's ordinal preferences. In the last 50 years, the rapid development of …

Sybil-resilient social choice with partial participation

R Meir, G Shahaf, E Shapiro, N Talmon - arXiv preprint arXiv:2001.05271, 2020 - arxiv.org
Voting rules may fail to implement the will of the society when only some voters actively
participate, and/or in the presence of sybil (fake or duplicate) voters. Here we aim to address …

Mechanism design for time critical and cost critical task execution via crowdsourcing

S Nath, P Dayama, D Garg, Y Narahari… - Internet and Network …, 2012 - Springer
An exciting application of crowdsourcing is to use social networks in complex task execution.
In this paper, we address the problem of a planner who needs to incentivize agents within a …