Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1064009acmconferencesBook PagePublication PagesecConference Proceedingsconference-collections
EC '05: Proceedings of the 6th ACM conference on Electronic commerce
ACM2005 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EC05: Sixth ACM Conference on Electronic Commerce 2005 Vancouver BC Canada June 5 - 8, 2005
ISBN:
978-1-59593-049-1
Published:
05 June 2005
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
July 7 - 11, 2025
Stanford , CA , USA
Reflects downloads up to 24 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

The papers in these proceedings were presented at the 2005 ACM Conference on Electronic Commerce, held June 5-8 in Vancouver, Canada. These papers were selected from 113 submissions in areas relevant to electronic commerce. The papers were selected by a program committee of 21 experts in the field.The selection process started shortly after the submission deadline of December 7, 2004. At least three program committee members were assigned to evaluate each paper's scientific novelty, technical quality, and importance to the field. Final selection of the 32 papers that appear in these proceedings was based on these reviews and deliberations among the program committee.

Article
Ranking systems: the PageRank axioms

This paper initiates research on the foundations of ranking systems, a fundamental ingredient of basic e-commerce and Internet Technologies. In order to understand the essence and the exact rationale of page ranking algorithms we suggest the axiomatic ...

Article
Graceful service degradation (or, how to know your payment is late)

When distributing digital content over a broadcast channel it's often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the content. This works well when users make a conscious decision to leave the ...

Article
Dynamic and secure B2B e-contract update management

Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Important features that distinguish e-contracts from traditional paper ...

Article
On the computational power of iterative auctions

We embark on a systematic analysis of the power and limitations of iterative combinatorial auctions. Most existing iterative combinatorial auctions are based on repeatedly suggesting prices for bundles of items, and querying the bidders for their "...

Article
Multi-unit auctions with budget-constrained bidders

We study a multi-unit auction with multiple bidders, each of whom has a private valuation and a budget. The truthful mechanisms of such an auction are characterized, in the sense that, under standard assumptions, we prove that it is impossible to design ...

Article
Fairness and optimality in congestion games

We study two problems, that of computing social optimum and that of finding fair allocations, in the congestion game model of Milchtaich[8] Although we show that the general problem is hard to approximate to any factor, we give simple algorithms for ...

Article
Information markets vs. opinion pools: an empirical comparison

In this paper, we examine the relative forecast accuracy of information markets versus expert aggregation. We leverage a unique data source of almost 2000 people's subjective probability judgments on 2003 US National Football League games and compare ...

Article
Content availability, pollution and poisoning in file sharing peer-to-peer networks

Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular technique consists in "poisoning" a specific item (movie, song, or software ...

Article
Communication complexity of common voting rules

We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, single transferable vote (STV), Condorcet, approval, Bucklin, cup, maximin, ...

Article
Complexity of (iterated) dominance

We study various computational aspects of solving games using dominance and iterated dominance. We first study both strict and weak dominance (not iterated), and show that checking whether a given strategy is dominated by some mixed strategy can be done ...

Article
Optimal design of English auctions with discrete bid levels

In this paper we consider a common form of the English auction that is widely used in online Internet auctions. This discrete bid auction requires that the bidders may only submit bids which meet some predetermined discrete bid levels and, thus, there ...

Article
True costs of cheap labor are hard to measure: edge deletion and VCG payments in graphs

We address the problem of lowering the buyer's expected payments in shortest path auctions, where the buyer's goal is to purchase a path in a graph in which edges are owned by selfish agents. We show that by deleting some of the edges of the graph, one ...

Article
Hidden-action in multi-hop routing

In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not the end-to-end transmission was successful. Therefore, in the absence of ...

Article
A price-anticipating resource allocation mechanism for distributed shared clusters

In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed market-based resource allocation system. Multiple users decide how to distribute their budget bids) among multiple machines according to ...

Article
Inefficiency in provisioning interconnected communication networks

We model the Internet as a collection of Internet Service Providers (ISPs) that transit and peer to meet an exogenous demand for the transport of IP traffic among an arbitrary set of cities. The prices of bandwidth and of transit are also exogenous. ...

Article
Privacy-preserving credit checking

Typically, when a borrower (Bob) wishes to establish a tradeline (e.g., a mortgage, an automobile loan, or a credit card) with a lender (Linda), Bob is subjected to a credit check by Linda. The credit check is done by having Linda obtain financial ...

Article
Secure distributed human computation

This paper is a preliminary exploration of secure distributed human computation. We consider the general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate ...

Article
Online auctions with re-usable goods

This paper concerns the design of mechanisms for online scheduling in which agents bid for access to a re-usable resource such as processor time or wireless network access. Each agent is assumed to arrive and depart dynamically, and in the basic model ...

Article
From optimal limited to unlimited supply auctions

We investigate the class of single-round, sealed-bid auctions for a set of identical items to bidders who each desire one unit. We adopt the worst-case competitive framework defined by [9, 5] that compares the profit of an auction to that of an optimal ...

Article
Robust solutions for combinatorial auctions

Bids submitted in auctions are usually treated as enforceable commitments in most bidding and auction theory literature. In reality bidders often withdraw winning bids before the transaction when it is in their best interests to do so. Given a bid ...

Article
Marginal contribution nets: a compact representation scheme for coalitional games

We present a new approach to representing coalitional games based on rules that describe the marginal contributions of the agents. This representation scheme captures characteristics of the interactions among the agents in a natural and concise manner. ...

Article
First-price path auctions

We study first-price auction mechanisms for auctioning flow between given nodes in a graph. A first-price auction is any auction in which links on winning paths are paid their bid amount; the designer has flexibility in specifying remaining details. We ...

Article
Towards truthful mechanisms for binary demand games: a general framework

The family of Vickrey-Clarke-Groves (VCG) mechanisms is arguably the most celebrated achievement in truthful mechanism design. However, VCG mechanisms have their limitations. They only apply to optimization problems with a utilitarian (or affine) ...

Article
Self-selection, slipping, salvaging, slacking, and stoning: the impacts of negative feedback at eBay

Analysis of usage history for a large panel of eBay sellers suggests that both seller and buyer behavior change in response to changes in a seller's feedback profile. Sellers are more likely to stop listing items right after receiving a negative ...

Article
Cost sharing in a job scheduling problem using the Shapley value

A set of jobs need to be served by a single server which can serve only one job at a time. Jobs have processing times and incur waiting costs (linear in their waiting time). The jobs share their costs through compensation using monetary transfers. We ...

Article
On decentralized incentive compatible mechanisms

Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally efficient mechanisms for severely restricted players ("single-parameter ...

Article
ICE: an iterative combinatorial exchange

We present the first design for a fully expressive iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive for CEs. Bidders specify lower and upper bounds on their value for ...

Article
Congestion games with failures

We introduce a new class of games, congestion games with failures (CGFs), which extends the class of congestion games to allow for facility failures. In a basic CGF (BCGF) agents share a common set of facilities (service providers), where each service ...

Article
Integrating tradeoff support in product search tools for e-commerce sites

In a previously reported user study, we found that users were able to perform decision tradeoff tasks more efficiently and commit considerably fewer errors with the example critiquing interface than with the ranked list. We concluded that example-based ...

Article
Nearly optimal multi attribute auctions

In almost every procurement situation, non-price attributes of the items to be purchased play a crucial role. Procurement protocols which take these attributes into account are called multi-attribute auctions.We study the following problem called ...

Contributors
  • University of Minnesota Twin Cities
  • University of Pennsylvania
  1. Proceedings of the 6th ACM conference on Electronic commerce

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate 664 of 2,389 submissions, 28%
    YearSubmittedAcceptedRate
    EC '1938210628%
    EC '182697026%
    EC '172577529%
    EC '162428033%
    EC '152207233%
    EC '142908028%
    EC '132237232%
    EC '041462416%
    EC '031102119%
    EC '011003535%
    EC '001502919%
    Overall2,38966428%