Author:
Kalech Meir,Kraus Sarit,Kaminka Gal A.,Goldman Claudia V.
Publisher
Springer Science and Business Media LLC
Reference18 articles.
1. Blosser, G., & Zhan, J. (2008). Privacy-preserving collaborative e-voting. In Intelligence and security informatics (pp. 508–513). Berlin, Heidelberg: Springer.
2. Conitzer, V., & Sandholm, T. (2002). Vote elicitation: Complexity and strategy-proofness. In Eighteenth national conference on artificial intelligence, pp. 392–397.
3. Conitzer, V., & Sandholm, T. (2005). Communication complexity of common voting rules. In EC ’05: Proceedings of the 6th ACM conference on electronic commerce, pp. 78–87.
4. Faltings B., Macho-Gonzalez S. (2005) Open constraint programming. Artifitial Intelligence 161(1–2): 181–208
5. Gelain, M., Pini, M. S., Rossi, F., & Venable, K. B. (2007) Dealing with incomplete preferences in soft constraint problems. In The 13th international conference on principles and practice of constraint prgramming (CP-07), pp. 286–300.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献