TY - GEN
T1 - A new solution concept for coalitional games in open anonymous environments
AU - Yokoo, Makoto
AU - Conitzer, Vincent
AU - Sandholm, Tuomas
AU - Ohta, Naoki
AU - Iwasaki, Atsushi
PY - 2006
Y1 - 2006
N2 - Coalition formation is a key aspect of automated negotiation among self-interested agents. In order for coalitions to be stable, a key question that must be answered is how the gains from cooperation are to be distributed. Various solution concepts (such as the Shapley value, core, least core, and nucleolus) have been proposed. In this paper, we demonstrate how these concepts are vulnerable to various kinds of manipulations in open anonymous environments such as the Internet. These manipulations include submitting false names (one acting as many), collusion (many acting as one), and the hiding of skills. To address these threats, we introduce a new solution concept called the anonymity-proof core, which is robust to these manipulations. We show that the anonymity-proof core is characterized by certain simple axiomatic conditions. Furthermore, we show that by relaxing these conditions, we obtain a concept called the least anonymity-proof core, which is guaranteed to be non-empty.
AB - Coalition formation is a key aspect of automated negotiation among self-interested agents. In order for coalitions to be stable, a key question that must be answered is how the gains from cooperation are to be distributed. Various solution concepts (such as the Shapley value, core, least core, and nucleolus) have been proposed. In this paper, we demonstrate how these concepts are vulnerable to various kinds of manipulations in open anonymous environments such as the Internet. These manipulations include submitting false names (one acting as many), collusion (many acting as one), and the hiding of skills. To address these threats, we introduce a new solution concept called the anonymity-proof core, which is robust to these manipulations. We show that the anonymity-proof core is characterized by certain simple axiomatic conditions. Furthermore, we show that by relaxing these conditions, we obtain a concept called the least anonymity-proof core, which is guaranteed to be non-empty.
UR - http://www.scopus.com/inward/record.url?scp=33746223981&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33746223981&partnerID=8YFLogxK
U2 - 10.1007/11780496_6
DO - 10.1007/11780496_6
M3 - Conference contribution
AN - SCOPUS:33746223981
SN - 3540354700
SN - 9783540354703
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 53
EP - 64
BT - New Frontiers in Artificial Intelligence - Joint JSAI 2005 Workshop Post-Proceedings
PB - Springer Verlag
T2 - Joint JSAI 2005 Workshop on New Frontiers in Artificial Intelligence
Y2 - 13 June 2005 through 14 June 2005
ER -