Curriculum Vitae Amir Ronen Department of Computer Science, Stanford University and ISCI Berkeley [email protected]

Total Page:16

File Type:pdf, Size:1020Kb

Curriculum Vitae Amir Ronen Department of Computer Science, Stanford University and ISCI Berkeley Amirr@Robotics.Stanford.EDU Curriculum Vitae Amir Ronen Department of Computer Science, Stanford University and ISCI Berkeley http://robotics.stanford.edu/~amirr [email protected] Academic Appointments Post-doctoral research fellow: Stanford University, Department of Com- puter Science (with Professor Yoav Shoham) and UC Berkeley, Interna- tional Computer Science Institute (with Professors Christos Papadimitriou, Richard Karp and Dr. Scott Shenker). 2001 - 2002. Post-doctoral research fellow: Stanford University, Department of Com- puter Science (with Professor Yoav Shoham). 2000 - 2001. Session Leader, Hebrew University of Jerusalem. Issues on the Border of Economics and Computation, Winter 1999; Data Structures, Spring 1997; Data Structures, Spring 1998; Computational Complexity, Spring 1992; Education Ph.D. Institute of Computer Science, Hebrew University of Jerusalem, Is- rael. 1996 - 2000. Thesis: Solving Optimization Problems Among Selfish Players. Committee: Professors Noam Nisan (advisor), Nathan Linial and Motty Perry. M.Sc. with honors in Computer Science, Institute of Computer Science, Hebrew University of Jerusalem, Israel. 1991-93. Thesis: A Competitive Approach for Managing Sharing in the Distributed Execution of Functional Programs. Advisor: Professor Amnon Barak. B.Sc. with honors in Mathematics (extended program) and Computer Sci- ence, Hebrew University of Jerusalem, Israel. 1988-91. Research Interests The interplay between game theory and computer science, theoretical com- puter science, game theory, mathematical economics, electronic commerce and the Internet. I am also interested in information retrieval theory and practice, machine learning, multi agent systems and distributed algorithms. Teaching Interests I am fully committed to teaching, both graduate and undergraduates and I love the interaction with students. In addition to courses related to my own area of research, I am capable of teaching most courses on the founda- tions of computer science (e.g. Algorithms) and software development (e.g. Java programming). My experience as a session leader includes graduate courses such as Issues on the Border of Economics and Computation and Computational Complexity and first year courses such as Data Structures (225 students, emphasis on object oriented programming). Industrial Experience Compassware Development Ltd. 1995-96. Research and implementa- tion of models, algorithms and tools for information retrieval. The work included statistical processing of natural language queries, a novel method for query expansion and automatic building of thesauri, an algorithm for relevance feedback incorporating techniques from information retrieval and machine learning and a tool for automatic topic extraction. In collaboration with Bar-Ilan University faculty. Scitex Ltd. 1993-94. Worked in a team developing a leading layout appli- cation for Apple platforms. Awards and Honors • Fulbright Foundation Post-Doctoral Fellowship. 2000-2001 (declined). • Wolf Prize for Ph.D. students, 1999. • M.Sc. merit scholarship, 1991-92, 1992-93. • B.Sc. Dean’s Prize 1988-89. Dean’s List 1989-90. • Member of a development team that received the Israeli Defense Award, Israel Defense Forces, 1986. • Second Place, Shay Bleyman Mathematics and Computer Science Competition, Tel-Aviv University School of Mathematics, 1983. Journal Papers Algorithmic Mechanism Design. Noam Nisan and Amir Ronen. Games and Economic Behavior 35 (2001): 166-196. A Competitive Algorithm for Managing Sharing in the Distributed Execution of Functional Programs. Gad Aharoni, Amnon Barak, and Amir Ronen. Journal of Functional Programming 7 (1997): 421-40. Conference Papers On Approximating Optimal Auctions (extended abstract). Amir Ronen. In proceedings of the Third ACM Conference on Electronic Commerce (EC01). Mechanism Design with Incomplete Languages. Amir Ronen. In proceedings of the Third ACM Conference on Electronic Commerce (EC01). Algorithms for Rational Agents. Amir Ronen. In Proceedings of the 27th Annual Conference on Current Trends in Theory and Practice of Informatics (SOFSEM2000). Computationally feasible VCG mechanisms. Noam Nisan and Amir Ronen. In Proceedings of the Second ACM Conference on Electronic Commerce (EC00). Algorithmic Mechanism Design (extended abstract). Noam Nisan and Amir Ronen. In Proceedings of the 31st Annual ACM Symposium on Theory of Computing (STOC99). Ongoing Projects Fault tolerant mechanism design. With Yoav Shoham, Moshe Tennenholtz and Ryan Porter. Further analysis of optimal auctions. With Christos Papadimitriou and Felix Wu. Talks • ”On Approximating Optimal Auctions”. Presented at DIMACS Work- shop on Computational Issues in Game Theory and Mechanism Design (November 2001), UC Berkeley and Stanford. • ”Algorithms for Rational Agents”. Invited talk at the 27th Annual Conference on Current Trends in Theory and Practice of Informatics (SOFSEM2000). • ”Algorithmic Mechanism Design”. Presented at MIT, Stanford, Berke- ley, Princeton, AT&T, IBM, Hebrew University and at STOC99. • ”A Note on Strategy-Proof Mechanisms”. Presented at the North- western/MEDS Workshop on Micro-Economic Theory, July 1999. Public Service Committee member. The Eighteenth National Conference on Artificial Intelligence (AAAI-02). (Expected in January 2002.) Committee member. The Third ACM Conference on Electronic Com- merce (EC01). 2001. Committee member. IJCAI 2001 workshop on economic models, agents, and auctions. 2001. Reviewer. The 42nd Annual Symposium on Foundations of Computer Science (FOCS 2001); The Seventeenth International Joint Conference on Artificial Intelligence (IJCAI 2001). Miscellaneous Citizenship: Israel. Visa Status: J1..
Recommended publications
  • Going Beyond Dual Execution: MPC for Functions with Efficient Verification
    Going Beyond Dual Execution: MPC for Functions with Efficient Verification Carmit Hazay abhi shelat ∗ Bar-Ilan University Northeastern Universityy Muthuramakrishnan Venkitasubramaniamz University of Rochester Abstract The dual execution paradigm of Mohassel and Franklin (PKC’06) and Huang, Katz and Evans (IEEE ’12) shows how to achieve the notion of 1-bit leakage security at roughly twice the cost of semi-honest security for the special case of two-party secure computation. To date, there are no multi-party compu- tation (MPC) protocols that offer such a strong trade-off between security and semi-honest performance. Our main result is to address this shortcoming by designing 1-bit leakage protocols for the multi- party setting, albeit for a special class of functions. We say that function f (x, y) is efficiently verifiable by g if the running time of g is always smaller than f and g(x, y, z) = 1 if and only if f (x, y) = z. In the two-party setting, we first improve dual execution by observing that the “second execution” can be an evaluation of g instead of f , and that by definition, the evaluation of g is asymptotically more efficient. Our main MPC result is to construct a 1-bit leakage protocol for such functions from any passive protocol for f that is secure up to additive errors and any active protocol for g. An important result by Genkin et al. (STOC ’14) shows how the classic protocols by Goldreich et al. (STOC ’87) and Ben-Or et al. (STOC ’88) naturally support this property, which allows to instantiate our compiler with two-party and multi-party protocols.
    [Show full text]
  • Curriculum Vitae
    Curriculum Vitae Prof. Michal Feldman School of Computer Science, Tel-Aviv University Personal Details • Born: Israel, 1976 • Gender: Female • email: [email protected] Education • Ph.D.: Information Management and Systems, University of California at Berkeley, May 2005. Thesis title: Incentives for cooperation in peer-to-peer systems. • B.Sc.: Bar-Ilan University, Computer Science, Summa Cum Laude, June 1999. Academic Positions 2013 - present: Associate Professor, School of Computer Science, Tel-Aviv University, Israel. Associate Professor, School of Business Administration and Center for 2011 - 2013: the Study of Rationality, Hebrew University of Jerusalem, Israel. 2007 - 2011: Senior Lecturer, School of Business Administration and Center for the Study of Rationality, Hebrew University of Jerusalem, Israel. Additional Positions 2011 - 2013: Visiting Researcher (weekly visitor), Microsoft Research New England, Cambridge, MA, USA. 2011 - 2013: Visiting Professor, Harvard School of Engineering and Applied Sciences, Center for Research on Computation and Society, School of Computer Science, Cambridge, MA, USA (Marie Curie IOF program). 2008 - 2011: Senior Researcher (part-time), Microsoft Research in Herzliya, Israel. 2007 - 2013: Member, Center for the Study of Rationality, Hebrew University. 2005 - 2007: Post-Doctoral Fellow (Lady Davis fellowship), Hebrew University, School of Computer Science and Engineering. 2004: Ph.D. Intern, HP Labs, Palo Alto, California, USA. 1 Grants (Funding ID) • European Research Council (ERC) Starting Grant: \Algorithmic Mechanism Design - Beyond Truthfulness": 1.4 million Euro, 2013-2017. • FP7 Marie Curie International Outgoing Fellowship (IOF): \Innovations in Algorithmic Game Theory" (IAGT): 313,473 Euro, 2011-2014. • Israel Science Foundation (ISF) grant. \Equilibria Under Coalitional Covenants in Non-Cooperative Games - Existence, Quality and Computation:" 688,000 NIS (172,000 NIS /year), 2009-2013.
    [Show full text]
  • Limitations and Possibilities of Algorithmic Mechanism Design By
    Incentives, Computation, and Networks: Limitations and Possibilities of Algorithmic Mechanism Design by Yaron Singer A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Christos Papadimitriou, Chair Professor Shachar Kariv Professor Scott Shenker Spring 2012 Incentives, Computation, and Networks: Limitations and Possibilities of Algorithmic Mechanism Design Copyright 2012 by Yaron Singer 1 Abstract Incentives, Computation, and Networks: Limitations and Possibilities of Algorithmic Mechanism Design by Yaron Singer Doctor of Philosophy in Computer Science University of California, Berkeley Professor Christos Papadimitriou, Chair In the past decade, a theory of manipulation-robust algorithms has been emerging to address the challenges that frequently occur in strategic environments such as the internet. The theory, known as algorithmic mechanism design, builds on the foundations of classical mechanism design from microeconomics and is based on the idea of incentive compatible pro- tocols. Such protocols achieve system-wide objectives through careful design that ensures it is in every agent's best interest to comply with the protocol. As it turns out, however, implementing incentive compatible protocols as advocated in classical mechanism design the- ory often necessitates solving intractable problems. To address this, algorithmic mechanism design focuses on designing
    [Show full text]
  • László Lovász Avi Wigderson De L’Université Eötvös Loránd À De L’Institute for Advanced Study De Budapest, En Hongrie Et À Princeton, Aux États-Unis
    2021 L’Académie des sciences et des lettres de Norvège a décidé de décerner le prix Abel 2021 à László Lovász Avi Wigderson de l’université Eötvös Loránd à de l’Institute for Advanced Study de Budapest, en Hongrie et à Princeton, aux États-Unis, « pour leurs contributions fondamentales à l’informatique théorique et aux mathématiques discrètes, et pour leur rôle de premier plan dans leur transformation en domaines centraux des mathématiques contemporaines ». L’informatique théorique est l’étude de la puissance croissante sur plusieurs autres sciences, ce et des limites du calcul. Elle trouve son origine qui permet de faire de nouvelles découvertes dans les travaux fondateurs de Kurt Gödel, Alonzo en « chaussant des lunettes d’informaticien ». Church, Alan Turing et John von Neumann, qui ont Les structures discrètes telles que les graphes, conduit au développement de véritables ordinateurs les chaînes de caractères et les permutations physiques. L’informatique théorique comprend deux sont au cœur de l’informatique théorique, et les sous-disciplines complémentaires : l’algorithmique mathématiques discrètes et l’informatique théorique qui développe des méthodes efficaces pour une ont naturellement été des domaines étroitement multitude de problèmes de calcul ; et la complexité, liés. Certes, ces deux domaines ont énormément qui montre les limites inhérentes à l’efficacité des bénéficié des champs de recherche plus traditionnels algorithmes. La notion d’algorithmes en temps des mathématiques, mais on constate également polynomial mise en avant dans les années 1960 par une influence croissante dans le sens inverse. Alan Cobham, Jack Edmonds et d’autres, ainsi que Les applications, concepts et techniques de la célèbre conjecture P≠NP de Stephen Cook, Leonid l’informatique théorique ont généré de nouveaux Levin et Richard Karp ont eu un fort impact sur le défis, ouvert de nouvelles directions de recherche domaine et sur les travaux de Lovász et Wigderson.
    [Show full text]
  • The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space
    The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space Adam Smith Shuang Song Abhradeep Thakurta Boston University Google Research, Brain Team Google Research, Brain Team [email protected] [email protected] [email protected] Abstract We revisit the problem of counting the number of distinct elements F0(D) in a data stream D, over a domain [u]. We propose an ("; δ)-differentially private algorithm that approximates F0(D) within a factor of (1 ± γ), and with additive error of p O( ln(1/δ)="), using space O(ln(ln(u)/γ)/γ2). We improve on the prior work at least quadratically and up to exponentially, in terms of both space and additive p error. Our additive error guarantee is optimal up to a factor of O( ln(1/δ)), n ln(u) 1 o and the space bound is optimal up to a factor of O min ln γ ; γ2 . We assume the existence of an ideal uniform random hash function, and ignore the space required to store it. We later relax this requirement by assuming pseudo- random functions and appealing to a computational variant of differential privacy, SIM-CDP. Our algorithm is built on top of the celebrated Flajolet-Martin (FM) sketch. We show that FM-sketch is differentially private as is, as long as there are p ≈ ln(1/δ)=(εγ) distinct elements in the data set. Along the way, we prove a structural result showing that the maximum of k i.i.d. random variables is statisti- cally close (in the sense of "-differential privacy) to the maximum of (k + 1) i.i.d.
    [Show full text]
  • Satisfiability and Evolution
    2014 IEEE Annual Symposium on Foundations of Computer Science Satisfiability and Evolution Adi Livnat Christos Papadimitriou Aviad Rubinstein Department of Biological Sciences Computer Science Division Computer Science Division Virginia Tech. University of California at Berkeley University of California at Berkeley [email protected] [email protected] [email protected] Gregory Valiant Andrew Wan Computer Science Department Simons Institute Stanford University University of California at Berkeley [email protected] [email protected] Abstract—We show that, if truth assignments on n variables genes are able to efficiently arise in polynomial populations reproduce through recombination so that satisfaction of a par- with recombination. In the standard view of evolution, a ticular Boolean function confers a small evolutionary advan- variant of a particular gene is more likely to spread across tage, then a polynomially large population over polynomially many generations (polynomial in n and the inverse of the initial a population if it makes its own contribution to the overall satisfaction probability) will end up almost surely consisting fitness, independent of the contributions of variants of other exclusively of satisfying truth assignments. We argue that this genes. How can complex, multi-gene traits spread in a theorem sheds light on the problem of the evolution of complex population? This may seem to be especially problematic adaptations. for multi-gene traits whose contribution to fitness does not Keywords-evolution; algorithms; Boolean functions decompose into small additive components associated with each gene variant —traits with the property that even if I. INTRODUCTION one gene variant is different from the one that is needed The TCS community has a long history of applying its for the right combination, there is no benefit, or even a net perspectives and tools to better understand the processes negative benefit.
    [Show full text]
  • A Decade of Lattice Cryptography
    Full text available at: http://dx.doi.org/10.1561/0400000074 A Decade of Lattice Cryptography Chris Peikert Computer Science and Engineering University of Michigan, United States Boston — Delft Full text available at: http://dx.doi.org/10.1561/0400000074 Foundations and Trends R in Theoretical Computer Science Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is C. Peikert. A Decade of Lattice Cryptography. Foundations and Trends R in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2014. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-68083-113-9 c 2016 C. Peikert All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for in- ternal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged.
    [Show full text]
  • 6.5 X 11.5 Doublelines.P65
    Cambridge University Press 978-0-521-87282-9 - Algorithmic Game Theory Edited by Noam Nisan, Tim Roughgarden, Eva Tardos and Vijay V. Vazirani Copyright Information More information Algorithmic Game Theory Edited by Noam Nisan Hebrew University of Jerusalem Tim Roughgarden Stanford University Eva´ Tardos Cornell University Vijay V. Vazirani Georgia Institute of Technology © Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-87282-9 - Algorithmic Game Theory Edited by Noam Nisan, Tim Roughgarden, Eva Tardos and Vijay V. Vazirani Copyright Information More information cambridge university press Cambridge, New York,Melbourne, Madrid, Cape Town, Singapore, Sao˜ Paulo, Delhi Cambridge University Press 32 Avenue of the Americas, New York, NY 10013-2473, USA www.cambridge.org Information on this title: www.cambridge.org/9780521872829 C Noam Nisan, Tim Roughgarden, Eva´ Tardos, Vijay V. Vazirani 2007 This publication is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press. First published 2007 Printed in the United States of America A catalog record for this book is available from the British Library. Library of Congress Cataloging in Publication Data Algorithmic game theory / edited by Noam Nisan ...[et al.]; foreword by Christos Papadimitriou. p. cm. Includes index. ISBN-13: 978-0-521-87282-9 (hardback) ISBN-10: 0-521-87282-0 (hardback) 1. Game theory. 2. Algorithms. I. Nisan, Noam. II. Title. QA269.A43 2007 519.3–dc22 2007014231 ISBN 978-0-521-87282-9 hardback Cambridge University Press has no responsibility for the persistence or accuracy of URLS for external or third-party Internet Web sites referred to in this publication and does not guarantee that any content on such Web sites is, or will remain, accurate or appropriate.
    [Show full text]
  • Algorithmic Mechanism Design
    Algorithmic Mechanism Design Noam Nisan Institute of Computer Science Hebrew University of Jerusalem Givat Ram Israel and Scho ol of Computer Science IDC Herzliya Emailnoamcshujiacil y Amir Ronen Institute of Computer Science Hebrew University of Jerusalem Givat Ram Israel Emailamirycshujiacil This researchwas supp orted by grants from the Israeli ministry of Science and the Israeli academy of sciences y This researchwas supp orted by grants from the Israeli ministry of Science and the Israeli academy of sciences Algorithmic Mechanism Design contact Amir Ronen Institute of Computer Science Hebrew University of Jerusalem Givat Ram Israel Emailamirycshujiacil Abstract We consider algorithmic problems in a distributed setting where the participants cannot b e assumed to follow the algorithm but rather their own selfinterest As such participants termed agents are capable of manipulating the algorithm the algorithm designer should ensure in advance that the agents interests are b est served by b ehaving correctly Following notions from the eld of mechanism design we suggest a framework for studying such algorithms In this mo del the algorithmic solution is adorned with payments to the partic ipants and is termed a mechanism The payments should b e carefully chosen as to motivate all participants to act as the algorithm designer wishes We apply the standard to ols of mechanism design to algorithmic problems and in particular to the shortest path problem Our main technical contribution concerns the study of a representative problem task
    [Show full text]
  • Pseudorandomness and Combinatorial Constructions
    Pseudorandomness and Combinatorial Constructions Luca Trevisan∗ September 20, 2018 Abstract In combinatorics, the probabilistic method is a very powerful tool to prove the existence of combinatorial objects with interesting and useful properties. Explicit constructions of objects with such properties are often very difficult, or unknown. In computer science, probabilistic al- gorithms are sometimes simpler and more efficient than the best known deterministic algorithms for the same problem. Despite this evidence for the power of random choices, the computational theory of pseu- dorandomness shows that, under certain complexity-theoretic assumptions, every probabilistic algorithm has an efficient deterministic simulation and a large class of applications of the the probabilistic method can be converted into explicit constructions. In this survey paper we describe connections between the conditional “derandomization” re- sults of the computational theory of pseudorandomness and unconditional explicit constructions of certain combinatorial objects such as error-correcting codes and “randomness extractors.” 1 Introduction 1.1 The Probabilistic Method in Combinatorics In extremal combinatorics, the probabilistic method is the following approach to proving existence of objects with certain properties: prove that a random object has the property with positive probability. This simple idea has beem amazingly successful, and it gives the best known bounds for arXiv:cs/0601100v1 [cs.CC] 23 Jan 2006 most problems in extremal combinatorics. The idea was introduced (and, later, greatly developed) by Paul Erd˝os [18], who originally applied it to the following question: define R(k, k) to be the minimum value n such that every graph on n vertices has either an independent set of size at least k or a clique of size at least k;1 It was known that R(k, k) is finite and that it is at most 4k, and the question was to prove a lower bound.
    [Show full text]
  • Linked Decompositions of Networks and the Power of Choice in Polya Urns
    Linked Decompositions of Networks and the Power of Choice in Polya Urns Henry Lin¤ Christos Amanatidisy Martha Sideriz Richard M. Karpx Christos H. Papadimitriou{ October 12, 2007 Abstract balls total, and each arriving ball is placed in the least loaded A linked decomposition of a graph with n nodes is a set of m bins, drawn independently at random with probability of subgraphs covering the n nodes such that all pairs of proportional to load. Our analysis shows that in our new subgraphs intersect; we seek linked decompositions such process, with high probability the bin loads become roughly p 2+² that all subgraphs have about n vertices, logarithmic balanced some time before O(n ) further balls have arrived diameter, and each vertex of the graph belongs to either and stay roughly balanced, regardless of how the initial O(n) one or two subgraphs. A linked decomposition enables balls were distributed, where ² > 0 can be arbitrarily small, many control and management functions to be implemented provided m is large enough. locally, such as resource sharing, maintenance of distributed directory structures, deadlock-free routing, failure recovery 1 Introduction and load balancing, without requiring any node to maintain Throwing balls into bins uniformly at random is well- information about the state of the network outside the known to produce relatively well-balanced occupancies subgraphs to which it belongs. Linked decompositions also with high probability. In contrast, when each new ball is enable e±cient routing schemes with small routing tables, added to a bin selected with probability proportional to which we describe in Section 5.
    [Show full text]
  • Sharing Non-Anonymous Costs of Multiple Resources Optimally
    Sharing Non-Anonymous Costs of Multiple Resources Optimally Max Klimm∗ Daniel Schmand† July 18, 2018 Abstract In cost sharing games, the existence and efficiency of pure Nash equi- libria fundamentally depends on the method that is used to share the resources’ costs. We consider a general class of resource allocation prob- lems in which a set of resources is used by a heterogeneous set of selfish users. The cost of a resource is a (non-decreasing) function of the set of its users. Under the assumption that the costs of the resources are shared by uniform cost sharing protocols, i.e., protocols that use only lo- cal information of the resource’s cost structure and its users to determine the cost shares, we exactly quantify the inefficiency of the resulting pure Nash equilibria. Specifically, we show tight bounds on prices of stabil- ity and anarchy for games with only submodular and only supermodular cost functions, respectively, and an asymptotically tight bound for games with arbitrary set-functions. While all our upper bounds are attained for the well-known Shapley cost sharing protocol, our lower bounds hold for arbitrary uniform cost sharing protocols and are even valid for games with anonymous costs, i.e., games in which the cost of each resource only depends on the cardinality of the set of its users. 1 Introduction Resource allocation problems are omnipresent in many areas of economics, com- puter science, and operations research with many applications, e.g., in routing, network design, and scheduling. Roughly speaking, when solving these prob- arXiv:1412.4456v2 [cs.GT] 4 Feb 2015 lems the central question is how to allocate a given set of resources to a set of potential users so as to optimize a given social welfare function.
    [Show full text]