{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T22:36:17Z","timestamp":1711492577309},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T00:00:00Z","timestamp":1625184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T00:00:00Z","timestamp":1625184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s10458-021-09516-8","type":"journal-article","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T09:03:03Z","timestamp":1625216583000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A contract-based incentive mechanism for distributed meeting scheduling: Can agents who value privacy tell the truth?"],"prefix":"10.1007","volume":"35","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3484-1361","authenticated-orcid":false,"given":"Boya","family":"Di","sequence":"first","affiliation":[]},{"given":"Nicholas R.","family":"Jennings","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,2]]},"reference":[{"key":"9516_CR1","doi-asserted-by":"crossref","unstructured":"Amgoud, L., Maudet, N., & Parsons, S. (2000). Modelling dialogues using argumentation. In Proceedings of the fourth international conference on multi-agent systems (ICMAS 2000) (pp. 31\u201338), Boston, MA, USA.","DOI":"10.1109\/ICMAS.2000.858428"},{"issue":"4","key":"9516_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1989734.1989744","volume":"2","author":"P Berry","year":"2011","unstructured":"Berry, P., Gervasio, M., Peintner, B., & Yorke-Smith, N. (2011). PTIME: Personalized assistance for calendaring. ACM Transactions on Intelligent Systems and Technology, 2(4), 1\u201322.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"9516_CR3","unstructured":"Bolton, P., & Dewatripont, M. (2005). Contract theory. MIT Press."},{"key":"9516_CR4","doi-asserted-by":"crossref","unstructured":"Cheung, M. H., Southwell, R., Hou, F., & Huang, J. (2015). Distributed time-sensitive task selection in mobile crowdsensing. In Proceedings of the 16th ACM international symposium on mobile ad hoc networking and computing (MobiHoc\u201915).","DOI":"10.1145\/2746285.2746293"},{"issue":"2","key":"9516_CR5","first-page":"209","volume":"4","author":"E Crawford","year":"2006","unstructured":"Crawford, E., & Veloso, M. (2006). Mechanism design for multi-agent meeting scheduling. Web Intelligence & Agent Systems, 4(2), 209\u2013220.","journal-title":"Web Intelligence & Agent Systems"},{"key":"9516_CR6","doi-asserted-by":"crossref","unstructured":"Crawford, E., & Veloso, M. (2005). Learning to select negotiation strategies in multi-agent meeting scheduling. In C. Bento, A. Cardoso, & G. Dias (Eds.), Progress in artificial intelligence. EPIA 2005. Lecture notes in computer science (Vol. 3808). Springer.","DOI":"10.1007\/11595014_57"},{"key":"9516_CR7","doi-asserted-by":"crossref","unstructured":"Di, B., & Jennings, N. (2020). Privacy-preserving dialogues between agents: A contract-based incentive mechanism for distributed meeting scheduling. In European conference on multi-agent systems (EUMAS\u201920).","DOI":"10.1007\/978-3-030-66412-1_19"},{"key":"9516_CR8","unstructured":"Dix, A. (1990). Information processing, context, and privacy. In Proceedings of INTERACT\u201990\u2014third IFIP conference on human\u2013computer interaction (pp. 15\u201320) Elsevier Science."},{"key":"9516_CR9","unstructured":"Doodle. https:\/\/doodle.com\/"},{"issue":"2","key":"9516_CR10","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MIC.2005.43","volume":"9","author":"L Dusseault","year":"2005","unstructured":"Dusseault, L., & Whitehead, J. (2005). Open Calendar sharing and scheduling with CalDAV. IEEE Internet Computing, 9(2), 81\u201389.","journal-title":"IEEE Internet Computing"},{"key":"9516_CR11","unstructured":"eMule. Available at: http:\/\/emule.com\/"},{"key":"9516_CR12","unstructured":"Farinelli, A., Rogers, A., Petcu, A., & Jennings, N. R. (2008). Decentralised coordination of low-power embedded devices using the Max-Sum algorithm. In Seventh international conference on autonomous agents and multi-agent systems (AAMAS-08) (pp. 639-646)."},{"issue":"3\u20134","key":"9516_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/S0921-8890(98)00029-3","volume":"24","author":"P Faratin","year":"1998","unstructured":"Faratin, P., Sierra, C., & Jennings, N. R. (1998). Negotiation decision functions for autonomous agents. International Journal of Robotics and Autonomous Systems, 24(3\u20134), 159\u2013182.","journal-title":"International Journal of Robotics and Autonomous Systems"},{"issue":"2","key":"9516_CR14","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1111\/j.0824-7935.2004.00238.x","volume":"20","author":"MS Franzin","year":"2004","unstructured":"Franzin, M. S., Rossi, F., Freuder, E. C., & Wallace, R. (2004). Multi-agent constraint systems with preferences: efficiency, solution quality and privacy loss. Computational Intelligence, 20(2), 264\u2013286.","journal-title":"Computational Intelligence"},{"key":"9516_CR15","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1613\/jair.5322","volume":"57","author":"T Grinshpoun","year":"2016","unstructured":"Grinshpoun, T., & Tassa, T. (2016). P-SyncBB: A privacy preserving branch and bound DCOP algorithm. Journal of Artificial Intelligence Research, 57, 621\u2013660.","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"4","key":"9516_CR16","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TKDE.2003.1209014","volume":"15","author":"M He","year":"2003","unstructured":"He, M., Jennings, N. R., & Leung, H. (2003). On agent-mediated electronic commerce. IEEE Transactions on Knowledge and Data Engineering, 15(4), 985\u20131003.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"9516_CR17","doi-asserted-by":"publisher","first-page":"611","DOI":"10.2307\/2938221","volume":"59","author":"H Itoh","year":"1999","unstructured":"Itoh, H. (1999). Incentives to help in multi-agent situations. Econometrica, 59(3), 611\u2013636.","journal-title":"Econometrica"},{"issue":"5","key":"9516_CR18","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1049\/el:19950245","volume":"31","author":"NR Jennings","year":"1995","unstructured":"Jennings, N. R., & Jackson, A. J. (1995). Agent based meeting scheduling: A design and implementation. IEEE Electronics Letters, 31(5), 350\u2013352.","journal-title":"IEEE Electronics Letters"},{"key":"9516_CR19","doi-asserted-by":"crossref","unstructured":"Karunatillake, N. C., Jennings, N. R., Rahwan, I., & Norman, T. (2005). Argument-based negotiation in a social context. In Proceedings of the 2nd international workshop on argumentation in multi-agent systems (ArtMAS).","DOI":"10.1007\/11794578_7"},{"key":"9516_CR20","unstructured":"Kandori, M. (2008). Repeated games. In S. N. Durlauf, & L. E. Blume (Eds.), New Palgrave dictionary of economics (2nd ed.). Palgrave Macmillan."},{"key":"9516_CR21","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s00446-012-0170-z","volume":"25","author":"I Kash","year":"2012","unstructured":"Kash, I., Friedman, E., & Halpern, J. (2012). Optimizing scrip systems: Crashes, altruists, hoarders, sybils and collusion. Distributed Computing, 25, 335\u2013357.","journal-title":"Distributed Computing"},{"key":"9516_CR22","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In IEEE symposium on security and privacy (SP).","DOI":"10.1109\/SP.2016.55"},{"key":"9516_CR23","doi-asserted-by":"crossref","unstructured":"Larson, K., & Sandholm, T. (2002). An alternating offers bargaining model for computationally limited agents. In Proceedings of the 1st international joint conference on autonomous agents and multi-agent systems (AAMAS) (pp. 135\u2013142).","DOI":"10.1145\/544741.544774"},{"issue":"1","key":"9516_CR24","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1002\/int.20120","volume":"21","author":"R Lau","year":"2006","unstructured":"Lau, R., Tang, M., Wong, O., Milliner, S., & Chen, Y. (2006). An evolutionary learning approach for adaptive negotiation agents. International Journal of Intelligent Systems, 21(1), 41\u201372.","journal-title":"International Journal of Intelligent Systems"},{"key":"9516_CR25","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1613\/jair.3983","volume":"47","author":"T Leaute","year":"2013","unstructured":"Leaute, T., & Faltings, B. (2013). Protecting privacy through distributed computation in multi-agent decision making. Journal of Artificial Intelligence Research, 47, 649\u2013695.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"9516_CR26","unstructured":"Lee, Y. (2012). Online membership incentive system & method. U.S. Patent Application No. 13\/503,831."},{"issue":"4","key":"9516_CR27","doi-asserted-by":"publisher","first-page":"6606","DOI":"10.1109\/JIOT.2019.2908861","volume":"6","author":"Z Li","year":"2019","unstructured":"Li, Z., Yang, Z., Xie, S., Chen, W., & Liu, K. (2019). Credit-based payments for fast computing resource trading in edge-assisted Internet of Things. IEEE Internet of Things Journal, 6(4), 6606\u20136617.","journal-title":"IEEE Internet of Things Journal"},{"key":"9516_CR28","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.artint.2017.07.003","volume":"252","author":"O Litov","year":"2017","unstructured":"Litov, O., & Meisels, A. (2017). Forward bounding on pseudo-trees for DCOPs and ADCOPs. Artificial Intelligence, 252, 83\u201399.","journal-title":"Artificial Intelligence"},{"key":"9516_CR29","doi-asserted-by":"crossref","unstructured":"Maheswaran, R. T., Pearce, J. P., Varakantham, P., Bowring, E., & Tambe M. (2005). Valuations of possible states (VPS): A quantitative framework for analysis of privacy loss among collaborative personal assistant agents. In Proceedings of the fourth international joint conference on autonomous agents and multiagent systems (AAMAS).","DOI":"10.1145\/1082473.1082629"},{"key":"9516_CR30","doi-asserted-by":"crossref","unstructured":"Mocanu, A., & Badica, C. (2016). Paxos-based weighted argumentation framework approach to distributed consensus. In International symposium on innovations in intelligent systems and applications (INISTA).","DOI":"10.1109\/INISTA.2016.7571844"},{"issue":"1\u20132","key":"9516_CR31","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.artint.2004.09.003","volume":"161","author":"PJ Modi","year":"2005","unstructured":"Modi, P. J., Shen, W. M., Tambe, M., & Yokoo, M. (2005). ADOPT: Asynchronous distributed constraint optimization with quality guarantees. Artificial Intelligence, 161(1\u20132), 149\u2013180.","journal-title":"Artificial Intelligence"},{"key":"9516_CR32","unstructured":"Modi, P. J., Veloso, M., Smith, S. F., & Oh, J. (2004). CMRadar: A personal assistant agent for calendar management. In Proceedings of the 19th national conference on artifical intelligence (AAAI\u201904) (pp. 1020\u20131021)."},{"issue":"4","key":"9516_CR33","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1111\/j.1467-8640.2012.00434.x","volume":"29","author":"L Pan","year":"2013","unstructured":"Pan, L., Luo, X., Meng, X., Miao, C., He, M., & Guo, X. (2013). A two-stage win-win multiattribute negotiation model: Optimization and then concession. Computational Intelligence, 29(4), 577\u2013625.","journal-title":"Computational Intelligence"},{"key":"9516_CR34","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1613\/jair.2500","volume":"32","author":"A Petcu","year":"2008","unstructured":"Petcu, A., & Parkes, D. C. (2008). M-DPOP: Faithful distributed implementation of efficient social choice problems. Journal of Artificial Intelligence Research, 32, 705\u2013755.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"9516_CR35","doi-asserted-by":"crossref","unstructured":"Pires de Mello, R., Gelaim, T., & Silveira, R. (2018). Negotiation strategies in multi-agent systems for meeting scheduling. In XLIV Latin American computer conference (CLEI) (pp. 242\u2013250).","DOI":"10.1109\/CLEI.2018.00037"},{"key":"9516_CR36","doi-asserted-by":"crossref","unstructured":"Preibusch, S. (2005). Implementing privacy negotiation techniques in E-commerce. In Seventh IEEE international conference on E-commerce technology (CEC).","DOI":"10.1109\/ICECT.2005.53"},{"key":"9516_CR37","unstructured":"Reddit Website: https:\/\/www.reddit.com"},{"issue":"3","key":"9516_CR38","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1023\/A:1008639617029","volume":"7","author":"S Sen","year":"1998","unstructured":"Sen, S., & Durfee, E. H. (1998). A formal study of distributed meeting scheduling. Group Decision and Negotiation, 7(3), 265\u2013289.","journal-title":"Group Decision and Negotiation"},{"key":"9516_CR39","doi-asserted-by":"crossref","unstructured":"Shintani, T., & Ito, T. (2001). Cooperative meeting scheduling among agents based on multiple negotiations. In International conference on cooperative information systems.","DOI":"10.1007\/3-540-44751-2_9"},{"key":"9516_CR40","doi-asserted-by":"crossref","unstructured":"Tanaka, T., Farokhi, F., & Langbort, C. (2013). A faithful distributed implementation of dual decomposition and average consensus algorithms. In 52nd IEEE conference on decision and control.","DOI":"10.1109\/CDC.2013.6760337"},{"issue":"5","key":"9516_CR41","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/aer.104.5.442","volume":"104","author":"HR Varian","year":"2014","unstructured":"Varian, H. R., & Harris, C. (2014). The VCG auction in theory and practice. American Economic Review, 104(5), 442\u2013445.","journal-title":"American Economic Review"},{"key":"9516_CR42","doi-asserted-by":"publisher","first-page":"17545","DOI":"10.1109\/ACCESS.2018.2805837","volume":"6","author":"J Wang","year":"2018","unstructured":"Wang, J., Li, M., He, Y., Li, H., Xiao, K., & Wang, C. (2018). A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access, 6, 17545\u201317556.","journal-title":"IEEE Access"},{"issue":"7","key":"9516_CR43","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1109\/JSTSP.2015.2425798","volume":"9","author":"L Xu","year":"2015","unstructured":"Xu, L., Jiang, C., Chen, Y., Ren, Y., & Liu, K. J. (2015). Privacy or utility in data collection? A contract theoretic approach. IEEE Journal of Selected Topics in Signal Processing, 9(7), 1256\u20131269.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"9516_CR44","doi-asserted-by":"crossref","unstructured":"Yassine, A., & Shirmohammadi, S. (2008). Privacy and the market for private data: A negotiation model to capitalize on private data. In IEEE\/ACS international conference on computer systems and applications.","DOI":"10.1109\/AICCSA.2008.4493601"},{"key":"9516_CR45","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.artint.2004.10.007","volume":"161","author":"M Yokoo","year":"2005","unstructured":"Yokoo, M., Suzuki, K., & Hirayama, K. (2005). Secure distributed constraint satisfaction: Reaching agreement without revealing private information. Artificial Intelligence, 161, 229\u2013245.","journal-title":"Artificial Intelligence"},{"key":"9516_CR46","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.geb.2015.07.001","volume":"94","author":"K Yoon","year":"2015","unstructured":"Yoon, K. (2015). On budget balance of the dynamic pivot mechanism. Games and Economic Behavior, 94, 206\u2013213.","journal-title":"Games and Economic Behavior"},{"key":"9516_CR47","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1613\/jair.5484","volume":"61","author":"A Zenonos","year":"2018","unstructured":"Zenonos, A., Stein, S., & Jennings, N. R. (2018). Coordinating measurements for environmental monitoring in uncertain participatory sensing settings. Journal of Artificial Intelligence Research, 61, 433\u2013474.","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"1\u20132","key":"9516_CR48","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.artint.2004.10.004","volume":"161","author":"W Zhang","year":"2005","unstructured":"Zhang, W., Wang, G., Xing, Z., & Wittenburg, L. (2005). Distributed stochastic search and distributed breakout: Properties, comparison and applications to constraint optimization problems in sensor networks. Artificial Intelligence, 161(1\u20132), 55\u201387.","journal-title":"Artificial Intelligence"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09516-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10458-021-09516-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09516-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T13:37:49Z","timestamp":1632490669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10458-021-09516-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,2]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["9516"],"URL":"https:\/\/doi.org\/10.1007\/s10458-021-09516-8","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,2]]},"assertion":[{"value":"10 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"35"}}