Meet your destiny: a non-manipulable meeting scheduler

  • Authors:
  • Eithan Ephrati;Gilad Zlotkin;Jeffrey S. Rosenschein

  • Affiliations:
  • Computer Science Department, University of Pittsburgh;Center for Coordination Science, Sloan School of Management, MIT;Computer Science Department, The Hebrew University

  • Venue:
  • CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
  • Year:
  • 1994

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present three scheduling mechanisms that are manipulation-proof for closed systems. The amount of information that each user must encode in the mechanism increases with the complexity of the mechanism. On the other hand, the more complex the mechanism is, the more it maintains the privacy of the users.The first mechanism is a centralized, calendar-oriented one. It is the least computationally complex of the three, but does not maintain user privacy. The second is a distributed meeting-oriented mechanism that maintains user privacy, but at the cost of greater computational complexity. The third mechanism, while being the most complex, maintains user privacy (for the most part) and allows users to have the greatest influence on the resulting schedule.