Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Paolo Penna and Carmine Ventre.

Slides:



Advertisements
Similar presentations
On Designing Truthful Mechanisms for Online Scheduling V. Auletta, R. De Prisco, P.P. and G. Persiano Università di Salerno.
Advertisements

Combinatorial Auction
Private capacities in mechanism design Vincenzo Auletta Paolo Penna Giuseppe Persiano Università di Salerno, Italy.
Mechanisms with Verification Carmine Ventre Teesside University.
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Carmine Ventre (University of Liverpool) Joint work with: Paolo Penna (University.
Optimal Collusion-Resistant Mechanisms with Verification Carmine Ventre Joint work with Paolo Penna.
Algorithmic mechanism design Vincent Conitzer
Strongly Polynomial-Time Truthful Mechanisms in One Shot Paolo Penna 1, Guido Proietti 2, Peter Widmayer 3 1 Università di Salerno 2 Università de l’Aquila.
On Optimal Single-Item Auctions George Pierrakos UC Berkeley based on joint works with: Constantinos Daskalakis, Ilias Diakonikolas, Christos Papadimitriou,
USING LOTTERIES TO APPROXIMATE THE OPTIMAL REVENUE Paul W. GoldbergUniversity of Liverpool Carmine VentreTeesside University.
Truthful Mechanism Design for Multi-Dimensional Scheduling via Cycle Monotonicity Ron Lavi IE&M, The Technion Chaitanya Swamy U. of Waterloo and.
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Algorithmic Game Theory and Scheduling Eric Angel, Evripidis Bampis, Fanny Pascual IBISC, University of Evry, France GOTha, 12/05/06, LIP 6.
A Sufficient Condition for Truthfulness with Single Parameter Agents Michael Zuckerman, Hebrew University 2006 Based on paper by Nir Andelman and Yishay.
Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines Eric Angel, Evripidis Bampis, Fanny Pascual LaMI, University of Evry, France WINE.
Optimal collusion-resistant mechanisms with verification Paolo Penna Carmine Ventre Università di Salerno University of Liverpool Italy UK.
SECOND PART: Algorithmic Mechanism Design. Implementation theory Imagine a “planner” who develops criteria for social welfare, but cannot enforce the.
Truthful Approximation Mechanisms for Scheduling Selfish Related Machines Motti Sorani, Nir Andelman & Yossi Azar Tel-Aviv University.
CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents Università di Salerno Project funded by the Future and.
1 Best-Reply Mechanisms Noam Nisan, Michael Schapira and Aviv Zohar.
CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents V. Auletta, P. Penna and G. Persiano Università di Salerno
The Algorithmic Structure of Group Strategyproof Budget- Balanced Cost-Sharing Mechanisms Paolo Penna & Carmine Ventre Università di Salerno Italy.
Limitations of VCG-Based Mechanisms Shahar Dobzinski Joint work with Noam Nisan.
Mechanism Design. Overview Incentives in teams (T. Groves (1973)) Algorithmic mechanism design (Nisan and Ronen (2000)) - Shortest Path - Task Scheduling.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno, WP2.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
Algorithms for Selfish Agents Carmine Ventre Università degli Studi di Salerno.
Combinatorial Auction. Conbinatorial auction t 1 =20 t 2 =15 t 3 =6 f(t): the set X  F with the highest total value the mechanism decides the set of.
More Powerful and Simpler Cost-Sharing Methods Carmine Ventre Joint work with Paolo Penna University of Salerno.
Mechanism Design: Online Auction or Packet Scheduling Online auction of a reusable good (packet slots) Agents types: (arrival, departure, value) –Agents.
(Optimal) Collusion-Resistant Mechanisms with Verification Paolo Penna & Carmine Ventre Università degli Studi di Salerno Italy.
A Truthful 2-approximation Mechanism for the Steiner Tree Problem.
Truthful Mechanisms for One-parameter Agents Aaron Archer, Eva Tardos Presented by: Ittai Abraham.
SECOND PART: Algorithmic Mechanism Design. Implementation theory Imagine a “planner” who develops criteria for social welfare, but cannot enforce the.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno.
SECOND PART: Algorithmic Mechanism Design. Suggested readings Algorithmic Game Theory, Edited by Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Incentive-compatible Approximation Andrew Gilpin 10/25/07.
Mechanism Design for Real-Time Scheduling Carl Bussema III 18 April 2005 Based on "Mechanism Design for Real-Time Scheduling" by Ryan Porter.
SECOND PART on AGT: Algorithmic Mechanism Design.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design Find correct rules/incentives.
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
On Scheduling Mechanisms: Theory, Practice and Pricing Ahuva Mu’alem SISL, Caltech.
Brief Annoucement: An algorithm composition scheme preserving monotonicity Davide Bilò ETH Zürich, Switzerland Luca Forlizzi Università dell'Aquila, Italy.
Using Algorithmic Mechanism Design to Solve the Data Redistribution Problem with Non-Cooperative Sensor Nodes Andre Chen July 23, 2015.
Techniques for truthful scheduling Rob van Stee Max Planck Institute for Informatics (MPII) Germany.
By: Amir Ronen, Department of CS Stanford University Presented By: Oren Mizrahi Matan Protter Issues on border of economics & computation, 2002.
Mechanisms with Verification for Any Finite Domain Carmine Ventre Università degli Studi di Salerno.
Market Design and Analysis Lecture 5 Lecturer: Ning Chen ( 陈宁 )
SECOND PART on AGT: Algorithmic Mechanism Design.
USING LOTTERIES TO APPROXIMATE THE OPTIMAL REVENUE Paul W. GoldbergUniversity of Liverpool Carmine VentreTeesside University.
Algorithms for Incentive-Based Computing Carmine Ventre Università degli Studi di Salerno.
Algorithmic Mechanism Design: an Introduction Approximate (one-parameter) mechanisms, with an application to combinatorial auctions Guido Proietti Dipartimento.
Mechanisms with Verification Carmine Ventre [Penna & V, 2007] [V, WINE ‘06]
Combinatorial Auctions without Money Dimitris Fotakis, NTUA Piotr Krysta, University of Liverpool Carmine Ventre, Teesside University.
Price of Anarchy Georgios Piliouras. Games (i.e. Multi-Body Interactions) Interacting entities Pursuing their own goals Lack of centralized control Prediction?
SECOND PART on AGT: Algorithmic Mechanism Design.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
Algorithmic Mechanism Design Shuchi Chawla 11/7/2001.
Combinatorial Auction. A single item auction t 1 =10 t 2 =12 t 3 =7 r 1 =11 r 2 =10 Social-choice function: the winner should be the guy having in mind.
Truthful and near-optimal mechanism design via linear programming Chaitanya Swamy Caltech and U. Waterloo Joint work with Ron Lavi Caltech.
Bayesian Algorithmic Mechanism Design Jason Hartline Northwestern University Brendan Lucier University of Toronto.
Combinatorial Public Projects
An Optimal Lower Bound for Anonymous Scheduling Mechanisms
Combinatorial Auction
Combinatorial Auction
Combinatorial Auction
Combinatorial Auction
Presentation transcript:

Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Paolo Penna and Carmine Ventre

Already on these screens... Concept of mechanisms with verification Construction of optimal mechanisms w/ verification  A class of social choice functions admitting CRMs w/ verification for any bounded domain Construction of optimal truthful mechanisms w/ verification for any bounded domain and any cost function of a certain form  Shown the technique only for finite domains collusion-resistant

Routing in Networks s Internet Change over time (link load) Private Cost No Input Knowledge Selfishness

Mechanisms: Dealing w/ Selfishness Augment an algorithm with a payment function The payment function should incentive in telling the truth Design a truthful mechanism s

Truthful Mechanisms M = (A, P) s Utility (true,,...., ) ≥ Utility (bid,,...., ) for all true, bid, and,..., M truthful if: Utility = Payment – cost = – true

Optimization & Truthful Mechanisms Objectives in contrast  Many lower bounds (even for two players and exponential running time mechanisms) Variants of the SPT [Gualà & Proietti, 06] Minimizing weighted sum scheduling [Archer & Tardos, 01] Scheduling Unrelated Machines [Nisan & Ronen, 99], [Christodoulou & Koutsoupias & Vidali 07], … Workload minimization in interdomain routing [Mu’alem & Schapira, 07], [Gamzu, 07]  & a brand new computational lower bound CPPP [Papadimitriou & Schapira & Singer, 08] Study of optimal truthful mechanisms

Collusion-Resistant Mechanisms CRMs are “impossible” to achieve  Posted price [Goldberg & Hartline, 05]  Fixed output [Schummer, 02] Unbounded apx ratios Coalition C + – ∑ Utility (true, true,,...., ) ≥ ∑ Utility (bid, bid,,...., ) for all true, bid, C and,..., in C

Describing Real World: Collusions “Accused of bribery”  1,030,000 results on Google  1,635 results on Google news Can we design CRMs using real-world information?

Describing Real World: Verification TCP datagram starts at time t  Expected delivery is time t + 1…  … but true delivery time is t + 3 It is possible to partially verify declarations by observing delivery time Other examples:  Distance  Amount of traffic  Routes availability 31 TCP IDEA ([Nisan & Ronen, 99]): No payment for agents caught by verification

(The general) Verification Setting Give the payment if the results are given “in time”  Agent is selected when reporting bid 1. true  bid  just wait and get the payment 2. true > bid  no payment (punish agent ) Utility = Payment – cost = – true

Comparison with [NR99] verification setting Two different declarations  Type  Execution time verification (reported exe time ≥ true one) Allocation depends on Payments depend on,

[NR99] verification: agent not caught (i.e., bid ≥ cost) “Physical” assumption e.g., not usable for TCP example cost = 10 mins bid = 3 hrs, Utility = Payment – reported cost = – bid NR

[NR99] verification: agent caught (i.e., bid < cost), Utility = Payment – true cost = – cost NR Mechanism truthful (resp. CR) in our verification model Mechanism truthful (resp. CR) in [NR99] verification model (Easy) Thm.

CRMs w/verification for single- parameter bounded domains Agents aka as “binary” (in/out outcomes)  e.g., controls edges any number between two known constants bid min & bid max

CRMs w/verification for single- parameter bounded domains: ideas Sufficient Properties  Pay all agents(!!!)  Algorithm 2-resistant s e e’ Truthfulness e’ has no way to enter the solution by unilaterally lying In coalition they can make the cut really expensive Utility C (true)= P e – 2 true 10+P e true 11+P e true P e’ = 0 Utility C (bid)=P e’ – 10 bid ≥ 10 + P e – 10 > Utility C (true) true

Truthful Mechanisms w/ Verification: the threshold bid < in bid > out bid A(bid, ) (A,P) truthful with verification [Auletta&De Prisco&Penna&Persiano,04] ths in out ths

2-resistant Algorithms t=(true, true,,...., ) ths b’ ths t’ ≥ b’ = b=(bid, bid,,...., ) t’ = in out ths b’ ths t’ b - =(bid,,...., ) t - =(true,,...., ) bid ≥ true(Verification doesn’t work)

Exploiting Verification: CRMs w/verification At least one agent is caught by verification Usage of the constant h for bounded domains Payment (b) = h - if out ths b’ hif in Thm. Algorithm A 2-resistant (A,Payment) is a CRM w/ verification Proof Idea.

Proof (continued) in out ths b’ ths t’ No agent is caught by verification Each is not worse by truthtelling bt in out Utility (t) == Utility (b)h - true true Utility (t) = h - ≥ h - true ths t’ = Utility (b) Payment (b) = h - if out h if in ths b’ h - ≥ h - ths t’ ths b’ h - true ≥ h - ths b’ true

Simplifying Resistance Condition t=(true, true,,...., ) ths b’ ths t’ ≥ b’ = b=(bid, bid,,...., ) t’ = in out ths b’ ths t’ b - =(bid,,...., ) t - =(true,,...., ) bid ≥ true(Verification doesn’t work) b=(bid,,...., ) t=(true,,...., ) bid ≥ true b’ =b-b- t’ =t-t- in out ths b’ ths t’ Thm. Optimal threshold-monotone algorithms with fixed tie breaking are n-resistant Optimal CRMs

Applications Optimal CRMs for:  MST  k-items auctions  Cheaper payments wrt mechanisms of previous “episode” Optimal truthful mechanisms for multidimensional agents bidding from bounded domains and non-decreasing cost functions of the form Cost(bid,..., bid )

Multidimensional Agents Outcomes = {X1,..., Xm} bid =(bid(X1),....,bid(Xm)) b=(bid,..., bid ) B(b) optimal algorithm with fixed tie breaking rule A(bid ) m optimal single- player functions View bid as a virtual coalition C of m single-parameter agents P (b) = ∑ payment (bid ) in C Lemma. If every A is m-resistant then (B,P) is truthful Thm. For non-decreasing cost function of the form Cost(bid,..., bid ) every A is threshold-monotone Every A is m-resistant (B,P) is truthful

Conclusions Optimal CRMs with verification for single- parameter bounded domains Optimal truthful mechanisms for multidimensional bounded domains  Construction tight (removing any of the hypothesis we get an impossibility result) Overcome many impossibility results by using a real-world hypothesis (verification) For finite domains: Mechanisms polytime if algorithm is Can we deal with unbounded domains? Threshold-monotone vs. utilitarian algorithms