Ron Lavi Presented by Yoni Moses.  Introduction ◦ Combining computational efficiency with game theoretic needs  Monotonicity Conditions ◦ Cyclic Monotonicity.

Slides:



Advertisements
Similar presentations
Combinatorial Auction
Advertisements

Truthful Mechanisms for Combinatorial Auctions with Subadditive Bidders Speaker: Shahar Dobzinski Based on joint works with Noam Nisan & Michael Schapira.
Combinatorial Auctions with Complement-Free Bidders – An Overview Speaker: Michael Schapira Based on joint works with Shahar Dobzinski & Noam Nisan.
6.896: Topics in Algorithmic Game Theory Lecture 21 Yang Cai.
Slide 1 of 31 Noam Nisan Approximation Mechanisms: computation, representation, and incentives Noam Nisan Hebrew University, Jerusalem Based on joint works.
The simplex algorithm The simplex algorithm is the classical method for solving linear programs. Its running time is not polynomial in the worst case.
6.896: Topics in Algorithmic Game Theory Lecture 20 Yang Cai.
Auction Theory Class 5 – single-parameter implementation and risk aversion 1.
Incremental Linear Programming Linear programming involves finding a solution to the constraints, one that maximizes the given linear function of variables.
Online Mechanism Design (Randomized Rounding on the Fly)
CPSC 455/555 Combinatorial Auctions, Continued… Shaili Jain September 29, 2011.
Approximating optimal combinatorial auctions for complements using restricted welfare maximization Pingzhong Tang and Tuomas Sandholm Computer Science.
The Communication Complexity of Approximate Set Packing and Covering
Truthful Mechanism Design for Multi-Dimensional Scheduling via Cycle Monotonicity Ron Lavi IE&M, The Technion Chaitanya Swamy U. of Waterloo and.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
C&O 355 Mathematical Programming Fall 2010 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Multi-item auctions with identical items limited supply: M items (M smaller than number of bidders, n). Three possible bidder types: –Unit-demand bidders.
Preference Elicitation Partial-revelation VCG mechanism for Combinatorial Auctions and Eliciting Non-price Preferences in Combinatorial Auctions.
A Sufficient Condition for Truthfulness with Single Parameter Agents Michael Zuckerman, Hebrew University 2006 Based on paper by Nir Andelman and Yishay.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
6.853: Topics in Algorithmic Game Theory Fall 2011 Matt Weinberg Lecture 24.
Bundling Equilibrium in Combinatorial Auctions Written by: Presented by: Ron Holzman Rica Gonen Noa Kfir-Dahav Dov Monderer Moshe Tennenholtz.
6.896: Topics in Algorithmic Game Theory Lecture 15 Constantinos Daskalakis.
Algorithmic Applications of Game Theory Lecture 8 1.
Mechanism Design and the VCG mechanism The concept of a “mechanism”. A general (abstract) solution for welfare maximization: the VCG mechanism. –This is.
The Stackelberg Minimum Spanning Tree Game Jean Cardinal · Erik D. Demaine · Samuel Fiorini · Gwenaël Joret · Stefan Langerman · Ilan Newman · OrenWeimann.
Welfare Maximization in Congestion Games Liad Blumrosen and Shahar Dobzinski The Hebrew University.
Limitations of VCG-Based Mechanisms Shahar Dobzinski Joint work with Noam Nisan.
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
Introduction to Linear and Integer Programming Lecture 7: Feb 1.
Truthful Randomized Mechanisms for Combinatorial Auctions Speaker: Michael Schapira Joint work with Shahar Dobzinski and Noam Nisan Hebrew University.
Approximation Algorithms
Truthful Randomized Mechanisms for Combinatorial Auctions Speaker: Shahar Dobzinski Joint work with Noam Nisan and Michael Schapira.
Towards a Characterization of Truthful Combinatorial Auctions Ron Lavi, Ahuva Mu’alem, Noam Nisan Hebrew University.
Combinatorial Auction. Conbinatorial auction t 1 =20 t 2 =15 t 3 =6 f(t): the set X  F with the highest total value the mechanism decides the set of.
Distributed Combinatorial Optimization
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Incentive-compatible Approximation Andrew Gilpin 10/25/07.
Definition and Properties of the Cost Function
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
Definition and Properties of the Production Function Lecture II.
Computational aspects of stability in weighted voting games Edith Elkind (NTU, Singapore) Based on joint work with Leslie Ann Goldberg, Paul W. Goldberg,
Multi-Unit Auctions with Budget Limits Shahar Dobzinski, Ron Lavi, and Noam Nisan.
VCG Computational game theory Fall 2010 by Inna Kalp and Yosef Heskia.
Auction Seminar Optimal Mechanism Presentation by: Alon Resler Supervised by: Amos Fiat.
C&O 355 Mathematical Programming Fall 2010 Lecture 4 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing Weijie Shi*, Linquan Zhang +, Chuan Wu*, Zongpeng Li +, Francis C.M. Lau*
More on Social choice and implementations 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A Using slides by Uri.
Yang Cai Oct 08, An overview of today’s class Basic LP Formulation for Multiple Bidders Succinct LP: Reduced Form of an Auction The Structure of.
Topic 2: Designing the “optimal auction” Reminder of previous classes: Discussed 1st price and 2nd price auctions. Found equilibrium strategies. Saw that.
Yang Cai Oct 06, An overview of today’s class Unit-Demand Pricing (cont’d) Multi-bidder Multi-item Setting Basic LP formulation.
Linear Program Set Cover. Given a universe U of n elements, a collection of subsets of U, S = {S 1,…, S k }, and a cost function c: S → Q +. Find a minimum.
X y x-y · 4 -y-2x · 5 -3x+y · 6 x+y · 3 Given x, for what values of y is (x,y) feasible? Need: y · 3x+6, y · -x+3, y ¸ -2x-5, and y ¸ x-4 Consider the.
C&O 355 Mathematical Programming Fall 2010 Lecture 5 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
Linear Programming Maximize Subject to Worst case polynomial time algorithms for linear programming 1.The ellipsoid algorithm (Khachian, 1979) 2.Interior.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
Combinatorial Auction. A single item auction t 1 =10 t 2 =12 t 3 =7 r 1 =11 r 2 =10 Social-choice function: the winner should be the guy having in mind.
Truthful and near-optimal mechanism design via linear programming Chaitanya Swamy Caltech and U. Waterloo Joint work with Ron Lavi Caltech.
Approximation Algorithms for Combinatorial Auctions with Complement-Free Bidders Speaker: Shahar Dobzinski Joint work with Noam Nisan & Michael Schapira.
Negotiating Socially Optimal Allocations of Resources U. Endriss, N. Maudet, F. Sadri, and F. Toni Presented by: Marcus Shea.
Non-LP-Based Approximation Algorithms Fabrizio Grandoni IDSIA
Bayesian Algorithmic Mechanism Design Jason Hartline Northwestern University Brendan Lucier University of Toronto.
Approximation Algorithms based on linear programming.
Truthful and Near-Optimal Mechanism Design via Linear Programming Ron Lavi California Institute of Technology Joint work with Chaitanya Swamy.
Linear program Separation Oracle. Rounding We consider a single-machine scheduling problem, and see another way of rounding fractional solutions to integer.
Approximation algorithms for combinatorial allocation problems
Comp/Math 553: Algorithmic Game Theory Lecture 09
Perturbation method, lexicographic method
An Optimal Lower Bound for Anonymous Scheduling Mechanisms
Part II General Integer Programming
Presentation transcript:

Ron Lavi Presented by Yoni Moses

 Introduction ◦ Combining computational efficiency with game theoretic needs  Monotonicity Conditions ◦ Cyclic Monotonicity ◦ Weak Monotonicity  An Example – Machine Scheduling Problem

 Approximation for Combinatorial Auctions ◦ Fractional allocation ◦ Integral allocation  Impossibility results

 m items (Ω) are allocated to n players  i is the value given by player i to a bundle S (a subset of Ω)  Valuations are ◦ Monotone: ◦ Normalized:  Goal: Find allocation such that is maximized.

 Problem: a general valuation’s size is exponential is n and m.  Possible representations: ◦ Bidding languages model ◦ access model  But polynomial algorithms that use these representations only obtain an approximation. VCG requires the exact optimum!

 Given: an algorithm for CA that outputs a c- approximation.  Construct: A randomized c-approx. mechanism that is truthful in expectation  Plan: ◦ First, solve for the fractional domain ◦ Next, move back to the original domain, using randomization

 Solve using Linear Programming  Allocation x gives player i a fraction of subset S.  The value is  Constraints: ◦ A player receives at most one integral subset ◦ An item cannot be over-allocated  Goal: ◦ maximize the sum of values

 The algorithm’s time complexity is polynomial. ◦ We can assume the bidding languages model, where the LP has size polynomial in the size of the bid (for example: k-minded players) ◦ We can assume general valuations with query- access, and the LP is solvable with a poly. num of demand queries ◦ The number of non-zero coordinates is poly. because we obtain x in polynomial-time  Solution is optimal => We can use VCG! ◦ but it’s a solution for the fractional domain…

 Definition: Algorithm A “verifies a c- integrality-gap” for the LP program CA-P if it receives real numbers and outputs an integral point which is feasible for CA-P and

 Suppose A verifies a c-integrality-gap for CA-P (in poly. time), and x is any feasible point of CA-P.  Then x/c can be decomposed to a convex combination of integral feasible points (in poly. time)

 Individual rationality (non-negative utility) is satisfied, regardless of the randomized choice:  VCG is individually rational:  Thus, by definition: for any l

 Lemma: The decomposition-based mechanism is truthful in expectation, and obtains a c-approx. to the social welfare  Proof:  The expected social welfare is.  Since x* is the optimal (fractional) allocation, the c- approx. is obtained.  Truthfulness: First, we show that the expected price equals the fractional price over c:

 Now, fix the other players’ valuation.  x* is the fractional optimum obtained when player i declares. z* is the frac. optimum obtained when i declares..  Since VCG fractional prices are truthful:  Divide this formula by c. Using the previous formula and by definition of the decomposition, we get:

 The left hand side is the expected utility for declaring.  The right hand side is the expected utility for declaring.  Thus, the lemma follows.

 This analysis is for one-shot mechanisms, where a player declares his valuation up-front ◦ for example: the bidding languages model.  For an iterative mechanism such as the query-access model, the solution is weakened to ex-post Nash ◦ If all other players are truthful, player i will maximize her expected utility by being truthful.

 How de we decompose x/c into ?  We use a new LP called P and its dual D.  notation: E is the set of nonzero fractions in the allocation. primaldual

 Constraints 1.11 of P describe the decomposition.  If the optimum satisfies, we’re almost done. ◦ But P has exponentially many variables!  We’ll use the dual D. Its number of variables is poly. ◦ Of course, D’s constraints are analogous to P’s variables => D has exponentially many constraints.  We can still solve D in polynomial time, using the ellipsoid method and our verifier A as a separation oracle.

 Claim: If w, z is feasible for D: If not, A can be used to find a violated constraint in poly. time  Proof:  Suppose.  Let A receive w as input. Its output is an integral allocation.  Since A is a c-approx. to the fractional optimum:  Due to the violated inequality of the claim:  Thus constraint 1.12 is violated for :

 Claim: The optimum of D is 1, and the decomposition is polynomial-time computable.  Proof: is feasible, hence the optimum is at least 1.  By the previous claim, it is at most 1.  To solve P, we first solve D with this separation oracle:  Given w,z, if, return the  separating hyperplane.  Otherwise, find the violated constraint (which implies the separating hyperplane)

 Due to the oracle, the ellipsoid method uses a poly. number of constraints  Thus, there is an equivalent program with only these constraints.  Its dual is a program equivalent to P, but with a poly. number of variables. ◦ Solving that gives us the decomposition.

 We still need an algorithm for verifying a c-integrality-gap…  Claim: We’re given A’, a c-approx. for general CA. ◦ The approximation is with respect to the fractional optimum.  Using A’,we can obtain A, a c-integrality-gap verifier for CA-P, with a poly. time overhead on top of A’.  Proof:  Given (the weights in A’s input), we need to build from them a valid valuation that can be used as input for A’. ◦ We can’t assume that w is non-negative and monotone.  Define for non-negativity  Next, Define for monotonicity.

 is valid and can be represented with size |E|.  Let  A’ gives c-approx. So such that ◦ Remember that  But in order to construct a verifier, we need this formula to hold for (w instead of ). ◦ Now we only consider coordinates in E ◦ Some coordinates in w (but not in ) can be negative  To fix the first problem, define :  For any (i,S) such that, set:  All other coordinates of are set to 0

 By construction,  To fix the second problem, define :   Clearly,  So now we have, which is feasible for CA-P such that

 Now we know how to build a verifier using a c-approx. for CA.  We still have to find an algorithm that approximates the fractional optimum.  The following greedy algorithm will give us a approx. to the fractional optimum (proof is skipped).  Input:  Iteration:  Let  Set.  Remove from E all (i’,S’) with i’=i or  If E isn’t empty, reiterate.

 The decomposition-based mechanism with Greedy as the integrality-gap verifier is individually rational and truthful- in-expectation and obtains an approximation of to the social welfare.

 The notion of truthfulness-in-expectation is inferior to truthfulness ◦ It assumes to players are only interested in their expected utility. But Don’t they care about the variance as well?  Stronger notion: universal truthfulness. Players maximize their utility for every coin toss ◦ Still, “deterministic truthfulness” is better. ◦ In classic algorithms, the law of large numbers can be used to approach the expected performance. But in mechanism design, we cannot repeat the execution because it affects the strategic properties.  Conclusion: deterministic mechanisms are still a better choice.

 Notations:  is the domain of values  The social choice function is onto A (domain of alternatives)  Definition: f is an “affine maximizer” if there exist weights such that for all :  Of course, we might prefer other function forms. For example, due to computational complexity, revenue maximization, etc. ◦ But what other forms are implementable:

 Theorem:  Suppose and. Then f is dominant-strategy implementable iff it is an affine maximizer. ◦ In other words, if we have unrestricted value domain and nontrivial alternative domain, we have to use an affine maximizer. ◦ Note that any affine maximizer is implementable (can be shown by generalizing VCG arguments).  We will prove one side of a weaker theorem.  Definition: f is neutral if for all, if an alternative x exists such that for all i and, then f (v)=x ◦ In a neutral affine maximizer, all constants will be zero.

 Theorem:  Suppose and. Then if f is dominant- strategy implementable and neutral, it must be an affine maximizer.  The proof will require two monotonicity conditions: ◦ Positive Association of Differences (PAD) ◦ Generalized-WMON

 Definition: f satisfies PAD if the following holds for any : f(v)=x. for any and any i, Claim: Any implementable function f, on any domain, satisfies PAD. Proof: Let. In other words, players up to i declare according to v’. The rest declare according to v. f(v’) = x

 Now, suppose that for some and,.  For every alternative we have. In addition:  Reminder: f satisfies W-MON if for every player i, every and every with,.  W-MON implies that. By induction,. Which means f(v’)=x.

 In W-MON, we fix a player and fix the other players’ declarations. ◦ We can generalize W-MON by dropping this.  Definition: f satisfies Generalized-WMON if for every with f(v)=x and f(v’)=y there exists a player i such that  Another way of looking at it: if f(v)=x and then.

 Claim: If the domain is unrestricted and f is implementable then f satisfies Generalized-WMON  Proof:  Fix any v, v’. Suppose that f(v’) = x and v’(y) – v(y) > v’(x) – v(x). Assume by contradiction that f(v) = y.  Fix a vector such that v’(x) – v’(y) = v(x)- v(y) -.  Define v’’:  Using PAD, the transition v->v’’ implies f(v’’)=y and the transition v’->v’’ implies f(v’’)=x. contradiction.

 Define:  Note that P(x,y) is not empty (assuming that v exists such that f(v) = x)  Also, if then for any,  Explanation: take v with f(v)=x and v(x)-v(y)=.  Construct v’ by increasing v(x) by and setting the other coordinates as in v. By PAD, f(v’)=x and v’(x) – v’(y) =

 Proof (i):  Suppose by contradiction that.  There exists We assumed that, we know that a v’ exists such that v’(x)-v’(y) = and f(v’)=x  Due to our assumption,. This contradicts Generalized-WMON

 Proof (ii): For any take some and fix some.  Also, fix some v such that for all.  By the above argument,  Since, it follows that f(v)=y.  Thus, as needed.

 Proof:  For any, fix some.  Choose any v such that for all  By Generalized-WMON, f(v)=x.  And by adding the 2 equations, we get:

 The proof of the thorem follows…  Based on separation lemma