Strong Implementation of Social Choice Functions in Dominant Strategies Clemens ThielenSven O. Krumke 3rd International Workshop on Computational Social.

Slides:



Advertisements
Similar presentations
Combinatorial Auction
Advertisements

C&O 355 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
C&O 355 Lecture 15 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A.
Weighted Matching-Algorithms, Hamiltonian Cycles and TSP
Min-Max Relations, Hall’s Theorem, and Matching-Algorithms Graphs & Algorithms Lecture 5 TexPoint fonts used in EMF. Read the TexPoint manual before you.
Algorithmic mechanism design Vincent Conitzer
6.896: Topics in Algorithmic Game Theory Lecture 20 Yang Cai.
C&O 355 Lecture 8 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
Approximating optimal combinatorial auctions for complements using restricted welfare maximization Pingzhong Tang and Tuomas Sandholm Computer Science.
C&O 355 Mathematical Programming Fall 2010 Lecture 9
1 Nondeterministic Space is Closed Under Complement Presented by Jing Zhang and Yingbo Wang Theory of Computation II Professor: Geoffrey Smith.
1 Combinatorial Agency with Audits Raphael Eidenbenz ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in EMF. Read the TexPoint.
Complexity class NP Is the class of languages that can be verified by a polynomial-time algorithm. L = { x in {0,1}* | there exists a certificate y with.
C&O 355 Mathematical Programming Fall 2010 Lecture 21 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
A Computational Characterization of Multiagent Games with Fallacious Rewards Ariel D. Procaccia and Jeffrey S. Rosenschein.
An Introduction to Game Theory Part I: Strategic Games
1 Truthful Mechanism for Facility Allocation: A Characterization and Improvement of Approximation Ratio Pinyan Lu, MSR Asia Yajun Wang, MSR Asia Yuan Zhou,
1 of 9 ON ALMOST LYAPUNOV FUNCTIONS Daniel Liberzon University of Illinois, Urbana-Champaign, U.S.A. TexPoint fonts used in EMF. Read the TexPoint manual.
The double-dimer model and skew Young diagrams Richard W. Kenyon David B. Wilson Brown University Microsoft Research TexPoint fonts used in EMF. Read the.
Algorithmic Applications of Game Theory Lecture 8 1.
NICE LOOKING MATRICES By now it shoud be clear that matrices are the backbone (computationally at least) of the attempt to solve linear systems, or, even.
1 Best-Reply Mechanisms Noam Nisan, Michael Schapira and Aviv Zohar.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A.
A Combinatorial Algorithm for Strong Implementation of Social Choice Functions Clemens ThielenStephan Westphal 3rd International Workshop on Computational.
25/5/2011iAGT Jerusalem How to Bribe a Prison Guard and Applications Amos Fiat joint work with Anna Karlin, Elias Koutsoupias, and Angelina Vidali TexPoint.
Mediators Slides by Sherwin Doroudi Adapted from “Mediators in Position Auctions” by Itai Ashlagi, Dov Monderer, and Moshe Tennenholtz.
Mechanism Design. Overview Incentives in teams (T. Groves (1973)) Algorithmic mechanism design (Nisan and Ronen (2000)) - Shortest Path - Task Scheduling.
Agent Technology for e-Commerce Chapter 10: Mechanism Design Maria Fasli
Complexity of Mechanism Design Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
C&O 355 Mathematical Programming Fall 2010 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
חישוביות וסיבוכיות Computability and Complexity Lecture 7 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAAA.
C&O 355 Mathematical Programming Fall 2010 Lecture 4 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Continued Fractions, Euclidean Algorithm and Lehmer’s Algorithm Applied Symbolic Computation CS 567 Jeremy Johnson TexPoint fonts used in EMF. Read the.
More on Social choice and implementations 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A Using slides by Uri.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 21.
Ran El-Yaniv and Dmitry Pechyony Technion – Israel Institute of Technology, Haifa, Israel Transductive Rademacher Complexity and its Applications.
Preference elicitation Communicational Burden by Nisan, Segal, Lahaie and Parkes October 27th, 2004 Jella Pfeiffer.
Automated Design of Multistage Mechanisms Tuomas Sandholm (Carnegie Mellon) Vincent Conitzer (Carnegie Mellon) Craig Boutilier (Toronto)
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Yang Cai Oct 08, An overview of today’s class Basic LP Formulation for Multiple Bidders Succinct LP: Reduced Form of an Auction The Structure of.
Chapter 4 Bayesian Approximation By: Yotam Eliraz & Gilad Shohat Based on Chapter 4 on Jason Hartline’s book Seminar in Auctions and Mechanism.
Uri Zwick Tel Aviv University Simple Stochastic Games Mean Payoff Games Parity Games TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Languages with Bounded Multiparty Communication Complexity Arkadev Chattopadhyay (McGill) Joint work with: Andreas Krebs (Tubingen) Michal Koucky (Czech.
Regret Minimizing Equilibria of Games with Strict Type Uncertainty Stony Brook Conference on Game Theory Nathanaël Hyafil and Craig Boutilier Department.
Algorithmic Mechanism Design: an Introduction Approximate (one-parameter) mechanisms, with an application to combinatorial auctions Guido Proietti Dipartimento.
On Cost Sharing Mechanisms in the Network Design Game Rohit Khandekar IBM Watson Joint work with Baruch Awerbuch JHU TexPoint fonts used in EMF. Read the.
Privacy-Preserving Linear Programming Olvi Mangasarian UW Madison & UCSD La Jolla UCSD – Center for Computational Mathematics Seminar January 11, 2011.
Union Find ADT Data type for disjoint sets: makeSet(x): Given an element x create a singleton set that contains only this element. Return a locator/handle.
ETH Zurich – Distributed Computing Group Raphael Eidenbenz, PhD Thesis 1ETH Zurich – Distributed Computing Group PhD Thesis Raphael Eidenbenz Prof. Roger.
Lec 12. PID Controller Design PID Controller Ziegler-Nichols Tuning Rule Reading: 10.1, 10.2, TexPoint fonts used in EMF. Read the TexPoint manual before.
Revisiting Output Coding for Sequential Supervised Learning Guohua Hao & Alan Fern School of Electrical Engineering and Computer Science Oregon State University.
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
FORMAL LANGUAGES, AUTOMATA AND COMPUTABILITY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Bayesian Algorithmic Mechanism Design Jason Hartline Northwestern University Brendan Lucier University of Toronto.
1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAA A AA A.
Mechanism design for computationally limited agents (last lecture discussed the case where valuation determination was complex) Tuomas Sandholm Computer.
CPS Mechanism design Michael Albert and Vincent Conitzer
CS 154, Lecture 6: Communication Complexity
Polynomial DC decompositions
Uri Zwick Tel Aviv University
Robust Mechanism Design with Correlated Distributions
CSE 321 Discrete Structures
Vincent Conitzer Mechanism design Vincent Conitzer
Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer
TexPoint fonts used in EMF.
New Direct Product results in Communication Complexity
Bayes Nash Implementation
Information, Incentives, and Mechanism Design
A Technique for Reducing Normal Form Games to Compute a Nash Equilibrium Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University, Computer Science.
Presentation transcript:

Strong Implementation of Social Choice Functions in Dominant Strategies Clemens ThielenSven O. Krumke 3rd International Workshop on Computational Social Choice 15 September 2010 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAAA A A A A AA A

Problem Definition Social choice setting with private information: Strong Implementability

Mechanisms TypesBidsSocial Choices Mechanism: strategy α 1 strategy α n g Strong Implementability Agent 1 Agent n

Utilities and Equilibria Definition: Strong Implementability valuation of the output payment obtained

Utilities and Equilibria Strong Implementability Definition:

Strong Implementation Definition: Strong Implementability

Strong Implementability Problem Strong Implementability Problem The Strong Implementability Problem: Strong Implementability Encoding length:

Augmented Revelation Mechanisms Augmented Revelation Mechanisms Strong Implementability Definition: Augmented Revelation Principle: [Mookherjee, Reichelstein 1990] „incentive compatibility“

Previous Results Strong Implementability

Previous Results (2) Strong Implementability

Our Results Strong Implementability

Augmented Revelation Principle Strong Implementability Augmented Revelation Principle: [Mookherjee, Reichelstein 1990] Augmented Revelation Principle for Dominant Strategies: [this paper]

General Idea (I) Strong Implementability To obtain an augmented revelation mechanism: Definition: see definition to follow soon

Selective Elimination Strong Implementability agent i

Selective Elimination Strong Implementability

Bad Pairs and Elimination Definition: Strong Implementability

Two Important Steps Theorem 2 (selective elimination is necessary): Theorem 3 (selective elimination is sufficient): Strong Implementability

Structure of the Algorithm guess verify Theorem 3 + close look at the proof Definition of selective elimination Strong Implementability

The Verification The Verification Strong Implementability General Approach: Main Observation:

The Payment Polyhedron The Payment Polyhedron Strong Implementability

The Payment Polyhedron (I) The Payment Polyhedron (I) Strong Implementability Inequalities encode which bids are dominant bids. Incentive compatibility & dominant bids

The Payment Polyhedron (II) The Payment Polyhedron (II) Strong Implementability Inequalities encode conditions of selective elimination

The Payment Polyhedron (II) The Payment Polyhedron (II) Strong Implementability Inequalities encode conditions of selective elimination

Verification Issues Strong Implementability Here I am!

Verification Issues We have to handle strict inequalities. To do so, we must find a point in the relative interior of the polyhedron. This can be done by means of the Ellipsoid Method (directly) or by solving a sequence of LPs. Byproduct: Payments are of polynomial encoding length. Strong Implementability

Conclusion Strong Implementability in dominant strategies  NP Characterization result generalizes to infinite type spaces Open: Is the problem in P? Useful(?) results: ◦ Augmented Revelation Principle ◦ Selective elimination procedure with polynomially many steps ◦ Payments of polynomial encoding size Strong Implementability NP- complete!

Thank you! Strong Implementability