Elicitation in combinatorial auctions with restricted preferences and bounded interdependency between items Vincent Conitzer, Tuomas Sandholm, Carnegie.

Slides:



Advertisements
Similar presentations
Combinatorial Auctions with Complement-Free Bidders – An Overview Speaker: Michael Schapira Based on joint works with Shahar Dobzinski & Noam Nisan.
Advertisements

Algorithmic mechanism design Vincent Conitzer
Combinatorial auctions Vincent Conitzer v( ) = $500 v( ) = $700.
Preference Elicitation Partial-revelation VCG mechanism for Combinatorial Auctions and Eliciting Non-price Preferences in Combinatorial Auctions.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
The Theory of NP-Completeness
Side Constraints and Non-Price Attributes in Markets Tuomas Sandholm Carnegie Mellon University Computer Science Department [Paper by Sandholm & Suri 2001]
Preference elicitation and multistage/iterative mechanisms Vincent Conitzer
Algorithmic Applications of Game Theory Lecture 8 1.
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
Computational problems, algorithms, runtime, hardness
Preference elicitation/ iterative mechanisms Adapted from notes by Vincent Conitzer.
Preference elicitation Vincent Conitzer
Limitations of VCG-Based Mechanisms Shahar Dobzinski Joint work with Noam Nisan.
Graphs 4/16/2017 8:41 PM NP-Completeness.
An Algorithm for Automatically Designing Deterministic Mechanisms without Payments Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie.
Computational Criticisms of the Revelation Principle Vincent Conitzer, Tuomas Sandholm AMEC V.
NP-Complete Problems Reading Material: Chapter 10 Sections 1, 2, 3, and 4 only.
Multi-unit auctions & exchanges (multiple indistinguishable units of one item for sale) Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Combinatorial Auction. Conbinatorial auction t 1 =20 t 2 =15 t 3 =6 f(t): the set X  F with the highest total value the mechanism decides the set of.
Analysis of Algorithms CS 477/677
Complexity of Mechanism Design Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Chapter 11: Limitations of Algorithmic Power
Approximation Algorithms for Combinatorial Auctions with Complement-Free Bidders Speaker: Michael Schapira Joint work with Shahar Dobzinski & Noam Nisan.
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
Multi-item auctions & exchanges (multiple distinguishable items for sale) Tuomas Sandholm Carnegie Mellon University.
Ascending multi-item auctions Increase prices until each item is demanded only once Item prices vs. bundle prices –E.g. where there exist no appropriate.
Arbitrage in Combinatorial Exchanges Andrew Gilpin and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Collusion and the use of false names Vincent Conitzer
CPS Auctions & Combinatorial Auctions
Auctions for robotics panel: talking points Robotics setting –Incentives usually don’t matter –Problems are combinatorial/multi-attribute => modern work.
Chapter 11 Limitations of Algorithm Power. Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples:
CPS 173 Mechanism design Vincent Conitzer
1 The Theory of NP-Completeness 2012/11/6 P: the class of problems which can be solved by a deterministic polynomial algorithm. NP : the class of decision.
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
Mechanism Design CS 886 Electronic Market Design University of Waterloo.
Preference elicitation Communicational Burden by Nisan, Segal, Lahaie and Parkes October 27th, 2004 Jella Pfeiffer.
Automated Design of Multistage Mechanisms Tuomas Sandholm (Carnegie Mellon) Vincent Conitzer (Carnegie Mellon) Craig Boutilier (Toronto)
Preferences Toby Walsh NICTA and UNSW
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
1 Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples: b number of comparisons needed to find the.
EMIS 8373: Integer Programming NP-Complete Problems updated 21 April 2009.
Slide 1 of 16 Noam Nisan The Power and Limitations of Item Price Combinatorial Auctions Noam Nisan Hebrew University, Jerusalem.
Algorithmic Mechanism Design: an Introduction Approximate (one-parameter) mechanisms, with an application to combinatorial auctions Guido Proietti Dipartimento.
Combinatorial Auctions with Structured Item Graphs Vincent Conitzer, Jonathan Derryberry, and Tuomas Sandholm Computer Science Department Carnegie Mellon.
Complexity of Determining Nonemptiness of the Core Vincent Conitzer, Tuomas Sandholm Computer Science Department Carnegie Mellon University.
CPS Preference elicitation/ iterative mechanisms Vincent Conitzer
CPS Auctions & Combinatorial Auctions Vincent Conitzer
CPS Computational problems, algorithms, runtime, hardness (a ridiculously brief introduction to theoretical computer science) Vincent Conitzer.
Chapter 11 Introduction to Computational Complexity Copyright © 2011 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.
Combinatorial Auction. A single item auction t 1 =10 t 2 =12 t 3 =7 r 1 =11 r 2 =10 Social-choice function: the winner should be the guy having in mind.
Approximation Algorithms for Combinatorial Auctions with Complement-Free Bidders Speaker: Shahar Dobzinski Joint work with Noam Nisan & Michael Schapira.
Definition and Complexity of Some Basic Metareasoning Problems Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Combinatorial Auctions with k-wise Dependent Valuations Vincent Conitzer (CMU) Tuomas Sandholm (CMU) Paolo Santi (Pisa) (Some of the results in this paper.
COSC 3101A - Design and Analysis of Algorithms 14 NP-Completeness.
P & NP.
Failures of the VCG Mechanism in Combinatorial Auctions and Exchanges
Auctions & Combinatorial Auctions
NP-Completeness Yin Tat Lee
Preference Elicitation in Combinatorial Auctions: An Overview Tuomas Sandholm [For an overview, see review article by Sandholm & Boutilier in the textbook.
Auctions & Combinatorial Auctions
Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer
Preference elicitation/ iterative mechanisms
NP-Completeness Yin Tat Lee
CPS 173 Auctions & Combinatorial Auctions
Vincent Conitzer Computer Science Department
Trevor Brown DC 2338, Office hour M3-4pm
CPS Preference elicitation/ iterative mechanisms
CPS Auctions & Combinatorial Auctions
CPS Auctions & Combinatorial Auctions
Presentation transcript:

Elicitation in combinatorial auctions with restricted preferences and bounded interdependency between items Vincent Conitzer, Tuomas Sandholm, Carnegie Mellon University Paolo Santi, Pisa University Corresponding to papers: Santi, Conitzer, Sandholm, “Towards a Characterization of Polynomial Preference Elicitation in CAs” (COLT-04) Conitzer, Sandholm, Santi, “Combinatorial Auctions with k-wise Dependent Valuations” (Draft)

Introduction

Combinatorial auction Can bid on combinations of items –Bidder’s perspective: Allows bidder to express what she really wants –Avoids exposure problems –No need for lookahead / counterspeculation –Auctioneer’s perspective: Automated optimal bundling Winner determination problem: –Label bids as winning or losing so as to maximize sum of bid prices »Each item can be allocated to at most one bid –If approximating, watch incentives –=> Better allocations of items than in noncombinatorial auctions

Another complex problem in combinatorial auctions: In direct-revelation mechanisms (e.g. VCG), bidders bid on all 2 m combinations –Need to compute the valuation for exponentially many combinations Each valuation computation can be NP-complete local planning problem E.g. carrier company bidding on trucking tasks: TRACONET [Sandholm AAAI-93] –Need to communicate the bids –Need to reveal the bids => Loss of privacy & strategic info Bidding languages [Sandholm 98, 99; Nisan 00; Hoos & Boutilier 01] do not solve the problem

Clearing algorithm What info is needed from an agent depends on what others have revealed Elicitor Conen & Sandholm IJCAI-01 workshop on Econ. Agents, Models & Mechanisms, ACMEC-01 Elicitor decides what to ask next based on answers it has received so far $ 1,000 for $ 1,500 for ? for

Related research Nondeterministic (i.e., oracle) models –Bikhchandani & Ostroy JET-02 –Gul & Stacchetti JET-00 –Conitzer & Sandholm AAAI-02 –Parkes AMEC-02 –Nisan & Segal 03 –Segal 04 Deterministic models –Ascending CAs, e.g. Parkes 99; Wurman & Wellman 00; Ausubel & Milgrom 02; Kwasnicka, Ledyard, Porter, DeMartini 04 –General elicitation framework General preferences (no externalities, free disposal) –Conen & Sandholm IJCAI-01 workshop, ACMEC-01, AAAI-02, AMEC-02 –Hudson & Sandholm AMEC-02, AAMAS-03, AAMAS-04 Restricted valuation classes [Techniques from computational learning theory] –Zinkevich, Blum, Sandholm ACMEC-03 –Blum, Jackson, Sandholm, Zinkevich COLT-03, JMLR-04 –Lahaie & Parkes ACMEC-04

Partial vs. full elicitation In general, can achieve savings in elicitation by basing queries to one agent on answers from others Here, will assume that auctioneer will want to know each agent’s entire preference function –So can focus on eliciting one agent’s function Will assume that agent’s valuation function is drawn from a restricted class of functions

Model Set of items I for sale Bidder has true valuation function v: 2 I   Elicitor knows class of functions C with v  C Elicitor’s goal is to identify v Elicitor can ask bidder for v(B) for any bundle B –Counts as one (value) query Distinguish between eliciting using –polynomial #queries –polynomial time May take significant time to compute which query to ask

Some examples of polynomial- query elicitable classes

Read-once valuations [Zinkevich, Blum, Sandholm 03] Valuations are represented by a tree Leaf nodes correspond to items and their values Nonleaf nodes (gates) perform operations including: SUM: computes the sum of its children MAX c : computes sum of the c highest inputs ATLEAST c : returns sum of inputs if at least c nonzero PLUS ALL MAX ALL RO +M : only MAX and SUM allowed

Tool t (=ToolboxDNF) [Zinkevich, Blum, Sandholm 03] Valuation represented by polynomial with items as variables Using only t monomials ABCD = 5 3A + 5AB + 2AC + 4D All coefficients must be nonnegative Can be elicited in O(mt) queries

Tool -t (slight variation) Here, weights on monomials with  2 items must be negative ABCD 3 = 4 3A + 6B + 2C + D - 2AB - AC Thrm. Can be elicited in O(mt) queries Proof: First ask all singletons. Then, discover monomials one by one. Only need to find minimal subset of items that has value less than sum of contained monomials discovered so far. So, start by querying grand bundle and remove items one by one.

Interval bids Items are ordered on a line Value of bundle = sum of values of disjoint components ABC v({A}) = 1 v({B}) = 2 v({C}) = 2 v({A, B}) = 4 v({B, C}) = 3 v({A, B, C}) = 5 IMPLIED: v({A, C}) = v({A})+v({C}) = 3 Thrm. Can be elicited using m(m+1)/2 queries if ordering is known Thrm. Can be elicited using m 2 – m + 1 queries if ordering is not known, but v({x, y}) > v({x}) + v({y}) iff x and y are adjacent Proof: Ask all singletons and pairs to find adjacencies (m(m+1)/2), then ask remaining components (m(m-1)/2 – (m-1)), for total of m 2 – m + 1 queries

Tree bids require exponential queries Natural generalization: tree such that value of bundle = sum of values of disjoint components Requires exponentially many queries: … … There are 2 m/2 such connected bids

Bounded interdependency

0+1+2 = 3 G 2 = 2-wise dependent valuations Node = item Value of bundle = sum of values of nodes/edges in bundle

G k = k-wise dependent valuations Value of bundle = sum of values of nodes/edges/multiedges in bundle For example, k=3: Node = item 1 3-edge

G k basic elicitation results Thrm. Every valuation function has a unique G m representation –Proof: Suppose we have found the unique weights for multiedges up to size j. Then weight of multiedge over S (with |S| = j+1) must be v(S) –  S’  S w(S’) Thrm. A function in G k can be elicited in O(m k ) queries –Proof: Query all bundles of size k or less. Again, weight of multiedge over S (with |S| = j+1  k) must be v(S) –  S’  S w(S’), so can use dynamic programming

Optimal clearing is still hard in G 2 Pf: reduces from EXACT-COVER-BY-3-SETS Can get total value of 2m/3 if and only if an exact 3-cover exists

Special case: union of graphs is forest Thrm. Can solve clearing problem to optimality by dynamic programming in time O(mn)

Approximating with G 2 or G k Thrm. Suppose there exists some v’ in G k such that for any bundle S, |v(S) – v’(S)| ≤ δ. Then, using O(m k ) queries, we can construct a function g in G k such that for any bundle S, |v(S) – g(S)| ≤ δ(1+(|S| choose k)). –Bound is tight for G 2 Thrm. Suppose that all the weights in v’s G m graph are positive. Then, using m(m+1)/2 queries, we can construct a function g in G 2 such that for any S, |v(S)-g(S)| ≤ (M(v)/2) ((|S|(|S|+1)/2) (1+ |(|S|-1)/2) –here M(v) is a measure of the function’s disagreement with the same function without any multiedges

Unions of classes

Let C 1, C 2 be valuation classes that can be elicited with polynomial #queries –Using algorithms A 1, A 2 with query bounds p 1 (n), p 2 (n) Consider the following simple algorithm for C 1  C 2 1.f 1  A 1, f 2  A 2 2.If f 1 = f 2, return it 3.Otherwise, find bundle S such that f 1 (S)  f 2 (S) 4.Query v(S) 5.If f 1 (S) = v(S), return f 1, otherwise f 2 At most p 1 (n) + p 2 (n) + 1 queries Gives no bound on computation: checking identity of functions in steps 2, 3 may take lot of computation Polynomial-query elicitable valuation classes closed under pairwise union

Consider the following classes: C 1 = {f s } where –f s (B) = 0 if B is empty or B = {s} –f s (B) = 2 if B = I –f s (B) = 1 otherwise p 1 (n) + p 2 (n) + 1 bound is tight To elicit C 1, simply ask v({s}) for every s –Need at most m-1 queries C 2 = {f -s } where –f -s (B) = 0 if B is empty –f -s (B) = 2 if B = I or B = I – {s} –f -s (B) = 1 otherwise To elicit C 2, simply ask v(I-{s}) for every s –Need at most m-1 queries To elicit C 1  C 2, need to find {s} or I-{s} with value different from 1 –Need 2m-1 = 2(m-1) + 1 queries {} {a} {b} {c} I I-{a} I-{b} I-{c} 121 2

Does taking the union ever make computation harder? Answer: yes. Consider following class: G 2 U : valuation is given by graph from G 2 (with positive edge weights) + upper bound u on value A B C u = 6 v({A, C}) = 6 Easy to elicit: –ask all singletons, all pairs to get graph –ask grand bundle to get u

Taking the union may make computation harder… Now consider the following class: G 2 UH : same as G 2 U except no more than half of bundle’s value can come from edges –require: no edge worth more than sum of endpoints A B C u = 20 v({A, B, C}) = 10 Again, easy to elicit: –ask all singletons, all pairs to get graph –ask grand bundle to get u

How computationally hard is it to elicit G 2 U  G 2 UH ? Thrm. It is coNP-complete to determine whether a function from G 2 U and another from G 2 UH (represented by their graphs and u) are identical –That is, it is NP-complete to find a bundle whose query would distinguish them

Proof of hardness Reduction from CLIQUE problem every vertex: weight 1 Required clique size: k (say, 3) every edge: weight (k+  ) / (k choose 2) u = 2k +  Clique of size k would have k vertex weight and k+  edge weight –So, G 2 UH at-most-half-from-edges constraint would be binding Cannot happen when there are fewer edges For larger sets, the u-constraint is binding

Optimized polynomial-time elicitation algorithm for RO +M  Tool -t  Tool t  G 2  INT Thrm. Runs in polynomial time and uses at most O(m(m+t)) queries

Towards characterizing easily elicitable valuation functions

Polynomial inferability Inferring a bundle = ascertaining its value from queries on other bundles Bundle is polynomially noninferable (strongly polynomially noninferable) wrt C if for some (any) function in C, the bundle’s valuation cannot be inferred using polynomially many queries Thrm. There exists a class of functions where –exponentially many bundles are polynomially noninferable –no bundles are strongly polynomially noninferable –the class cannot be elicited using polynomially many queries. Proof uses [Angluin 88] idea, functions of the form: … v(B) = 1 iff B contains all items corresponding to a color

Conclusions Focused on learning full valuation function in restricted classes New easy-to-elicit classes of valuations –Tool -t, Interval, G k Clearing for G 2 is NP-complete –But easy if union of graphs is forest Approximation with functions from G 2 or G k Polyquery elicitable classes closed under pairwise union –But computation required may go from polynomial to NP-hard –Efficient algorithm for union of most of the classes studied Even classes without strongly polynomially noninferable bundles may require exponentially many queries for elicitation

Future research Can Interval class be elicited with polynomially many queries without knowing the order? Can we come up with a more general characterization of what makes valuation functions easy to elicit? What if we have a restricted class of valuations and we only need to elicit enough to allocate (or compute VCG payments)?

Thank you for your attention!

Combinatorial auctions There is a set of items I for sale Each bidder j has valuation function v j : 2 I   Goal is to allocate nonoverlapping subsets B j  I to the bidders to maximize  j v j (B j ) v 1 ( ) = 1000 v 1 (, ) = 900v 1 (,, ) = 1000 v 2 ( ) = 900 v 2 (, ) = 700v 2 (,, ) = 1000 Optimal allocation: bidder 1 gets and, bidder 2 gets Three items for sale:

Challenges for combinatorial auctions Various challenges for combinatorial auctions: –Computational complexity of allocating –Giving bidders incentives to reveal their valuations truthfully –Communication complexity (preference elicitation)

Preference elicitation Communicating entire valuation function of bidder to auctioneer involves transmitting exponential number of bits (value of each possible bundle) Idea: Only need to elicit enough information from bidders to determine optimal solution [Conen & Sandholm 01] In worst case, computing optimal solution requires exchanging exponential amount of information [Nisan & Segal 03] In practice, only vanishing fraction of preferences needs to be elicited to provably optimally allocate [Hudson & Sandholm]