Download presentation

Presentation is loading. Please wait.

Published byWill Scroggins Modified over 3 years ago

1
Optimal Collusion-Resistant Mechanisms with Verification Carmine Ventre Joint work with Paolo Penna

2
Routing in Networks s 1 2 3 10 2 1 1 4 3 7 7 1 Internet Change over time (link load) Private Cost No Input Knowledge Selfishness d

3
Mechanisms: Dealing w/ Selfishness Augment an algorithm with a payment function The payment function should provide incentives for telling the truth Design a truthful mechanism s 1 2 3 10 2 1 1 4 3 7 7 1 d

4
d Truthful Mechanisms M = (A, P) s Utility (true,,...., ) ≥ Utility (false,,...., ) for all true, false, and,..., M truthful if: Utility = Payment – cost = – true

5
VCG Mechanisms M = (A, P) 1 2 3 10 2 1 1 4 3 7 7 1 P e = A e=∞ – A e=0 if e is selected (0 otherwise) M is truthful iff A is optimal P e’ = A e’=∞ – A e’=0 = 7 e’ A e’=∞ = 14 A e’=0 = 10 – 3 = 7 s Utility e’ = P e’ – cost e’ = 7 – 3 d

6
Inside VCG Payments P e = A e=∞ – A e=0 Cost of best solution w/o e Independent from e h(b –e ) Cost of computed solution w/ e = 0 Mimimum (A is OPT) A(true) A(false) b –e all but e Cost nondecreasing in the agents’ bids

7
Describing Real World: Collusions Accused of bribery ~900,000 results on Google 6,463 results on Google news Are VCGs collusion-resistant mechanisms?

8
Collusion-Resistant Mechanisms Coalition C + – ∑ Utility (true, true,,...., ) ≥ ∑ Utility (false,false,,...., ) for all true, false, C and,..., in C

9
VCGs and Collusions s 3 1 6e1e1 e2e2 e3e3 P e 1 (true) = 6 – 1 = 5 e 3 reported value “Promise 10% of my new payment” (briber) 11 P e 1 (false) = 11 – 1 – 1 = 9 “P e3 (false)” = 1 bribe h( ) must be a constantb –e d

10
Preventing Collusions is expensive Pay all the agents(!!!) 2 10 e e’ Truthfulness e’ to enter the solution by unilaterally lying must underbid (competition, i.e., non-cooperative behaviour) In coalition they can make the cut really expensive (cooperative behaviour) Utility C (true)= P e – 2 true 10+P e true 11+P e true P e’ = 0 Utility C (false)=P e’ – 10 false ≥ 10 + P e – 10 > Utility C (true) true s 1 2 3 10 2 1 1 4 3 7 7 1 d

11
Constructing Collusion-Resistant Mechanisms (CRMs) h is a constant function Pay all the agents A(true) A(false) Coalition C (A, VCG payments) is a CRM How to ensure it?“Impossible” for classical mechanisms ([GH05]&[S00])

12
Describing Real World: Verification TCP datagram starts at time t Expected delivery is time t + 1… … but true delivery time is t + 3 It is possible to partially verify declarations by observing delivery time Other examples: Distance Amount of traffic Routes availability 31 TCP IDEA ([Nisan & Ronen, 99]): No payment for agents caught by verification

13
The Verification Setting Give the payment if the results are given “in time” Agent is selected when reporting false 1. true false just wait and get the payment 2. true > false no payment (punish agent )

14
Exploiting Verification: Optimal CRMs No agent is caught by verification At least one agent is caught by verification A(true) = A(true, (t 1, …, t n )) A(false, (t 1, …, t n )) A(false, (b 1, …, b n )) = A(false) A is OPT For any i t i b i Cost is monotone VCG hypotheses Usage of the constant h for bounded domains VCGs with verification are collusion-resistant Any value between b min e b max

15
Approximate CRMs Extending technique above: Optimize MinMax + A VCG MinMax extensively studied in AMD E.g., Interdomain routing and Scheduling Unrelated Machines Many lower bounds even for two players and exponential running time mechanisms E.g., [NR99], [AT01], [GP06], [CKV07], [MS07], [G07], [PSS08], [MPSS09] MinMax objective functions admit a (1+ε)-apx CRM

16
Applications * = FPTAS for a constant number of machines # = PTAS for a constant number of machines

17
Conclusions Collusion-Resistant mechanisms with verification for arbitrary bounded domains optimizing generalization of utilitarian (VCG) cost functions Overcome many impossibility results by using a real-world hypothesis (verification) Efficient Mechanisms Mechanism is polytime if algorithm is

18
Further Research Frugality of payment scheme? Can we deal with unbounded domains? What is the real power of verification? Explore different definitions for the verification paradigm [Nisan&Ronen, 1999] [Green & Laffont, 1986]...... for which we can also look for untruthful mechanisms Apply verification to CAs

Similar presentations

OK

Bayesian Algorithmic Mechanism Design Jason Hartline Northwestern University Brendan Lucier University of Toronto.

Bayesian Algorithmic Mechanism Design Jason Hartline Northwestern University Brendan Lucier University of Toronto.

© 2018 SlidePlayer.com Inc.

All rights reserved.

To make this website work, we log user data and share it with processors. To use this website, you must agree to our Privacy Policy, including cookie policy.

Ads by Google

Ppt on area related to circles Open ppt on ipad free Ppt on reduced instruction set computer Ppt on introduction to object-oriented programming pdf Presentation ppt on motivation and emotion Free ppt on smart note taker documentation Maths addition ppt on blocks Ppt on cisco packet tracer Ppt on preservation of public property auction Ppt on asymptotic notation of algorithms pdf