Presentation is loading. Please wait.

Presentation is loading. Please wait.

Elicitation in combinatorial auctions with restricted preferences and bounded interdependency between items Vincent Conitzer, Tuomas Sandholm, Carnegie.

Similar presentations


Presentation on theme: "Elicitation in combinatorial auctions with restricted preferences and bounded interdependency between items Vincent Conitzer, Tuomas Sandholm, Carnegie."— Presentation transcript:

1 Elicitation in combinatorial auctions with restricted preferences and bounded interdependency between items Vincent Conitzer, Tuomas Sandholm, Carnegie Mellon University Paolo Santi, Pisa University Corresponding to papers: Santi, Conitzer, Sandholm, “Towards a Characterization of Polynomial Preference Elicitation in CAs” (COLT-04) Conitzer, Sandholm, Santi, “Combinatorial Auctions with k-wise Dependent Valuations” (Draft)

2 Introduction

3 Combinatorial auction Can bid on combinations of items –Bidder’s perspective: Allows bidder to express what she really wants –Avoids exposure problems –No need for lookahead / counterspeculation –Auctioneer’s perspective: Automated optimal bundling Winner determination problem: –Label bids as winning or losing so as to maximize sum of bid prices »Each item can be allocated to at most one bid –If approximating, watch incentives –=> Better allocations of items than in noncombinatorial auctions

4 Another complex problem in combinatorial auctions: In direct-revelation mechanisms (e.g. VCG), bidders bid on all 2 m combinations –Need to compute the valuation for exponentially many combinations Each valuation computation can be NP-complete local planning problem E.g. carrier company bidding on trucking tasks: TRACONET [Sandholm AAAI-93] –Need to communicate the bids –Need to reveal the bids => Loss of privacy & strategic info Bidding languages [Sandholm 98, 99; Nisan 00; Hoos & Boutilier 01] do not solve the problem

5 Clearing algorithm What info is needed from an agent depends on what others have revealed Elicitor Conen & Sandholm IJCAI-01 workshop on Econ. Agents, Models & Mechanisms, ACMEC-01 Elicitor decides what to ask next based on answers it has received so far $ 1,000 for $ 1,500 for ? for

6 Related research Nondeterministic (i.e., oracle) models –Bikhchandani & Ostroy JET-02 –Gul & Stacchetti JET-00 –Conitzer & Sandholm AAAI-02 –Parkes AMEC-02 –Nisan & Segal 03 –Segal 04 Deterministic models –Ascending CAs, e.g. Parkes 99; Wurman & Wellman 00; Ausubel & Milgrom 02; Kwasnicka, Ledyard, Porter, DeMartini 04 –General elicitation framework General preferences (no externalities, free disposal) –Conen & Sandholm IJCAI-01 workshop, ACMEC-01, AAAI-02, AMEC-02 –Hudson & Sandholm AMEC-02, AAMAS-03, AAMAS-04 Restricted valuation classes [Techniques from computational learning theory] –Zinkevich, Blum, Sandholm ACMEC-03 –Blum, Jackson, Sandholm, Zinkevich COLT-03, JMLR-04 –Lahaie & Parkes ACMEC-04

7 Partial vs. full elicitation In general, can achieve savings in elicitation by basing queries to one agent on answers from others Here, will assume that auctioneer will want to know each agent’s entire preference function –So can focus on eliciting one agent’s function Will assume that agent’s valuation function is drawn from a restricted class of functions

8 Model Set of items I for sale Bidder has true valuation function v: 2 I   Elicitor knows class of functions C with v  C Elicitor’s goal is to identify v Elicitor can ask bidder for v(B) for any bundle B –Counts as one (value) query Distinguish between eliciting using –polynomial #queries –polynomial time May take significant time to compute which query to ask

9 Some examples of polynomial- query elicitable classes

10 Read-once valuations [Zinkevich, Blum, Sandholm 03] Valuations are represented by a tree Leaf nodes correspond to items and their values Nonleaf nodes (gates) perform operations including: SUM: computes the sum of its children MAX c : computes sum of the c highest inputs ATLEAST c : returns sum of inputs if at least c nonzero PLUS ALL MAX ALL 500400 200 100 1000 150 RO +M : only MAX and SUM allowed

11 Tool t (=ToolboxDNF) [Zinkevich, Blum, Sandholm 03] Valuation represented by polynomial with items as variables Using only t monomials ABCD 3 2 + = 5 3A + 5AB + 2AC + 4D All coefficients must be nonnegative Can be elicited in O(mt) queries

12 Tool -t (slight variation) Here, weights on monomials with  2 items must be negative ABCD 3 = 4 3A + 6B + 2C + D - 2AB - AC - 1 2 + Thrm. Can be elicited in O(mt) queries Proof: First ask all singletons. Then, discover monomials one by one. Only need to find minimal subset of items that has value less than sum of contained monomials discovered so far. So, start by querying grand bundle and remove items one by one.

13 Interval bids Items are ordered on a line Value of bundle = sum of values of disjoint components ABC v({A}) = 1 v({B}) = 2 v({C}) = 2 v({A, B}) = 4 v({B, C}) = 3 v({A, B, C}) = 5 IMPLIED: v({A, C}) = v({A})+v({C}) = 3 Thrm. Can be elicited using m(m+1)/2 queries if ordering is known Thrm. Can be elicited using m 2 – m + 1 queries if ordering is not known, but v({x, y}) > v({x}) + v({y}) iff x and y are adjacent Proof: Ask all singletons and pairs to find adjacencies (m(m+1)/2), then ask remaining components (m(m-1)/2 – (m-1)), for total of m 2 – m + 1 queries

14 Tree bids require exponential queries Natural generalization: tree such that value of bundle = sum of values of disjoint components Requires exponentially many queries: … … There are 2 m/2 such connected bids

15 Bounded interdependency

16 0+1+2 = 3 G 2 = 2-wise dependent valuations 1 3 3 -2 0 2 1 Node = item Value of bundle = sum of values of nodes/edges in bundle

17 G k = k-wise dependent valuations Value of bundle = sum of values of nodes/edges/multiedges in bundle For example, k=3: 1 3 3 -2 0 2 1 Node = item 1 3-edge

18 G k basic elicitation results Thrm. Every valuation function has a unique G m representation –Proof: Suppose we have found the unique weights for multiedges up to size j. Then weight of multiedge over S (with |S| = j+1) must be v(S) –  S’  S w(S’) Thrm. A function in G k can be elicited in O(m k ) queries –Proof: Query all bundles of size k or less. Again, weight of multiedge over S (with |S| = j+1  k) must be v(S) –  S’  S w(S’), so can use dynamic programming

19 Optimal clearing is still hard in G 2 Pf: reduces from EXACT-COVER-BY-3-SETS 1 1 1 1 1 1 Can get total value of 2m/3 if and only if an exact 3-cover exists

20 Special case: union of graphs is forest Thrm. Can solve clearing problem to optimality by dynamic programming in time O(mn) 3 6 7 1 1 9 2

21 Approximating with G 2 or G k Thrm. Suppose there exists some v’ in G k such that for any bundle S, |v(S) – v’(S)| ≤ δ. Then, using O(m k ) queries, we can construct a function g in G k such that for any bundle S, |v(S) – g(S)| ≤ δ(1+(|S| choose k)). –Bound is tight for G 2 Thrm. Suppose that all the weights in v’s G m graph are positive. Then, using m(m+1)/2 queries, we can construct a function g in G 2 such that for any S, |v(S)-g(S)| ≤ (M(v)/2) ((|S|(|S|+1)/2) (1+ |(|S|-1)/2) –here M(v) is a measure of the function’s disagreement with the same function without any multiedges

22 Unions of classes

23 Let C 1, C 2 be valuation classes that can be elicited with polynomial #queries –Using algorithms A 1, A 2 with query bounds p 1 (n), p 2 (n) Consider the following simple algorithm for C 1  C 2 1.f 1  A 1, f 2  A 2 2.If f 1 = f 2, return it 3.Otherwise, find bundle S such that f 1 (S)  f 2 (S) 4.Query v(S) 5.If f 1 (S) = v(S), return f 1, otherwise f 2 At most p 1 (n) + p 2 (n) + 1 queries Gives no bound on computation: checking identity of functions in steps 2, 3 may take lot of computation Polynomial-query elicitable valuation classes closed under pairwise union

24 Consider the following classes: C 1 = {f s } where –f s (B) = 0 if B is empty or B = {s} –f s (B) = 2 if B = I –f s (B) = 1 otherwise p 1 (n) + p 2 (n) + 1 bound is tight To elicit C 1, simply ask v({s}) for every s –Need at most m-1 queries C 2 = {f -s } where –f -s (B) = 0 if B is empty –f -s (B) = 2 if B = I or B = I – {s} –f -s (B) = 1 otherwise To elicit C 2, simply ask v(I-{s}) for every s –Need at most m-1 queries To elicit C 1  C 2, need to find {s} or I-{s} with value different from 1 –Need 2m-1 = 2(m-1) + 1 queries {} {a} {b} {c} 0 101 I I-{a} I-{b} I-{c} 121 2

25 Does taking the union ever make computation harder? Answer: yes. Consider following class: G 2 U : valuation is given by graph from G 2 (with positive edge weights) + upper bound u on value 1 3 3 2 2 A B C u = 6 v({A, C}) = 6 Easy to elicit: –ask all singletons, all pairs to get graph –ask grand bundle to get u

26 Taking the union may make computation harder… Now consider the following class: G 2 UH : same as G 2 U except no more than half of bundle’s value can come from edges –require: no edge worth more than sum of endpoints 1 3 3 2 2 A B C u = 20 v({A, B, C}) = 10 Again, easy to elicit: –ask all singletons, all pairs to get graph –ask grand bundle to get u

27 How computationally hard is it to elicit G 2 U  G 2 UH ? Thrm. It is coNP-complete to determine whether a function from G 2 U and another from G 2 UH (represented by their graphs and u) are identical –That is, it is NP-complete to find a bundle whose query would distinguish them

28 Proof of hardness Reduction from CLIQUE problem every vertex: weight 1 Required clique size: k (say, 3) every edge: weight (k+  ) / (k choose 2) u = 2k +  Clique of size k would have k vertex weight and k+  edge weight –So, G 2 UH at-most-half-from-edges constraint would be binding Cannot happen when there are fewer edges For larger sets, the u-constraint is binding

29 Optimized polynomial-time elicitation algorithm for RO +M  Tool -t  Tool t  G 2  INT Thrm. Runs in polynomial time and uses at most O(m(m+t)) queries

30 Towards characterizing easily elicitable valuation functions

31 Polynomial inferability Inferring a bundle = ascertaining its value from queries on other bundles Bundle is polynomially noninferable (strongly polynomially noninferable) wrt C if for some (any) function in C, the bundle’s valuation cannot be inferred using polynomially many queries Thrm. There exists a class of functions where –exponentially many bundles are polynomially noninferable –no bundles are strongly polynomially noninferable –the class cannot be elicited using polynomially many queries. Proof uses [Angluin 88] idea, functions of the form: … v(B) = 1 iff B contains all items corresponding to a color

32 Conclusions Focused on learning full valuation function in restricted classes New easy-to-elicit classes of valuations –Tool -t, Interval, G k Clearing for G 2 is NP-complete –But easy if union of graphs is forest Approximation with functions from G 2 or G k Polyquery elicitable classes closed under pairwise union –But computation required may go from polynomial to NP-hard –Efficient algorithm for union of most of the classes studied Even classes without strongly polynomially noninferable bundles may require exponentially many queries for elicitation

33 Future research Can Interval class be elicited with polynomially many queries without knowing the order? Can we come up with a more general characterization of what makes valuation functions easy to elicit? What if we have a restricted class of valuations and we only need to elicit enough to allocate (or compute VCG payments)?

34 Thank you for your attention!

35 Combinatorial auctions There is a set of items I for sale Each bidder j has valuation function v j : 2 I   Goal is to allocate nonoverlapping subsets B j  I to the bidders to maximize  j v j (B j ) v 1 ( ) = 1000 v 1 (, ) = 900v 1 (,, ) = 1000 v 2 ( ) = 900 v 2 (, ) = 700v 2 (,, ) = 1000 Optimal allocation: bidder 1 gets and, bidder 2 gets Three items for sale:

36 Challenges for combinatorial auctions Various challenges for combinatorial auctions: –Computational complexity of allocating –Giving bidders incentives to reveal their valuations truthfully –Communication complexity (preference elicitation)

37 Preference elicitation Communicating entire valuation function of bidder to auctioneer involves transmitting exponential number of bits (value of each possible bundle) Idea: Only need to elicit enough information from bidders to determine optimal solution [Conen & Sandholm 01] In worst case, computing optimal solution requires exchanging exponential amount of information [Nisan & Segal 03] In practice, only vanishing fraction of preferences needs to be elicited to provably optimally allocate [Hudson & Sandholm]


Download ppt "Elicitation in combinatorial auctions with restricted preferences and bounded interdependency between items Vincent Conitzer, Tuomas Sandholm, Carnegie."

Similar presentations


Ads by Google