1 / 38

Single Value Combinatorial Auctions and Implementation in Undominated Strategies

This research delves into Single-Value Combinatorial Auctions, proposing a strategic mechanism design to maximize social welfare while considering computational feasibility and strategic behavior. It discusses special cases and challenges in implementing such auctions, emphasizing the significance of approximations in reaching optimal outcomes. Additionally, it explores the concept of Single-Minded Bidders and presents a novel Japanese Wrapper mechanism to enhance efficiency and encourage truthful bidding strategies.

pamv
Download Presentation

Single Value Combinatorial Auctions and Implementation in Undominated Strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Single Value Combinatorial Auctions and Implementation in Undominated Strategies Moshe Babaioff*, Ron Lavi+ and Elan Pavlov* + Social and Information Sciences Laboratory, California Institute of Technology * School of Computer Science and Engineering , Hebrew University

  2. Outline • Basic definitions, motivation. • Describe the first main result, on a simplified model. • Define Single-Value combinatorial auctions • Examples, discussion • Describe the second main result.

  3. Combinatorial Auctions • m indivisible non-identical items for sale. • n bidders compete for subsets of these items. • Each bidder i has a valuation for each set of items:vi(S) = value that i assigns to acquiring the set S • viis non-decreasing (“free disposal”). • vi () = 0. • Each bidder is strategic, aims to maximize his own utility:the value of the subset received minus the price. • Objective: Find a partition (S1…Sn) of {1..m} that maximizes the social welfare: ivi (Si)

  4. Design goals • Requirement 1: Computational feasibility. Design mechanisms that can be computed in reasonable time. • Going over all possible allocations of items to players can take more than a life time (!), even for medium-sized instances. • Requirement 2: Design mechanisms that lead to “good” outcomes in the presence of strategic behavior. • Direct revelation mechanisms: The VCG mechanism always has dominant strategies, but sometimes violates requirement 1. Also has other disadvantages, described e.g. by[Ausubel-Milgron]. • Indirect mechanisms, mainly ascending auctions: players compete by raising prices; winners pay their “last offer”. • Wish to satisfy 1+2 simultaneously.

  5. Some Special Cases • One item: • Vickrey’s 2nd price auction leads to optimal welfare (in dominant strategies). • This has an equivalent ascending (English) auction. • Multiple items: • Complementarities: v(SÈT) > v(S) + v(T). • Substitutability: slightly more subtle than “no complementarities”. • For substitutability, VCG is tractable, and there exist ascending auctions that are equivalent to VCG: • [Ausubel] Identical items; downward-sloping valuations. • [Demange-Gale-Sotomayor] Unit-demand bidders. • [Gul-Stacchetti] Gross-substitute bidders (leading to Walrasian prices).

  6. The Case of Complementarities (I) • In general, no mechanism can reach the optimal outcome with polynomial communication [Nisan-Segal]. • The computational problem is hard: • For special cases that enable short communication, the computational problem is NP-hard [Lehmann-O’Callaghan-Shoham]. • Hence we allow approximations: (always) reaching an outcome with welfare at least (1/c)·(“optimal welfare”) (c is a parameter). • VCG is not truthful with approximations [Nisan-Ronen].

  7. The Case of Complementarities (II) • No “fast” ascending auction with strategic properties: • The proxy auction [Ausubel-Milgrom] and the i-bundle auction [Parkes] maintain exponential number of prices, and continues for exponential number of rounds. • No ascending auction with strategic properties that reaches an approximately optimal outcome.

  8. Outline • Basic definitions, motivation. • Describe the first main result, on a simplified model. • Define Single-Value combinatorial auctions • Examples, discussion • Describe the second main result.

  9. Single Minded Bidders • Single-Minded Bidders [Lehmann-O’Callaghan-Shoham]:Player i desires one subset of items, Si, for a value vi • No algorithm can obtain better than √m approximation in polynomial time. • There exists a truthful mechanism that obtains a √m approximation in polynomial time. • “Known” Single Minded Bidders [Mu’alem-Nisan]: The desired subset is public information; the value is private information. • They give variety of truthful mechanisms, under the “known” assumption.

  10. Algorithm to Mechanism

  11. Same value 1 v1 1 v2 W W v1T v2T L 1 vn vnT Double value or retire The Japanese Wrapper (JW) Assumption: vi(T)=0 or vi(T)≥1 T is the number of rounds The dominant strategy of i is to increase her value when losing, as long as the increased value ≤vi C-approx ALG A winner pays her last value viT The output at each iteration is improving and Pareto efficient

  12. si sk Analysis – First Step Lemma 1:T ≤ 2log(vmax)+1 Proof: • Look at i, the last agent to retire. • Since ALG is Pareto efficient, i intersects some winner k. • Therefore at each iteration either i or k lose. • Each agent can lose at most log(vmax) times.

  13. R1 R2 RT Analysis – Second Step Lemma 2: The JW is a (2 c T+1)-approximation. Proof: • W=winners. L=losers. OPT(WÈL)≤OPT(W)+OPT(L) • Rt= agents that retired at iteration tvt= the vector of values at time t. • OPT(Rt) < 2 OPT(Rt | vt) < 2 c ·V(W) L W

  14. Summary of the Analysis Theorem: The JW mechanism obtains an O(c log(vmax))-approximation in dominant strategies for known single minded players. Remarks: • The first ascending auction for this case, and the first general method to convert any given algorithm to an ascending auction. • This is useful e.g. for: • Special cases that allow the √m barrier to be broken. • Converting heuristics that work well in practice to truthful mechanisms.

  15. Outline • Basic definitions, motivation. • Describe the first main result, on a simplified model. • Define Single-Value combinatorial auctions • Examples, discussion • Describe the second main result.

  16. What about Multi-Minded Players? The picture for multi-minded players is very partial: • If we have B > 3 copies of each item, [Bartal-Gonen-Nisan] give a truthful -approximation mechanism. • Very recently [Lavi-Swamy] give a randomized -approx. (for any B>1) which is truthful-in-expectation (in particular it assumes that players are risk-neutral). • No tractable deterministic mechanism is known, and no tractable ascending auction is known.

  17. Single-Value Players • A Single-Value player has: • a collection Si of several desiredsubsets of items, and, • a value vi>0 for any s Si. • Two information models: • “Known” domain: Siis publicly known. viis private information. • “Unknown” domain – Both vi,Si are private information.

  18. Example: Edge-Disjoint Paths Given a graph G=(V,E): • Each agent i desires path from his source node si to his target node ti for value vi . • Edges (=goods) should be allocated to agents in order to maximize welfare. • A natural Single Value multi minded CA. t2 s1 s2 t1 V1=10 V2=4

  19. Single-Value Players • A Single-Value player has: • a collection Si of several desiredsubsets of items, and, • a value vi>0 for any s Si. • Two information models: • “Known” domain: Siis publicly known. viis private information. • “Unknown” domain – Both vi,Si are private information. • Type may have exponential size -- direct revelation is intractable. • [Nisan] shows that no algorithm can obtain better than Ω(√m) approximation with polynomial communication.

  20. Our Results • Known domains: decoupling of algorithms and incentives. THM 1: There exists a methodto convert any c-approx algorithm to an ascending auction that obtains O(log2(vmax) c)-approxin dominant strategies (assuming “appropriate oracle access”). • Unknown domains: THM 2: There exists an ascending auction that obtains an O(log2(vmax) √m)-approximation in “undominated strategies”. • We actually use “Computationally Feasible Undominated Strategies”, a slightly stronger notion that we define.

  21. Outline • Basic definitions, motivation. • Describe the first main result, on a simplified model. • Define Single-Value combinatorial auctions • Examples, discussion • Describe the second main result: • A mechanism for unknown multi-minded players. • The switch to undominated strategies

  22. Modifying the JW • An iterative procedure, similar to before. • Agents bid for a value and a bundle: • Start from value=1, bundle=G (all the items). • Value increases over time. • Bundle shrinks over time. • Winner gets his final bundle, pays his final value. • An agent focuses on one of his bundles.

  23. 1,G v1,s1 v2,s2 W 1,G W,s’ v1T,s1T v2T,s2T L,s’ vn,sn 1,G vnT,snT The General JW Same value vi and set bundle=s’i A winner gets siTand pays her last value viT ALG Multiply value and set bundle=s’i , or retire

  24. 1,G v1,s1 v2,s2 W 1,G W,s’ v1T,s1T v2T,s2T L,s’ vn,sn 1,G vnT,snT The General JW s’iis a subset ofsi Same value vi and set bundle=s’i A winner gets siTand pays her last value viT ALG Multiply value and set bundle=s’i , or retire

  25. 1,G v1,s1 v2,s2 W 1,G W,s’ v1T,s1T v2T,s2T L,s’ vn,sn 1,G vnT,snT The General JW s’iis a subset ofsi Same value vi and set bundle=s’i A winner gets siTand pays her last value viT ALG Multiply value and set bundle=s’i , or retire

  26. The 1-CA algorithm for Single Minded Players[Halldorsson, Mu’alem-Nisan] Input: v,s Procedure • Go over the agents in descending order of values.Let player i be the current agent. • If and |si|≤√m addi to Greedy. Output: value-maximal THM[Halldorsson] : This is a 2√m-approx.

  27. Example 3 3 4 10 5 Result: Black wins.

  28. 3 3 4 10 5 Example Green lies about bundle: THM[Mu’alem-Nisan]: 1-CA can be implemented truthfully for “known” single minded players, but not for “unknown” minded players. 3 3 4 10 5 Result: Green+Red+Purple win. Result: Black wins.

  29. Plugging the 1-CA in our Wrapper Input: vt,st, Wt-1 Procedure • Go over the agents in descending order of values.Let player i be the current agent. • If iWt-1 allow i to pick a bundle such that |sit+1|≤√m, in any other case sit+1= sit. • If |sit+1|≤√m, add i to any of the allocations for which he can be added. Output st+1and with maximal value. Shrinking • Allocation is also: • Pareto efficient • Improving over time

  30. “loser-if-silent” Green thinks the scenario is… But the actual scenario is… 3 3 4 10 10 5 5 • DFN: Player i is a “loser-if-silent” if she will surely retire if she does not shrink her active set. • If player i is a “loser-if-silent”, and her active set strictly contains a desired bundle, then she will shrink her active set.

  31. What are the “reasonable” strategies here? On which bundle to bid? No dominant strategy! DFN: A strategy is “reasonable” if, • Never bids over her value. • Never retires before getting to vi/2. • Never bids on an undesired bundle. • If player i is a “loser-if-silent”, and her active set strictly contains a desired bundle, then she will shrink her active set. Theorem: For any combination of “reasonable” strategies, the mechanism achieves O(log2(vmax)√m)-approximation.

  32. Feasible implementation in undominated strategies

  33. Dominant Strategies Implementation • Definition: • A strategy sidominates the strategy s’i, if for anys-i, ui(si ,s-i) ≥ ui(s’i,s-i), and this inequality is strict for at least one instance of s-i. • A strategy si is dominantfor agent i if it dominates any other strategy of agent i. • Definition: A mechanism implements a c-approximation in dominant strategiesif for the vector of dominant strategies s, it outputs a c-approximationoutcome.

  34. Undominated Strategies Implementation • Definition: A mechanism implements a c-approximation in undominated strategies if for any combination of undominated strategies, it outputs a c-approximation outcome. Dominated strategies Undominated strategies

  35. Feasible implementation in undominated strategies • DFN: A mechanism has the “fast undominance recognition property”if there exists a polynomial-time procedure that, given any strategy s’i , determines if s’iis dominated, and, if so, finds an undominated strategy si that dominates s’i. • Main Definition: A mechanism feasibly implements a c-approximation in undominated strategies if • For any undominated strategies vector s, it outputs a c-approximation outcome in polynomial time. • The mechanism has the fast undominance recognition property. The agent is never harmed by this transformation

  36. Dominant Strategies Mechanism Rational agents do not play dominated strategies: truthful. Straightforward to choose a strategy (bid truthfully). An agent does not assume rationality of others. No coordination between agents needed. Approximation achieved for truthful agents. An agent never regrets her action. Feasible US Implementation Rational agents do not play dominated strategies. Easy (polynomial) for an agent to choose a strategy. An agent does not assume rationality of others. No coordination between agents needed. Approximation achieved for any vector of undominated strategies. An agent might regret her action. Dominant vs. Undominated

  37. Unknown Multi Minded CA Results Main Theorem: The “1-CA Japanese Mechanism” feasibly implements an O(log2(vmax)√m)-approximation in undominated strategies for unknown multi-minded CAs with single-value players. • This also holds for players who are only “δ-close” to single value, with an additional approximation loss of δ.

  38. Summary • We define and study single valueCombinatorial Auctions in two information models (Known-Unknown). • We present a general way to create truthful mechanism from any algorithm forKnown Single Value players. • We define the notion of a “feasible implementation in undominated strategies”. • We present such mechanisms for Unknown Single Value players. • The first strategic mechanisms with non trivial approximation for this case.

More Related