Truthful Randomized Mechanisms for Combinatorial Auctions∗ Shahar Dobzinski



Noam Nisan‡

Michael Schapira§

March 8, 2010

Abstract We present a new framework for the design of computationally-efficient and incentive-compatible mechanisms for combinatorial auctions. The mechanisms obtained via this framework are randomized, and obtain incentive-compatibility in the universal sense (in contrast to the substantially weaker notion of incentive-compatibility in expectation). We demonstrate the usefulness of our techniques by exhibiting two mechanisms for combinatorial auctions with general bid√ der preferences. The first mechanism obtains an optimal O( m)-approximation to the optimal social welfare for arbitrary bidder valuations. The second mechanism obtains an O(log2 m)approximation for a class of bidder valuations that contains the important class of submodular bidders. These approximation ratios greatly improve over the best (known) deterministic incentive-compatible mechanisms for these classes.

1

Introduction

1.1

Background

The central problem in the field of Algorithmic Mechanism Design [24] is reconciling the tension between the computational efficiency requirement and the economic requirement that algorithms take into account the strategic behaviour of the different participants. The need for algorithms and computational protocols that are both computationally-efficient and incentive-compatible naturally arises in Internet environments, where, alongside the standard computational considerations, one must also address the fact that the “input” to the protocols is often provided by self-interested, often competing, economic agents. Algorithmic Mechanism Design is rooted in two distinct areas of research: theory of computation and mechanism design (a subfield of microeconomic theory, see [21, 27]). The vast majority of works in Algorithmic Mechanism Design aim for the the very robust notion of truthful mechanisms. Informally, this game-theoretic solution concept provides the very strong guarantee that an agents is better off adhering to the behaviour prescribed by the mechanism designer regardless of what the other agents do. As an example, consider the following scenario: n bidders are competing on a single item. Each bidder i gains a value of vi for winning the item, and a value of 0 otherwise. Vickrey [29] proposed the following auction: each bidder i bids bi , the bidder with the highest bid wins and pays the price of the second-highest bid. Define the profit of a bidder to be his value (vi if he wins the item, 0 otherwise) minus his payment (the bid of the other bidder if he wins the item, 0 otherwise). We leave it as an easy exercise to the reader to prove that this ∗

A preliminary version of this paper appeared in STOC’06 Department of Computer Science, Cornell University, [email protected]. ‡ The School of Computer Science and Engineering, The Hebrew University of Jerusalem, [email protected]. § Department of Computer Science, Yale University, New Haven, CT 06520, USA, and Computer Science Division, University of California at Berkeley, CA, USA. [email protected]

1

simple auction is truthful 1 : a bidder always maximizes his profit by setting bi = vi , regardless of the other bids. The goal of this paper is to design truthful mechanisms for more complicated settings, while requiring that the mechanisms we design are also efficient from a computational point of view. Unfortunately, the design of truthful mechanisms is often a hard task. This stems from the fact that the the basic technique of traditional mechanism design – namely VCG mechanisms [29, 5, 14] – is applicable only in cases where the exact optimal outcome can be computed and the goal is to maximize the social welfare (see later for a definition). While our goal in this paper is indeed to maximize the social welfare, VCG is not applicable in our case since computing the exact optimal outcome is computationally infeasible task in the settings that we are interested in. This immediately implies a clash between traditional mechanism design and the theory of computation. The clash is inherent: normally, when faced with computational intractability, computer scientists turn to approximations or heuristics. Sadly, the VCG technique cannot be applied to approximate solutions [25]. Hence, it is necessary to devise new techniques. In this paper, we tackle this important problem in the context of the paradigmatic problem of Algorithmic Mechanism Design – combinatorial auctions. In a combinatorial auction, m items are auctioned to n players. Each player i has a valuation function vi that specifies his value vi (S) for each subset S of items. The objective is to find a partition of the m items between the n bidders that maximizes the social welfare Σi vi (Si ), where Si is the set of items allocated to bidder i. For a thorough overview of combinatorial auctions we refer the reader to [6]. Combinatorial auctions capture the fundamental issues of Algorithmic Mechanism Design: Finding the exact optimum is computationally hard, even for very restricted cases. While several approximation algorithms, with varying approximation ratios, are known for the general case, and for various interesting special cases [8, 9, 10, 11, 19, 30], these algorithms fail to provide incentive-compatibility.

1.2

A New Framework

We present a new framework for designing incentive-compatible mechanisms for combinatorial auctions. Our techniques greatly differ from the methods of [18, 10], and are inspired by the random sampling methods that were used for auctioning “digital goods” in [12]. The results obtained via our techniques illustrate the usefulness of randomness (and, in particular, random sampling) in complex multi-dimensional environments (in contrast to the “single-parameter” digital goods setting). The framework is used to obtain (in this paper, and, in subsequent work [2, 7]) the state of the art truthful approximation algorithms for both social-welfare maximization and revenue maximization in the combinatorial auctions environment. We note that, in the context of a different mechanism design problem, it was observed in [24] that randomized mechanisms can sometimes provide better approximation ratios than deterministic ones. We do not know whether it is possible to match the approximation ratios obtained using our techniques in a deterministic manner. There are two possible definitions for incentive compatibility of a randomized mechanism. The first and stronger one, defines an incentive-compatible randomized mechanism as a probability distribution over incentive compatible deterministic mechanisms. Thus, this definition requires that for any fixed outcome of the random choices made by the mechanism, players still maximize their utility by reporting their true valuations. This definition was used in [24, 12, 13], and will be called incentive compatibility in the universal sense. The weaker definition only requires that players maximize their expected utility, where the expectation is over the random choices of the mechanism (but still for every behaviour of the other players). This definition was used in [18, 10] (see below), and will be called incentive compatibility in expectation. There are two major implications of the difference between these two notions: 1

In this paper we use the terms truthful and incentive compatible interchangeably.

2

1. Attitude towards risk: randomized mechanisms that are incentive compatible in expectation only motivate risk-neutral bidders to act truthfully. Risk-averse bidders may benefit from strategic behavior. In contrast, the universal sense of incentive compatibility applies to any attitude towards risk, as it applies to every possible realization of the random coins. 2. Knowledge of the random coin flips: randomized mechanisms that are incentive compatible in expectation induce truthful behavior only as long as players have no information about the outcomes of the random coin flips before they need to act. Thus, in order to ensure truthful behavior the mechanism must utilize cryptography-grade randomness, and keep it secret from the players. In contrast, any randomization that is effective algorithmically suffices to ensure truthful behavior in the universal case. (In a similar vein, technically speaking, using a pseudorandom generator will destroy the formal incentive compatibility properties of randomized mechanisms that are incentive compatible in expectation, due to the slight – sub-polynomial – change in probabilities of outcomes.) The randomized mechanisms obtained using our techniques achieve incentive-compatibility in the strong, universal, sense. When designing randomized approximation algorithms one wishes to obtain a solution that is “not far” from the optimum with high probability. This is often achieved by showing that the expected value of the solution of the algorithm is high, and then amplifying the probability of success by running the algorithm many times and choosing the best solution. We stress that when designing incentive-compatible approximation mechanisms this technique is no longer applicable. This is due to the fact that, in general, running a mechanism multiple times and choosing the best output does not preserve the truthfulness of the mechanism. Hence, we must guarantee that the mechanism will output a “good” solution with “high” probability without amplification. Our framework provides a solution to this problem.

1.3

Two Truthful Randomized Mechanisms

We use our techniques to design two truthful randomized mechanisms for combinatorial auctions: First, we present an optimal randomized mechanism for combinatorial auctions that is incentive compatible is the universal sense. This is another step towards the “holy grail” of obtaining a deterministic one. Theorem: There exists a polynomial-time randomized mechanism for combinatorial auctions with √ general bidders that is incentive compatible in the universal sense and obtains a O( m) approximation ratio.2 The algorithm runs in time that is polynomial in the natural parameters of the problem: the number of players n and the number of items m. Access to the (exponentially long) valuation functions of the players is done using the usual demand queries [4, 8, 9] model, in which bidders are presented with a vector of item prices (pP 1 , ..., pm ) and reply with the set of items S that maximizes √ their utility under these prices v(S) − j∈S pj . We note that the O( m) approximation ratio obtained by this mechanism is the best possible by polynomial time mechanisms [23, 28]. Furthermore, our result is technically stronger: For any fixed ² > 0 we provide a mechanism that obtains √ m -approximation with probability of at least 1 − ². The paper [7], uses our techniques in a more poly(²) subtle way to design a mechanisms that obtain a good approximation ratio with high probability whose approximation ratio is independent of ². 2

Somewhat unusually, the equilibrium obtained is in dominant strategies even for the adaptive query model which usually only supports ex-post equilibria. See [18] for a discussion.

3

√ A major open problem we leave open is that of finding deterministic O( m)-approximation efficiently-computable incentive-compatible mechanisms for combinatorial auctions. Using the same framework, we are also able to design improved mechanisms for the important special case of submodular valuations, and actually even for a more general class of valuations termed “XOS” in [19] and “fractionally-subadditive” in [10]3 . Theorem: There exists a polynomial-time randomized mechanism for combinatorial auctions with XOS bidders that is incentive compatible in the universal sense and obtains an O(log2 m) approximation ratio. We note that the approximation ratio of this mechanism is very far from the constant approximation ratio that is possible from a pure computation point of view, even if one disregards the truthfulness requirement [9, 10]. Using our techniques, [7] presents a truthful mechanism with an almost logarithmic approximation ratio for the wider class of subadditive valuations (see [8, 10]). Designing truthful mechanisms with constant approximation ratios for this problem remains an important open problem.

1.4

Related Work

In a landmark paper, Lehmann et al. [20] were able to design an incentive-compatible, efficientlycomputable, approximation mechanism – which achieves an approximation ratio that is as good √ as computationally possible Θ( m) [23, 28] – for a special case of combinatorial auctions, namely, “single-minded bidders”. This is the case in which each bidder is only interested in a single bundle of goods. For this special case, as well as some other single-parameter scenarios a host of incentive compatible mechanisms have been designed in past years (e.g., [22, 1, 12, 13]). However, very little is known for more general cases in which bidders have complex multi-dimensional preferences. For combinatorial auctions, the best (known) deterministic truthful mechanisms are obtained by completely optimizing over a restricted range of allocations and√then using the VCG technique. These get a barely better than trivial approximation ratio of O(m/ log m) for the general case [15], √ and a weak O( m) for the “complement-free” case [8] – both ratios being quite far from what is computationally possible. Some evidence showing that obtaining a non-VCG incentive-compatible mechanism for combinatorial auctions and related problems would be difficult was given in [17]. (We note that, for a related problem, in which there are many duplicated of each item, there is a nonVCG mechanism [3].) We show that improved approximation ratios are achievable by randomized truthful mechanisms. In [18] a rather general technique was developed for converting approximation algorithms into randomized mechanisms that are incentive compatible in expectation. The technique is based on randomized rounding of the LP relaxation, and relies on a clever representation of the LP solution as a scaled convex combination of integer solutions. In particular, a randomized mechanism for general combinatorial auctions that is incentive compatible in expectation and obtains the computationally√ optimal approximation ratio of O( m) is given. Using our techniques we match this approximation ratio with a mechanism that is truthful in the universal sense, and provide an improved approximation ratio for the special case where all valuations are XOS. 3

For the XOS class, the bidders must also be able to answer, so called, XOS queries [8].

4

2

Preliminaries

2.1

Problem Definition and Truthfulness

In a combinatorial auction, a set M of items, M = {1, ..., m}, is sold to n bidders. Every bidder values bundles of items, rather than only assigning values to single items. The value that bidder i assigns to bundle S is defined by a valuation function vi : 2M → R+ . The two standard assumptions are that vi is normalized (vi (∅) = 0) and monotone (for every S ⊆ T ⊆ M, vi (S) ≤ vi (T )). Our goal is to partition the items between the bidders in a way that maximizes the “total social welfare”. That is, to find a partition (S1 , ..., Sn ) of M , that maximizes Σi vi (Si ). Even though the size of the “input” is exponential in m (each vi is described by 2m real numbers) we require algorithms to run in time polynomial in the natural parameters of the problem: m and n. An important issue is how the input is accessed. In this paper we follow the “black box” approach: we assume that we are given an oracle for each valuation function. The oracle is limited to some predefined type of queries. A common type of query is the demand query (e.g., [8, 9, 4]). A demand query to a valuation vi specifies a vector p = (p1 , ..., pm ) of “item prices”. The answer to the query is a set that would be “demanded” by the queried bidder under these item prices. That is, a subset P S that maximizes vi (S) − j∈S pj . Let V be the set of all valuations. An n-bidder mechanism for combinatorial auctions is a pair (f, p) where f : V n → A, where A is the set of all allocations, and p = (p1 , . . . , pn ), where pi : V n → R. f might be either randomized or deterministic. Definition 2.1 Let (f, p) be a deterministic mechanism. (f, p) is truthful if for all i, all vi , vi0 ∈ V and all v−i ∈ V n−1 we have that vi (f (vi , v−i )i ) − pi (vi , v−i ) ≥ vi0 (f (vi0 , v−i )i ) − p(vi0 , v−i ). Definition 2.2 (f, p) is universally truthful if it is a probability distribution over truthful deterministic mechanisms. Definition 2.3 (f, p) is truthful in expectation if for all i, all vi , vi0 ∈ V and all v−i ∈ V n−1 we have that E[vi (f (vi , v−i )i ) − p(vi , v−i )] ≥ E[vi0 (f (vi0 , v−i )i ) − pi (vi0 , v−i )], where the expectation is taken over the internal random coins of the algorithm. Some special cases of combinatorial auctions have recently received a lot of attention. In particular, combinatorial auctions in which all bidders are known to have submodular valuations are the subject of extensive research (e.g., [19, 8, 16, 9]). A valuation v is submodular if v(S ∪ T ) + v(S ∩ T ) ≤ v(S) + v(T ) for all S, T ⊆ M . All submodular valuations are known to be strictly contained in the more general class of valuations termed “XOS” in [19], and “fractionallysubadditive” in [10]. A valuation v is said to be XOS if there are additive valuations {a1 , ..., at }, such that v(S) = maxk {ak (S)} for all S ⊆ M 4 . See [9] for a more thorough explanation. For every XOS valuation v that is constructed from the additive valuations a1 , . . . , ak , and bundle S, we say that the additive valuation a such that a(S) = maxk {ak (S)} is a maximizing clause for S in vi . We require XOS bidders to be able to answer XOS queries, where a bundle is given and the answer is a maximizing clause for that bundle. Our mechanisms use the fractional relaxation of the problem. The standard LP formulation of combinatorial auctions is as follows: Maximize: Σi,S xi,S vi (S) Subject to: • For each item j: Σi,S|j∈S xi,S ≤ 1 4

A valuation a is additive if for every S ⊆ M , a(S) = Σj∈S a({j})

5

• for each bidder i: ΣS xi,S ≤ 1 • for each i, S: xi,S ≥ 0 We remark that the LP relaxation can be solved using demand oracles only [26].

3

A Framework For Designing Incentive-Compatible Mechanisms

The design of a randomized approximation algorithm comprises two basic steps: first, we design an algorithm that returns a solution with an expected value “not far” from the optimum. Second, we find a solution with a value “close” to the expectation with high probability. Usually, the main difficulty is in achieving the first goal and proving that a solution with value close to the expectation can be obtained with some (perhaps polynomially low) probability. The probability of success can then be amplified by running the algorithm a polynomial number of times and choosing the best solution. In contrast, the design of a randomized mechanism is more complicated: in general, running a mechanism multiple times and choosing the best output does not preserve the truthfulness of the mechanism. Hence we must guarantee that the mechanism will output a “good” solution with “high” probability without amplification. The additional difficulty is the usual one of making sure that the algorithm will incentivize the bidders to reveal their true preferences. Before describing the framework we need a definition. Fix an instance of combinatorial auctions with n bidders and m items. Let OPT denote the value of the optimal solution in this instance, and OP T ∗ denote the optimal fraction solution. Bidder i is called t-dominant if vi (M ) ≥ OPt T . Bidder ∗ i is called fractionally t-dominant if vi (M ) ≥ OPtT . Roughly speaking, the framework relies on the examination of two distinct possible cases: either there is a dominant bidder – so allocating all items to him is a good approximation to the welfare, or there is no such bidder. That is, there is no “small” group of bidders that contributes “a lot” to the optimal solution. In the first case, achieving a good approximation is easy - allocate all items to that bidder. In the second and more complicated case, we will perform a fixed-price auction and will have to prove that we get a good approximation. The key observation here is that two randomly chosen groups that consist (in expectation) of a constant fraction of the bidders have many properties in common (e.g., both hold a constant fraction of the total welfare.) This is similar to the main principle in random-sampling auctions for “digital goods” [12]. However, our situation is much more complex due to the multi-parameter setting of combinatorial auctions, in contrast to the single-parameter setting of [12], and the fact that the our problems are NP hard to solve. The framework allows us, with high probability, to distinguish between the two cases, and provides us with the tools for finding the price used in the fixed-price auction. The main difficulty in tailoring the framework to a specific setting is showing that the fixed-price auction guarantees a good approximation. Indeed, in the two mechanisms we are about to present in this paper the price used in the fixed-price auction is determined in a completely different manner. We assume that the number of bidders is large comparing to the number of items, since otherwise, one can easily get a truthful n1 -approximation by bundling all items together and conducting a second price auction. The Framework: Phase I: Partitioning the Bidders Assign each bidder to exactly one of the following three sets: SEC-PRICE with probability 1 − ², FIXED with probability 2² , and STAT with probability 2² . 6

Only bidders from SEC-PRICE will be allowed to participate in the second-price auction. Bidders in STAT will never get any items, so we can safely use this group to gather the necessary statistics (see next phase). The bidders in FIXED will be the only bidders who participate in the fixed-price auction. Phase II: Gathering Statistics There are two goals to this phase: find a reservation price r for the second-price auction in the next phase, and a price p for the fixed-price auction of phase IV. Only bidders from STAT will be used to determine these prices. This is necessary to guarantee truthfulness, since bidders in STAT never receive any items. Finding these prices is mechanism specific, however, the reservation price for the second price auction is generally determined by applying an approximation algorithm to bidders from STAT. If no small group of bidders contributes a large fraction of the optimal solution (the second case), we can prove that with high probability the reservation price we obtain is a good approximation to the optimal welfare. On the other hand, If there is one bidder with very high value for the bundle of all items (the first case), we will see that this reservation price has no effect on the result of the second-price auction. Phase III: A Second-Price Auction Conduct a second-price auction restricted only to bidders in SEC-PRICE with a reservation price of r for the bundle M of all items. If there is a “winning bidder”, allocate all the items to that bidder, charge this bidder maxt∈SEC−P RICE,t6=i (vt (M ), r), and output this allocation. Otherwise, proceed to the next phase. Intuitively, one can think of this phase as handling the first case, where there is a dominant bidder. This bidder will be placed in SEC-PRICE with probability 1 − ², and in this case we get a good approximation to the welfare, and the algorithm terminates. The purpose of the reservation price is to handle the second case, where there is no dominant bidder. In this case, allocating all items to one bidder may provide a bad approximation ratio. The reservation price guarantees that if there is a “winning bidder”, we get a good approximation because the revenue obtained in the second-price auction (which is at least the reservation price) is obviously a lower bound on the welfare. Phase IV: A Fixed-Price Auction Let R = M . For each bidder i ∈ F IXED, in some arbitrary order: (a) Let Si be the demand of bidder i given the following prices: p for each item in R, and ∞ for each item in M − R. (b) Allocate Si to bidder i, and set his price to be p · |Si |. (c) Let R = R \ Si . This phase is meant to handle the second case, where there is no dominant bidder. Indeed, it can be shown that in this case since FIXED is a randomly chosen group that consists of a constant fraction of all bidders, it also holds, with high probability, a constant fraction of the optimal welfare. In addition, we show that in the second case the bidders in STAT aid us in choosing a fixed price that leads to a good approximation. The way this price is computed is setting-specific, and is not the same in our two mechanisms. 7

Lemma 3.1 A mechanism that is designed according to the framework is universally truthful. Proof: Notice that a bidder can be allocated some items only if he is either in SEC-PRICE or in FIXED. Bidders in SEC-PRICE can receive items only by participating in the second-price auction with the reservation price, and bidders in FIXED only by participating in the fixed-price auction. The parameters for these auctions (which are well known to be truthful if the participating bidders do not affect the reservation price or the fixed price) are determined by bidders in STAT. Bidders in STAT never receive any items, and thus have no incentive to misreport their preferences. Thus we can safely rely on the information that provide. Some Technical Properties of the Framework We now study some basic features of the framework that make it useful. Lemma 3.2 Fix an instance with m items and n bidders, and some mechanism that is designed using the framework. Suppose that there is a t-dominant bidder and that it holds that r ≤ OPt T . Then, the mechanism provides a t-approximation with probability at least 1 − ². Proof: Let i be some t-dominant bidder. Observe that with probability 1−², i ∈ SEC-PRICE. We now show that in this case the mechanism guarantees a t approximation (otherwise we assume that the mechanism fails to guarantee any approximation ratio). We have that vi (M ) ≥ r, thus some bidder in SEC-PRICE will win the items. Furthermore, since vi (M ) ≥ OPt T allocating all items to i is a t-approximation to the optimal welfare. Thus, the mechanism terminates by allocating the items to a bidder in SEC-PRICE and we get a t-approximation to the optimal welfare. Lemma 3.3 Let OP TS (OP TS∗ ) be the optimal integral (fractional) solution with the participation of bidders in S only. If there is no (fractionally) t-dominant bidder, then with probability at least 1 − 16 ²t : 1.

² 4

∗ · OP T ∗ ≤ OP TST AT

2.

² 4

· OP T ∗ ≤ OP TF∗ IXED

and with probability at least 1 − 1.

² 4

· OP T ≤ OP TST AT

2.

² 4

· OP T ≤ OP TF IXED

16 ²t :

Proof: We start by proving that the probability that the first event does not occur is at most 8 ²t . By symmetry, the second event does not occur with the same probability. The lemma will then follow, by applying the union bound. We prove the lemma for fractional solutions, but the proof is almost identical for integral ones. ∗ Let A be the random variable that receives the value of OP TST AT . For every bidder i we denote ∗ by Ai the random variable that receives the value of bidder i in OP TST AT , conditioned on bidder i in STAT. Let {xi,S }1≤i≤n,S⊆M be the set of variables in the fractional solution, OP T ∗ . Since every bidder is placed in STAT with probability 2² , and STAT ⊆ N , we have that E[A] = Σi 2² E[Ai ] ≥ Σi 2² ΣS xi,S vi (S) = 2² OP T ∗ . If the conditions of the lemma hold, we also have that for each i, ∗ Ai < OPtT . We use this fact to set an upper bound on the probability that A gets a value that is substantially smaller than its expectation. We make use of the following corollary from Chebyshev’s inequality: 8

Proposition 3.4 Let X be the sum of independent random variables, each of which lies in [0, l]. Then, for any α > 0, Pr[|X − E[X]| ≥ α] ≤ lE[X] . α2 ∗

Since for each i, Ai ∈ [0, OPtT ], we have that ² ² ² Pr[A < · OP T ∗ ] ≤ Pr[|A − · OP T ∗ | ≥ · OP T ∗ ] ≤ 4 2 4

4

OP T ∗ ² · 2 · OP T ∗ t ( 4² OP T ∗ )2



8 ²t

Combinatorial Auctions with General Valuations

In this section we exhibit an incentive-compatible mechanism for approximating combinatorial auctions with general valuations. The incentive compatibility of the mechanism is guaranteed by its use of the framework. As in all mechanisms built using the framework, the main difficulty is to analyze the case where there is no dominant bidder. In this case, our mechanism uses the bidders of STAT to approximate the value of the optimal fractional solution. We set the item price for the fixed-price auction to be (approximately) the value of the approximation we obtained, divided by the number of items. The important technical √ observation is that for each item we manage to sell at this price, we “lose” a value of at most O( m) times this price (compared to the optimal fractional solution). The revenue we get in this case sets a lower bound on the welfare we achieve. Although the mechanism does use the LP relaxation of the problem, LP plays a relatively minor role. This is in contrast to previous related work [18, 10], where the technique itself is LP based. The Algorithm: Input: n bidders, each with a general valuation vi that is represented by a demand oracle, a rational number 0 < ² < 1. √

Output: An allocation of the items, which is a O( payment for each bidder.

m )-approximation ²3

to the optimal allocation, a

The Algorithm: Phase I: Partitioning the Bidders 1. Assign each bidder to exactly one of the following three sets: SEC-PRICE with probability 1 − ², FIXED with probability 2² , and STAT with probability 2² . Phase II: Gathering Statistics 2. Calculate the value of the optimal fractional solution in the combinatorial auction with all m ∗ items, but only with bidders in STAT. Denote this value by OP TST AT . Phase III: A Second-Price Auction OP T ∗

√ST AT , in which the bundle M 3. Conduct a second-price auction with a reservation price of m of all items is sold to the bidders in SEC-PRICE. If there is a “winning bidder”, allocate all the items to that bidder, charge this bidder maxt∈SEC−P RICE,t6=i (vt (M ), r), and output this allocation. Otherwise, proceed to the next step.

Phase IV: A Fixed-Price Auction 9

4. Let R = M . Let p =

∗ ²OP TST AT 8m

.

5. For each bidder i ∈ F IXED, in some arbitrary order: (a) Let Si be the demand of bidder i given the following prices: p for each item in R, and ∞ for each item i M − R. (b) Allocate Si to bidder i, and set his price to be p · |Si |. (c) Let R = R \ Si . Theorem 4.1 The algorithm is feasible, truthful and runs in polynomial time. It guarantees an √ approximation ratio of O( ²3m ) with probability at least 1 − ². The algorithm clearly produces a feasible allocation. In addition, the algorithm is incentive compatible, since it was designed using the framework. It is left to prove that it obtains the desired approximation ratio with probability at least 1 − ². √ √ If there is a fractionally m-dominant bidder, then by Lemma 3.2 we get a m approximation with probability at least 1−², as needed. Hence, from now on we assume that there is no fractionally √ m-dominant bidder. By Lemma 3.3, we have that with probability of 1 − o(1) the values of the optimal fractional solutions for FIXED√and STAT are “close” to OP T ∗ . If this is the case, we will show that we manage to achieve an O( ²2m ) approximation factor. With probability of at most o(1) this is not the case, and we assume that the algorithm fails to provide any approximation ratio. Although the second-price auction was designed to handle the case where there is a dominant bidder, it is still possible that some bidder i in SEC-PRICE will be allocated the bundle M in Step ∗ OP TST √ AT . Therefore, that bidder’s value 3. However, notice that bidder i was forced to pay at least m ∗ ∗ OP TST √ AT , which by Lemma 3.3 is at least ²OP √ T . Hence, m 4 m √ provides an O( ²m ) approximation to the optimal solution.

for the bundle M is greater than

allocating

the bundle M to bidder i If no bidder in SEC-PRICE won the bundle M then the algorithm allocates the items to the bidders in FIXED (Step 5). As before, we claim that the revenue is a lower bound to the social 3 ∗ √ T ). Hence, Step 5 will welfare. The next lemma shows that in this case the revenue will be Ω( ² OP m result in an allocation that is a Ω(

√ m )-approximation ²3

Lemma 4.2 Suppose that there is no fractionally conditions hold: 1. For the item-price p it holds that: 2. OP TF∗ IXED ≥

² 4

²2 OP T ∗ 16m

to the optimal allocation.

√ m-dominant bidder, and that the following

T ≤ p ≤ ² OP 8m



· OP T ∗

then the revenue of the fixed-price auction (Step 5) is Ω( ²

3 OP T ∗

√ m

).

Proof: Let {yi,S }i∈F IXED,S⊆M be the variables in the optimal fractional solution among bidders in FIXED only. We restrict our attention to bundles in OP TF∗ IXED that are profitable at price p per item. That is, let T be the set of pairs (i, S) such that yi,S > 0, and vi (S) − p · |S| > 0. The next claim shows that we do not lose too much by ignoring all other bundles in OP TF∗ IXED . Claim 4.3 Σ(i,S)∈T yi,S vi (S) ≥

1 2

· OP TF∗ IXED

10

Proof: Define T to be the “complement” set of T . Formally, T consists of all pairs (i, S) such that yi,S > 0 in OP TF∗ IXED , but vi (S) − p · |S| ≤ 0. Observe that OP TF∗ IXED = Σ(i,S)∈T yi,S vi (S) + Σ(i,S)∈T yi,S vi (S). It is enough to bound from above the contribution of T to OP TF∗ IXED to prove the claim. Σ(i,S)∈T yi,S vi (S) ≤ Σ(i,S)∈T yi,S p · |S| ≤ m · p ≤ m ·

OP TF∗ IXED ² · OP T ∗ ≤ 8m 2

where the first inequality is because of the definition of T and the second inequality is due to the LP constraints. We now calculate the revenue raised in Step 5. Without loss of generality, assume the bidders in FIXED are 1, ..., 2² n. In the first iteration of Step 5, bidder 1 is asked for his most demanded set. The key observation is that if there is some S such that x1,S > 0 and (1, S) ∈ T then bidder 1’s demand is not empty. Recall that for each item in S1 we gain a revenue of p. We now give an upper bound to what we “lose” by assigning S1 to bidder 1 in comparison to OP TF∗ IXED . Notice, that by assigning S1 to bidder 1 we lose both the value of all the fractional bundles assigned to bidder 1 in OP TF∗ IXED , and of all the bundles in OP TF∗ IXED that contain an item from S1 . The value of all the fractional bundles assigned to bidder 1 in OP TF∗ IXED is at most ∗ OP √T : m OP T ∗ Σ(1,S)∈T y1,S v1 (S) ≤ √ m ∗

√ T and Σ(1,S) y1,S ≤ 1, due to the constraints of the LP formulation. because v1 (M ) < OP m We now bound the value of all the bundles in OP TF∗ IXED that contain some item from S1 . Fix ∗ √T , some item j ∈ S1 . Again, using the constraints of the LP and vi (M ) < OP m

OP T ∗ Σ(i,S)∈T |j∈S yi,S vi (S) ≤ √ m ∗

T To conclude, for every item we sell to bidder 1 at price p ≥ ²2 · OP 16m , we lose bundles in T that ∗ √ T . To continue the analysis, remove from OP T ∗ have a total value of at most 2 · OP F IXED all pairs m (i, S) which can not be assigned now (either i = 1, or j ∈ Si and j ∈ S). Now observe that for every T∗ item we sell to bidder 2 at price p ≥ ²2 · OP 16m , we lose bundles in T that have a total value of at ∗ √ T (using the same arguments as before). As before, remove from OP T ∗ most 2 · OP F IXED all pairs m (i, S) which can not be assigned now (either i = 2, or j ∈ Si and j ∈ S). The analysis continues similarly until we consider all bidders in FIXED. √ The revenue achieved by the algorithm is an O( ²2m )-approximation to the value of OP TF∗ IXED .

Since OP TF∗ IXED ≥

5

² 4

· OP T ∗ we have that it is a O(

√ m ) ²3

approximation to OP T ∗ , as needed.

Combinatorial Auctions with XOS Valuations

The mechanism for XOS valuations is also based on the framework. Again, the main challenge is handling the case where there is no dominant bidder. The treatment of this case is very different than the treatment in the previous algorithm. Suppose we assign a bundle S to a bidder with an XOS valuation vi . By the definition of XOS valuations, v(S) = a(S) where a is some additive valuation (the maximizing clause). For each j ∈ S, we can think of a(j) as the “price” of j. We use these prices to find a price for the fixed-price auction. Towards this end, we define the following: 11

Definition 5.1 An allocation T = (T1 , ..., Tn ) is supported by a price p, if for each bidder i and each possible bundle Si ⊆ Ti , it holds that vi (Si ) ≥ |Si | · p. We call Σi |Ti | · p the supported value of T. We now show that for every allocation it is possible to find a “contained” allocation and a price that supports it that holds a considerable part of the welfare of the original allocation. Lemma 5.2 Let T = (T1 , ..., Tn ) be an allocation. There is an algorithm that uses a polynomial number of XOS queries and finds an allocation (S1 , ..., Sn ) that is supported by a price p that is a i vi (Ti ) power of 2, such that for each i, Si ⊆ Ti . The supported value of (S1 , ..., Sn ) is Ω( Σlog m ). Proof: The algorithms works as follows: query each bidder i’s XOS oracle for the maximizing XOS clause for Ti . We refer to the value of an item in Ti as the item’s value in the maximizing clause of Ti . Let W = Σi vi (Ti ) (i.e., the welfare value of T .) Let P be the set of all powers of 2 W between W and 2m . Notice that |P | = O(log m). Round down each item’s value in the maximizing clauses to the nearest value in P . Let p ∈ P be the (rounded down) item value that “contributes the most” to the welfare. Notice that we ignore W items with value lower than 2m – our “loss” is not too high since the sum of these items’ values is W less than 2 . We can now define (S1 , ..., Sn ) to be the allocation in which Si ⊆ Ti and the (rounded down) value of every item in Ti is at least p. We note that if a valuation is known to be submodular, an XOS oracle for it can be simulated using a demand oracle [8]. Thus, if all bidders are known to be submodular our mechanism can be implemented using demand oracles only. The Algorithm: Input: n bidders, v1 , ..., vn , each represented by a demand and a XOS oracle, a rational number 0 < ² < 12 . 2

Output: An allocation of the items, which is an O( log²3 m )-approximation to the optimal allocation. The Algorithm: Phase I: Partitioning the Bidders 1. Assign each bidder to exactly one of the following three sets: SEC-PRICE with probability 1 − ², FIXED with probability 2² , and STAT with probability 2² . Phase II: Gathering Statistics 2. Find an allocation that is an O(1) approximation to the value of the optimal solution in the combinatorial auction with bidders in STAT only and all m items (e.g., using the algorithms of [8, 9]). Denote this value by OP TST AT . 3. Using the allocation obtained in the previous step, find a price p0 and an allocation T = TST AT (T1 , ..., T|ST AT | ) such that T is supported by p0 and its supported value is Ω( OPlog m ). Phase III: A Second-Price Auction 2

TST AT ² · OPlog , in which the bundle 4. Conduct a second-price auction with a reservation price of 100 2 m M of all items is sold to bidders in SEC-PRICE. If there is a “winning bidder”, allocate all items to that bidder, charge this bidder maxt∈SEC−P RICE,t6=i (vt (M ), r), and output this allocation. Otherwise, proceed to the next step.

12

Phase IV: A Fixed-Price Auction 5. Let R = M . Let p = p0 /2. 6. For each bidder i ∈ F IXED, in some arbitrary order: (a) Let Si be the demand of bidder i given the following prices: p for each item in R, and ∞ for each item in M − R. (b) Allocate Si to bidder i, and set his price to be p · |Si |. (c) Let R = R \ Si . Theorem 5.3 The algorithm is feasible, truthful and runs in polynomial time. It guarantees an 2 approximation ratio of O( log²3 m ) with probability at least 1 − ². The algorithm clearly produces a feasible allocation. In addition, the algorithm is incentive compatible, since it was designed using the framework. It is left to prove that it obtains the desired approximation ratio with probability at least 1 − ². ²2 OP T Let R = 100 . If there is an R-dominant bidder, then by Lemma 3.2 we get a R approxlog2 m imation with probability at least 1 − ², as needed. Hence, from now on we assume that there is no R-dominant bidder. The main effort here is to analyze the process of finding the price p used in the fixed-price auction, and show that the fixed-price auction provides a good approximation to OP T T the welfare. In the sequel, we let P denote the set of all powers of 2 where 2mOP log m ≤ p ≤ log m for OP T which there exists an allocation T that is supported by p with a supported value of Ω( 4² · log m ). Lemma 5.4 Suppose there is no R-dominant bidder. Then, with probability at least than 1 − 2²2 : 1.

² 4

· OP T ≤ OP TST AT

2.

² 4

· OP T ≤ OP TF IXED

3. For every pk ∈ P there exists an allocation T k of the items to the bidders in FIXED only such ²2 OP T that T k is supported by pk , and the supported value of T k is Ω( 16 · log m ). Proof: By Lemma 3.3 the probability that at least one of the first two events does not occur is o(1). We now bound from above the probability that the third event occurs and use the union bound to complete the proof. Consider Pk ∈ P , and let T = (T1 , ..., Tn ) be an allocation that is supported by pK with a OP T supported value of Ω( 4² · log m ). In particular, for each bidder i ∈ F IXED, vi (Ti ) ≥ |Ti | · pt . We will prove that with high probability the allocation T k that allocates Ti to every i ∈ F IXED and ²2 OP T nothing to the other bidders has a welfare of Ω( 16 · log m ). Let Ai be the random variable that gets the value of p · |Ti | with probability 2² , and 0 with probability 1 − 2² . Let A = Σi Ai . Since every bidder i is placed in FIXED with probability 2² we OP T have that E[A] = Σi E[Ai ] = 2² Σi p · |Ti | ≥ 4² · log m }. Using proposition 3.4, and since for each i, Ai ∈ [0, R], we have that 2

OP T R · ²8 log ²2 OP T ²2 OP T ²2 OP T 32R · log m m Pr[A < ] ≤ Pr[|A − |≥ ] ≤ ²2 OP T ≤ 2 16 log m 8 log m 16 log m ² · OP T ( 16 log m )2

Since there are at most log m possible choices of pk , by the union bound the third event does not m log m occur with probability at most 32R·log . By our choice of R, we get that all events occur ²2 ·OP T simultaneously with probability at least 1 − 2²2 . 13

We will show that if the events specified in Lemma 5.4 hold we achieve an approximation ratio of O( log²3m ). The events does not occur with probability of at most 2²2 , and we assume that in this case the algorithm fails to provide any approximation ratio. If some bidder i in SEC-PRICE was allocated M in Step 4, then he was forced to pay at least ²2 OP TST AT ²2 OP TST AT 100 log2 m . Therefore, that bidder’s value for M is greater than 100 log2 m , which by Lemma 2

3

T 5.4 is at least O( ²logOP ). Hence, allocating M to bidder i provides a a O( log²3 m ) approximation to 2 m the optimal solution. If no bidder in SEC-PRICE won the bundle M then the algorithm allocates the items to bidders in FIXED (Step 6). The next two lemmas show that in this case we will get an allocation that is an O( log²3m )-approximation to the optimal allocation.

Lemma 5.5 Let T = (T1 , ..., Tn ) be an allocation that is supported by some p. A fixed-price auction with a price of p2 generates an allocation with welfare Ω(Σi |Ti | · p). Proof: We first note that assigning Ti to each bidder i and charging a price of |Ti | · p, we gain a revenue of Σi |Ti | · p, while all bidders are profitable. We will use this revenue as a lower bound to the welfare that can be achieved. However, we do not guarantee that the actual revenue of the fixed price auction is close to Σi |Ti | · p. We now upper bound the revenue lost by assigning S1 – the set bidder 1 is assigned in the fixed-price auction – to bidder 1, comparing to the allocation that assigns Ti to bidder i. We could have assigned T1 to bidder 1 and gain a revenue of |T1 | · p2 . However, The value of T1 is at most twice the value of S1 since bidder 1 could gain a profit of at least |T1 | · p2 by choosing T1 , and S1 has at least that value being bidder 1’s most demanded set. We note again that the revenue we achieve in this case (but not the welfare) might be very small comparing to vi (Ti ). The second possible lose occurs if there is an item j ∈ S1 and bidder i0 > 1 with j ∈ Ti0 . Tp is supported by p, and thus we have that vi0 (Ti0 \{j}) ≥ (|Ti0 | − 1) · p. Summing over all such items, we lose a value of at most |S1 | · p2 ≤ v1 (S1 ). The inequality holds since S1 is profitable for bidder 1 under a price per item of p2 . To conclude, by assigning T1 to bidder 1 we lose a revenue of O(T1 ). The analysis continues by removing from T2 , ..., Tn all items which are in T1 , and repeating the same analysis with bidder 2 instead of bidder 1. Lemma 5.6 If the events specified in Lemma 5.4 occur then the allocation generated by the fixedprice auction (Step 6) is an O( log²3m )-approximation to the optimal welfare. Proof: Observe that in Step 3 we have found an allocation that is supported by p and has a total TST AT T value more than OPlog ≥ 4²OP m log m . Obviously, an allocation restricted to bidders in STAT only is also an allocation for all bidders with the same value. We can therefore deduce that there exists an allocation Tp of the items to bidders in FIXED such that Tp = (T1 , ..., Tn ) is supported by p, and ²2 OP T worth at least 16 · log m . Clearly, all conditions of Lemma 5.5 hold. Therefore, the algorithm is an O( log²2m )-approximation to the value of OP TF IXED . Since OP TF IXED ≥ 4² · OP T we have that it is an O( log²3m ) approximation to OP T .

6

Concluding Remarks

In this paper we presented universally truthful mechanisms for two settings: combinatorial auctions with general valuations and combinatorial auctions with XOS valuations. For the first setting we 14



m showed that for any ² > 0 there exists an O( poly(²) ) truthful approximation mechanism that obtains this approximation ratio with of at least probability 1−². For the latter setting we show that for any log2 m ² > 0 there exists an O( poly(²) ) truthful approximation mechanism that obtains this approximation ratio with probability of at least 1 − ². The main contribution of this paper is the introduction of a new framework for designing truthful mechanisms. Indeed, the framework was already applied to different settings. We now mention two of them. Balcan et al. [2] consider the problem of revenue maximization in combinatorial auctions. A careful look on the mechanisms presented in this paper reveals that the revenue arguments are used in the analysis of the approximation ratio. In other words and very roughly speaking, we provide a lower bound to the social welfare we achieve during the fixed-price auction by analyzing the revenue obtained in the fixed price auction. Thus, there is a connection between maximizing revenue and maximizing social welfare. Balcan et al. [2] make this intuition formal, analyze it, and apply it to the settings considered in this paper, and some other ones. The paper by Dobzinski [7] extends the current paper in two aspects: first, it presents an extension of the framework that provides a better tradeoff between the approximation ratio and the success probability. Second, it uses the framework to provide a truthful algorithm for combinatorial auctions with subadditive bidders (a superset of combinatorial auctions with XOS valuations). The approximation ratio of this new algorithm is O(log m log log m).

Acknowledgments We thank Moshe Babaioff, Liad Blumrosen, Uri Feige, Ron Lavi, Ahuva Mu’alem, and Chaitanya Swamy for helpful discussions and comments. The second author is supported by a grant from the Israeli Academy of Sciences. The third author is supported by NSF grant 0331548. The work was partially done when the first and third authors were in the Hebrew University and were supported by a grant from the Israeli Academy of Sciences.

References ´ Tardos. An approximate [1] Aaron Archer, Christos H. Papadimitriou, Kunal Talwar, and Eva truthful mechanism for combinatorial auctions with single parameter agents. In SODA, pages 205–214, 2003. [2] Maria-Florina Balcan, Avrim Blum, and Yishay Mansour. Item pricing for revenue maximization. In EC ’08: Proceedings of the 9th ACM conference on Electronic commerce, pages 50–59. ACM, 2008. [3] Yair Bartal, Rica Gonen, and Noam Nisan. Incentive compatible multi unit combinatorial auctions. In TARK, pages 72–87, 2003. [4] Liad Blumrosen and Noam Nisan. On the computational power of iterative auctions. In EC ’05: Proceedings of the 6th ACM conference on Electronic commerce, pages 29–43, 2005. [5] Edward H. Clarke. Multipart pricing of public goods. Public Choice, pages 17–33, 1971. [6] Peter Cramton, Yoav Shoham, and Richard Steinberg (Editors). Combinatorial Auctions. MIT Press., 2005. [7] Shahar Dobzinski. Two randomized mechanisms for combinatorial auctions. In APPROXRANDOM, pages 89–103, 2007. 15

[8] Shahar Dobzinski, Noam Nisan, and Michael Schapira. Approximation algorithms for combinatorial auctions with complement-free bidders. In STOC, pages 610–618, 2005. [9] Shahar Dobzinski and Michael Schapira. An improved approximation algorithm for combinatorial auctions with submodular bidders. In SODA, pages 1064–1073, 2006. [10] Uriel Feige. On maximizing welfare when utility functions are subadditive. In STOC, pages 41–50, 2006. [11] Uriel Feige and Jan Vondr´ak. Approximation algorithms for allocation problems: Improving the factor of 1 - 1/e. In FOCS, pages 667–676, 2006. [12] Andrew V. Goldberg, Jason D. Hartline, Anna R. Karlin, Michael Saks, and Andrew Wright. Competitive auctions. Games and Economic Behavior, 55(2):242–269, 2006. [13] Andrew V. Goldberg, Jason D. Hartline, and Andrew Wright. Competitive auctions and digital goods. In Symposium on Discrete Algorithms, pages 735–744, 2001. [14] Theodore Groves. Incentives in teams. Econometrica, pages 617–631, 1973. [15] Ron Holzman, Noa Kfir-Dahav, Dov Monderer, and Moshe Tennenholtz. Bundling equilibrium in combinatrial auctions. Games and Economic Behavior, 47:104–123, 2004. [16] Subhash Khot, Richard J. Lipton, Evangelos Markakis, and Aranyak Mehta. Inapproximability results for combinatorial auctions with submodular utility functions. In WINE, pages 92–101, 2005. [17] Ron Lavi, Ahuva Mu’alem, and Noam Nisan. Towards a characterization of truthful combinatorial auctions. In FOCS, pages 574–583, 2003. [18] Ron Lavi and Chaitanya Swamy. Truthful and near-optimal mechanism design via linear programming. In FOCS, pages 595–604, 2005. [19] Benny Lehmann, Daniel J. Lehmann, and Noam Nisan. Combinatorial auctions with decreasing marginal utilities. In ACM Conference on Electronic Commerce, pages 18–28, 2001. [20] Daniel Lehmann, Liadan Ita O’Callaghan, and Yoav Shoham. Truth revelation in approximately efficient combinatorial auctions. In JACM 49(5), pages 577–602, Sept. 2002. [21] Andrew Mas-Collel, Michael Whinston, and Jerry Green. Microeconomic Theory. Oxford university press, 1995. [22] Ahuva Mu’alem and Noam Nisan. Truthful approximation mechanisms for restricted combinatorial auctions. In AAAI/IAAI, pages 379–384, 2002. [23] Noam Nisan. The communication complexity of approximate set packing and covering. In ICALP, pages 868–875, 2002. [24] Noam Nisan and Amir Ronen. Algorithmic mechanism design (extended abstract). In STOC, pages 129–140, 1999. [25] Noam Nisan and Amir Ronen. Computationally feasible vcg mechanisms. In ACM Conference on Electronic Commerce, pages 242–252, 2000. [26] Noam Nisan and Ilya Segal. The communication requirements of efficient allocations and supporting prices. Journal of Economic Theory, 129(1):192 – 224, 2006. 16

[27] Martin J. Osborne and Ariel Rubistein. A Course in Game Theory. MIT press, 1994. [28] Tuomas Sandholm. Algorithm for optimal winner determination in combinatorial auctions. Artificial Intelligence, 135(1-2):1–54, 2002. [29] William Vickrey. Counterspeculation, auctions and competitive sealed tenders. Journal of Finance, pages 8–37, 1961. [30] Jan Vondrak. Optimal approximation for the submodular welfare problem in the value oracle model. In STOC ’08: Proceedings of the 40th annual ACM symposium on Theory of computing, pages 67–74, 2008.

17

Truthful Randomized Mechanisms for Combinatorial ...

Mar 8, 2010 - approximation for a class of bidder valuations that contains the important ... arises in Internet environments, where, alongside the standard ...

231KB Sizes 3 Downloads 277 Views

Recommend Documents

On Characterizations of Truthful Mechanisms for Combinatorial ...
Shahar Dobzinski. School of Computer Science and Engineering .... One open question is to characterize combinatorial auc- ..... Of course, we will make sure.

On Characterizations of Truthful Mechanisms for Combinatorial ...
School of Computer Science and Engineering. The Hebrew ... Stanford University. 470 Gates ... personal or classroom use is granted without fee provided that copies are not made or ... EC'08, July 8–12, 2008, Chicago, Illinois, USA. Copyright ...

Two Randomized Mechanisms for Combinatorial ...
mechanism also provides the best approximation ratio for combinatorial auctions with ... Notice that a naive representation of each valuation function ...... (taking into account only profitable bundles under price p), each with a revenue of OP T ∗

Combinatorial exchange mechanisms for efficient ...
are involved in a large scale communication network such as the Internet. There ... that buyers insist on getting the same bandwidth on all links in their bundles.

Combinatorial exchange mechanisms for efficient ... - Project Euclid
bandwidth to network service providers. As is well-known, ... 1. Introduction. Communication networks have increased in scale and hetero- geneity. There are ...

Truthful Approximation Mechanisms for Restricted ...
Jun 14, 2007 - ∗School of Computer Science and Engineering, Hebrew University of Jerusalem, Israel. [email protected]. †School of Computer Science ...

An Impossibility Result for Truthful Combinatorial ...
Department of Computer Science. Cornell University, Ithaca NY 14853 [email protected] ... STOC'11, June 6–8, 2011, San Jose, California, USA. Copyright 2011 ..... tion of truthful mechanisms with good approximation ratio remains an ...

Truthful Reputation Mechanisms for Online Systems
company, and good spirit will be very much missed once we move away. But most of all, ...... However, the strategy for merging own experiences with those of ...

Truthful Reputation Mechanisms for Online Systems
synergy between reputation and the internet. – problems with legal litigations. – fast dissemination of information. – low cost. – can be designed. • increasingly ...

Towards a Characterization of Truthful Combinatorial ...
Nov 12, 2004 - W-MON and IIA (plus two more technical requirements) must be a weighted .... bundles of items in a way that may depend on the combination they win, i.e. ..... that f is truthful, with the payments pi(N,vj)=0 and pi(Y,vj)=2vj − 10.

RANDOMIZED k-SERVER ALGORITHMS FOR ...
According to the definition of DM, when δ > 1, dem1 = 0, since it finished only ... but at the end of period p there is only one Dp(i)-phase in block Bi. It may be the ...

Anticoncentration regularizers for stochastic combinatorial problems
Machine Learning Department. Carnegie Mellon University ... they are the solution to a combinatorial optimization problem, NP-hardness motivates the use of ...

Mechanisms for Complement-Free Procurement
1.1 Our Results. For complement-free (subadditive) objectives we first give ... as well as other domains [6]. 1.3 Open ..... free domain are functions for which S ⊆ T does not neces- ..... (say ǫ = 2−n,n > 100) serves as such an example. In this

A Truthful Mechanism for Offline Ad Slot ... - Research at Google
Jan 18, 2008 - 1 Google, Inc. Email: {jonfeld,muthu,mpal}@google.com ... interpretation in this application: if an overall advertising campaign allocates a fixed portion of its budget ... truthful mechanism (see Example 1 in Section 2). However ...

Combinatorial Nullstellensatz
Suppose that the degree of P as a polynomial in xi is at most ti for 1 ≤ i ≤ n, and let Si ⊂ F be a ... where each Pi is a polynomial with xj-degree bounded by tj.

Randomized Spatial Context for Object Search
reasonable, this approach is highly dependent on the quality of image segmentation or ... conduct visual object search first on a movie database, and then on a ...

Prompt Mechanisms for Online Auctions
In reality, however, the setting of many problems is online, meaning that the mechanism has no prior information regarding the identity of the par- ticipating players, or that the goods that are for sale are unknown in advance. Examples include spons

Robust Mechanisms for Risk-Averse Sellers - CiteSeerX
at least 1/2, which implies that we get at most 2Ç«2 utility for urisk-averse, compared to Ç«(1 − Ç«) at the price Ç«/(1 − Ç«). 2.4 Results and Techniques. We first show ...

dependability mechanisms for desktop grids
parallel applications executed over desktop grids. It includes chapters 4, 5, ..... This type of applications is known as embarrassingly parallel computations or ...

5 Biophysical Mechanisms for Nonthermal ... -
Sep 19, 2014 - 5.2.2 Nonlinearity: Sigmoid Dependencies and Power Windows . .... Huss et al., 2007; Lai, 2005), (2) results of medical application of NT MW in the former Soviet ..... quantum character and may develop in the absence of thermal ......

Mechanisms for Complement-Free Procurement
tion mechanism; both mechanisms are in the demand oracle model. For cut .... tions for procuring private data [13] dynamic auctions [10] as well ..... utilities term.

Obtaining Reliable Feedback for Sanctioning Reputation Mechanisms
plified considerably when such reputation information is shared among a ..... information prohibits the use of this kind of mechanisms in a large scale online market. .... require CPU time, storage requests need disk space, information requests .....