Truthfulness via Proxies Shahar Dobzinski Department of Computer Science Cornell Unversity [email protected]

Hu Fu Department of Computer Science Cornell Unversity [email protected]

Robert Kleinberg Department of Computer Science Cornell Unversity [email protected] February 4, 2011

Abstract

der is to truthfully answer the queries. The simplest and strongest notion considered is determinisThis short note exhibits a truthful-in-expectation tic truthfulness, where no randomization is allowed. O( logloglogmm )-approximation mechanism for combina- The VCG mechanism is truthful and optimally solves torial auctions with subadditive bidders that uses the problem, but is not computationally efficient. polynomial communication. The best truthful approximation algorithm √ known achieves a poor approximation ratio of O( m) [6], which is achieved by a maximal-in-range algorithm 1 Introduction (see below). An evidence that deterministic algorithms cannot achieve an improved approximation We consider the problem of maximizing the social ratio was given in [5]: maximal-in-range algorithms welfare in combinatorial auctions with subadditive cannot achieve an approximation ratio better than 1 bidders. In this problem, we have a set M , |M | = m, m 6 with polynomial communication. of heterogeneous items, and n bidders. Each bidder i If randomization is allowed, there exists a univerhas a valuation function vi , vi : 2M → R. We assume sally truthful mechanism (a distribution over deterthat each valuation vi is normalized (vi (∅) = 0), nonministic truthful mechanisms) that guarantees an apdecreasing, and subadditive: for any two bundles S proximation ratio of O(log m log log m) [3]. This paand T , vi (S) + vi (T ) ≥ vi (S ∪ T ). This important per relaxes the solution concept and considers mechclass of valuations contains other interesting classes. anisms that are truthful in expectation: truth telling In particular, it strictly contains the class of submodmaximizes the expected profit of each bidder, where ular valuations. Our goal is to find an allocation of the expectation is taken over the internal random the items (S1 , . . . , Sn ) that maximizes the social welcoins of the algorithm. We stress that truthfulness in fare: Σi vi (Si ). The efficiency of our algorithms will expectation is much weaker than universal truthfulbe measured in terms of the natural parameters of ness: in particular, bidders that are not risk neutral the problem: n and m. Since the valuation funcmay not be incentivized to bid truthfully. See [7] for tions are objects of exponential size, we assume that a discussion. they are represented by black boxes that can answer any type of queries. In particular, we assume that In this note we show that there exists a truthful-inbidders are computationally unbounded and measure expectation O( logloglogmm )-approximation mechanism only the amount of communication between them. that uses only polynomial amount of communication. Feige [8] obtains a 2-approximation algorithm by While this only slightly improves the best approximaapplying an ingenious randomized rounding. This tion ratio provided by universally truthful algorithms is the best possible [6] in polynomial communica- (at the cost of weakening the solution concept), we tion. Much research was concerned with the design feel that this result is of interest for two main reasons of truthful algorithms for the problem: algorithms (1) the random-sampling based techniques of [3] do in which a profit-maximizing strategy for each bid- not seem capable of achieving a better than a loga1

rithmic factor, so this result might hint at a performance gap between truthful-in-expectation and universally truthful mechanisms in our setting, and (2) our rounding technique is non-trivial and may be of independent interest. Our algorithm is described in the communication complexity model. The model is best suited for proving strong, unconditional impossibility results. However, if we want algorithms designed in the model to be useful, they should not take advantage of the unlimited computational power of the bidders. Indeed, essentially all known algorithms known for combinatorial auctions need polynomially bounded computation power and use a restricted and natural communication form, e.g., demand queries (given prices per item p1 , . . . , pm return a bundle that maximizes the profit). Unfortunately, we do not know how to implement our algorithm using demand queries, or any other type of natural query. In a sense, this is an abuse of the communication complexity model; hence we recommend viewing our result as demonstrating the falsehood of certain strong impossibility results for the problem, rather than as a “real” mechanism suitable for use in combinatorial auctions. Let us briefly discuss the techniques we use. Almost all truthful deterministic mechanisms known in the literature are maximal-in-range, a scaled-down version of the classic VCG mechanism: for every set of valuations, select the welfare-maximizing allocation in a predefined set of allocations. However, as mentioned above, [5] shows that this method can only guarantee a poor approximation ratio in our setting. One way to overcome this obstacle was spelled out by [4] which suggested the use of maximal in distributional range (MIDR) mechanisms: for every set of valuations, select the welfare-maximizing distribution in a predefined set of distributions over allocations, then sample an allocation from this distribution. This results in a truthful-in-expectation mechanism. Furthermore, in [4] it is shown that for some problems MIDR mechanisms may be more powerful than any universally truthful mechanism. Our mechanism is also MIDR1 . The basic idea is to represent each bidder by a proxy bidder, find the optimal fractional solution among these proxy bidders, and then round the fractional solution. Each proxy bidder is defined so that he “simulates” the expected value of the bundle after the randomized rounding. The main obstacle is to prove feasibility while still

being able to relate the value of the rounded solution (that was calculated with respect to the proxy bidders) to the original bidders. We note that Lavi and Swamy [9] already implicitly used maximal-in-distributional-range algorithms together with the LP relaxation of the problem. Our solution requires a subtler rounding of the LP, and in particular overcomes one of the main barriers of [9]: their decomposition is based on an algorithm that “verifies” the integrality gap, and thus √they can only provide a truthful-in-expectation O( m)approximation mechanism for our setting. Our mechanism uses a direct approach to “decompose” a linear program with proxy bidders. This is one of the main reasons for our success in guaranteeing a better approximation ratio. The main question we leave open is the existence of a constant-ratio truthful-in-expectation mechanism for combinatorial auctions with subadditive bidders. A first step in this direction might be to prove that no MIDR mechanism can achieve an O(1) approximation in polynomial time.

2

The Mechanism

2.1

The Range

We first remind the reader of the linear program relaxation of the problem: Maximize: Σi,S xi,S vi (S) Subject to: • For each item j: Σi,S|j∈S xi,S ≤ 1 • for each bidder i: ΣS xi,S ≤ 1 • for each i, S: xi,S ≥ 0 Definition 2.1 A distribution D over (not necessarily feasible) allocations is called (c, p)-fractional if there exists a feasible fractional solution {xi,S }i,S to the LP such that D is equal to the distribution produced by the following process: with probability p no bidder is allocated any item. With probability 1 − p each bidder i receives exactly one bundle S with probability xi,S and keeps each item j ∈ S with probability c, independently at random. Definition 2.2 (the range) The range Rc,p consists of all (c, p)-fractional distributions.

1 In fact, our range will consist of distributions over infeasible allocations, but we will always output a distribution over feasible allocations with the same expected welfare as the best distribution in the range. Hence the mechanism is equivalent to MIDR (see [5]), and truthfulness in expectation follows.

Before proving that there is one distribution in Rc,p that provides a good approximation, we require the following definition: 2

Definition 2.3 Given a valuation v, let the c-proxy valuation v 0 be:

time in n). Also, from now on we fix c =

1

100 log m log log m +1

1 . We first have to make sure that the and p = 20 algorithm is correctly defined. For that we have to prove that p ≤ 1 − qi , for every qi . This follows from the next claim [8, 6]:

v 0 (S) = ET ∼DS [v(T )] where D is the distribution where each j ∈ S is in T with probability c independently at random.

Claim 2.6 ([8]) Fix any feasible solution of the linear program. Allocate each bidder i exactly one bundle where each bundle S is allocated with probability xi,S . The probability that no item is allocated more 1 than 1c − 1 times is at least 1 − m .

Lemma 2.4 The optimal distribution in a Rc,p 1 range is an O( c·p )-approximation to the optimal social welfare if the valuations are subadditive.

The proof of this lemma immediately follows by Hence 1 − q ≥ 1 − 1 ≥ p, as needed. We now show i m considering the optimal allocation and using the fol- that the algorithm indeed finds the optimal distribulowing proposition from [8]: tion in the range and uses a polynomial amount of Proposition 2.5 (paraphrasing [8]) Let S be a communication. bundle, v a subadditive valuation, and c such that 0 ≤ c ≤ 1 and 1c is an integer. Then, v 0 (S) ≥ c · v(S), where v 0 is the c-proxy valuation of v.

Lemma 2.7 The algorithm finds a distribution with value that equals the distribution with the maximum expected welfare in R(c,p) .

2.2

Proof: Notice that the optimal solution of the linear program with the proxy valuations is exactly the expected value of the optimal distribution in Rc,1 : the proxy valuations “simulate” the random process where each bidder keeps each item with probability c. Thus, it suffices to prove that the algorithm always finds a solution with value exactly p · OP T , where OP T is the value of the optimal solution of the LP. This will guarantee us that the expected value of the solution equals R(c,p) . We note that strict equality instead of a bound is needed here, as required by the definition of MIDR. Notice that after the tentative assignment in Step 3 the expected value of the sum of the tentative bundles (with respect to the proxy valuations) is exactly the value of the optimal solution of the linear program. After step 6 the expected value of the bundles assigned to the bidders (now with respect to the real valuations) is greater than p · OP T . The last step “cancels” some of the allocations so that if bidder i was allocated bundle S, the probability he will be allocated some items from S (i.e., the probability that auction is not canceled at Step 3 and that he keeps some items at Step 7) is exactly p · xi,S . (The probability of keeping the items in Step 7 is defined in terms of qi so that the eventual probability of keeping the items is not affected by the tentatively allocated bundle Si .) Thus the expected value of the solution is exactly p · OP T , as needed.

The Algorithm

1. For each valuation vi of bidder i, let vi0 be the c-proxy valuation. 2. Solve the linear program relaxation of the problem with respect to the c-proxy valuations vi0 . 3. Each bidder i is tentatively assigned exactly one bundle Si , where bundle S is allocated to i with probability exactly xi,S . 4. For each item j that is allocated more than times, set Si = ∅ for each Si such that j ∈ Si .

1 c

5. For each bidder i, let qi be the probability that some item in Si was allocated more than 1c − 1 times in the following random experiment: each bidder i0 , i0 6= i, is allocated bundle S with probability xi,S . 6. Independently for each item j ∈ S, select at most one bidder to receive j, so that each bidder that is tentatively allocated Si where j ∈ Si receives item j with probability exactly c. p 7. For each bidder i, with probability 1 − 1−q he i is not allocated any items, and with probability p 1−qi he keeps the items that he was assigned in the previous step.

We note that the last step of the algorithm is a reimplementation of the main idea behind the truthfulin-expectation mechanism for single-minded bidders of [1]. In our proofs we assume m is large enough (when m is a constant, VCG can be implemented in polynomial

Lemma 2.8 The communication complexity of the algorithm is polynomial in n and m. Proof: The only two steps for which it is not obvious that only polynomial communication is required 3

are Steps 2 and the calculation of the qi ’s. In Step [8] Uriel Feige. On maximizing welfare where the 2 we solve a linear program that calculates the oputility functions are subadditive. In STOC’06. timal fractional solution for some valuations. This can be done in polynomial communication, as long [9] Ron Lavi and Chaitanya Swamy. Truthful and near-optimal mechanism design via linear proas demand queries are available [2]. In our case we gramming. In FOCS 2005. need to compute answers to demand queries with respect to the proxy valuations. This can be done by each bidder i with no additional communication since each proxy valuation vi0 depends only on vi . We note that the support of the solution of the linear program consists only of polynomially many variables [2]. Calculating each qi can be done using no communication cost simply by enumerating over all possible outputs of the random coins. Together we have: Theorem 2.9 There exists a truthful-in-expectation O( logloglogmm )-approximation mechanism for combinatorial auctions with submodular bidders. The algorithm uses polynomial communication. Acknowledgments We thank Shaddin Dughmi and Tim Roughgarden for pointing out a bug in an earlier version of this note.

References [1] A. Archer, C. Papadimitriou, K. Talwar, and E. Tardos. An approximate truthful mechanism for combinatorial auctions with single parameter agent. In SODA’03. [2] Liad Blumrosen and Noam Nisan. On the computational power of demand queries. SIAM J. Comput., 39(4):1372–1391, 2009. [3] Shahar Dobzinski. Two randomized mechanisms for combinatorial auctions. In APPROX, 2007. [4] Shahar Dobzinski and Shaddin Dughmi. On the power of randomization in algorithmic mechanism design. In FOCS’09. [5] Shahar Dobzinski and Noam Nisan. Limitations of vcg-based mechanisms. Preliminary version in STOC’07. [6] Shahar Dobzinski, Noam Nisan, and Michael Schapira. Approximation algorithms for combinatorial auctions with complement-free bidders. In STOC’05. [7] Shahar Dobzinski, Noam Nisan, and Michael Schapira. Truthful randomized mechanisms for combinatorial auctions. In STOC’06. 4

Truthfulness via Proxies

Feb 4, 2011 - Cornell Unversity [email protected]. Hu Fu. Department of Computer Science. Cornell Unversity [email protected]. Robert Kleinberg.

136KB Sizes 1 Downloads 288 Views

Recommend Documents

Trustworthy Proxies - Research at Google
In a language with both proxies and objects with invariants, these features in- teract. ...... 8 See http://wiki.ecmascript.org/doku.php?id=harmony:weak_maps.

Language Support for Distributed Proxies
lems associated with using proxies in a distributed system. We believe that proxies in ... date) from XML types to Object types and vice versa. We describe these ...

Setting Lower Bounds on Truthfulness
prove our lower bounds for this problem in the inter-domain routing setting ..... 100 otherwise. Let M be a deterministic, weakly-monotone, mechanism that ...... We assume that for every i vi(∅) = 0 (free disposal) and for every two bundles of ...

+135#Buy; 'Premium Socks Proxies Service (1 month)'
I wasnt getting very good swings or run production when we did soft toss or live pitching.....I broke ... Cheap Windows VPS & Linux VPS - VirMach.com The Best .

Improved Lower Bounds for Non-Utilitarian Truthfulness
Allocation algorithm – attends to the algorithmic issue. (solves the ... Given any optimal allocation algorithm, there is no payment scheme ...... Open Questions.

Proxies: Design Principles for Robust Object ... - Research at Google
3. Javascript. Javascript is a scripting language whose language runtime is often embedded .... standard way of intercepting method calls based on Smalltalk's.

Christian Faith and the Truthfulness of Bible History - PCA Historical ...
Jul 18, 2008 - nal facts of Sacred History, leads straightway to the inference: if these facts are ..... facts, so that not even by the greatest stretch of tolerance can I call him a Christian in ... tian faith: it touches what to us is the centre. I

Christian Faith and the Truthfulness of Bible History - PCA Historical ...
Jul 18, 2008 - It has enabled students of the Word of God to lay aside their preconceptions ... conducted with a naturalistic bias and with the use of foolish methods—even there ..... theme, before these facts had transpired. But the important ...

A The Computational Complexity of Truthfulness in ...
the valuation function more substantially than just the value of a single set. ...... This is a convex function of c which is equal to (1−1/e)pm|U| at c = 0 and equal to ...

Via 1617(a) @ via ac97 enhanced audio controller driver download ...
Hp laserjet p1005 drivers windows 7 free download.Intrudactoun tuVia ... Download printer driver for hp officejet pro 8500.288489471588365.Dell 968 aio printer driver windows 7.Download Via ... Canon dr-3060 scsiscanner device driver.

Via Valeriana.pdf
... integratori alimentari, macchina fotografica,. maglietta tecnica di ricambio, occhiali e cappello da sole. Ai partecipanti iscritti verranno forniti i contatti telefonici.

Isomorphism via full groups
Suppose that X is a Polish space and E is a countable Borel equivalence relation on X. The full group of E is the group [E] of Borel automorphisms f : X → X such that graph(f) ⊆ E. The full semigroup of E is the semigroup [E] of Borel isomorphism

Driver via vt1708 a via vt8237s high definition audio controller ...
High power wireless usb adapter driver mac.Ntl usb ... Driver da placa maeasus p5pe-vm. Aceraspire ... Pdf printer driver download windows xp.Intelr 845g ...

lynda via bpl.pdf
http://www.bpl.org/general/circulation/ecards.htm. Click on “Get oR Renew Your eCard” ... lynda via bpl.pdf. lynda via bpl.pdf. Open. Extract. Open with. Sign In.

casos via FJ.pdf
Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... casos via FJ.pdf. casos via FJ.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying casos via FJ.pdf.

Via Curcis VerboDivino.pdf
Page 3 of 8. Via Curcis VerboDivino.pdf. Via Curcis VerboDivino.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Via Curcis VerboDivino.pdf.

Díptic Via Ferrada.pdf
Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... Díptic Via Ferrada.pdf. Díptic Via Ferrada.pdf. Open. Extract. Open with.

Notam voorbeelden via CLR.pdf
A) ICAO code van FIR en/of airport waarvoor deze NOTAM van toepassing is. B) Datum en tijd (10 digit groep met jaar, maand, dag, uur, minuten () waarop ...

Achieving Anonymity via Clustering - Stanford CS Theory
2Department of Computer Science, Stanford University,. Stanford, CA .... year with a maximum of 100 years. In this ... clustering with minimum cluster size r = 2, applied to the table in .... the clause nodes uj have degree at most 3 and cannot be.

Garment Personalization Via Identity Transfer.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Garment ...

Accelerated Distributed Average Consensus Via ...
Sep 17, 2008 - Telecommunications and Signal Processing–Computer Networks Laboratory. Department of Electrical and Computer Engineering ... A. Related Work ... its powers), retain a history of all state values, and then solve a system of ..... with

Achieving anonymity via clustering - Research at Google
[email protected]; S. Khuller, Computer Science Department, Unversity of Maryland, .... have at least r points.1 Publishing the cluster centers instead of the individual ... with a maximum of 1000 miles, while the attribute age may differ by a

Concerns about reputation via gossip.pdf
the receiver. The receiver is simply a passive recipient and. has no sanctioning power over the dictator's actions (cf. the. ultimatum game; e.g., Bolton & Zwick, ...

VIA MIX-OXIDE SINTERING ROUTE
obtaining a single phase Lead Zirconate nano- powders was 25h milling, followed by calcination at 800oC for .... Mat Letters 2007;. 61: 2822-6. 8. Puchmark C, Jiansirisomboon S, Rujijanagul. G, Tunkasiri T. Effect of Sintering. Temperatures on Phase