Web-Mining Agents Rules of Encounter

Slides:



Advertisements
Similar presentations
Distributed AI an overview. D Goforth - COSC 4117, fall Why distributed AI? situated expert – the importance of general knowledge and incorporation.
Advertisements

(Single-item) auctions Vincent Conitzer v() = $5 v() = $3.
Reaching Agreements I. 2 Outline Motivation Mechanism Design Auctions Negotiation.
Reaching Agreements II. 2 What utility does a deal give an agent? Given encounter  T 1,T 2  in task domain  T,{1,2},c  We define the utility of a.
CPS Bayesian games and their use in auctions Vincent Conitzer
Nash’s Theorem Theorem (Nash, 1951): Every finite game (finite number of players, finite number of pure strategies) has at least one mixed-strategy Nash.
Auctions Auction types: –First price, sealed bid auction –Second price, sealed bid auction –English auction (ascending bid auction) –Dutch auction (descending.
Multi-item auctions with identical items limited supply: M items (M smaller than number of bidders, n). Three possible bidder types: –Unit-demand bidders.
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Negotiation Martin Beer, School of Computing & Management Sciences, Sheffield Hallam University, Sheffield, United Kingdom
SIF8072 Distributed Artificial Intelligence and Intelligent Agents
Do software agents know what they talk about? Agents and Ontology dr. Patrick De Causmaecker, Nottingham, March
Auctions Ruth Tarrant. Classifying auctions What is the nature of the good being auctioned? What are the rules of bidding? Private value auction Common.
Negotiation A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor SIUC.
Introduction to Game Theory
An Introduction to Game Theory Part I: Strategic Games
SARANI SAHABHATTACHARYA, HSS ARNAB BHATTACHARYA, CSE 07 JAN, 2009 Game Theory and its Applications.
Game-Theoretic Approaches to Multi-Agent Systems Bernhard Nebel.
Design of Multi-Agent Systems Teacher Bart Verheij Student assistants Albert Hankel Elske van der Vaart Web site
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
Review: Game theory Dominant strategy Nash equilibrium
VAMSEE KONERU PRADNYA SUTE
Distributed Rational Decision Making Sections By Tibor Moldovan.
CONSISTENCY MAINTENANCE AND NEGOTIATION. What Is a TMS? A truth maintenance system performs some form of propositional deduction maintains justifications.
This Week’s Topics  Review Class Concepts -Auctions, continued -Repeated Games -Bertrand Trap & Anti-Trust -Auctions.
Collusion and the use of false names Vincent Conitzer
EEL 5708 Competitive behavior in multi-agent systems.
Consensus: Multi-agent Systems (Part1) Quantitative Analysis: How to make a decision? Thank you for all referred pictures and information.
7-1 LECTURE 7: Reaching Agreements An Introduction to MultiAgent Systems
7-1 LECTURE 7: Reaching Agreements An Introduction to MultiAgent Systems
7-1 LECTURE 7: Reaching Agreements An Introduction to MultiAgent Systems
Auction Theory תכנון מכרזים ומכירות פומביות Topic 7 – VCG mechanisms 1.
Auctions and Bidding. 2 Auction Theory Auction theory is important for practical reason empirical reason –testing-ground for economic theory, especially.
Steffen Staab 1WeST Web Science & Technologies University of Koblenz ▪ Landau, Germany Network Theory and Dynamic Systems Auctions.
How to Analyse Social Network? : Part 2 Game Theory Thank you for all referred contexts and figures.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
1 Types of Auctions English auction –ascending-price, open-outcry Dutch auction –descending-price, open-outcry 1 st price sealed bid auction –known as.
Chapter 12 Game Theory Presented by Nahakpam PhD Student 1Game Theory.
7-1 LECTURE 7: Reaching Agreements An Introduction to MultiAgent Systems
Comp/Math 553: Algorithmic Game Theory Lecture 10
Ralf Möller Institut für Informationssysteme Universität zu Lübeck
Contents of the Talk Preliminary Materials Motivation and Contribution
Management support systems II
LECTURE 7: Reaching Agreements
False-name Bids “The effect of false-name bids in combinatorial
LECTURE 7: Reaching Agreements
Bayesian games and their use in auctions
Comp/Math 553: Algorithmic Game Theory Lecture 08
CPS Mechanism design Michael Albert and Vincent Conitzer
Auctions and Competitive Bidding
Service-Oriented Computing: Semantics, Processes, Agents
Comp/Math 553: Algorithmic Game Theory Lecture 09
Market/Agent-Oriented Programming
Tuomas Sandholm Computer Science Department Carnegie Mellon University
Internet Economics כלכלת האינטרנט
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
Service-Oriented Computing: Semantics, Processes, Agents
Decision Theory and Game Theory
Unit 4 SOCIAL INTERACTIONS.
Authors: Oren Rigbi Damian Goren
Vincent Conitzer Mechanism design Vincent Conitzer
Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer
Market Oriented Programming
Preference elicitation/ iterative mechanisms
Market Oriented Programming
Game Theory: The Nash Equilibrium
Information, Incentives, and Mechanism Design
Auction Theory תכנון מכרזים ומכירות פומביות
Vincent Conitzer CPS Mechanism design Vincent Conitzer
CPS Bayesian games and their use in auctions
Presentation transcript:

Web-Mining Agents Rules of Encounter Prof. Dr. Ralf Möller Universität zu Lübeck Institut für Informationssysteme Tanya Braun (Übungen)

Acknowledgements to… … and to many other lecturers who have shared their slides on the web!

Mechanisms, Protocols, and Strategies The mechanism defines the “rules of encounter” between agents Mechanism design is designing mechanisms so that they have certain desirable properties Given a particular protocol, how can a particular strategy be designed that individual agents can use? Notion of a dominant strategy Best strategy can be determined w/o considering the (best) strategies of other agents

Example: Prisoner’s Dilemma Two people are arrested for a crime. If neither suspect confesses, both are released. If both confess then they get sent to jail. If one confesses and the other does not, then the confessor gets a light sentence and the other gets a heavy sentence. A: Don’t Confess A: Confess B=-5, A=-5 B=-1, A=-10 B=-10, A=-1 B=-2, A=-2 Dom. Str. Eq B:Confess Pareto Optimal Outcome B:Don’t Confess Dominant strategy exists but is not Pareto efficient

Example: Split or Steal Does communication help? Only if agents do not lie A: Steal A: Split Dom. Str. Eq B=0, A=0 B=100, A=-10 B=-10, A=100 B=50, A=50 B:Steal Pareto Optimal Outcome B:Split

Example: Bach or Stravinsky A couple likes going to concerts together. One loves Bach but not Stravinsky. The other loves Stravinsky but not Bach. However, they prefer being together than being apart. B S 2,1 0,0 1,2 B No dom. str. equil. S

Nash Equilibrium Sometimes an agent’s best-response depends on the strategies other agents are playing No dominant strategy equilibria A strategy profile is a Nash equilibrium if no player has incentive to deviate from his strategy given that others do not deviate B S B 2,1 0,0 1,2 S

Mechanism Design Protocol such that agent can determine their actions Desirable properties of mechanisms: Convergence/guaranteed success Maximizing social welfare Pareto efficiency Individual rationality Stability Simplicity Distribution

Auctions An auction takes place between an agent known as the auctioneer and a collection of agents known as the bidders The goal of the auction is for the auctioneer to allocate the good to one of the bidders In most settings the auctioneer desires to maximize the price; bidders desire to minimize price

Auction Parameters Goods can have Winner determination may be private value public/common value correlated value Winner determination may be first price second price Bids may be open cry sealed bid Bidding may be one shot ascending descending

English Auctions Most commonly known type of auction: first price open cry ascending Dominant strategy is for agent to successively bid a small amount more than the current highest bid until it reaches their valuation, then withdraw Susceptible to: winner’s curse shills

Dutch Auctions Dutch auctions are examples of open-cry descending auctions: auctioneer starts by offering good at artificially high value auctioneer lowers offer price until some agent makes a bid equal to the current offer price the good is then allocated to the agent that made the offer

First-Price Sealed-Bid Auctions First-price sealed-bid auctions are one-shot auctions: there is a single round bidders submit a sealed bid for the good good is allocated to agent that made highest bid winner pays price of highest bid Best strategy is to bid less than true valuation

Example: 1st price sealed-bid auction 2 agents (1 and 2) with values v1,v2 drawn uniformly from [0,1]. Utility of agent i if it bids bi and wins the item is ui=vi-bi. Assume agent 2’s bidding strategy is b2(v2)=v2/2 How should 1 bid? (i.e. what is b1(v1)=z?) U1=∫x=02z(v1-x)dx = [v1x-(1/2)x2]02z = 2zv1-2z2 Note: given b2(v2)=v2/2, 1 only wins if v2<2z otherwise U1 is 0 argmaxz[2zv1-2z2 ] when z=b1(v1)=v1/2 Similar argument for agent 2, assuming b1(v1)=v1/2. We have an equilibrium

Vickrey Auctions Vickrey auctions are: second-price sealed-bid Good is awarded to the agent that made the highest bid; at the price of the second highest bid Bidding to your true valuation is dominant strategy in Vickrey auctions Vickrey auctions susceptible to antisocial behavior

Phone Call Competition Example Customer wishes to place long-distance call Carriers simultaneously bid, sending proposed prices Phone automatically chooses the carrier (dynamically) MCI AT&T Sprint $0.20 $0.23 $0.18

MCI AT&T Sprint Best Bid Wins Phone chooses carrier with lowest bid Carrier gets amount that it bid MCI AT&T Sprint $0.20 $0.23 $0.18

Attributes of the Mechanism Distributed Symmetric Stable Simple Efficient Carriers have an incentive to invest effort in strategic behavior AT&T “Maybe I can bid as high as $0.21...” MCI Sprint $0.20 $0.18 $0.23

Best Bid Wins, Gets Second Price (Vickrey Auction) Phone chooses carrier with lowest bid Carrier gets amount of second-best price MCI AT&T Sprint $0.20 $0.23 $0.18

Attributes of the Vickrey Mechanism Distributed Symmetric Stable Simple Efficient Carriers have no incentive to invest effort in strategic behavior AT&T “I have no reason to overbid...” MCI Sprint $0.20 $0.18 $0.23

Lies and Collusion The various auction protocols are susceptible to lying on the part of the auctioneer, and collusion among bidders, to varying degrees All four auctions (English, Dutch, First-Price Sealed Bid, Vickrey) can be manipulated by bidder collusion A dishonest auctioneer can exploit the Vickrey auction by lying about the 2nd-highest bid Shills can be introduced to inflate bidding prices in English auctions

Negotiation Auctions are only concerned with the allocation of goods: richer techniques for reaching agreements are required Negotiation is the process of reaching agreements on matters of common interest

Bargaining, Mechanims, Strategies, Deals Negotiations can involve Exchange of information Relaxation of initial goals Mutual concession Negotiations governed by mechanism (or protocol) Rules of encounter between the agents Public rules by which the agents will come to agreements Stategies that agents should use Deals that can be made Sequence of offers and counter-offers that can be made

Negotiation in Applications Task-oriented domains (TOD) Each agent is associated with a set of tasks (e.g., web mining tasks) Goal: redistribute tasks such that costs of completing the tasks is reduced/minimized State-oriented domains (SOD ⊇ TOD) Each agent has a set of goal states it would like to achieve Use negotiation to achieve a common goal (actions can have positive or negative side effects) Worth-oriented domains (WOD ⊇ SOD) Agents assign worth to state (agent-local utility) Goal: maximize mutual worth / compromise on goals

How many agents? One to one One to many (auction is an example of one seller and many buyers) Many to many (could be divided into buyers and sellers, or all could be identical in role – like officemate) n(n-1)/2 number of pairs

Negotiation Process Negotiation usually proceeds in a series of rounds, with every agent making a proposal at every round. Communication during negotiation: Another way of looking at the negotiation process: Who ”moves” the farthest Proposal Counter Proposal Agenti concedes Agenti Agentj Proposals by Aj Proposals by Ai Point of Acceptance/ aggreement

Types of deals Conflict deal: keep the same tasks as had originally Pure – divide up tasks Mixed – we divide up the tasks, but we decide probabilistically who should do what All or Nothing (A/N) - Mixed deal, with added requirement that we only have all or nothing deals (one of the tasks sets is empty)

TOD Examples Parcel Delivery Database Query Answering / Web Mining Several couriers have to deliver sets of parcels to different cities. Target of negotiation is to reallocate deliveries so that the cost of travel for each courier is minimal. Database Query Answering / Web Mining Scenario 1: Several agents have access to a common database / web area, and each has to carry out a set of queries Target of negotiation is to arrange queries so as to maximize efficiency of database operations (Selection, Projection, Join, …) E.g., "you are doing a join as part of another operation, so please save the results for me" Scenario 2: Several agents have to access an overlapping set of web areas Agree on reallocation and share results

Negotiation Protocols Who begins Take turns Single or multiple issues Build off previous offers Give feedback (or not). Tell what utility is (or not) Obligations – requirements for later Privacy (not share details of offers with others) Allowed proposals you can make as a result of negotiation history Process terminates (hopefully)

Criteria of a Negotiation Protocols Efficiency – do not waste utility. Pareto Optimal Stability – no agent have incentive to deviate from dominant strategy Simplicity – low computational demands on agents (e.g., no counter-speculation required  "dominant strategy" exists) Distribution – no central decision maker Symmetry (possibly) – may not want agents to play different roles

Task-oriented domain (TOD) A task-oriented domain is a triple <T, Ag, c> where T is the (finite) set of all possible tasks Ag = {1,…,n} is the set of participating agents c = (T)  R defines the cost of executing each subset of tasks Constraints on the cost function c: If T  T, then c(T)  c (T) (monotonicity). c() = 0

The case of two agents Let (T1, T2) be the original tasks of two agents and let  = (D1, D2) be a new task allocation ( a deal ), i.e., T1  T2 = D1  D2 An agent i’s utility of a deal  is defined as follows: utilityi() = c(Ti) – c(Di) 1 dominates 2 when one agent is better off and none is worse off

The negotiation set The negotiation set consists of the deals that are Pareto efficient and individual rational. A deal is Pareto efficient if it is not dominated by another task allocation A deal is individual rational if neither agent is worse off than in the original allocation (the ‘conflict deal’) Negotiation set Utility of agent 2 Individual rational Utility of agent 1 Conflict deal

Monotonic Concession Protocol Both agents make several small concessions until an agreement is reached. Each agent proposes a deal If one agent matches or exceeds what the other demands, the negotiation ends Else, each agent makes a proposal that is equal or better for the other agent (concede) If no agent concedes, the negotiation ends with the conflict deal

Monotonic Concession Protocol Utility of agent 1 Utility of agent 2 21 22 12 11

Monotonic Concession Protocol Properties Termination: guaranteed if the agreement space is finite Verifiability: easy to check that an opponent really concedes (only one’s own utility function matters) Criticism You need to know your opponent’s utility function to be able to concede (typical assumption in game theory; not always appropriate)

Monotonic Concession Protocol What is a good negotiation strategy for the Monotonic Concession Protocol? Consider danger of getting it wrong: If you concede too often (or too much), then you risk not getting the best possible deal for yourself. If you do not concede often enough, then you risk conflict (which has utility 0).

Zeuthen strategy Idea: measure willingness to risk conflict 2 1 Utility of agent 1 Utility of agent 2 Idea: measure willingness to risk conflict 2 1

Zeuthen strategy Start with deal that is best among all deals in the negotiation space Calculate willingness to risk conflict of self and opponent If willingness to risk conflict is smaller than opponent, offer minimal sufficient concession (a sufficient concession makes opponent’s willingness to risk conflict less than yours); else offer original deal

Deception in task-oriented domains Deception can benefit agents in two ways: Phantom and decoy tasks Pretending that you have been allocated tasks you have not Hidden tasks Pretending not to have been allocated tasks that you have been

Evaluation The game-theoretic approach to reaching agreement has pros and cons: PRO: Desirable properties of protocols provable CON: Positions cannot be justified CON: Positions cannot be changed Alternative: Argumentation

Logic-based Argumentation Database ├ (Sentence, Grounds) Database is a (possibly inconsistent) set of logical formulae Sentence is a logical formula known as the conclusion Grounds is a set of logical formulae such that: Grounds  Database; and Sentence can be proved from Grounds

Argument attack Let (C1, G1) and (C2, G2) be arguments from some database D. (C1, G1) rebuts (C2, G2) if C1  C2 (C1, G1) undercuts (C2, G2) if C1  S for some S  G2 Rebuttals and undercuts are known as attacks.

Abstract Argumentation An abstract argument system is a collection or arguments together with a relation “” indicating what attacks what Labeling: An argument is out (defeated) if (and only if) it has an undefeated attacker, and in (undefeated) if all its attackers are defeated Out-in labelings obeying this constraint do not always exist and are not always unique.

Computing labelings Idea for an algorithm: Label all nodes that can have no in attacker in a complete labeling as in. (Having no attackers at all will do.) Label all nodes with an in attacker as out. Go to 1 if changes were made; else stop.

An Example Abstract Argument System in out That’s it! BTW: In this case there exists no complete labeling. (Why?)