1 Combinatorial Agency with Audits Raphael Eidenbenz ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in EMF. Read the TexPoint.

Slides:



Advertisements
Similar presentations
Copyright © 2004 South-Western 22 Frontiers of Microeconomics.
Advertisements

Reaching Agreements II. 2 What utility does a deal give an agent? Given encounter  T 1,T 2  in task domain  T,{1,2},c  We define the utility of a.
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
C&O 355 Mathematical Programming Fall 2010 Lecture 12 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
© 2007 Thomson South-Western. ASYMMETRIC INFORMATION A difference in access to relevant knowledge is called information asymmetry.
Effort Games and the Price of Myopia Michael Zuckerman Joint work with Yoram Bachrach and Jeff Rosenschein.
1 On the Methodology of Inequity Aversion Theory.
The Stag Hunt Game. Introduction The stag hunt, first proposed by Rousseau, is a game which describes a conflict between safety and social cooperation.
Chapter 6 Game Theory © 2006 Thomson Learning/South-Western.
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
Upper bounds for asymmetric Ramsey properties of random graphs Reto Spöhel, ETH Zürich Joint work with Yoshiharu Kohayakawa, Universidade de São Paulo.
On the relation between probabilistic and deterministic avoidance games Torsten Mütze, ETH Zürich Joint work with Michael Belfrage (ETH Zürich), Thomas.
Crowdsourced Bayesian Auctions MIT Pablo Azar Jing Chen Silvio Micali ♦ TexPoint fonts used in EMF. ♦ Read the TexPoint manual before you delete this box.:
A Computational Characterization of Multiagent Games with Fallacious Rewards Ariel D. Procaccia and Jeffrey S. Rosenschein.
Chapter 6 © 2006 Thomson Learning/South-Western Game Theory.
Manipulation in Games Raphael Eidenbenz Yvonne Anne Oswald Stefan Schmid Roger Wattenhofer Distributed Computing Group ISAAC 2007 Sendai, Japan December.
1 Truthful Mechanism for Facility Allocation: A Characterization and Improvement of Approximation Ratio Pinyan Lu, MSR Asia Yajun Wang, MSR Asia Yuan Zhou,
Chapter 2 The Base Model Stefan P. Schleicher University of Graz Economics of Information Incentives and Contracts.
Game-Theoretic Approaches to Multi-Agent Systems Bernhard Nebel.
Complexity Results about Nash Equilibria
An Introduction to Game Theory Part II: Mixed and Correlated Strategies Bernhard Nebel.
Strong Implementation of Social Choice Functions in Dominant Strategies Clemens ThielenSven O. Krumke 3rd International Workshop on Computational Social.
Taxation and Stability in Cooperative Games Yair Zick Maria Polukarov Nick R. Jennings AAMAS 2013.
Harsanyi transformation Players have private information Each possibility is called a type. Nature chooses a type for each player. Probability distribution.
Agent Technology for e-Commerce Chapter 10: Mechanism Design Maria Fasli
Distributed Computing Group TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA Distributed Asymmetric Verification.
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis By Byung-Gon Chun et al. UC Berkeley PODC’04.
Rationality and information in games Jürgen Jost TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A A A AAA Max Planck.
Probabilistic one-player vertex-coloring games via deterministic two-player games The deterministic game Torsten Mütze, ETH Zürich Joint work with Thomas.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Coloring random graphs online without creating monochromatic subgraphs Torsten Mütze, ETH Zürich Joint work with Thomas Rast (ETH Zürich) and Reto Spöhel.
Adverse Selection & Renegotiation in Procurement (The Review of Economic Studies 1990) work of: Jean-Jacques Laffont & Jean Tirole presented by: Deepak.
On Bounded Rationality and Computational Complexity Christos Papadimitriou and Mihallis Yannakakis.
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
EC941 - Game Theory Francesco Squintani Lecture 3 1.
Communication Networks A Second Course Jean Walrand Department of EECS University of California at Berkeley.
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
Semester 2, Seminar 7 – Contracting & Accounting Information Financial Accounting.
Copyright © 2009 by Pearson Education Canada Chapter 9 An Analysis of Conflict.
Mechanisms for Making Crowds Truthful Andrew Mao, Sergiy Nesterko.
Experiments with the Volunteer‘s Dilemma Game
Introduction 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A.
Sequences of Take-It-or-Leave-it Offers: Near-Optimal Auctions Without Full Valuation Revelation Tuomas Sandholm and Andrew Gilpin Carnegie Mellon University.
Small subgraphs in the Achlioptas process Reto Spöhel, ETH Zürich Joint work with Torsten Mütze and Henning Thomas TexPoint fonts used in EMF. Read the.
Bounding the Cost of Stability in Games with Restricted Interaction Reshef Meir, Yair Zick, Edith Elkind and Jeffrey S. Rosenschein COMSOC 2012 (to appear)
Online Ramsey Games in Random Graphs Reto Spöhel, ETH Zürich Joint work with Martin Marciniszyn and Angelika Steger TexPoint fonts used in EMF. Read the.
Moshe Tennenholtz, Aviv Zohar Learning Equilibria in Repeated Congestion Games.
Uri Zwick Tel Aviv University Simple Stochastic Games Mean Payoff Games Parity Games TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
Network Economics -- Lecture 2: Incentives in P2P systems and reputation systems Patrick Loiseau EURECOM Fall 2012.
Automated Mechanism Design Tuomas Sandholm Presented by Dimitri Mostinski November 17, 2004.
Explicit versus Implicit Contracts for Dividing the Benefits of Cooperation Marco Casari and Timothy Cason Purdue University.
ETH Zurich – Distributed Computing Group Raphael Eidenbenz, PhD Thesis 1ETH Zurich – Distributed Computing Group PhD Thesis Raphael Eidenbenz Prof. Roger.
Fundamental Limitations of Networked Decision Systems Munther A. Dahleh Laboratory for Information and Decision Systems MIT AFOSR-MURI Kick-off meeting,
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
5.1.Static Games of Incomplete Information
Utility Dependence in Correct and Fair Rational Secret Sharing Gilad Asharov Yehuda Lindell Bar-Ilan University, Israel.
Avoiding small subgraphs in the Achlioptas process Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas TexPoint fonts used in EMF.
On the path-avoidance vertex-coloring game Torsten Mütze, ETH Zürich Joint work with Reto Spöhel (MPI Saarbrücken) TexPoint fonts used in EMF. Read the.
1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAA A AA A.
A useful reduction (SAT -> game)
Frontiers of Microeconomics
Convergence, Targeted Optimality, and Safety in Multiagent Learning
Uri Zwick Tel Aviv University
Frontiers of Microeconomics
Bayes Nash Implementation
Normal Form (Matrix) Games
Presentation transcript:

1 Combinatorial Agency with Audits Raphael Eidenbenz ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A

Raphael Eidenbenz, GameNets ‘092 Introduction Grid Computing... –Distributed project orchestrated by one server –Server distributes tasks –Agents compute subtask –Results are sent back to server –Server aggregates result Server / Principal Agents

Raphael Eidenbenz, GameNets ‘093 Introduction: Grid Computing –What are an agent‘s incentives? Payment, fame, altruism –Why not cheat and return a random result? Will principal find out? Not really –Individual computation is a hidden action –Principal can only check whether entire project failed Server / Principal Agents

Raphael Eidenbenz, GameNets ‘094 Introduction: Grid Computing –Project failed Who did a bad job? Whom to pay? –Maybe project still succeeds if only one agent exerts low effort If more than 2/3 of the agents exert high effort... Whom to pay? Server / Principal Agents

Raphael Eidenbenz, GameNets ‘095 Binary Combinatorial Agency [Babaioff, Feldman, Nisan 2006] 1 principal, n selfish risk-neutral agents Hidden actions ={ high effort, low effort } –High effort  subtask succeeds with probability δ –Low effort  subtask succeeds with probability γ Combinatorial project success function –AND: success if all subtasks succeed –OR: success if at least one subtask succeeds –MAJORITY: success if more than half of the agents succeed Principal contracts with agents –Individual payment p i depending on entire project‘s outcome –Assume Nash equilibrium in the created game

Raphael Eidenbenz, GameNets ‘096 Results [Babaioff, Feldman, Nisan 2006] AND technology –Principal either contracts with all agents or with none Depending on her valuation v –One transition point where optimal choice changes OR technology –Principal contracts with k agents, 0 · k · n –With increasing valuation v, there are n transition points where the optimal number k increases by 1

Raphael Eidenbenz, GameNets ‘097 Combinatorial Agency with Audits Grid computing: server can recompute a subtask –Actions are observable at a certain cost κ. –Principal conducts k random audits among the l contracted agents Agent i is audited with probability –Sophisticated contracts If audited and convicted of low effort ! p i =0 even if project successful Server / Principal Agents 

Raphael Eidenbenz, GameNets ‘098 Some Observations The possibility of auditing can never be detrimental Nash Equilibrium if principal contracts l and audits k agents –payment p i –principal utility u –agent utility u i

Raphael Eidenbenz, GameNets ‘099 AND-Technology Project succeeds if all agents succeed δ: agent success probability with high effort γ: agent success probability with low effort There is one transition point v * –for v · v *, contract no agent –for v ¸ v *, contract with all agents and conduct k * audits Transition earlier with the leverage of audits Theorem

Raphael Eidenbenz, GameNets ‘0910 AND-Technology (2 Agents): Principal Utility

Raphael Eidenbenz, GameNets ‘0911 AND-Technology: Benefit from Audits in %

Raphael Eidenbenz, GameNets ‘0912 OR-Technology Project succeeds if at least one agent succeeds δ: agent success probability with high effort γ: agent success probability with low effort There are n transition point v 1 *,v 2 *,...,v n * –for v · v 1 *, contract no agent –for v l-1 * · v · v l *, contract with l agents, conduct k * (l) audits –for v ¸ v n *, contract with all agents and conduct k * (n) audits Conjecture Lemma

Raphael Eidenbenz, GameNets ‘0913 OR-Technology (2 Players): Benefit from Audits in %

Raphael Eidenbenz, GameNets ‘0914 Conclusion If hidden actions can be revealed at a certain cost, the coordinator may improve cooperation and efficiency in a distributed system AND technology –General solution to optimally choose p i, l and k –One transition point with increasing valuation OR technology –Formula for number of audits to conduct if number of contracts given Principal can find optimal solution in O(n) –Probably n transition points Transition points occur earlier with the leverage of audits

Raphael Eidenbenz, GameNets ‘0915 Outlook Test results in the wild –Accuracy of the model? –Does psychological aversion against control come into play? Non-anonymous technologies –Which set of agents to audit? Solve problem independent of technology –Are there general algorithms to solve the principal‘s optimization problem for arbitrary technologies? –What is the complexity? Total rationality unrealistic Thank you!

Raphael Eidenbenz, GameNets ‘0916 Bibliography [Babaioff, Feldman, Nisan 2006]: Combinatorial Agency. EC [Babaioff, Feldman, Nisan 2006]: Mixed Strategies in Combinatorial Agency. WINE [Monderer, Tennenholtz]: k-Implementation. EC [Enzle, Anderson]: Surveillant Intentions and Intrinsic Motivation. J. Personality and Social Psychology 64, [Fehr, Klein, Schmidt]: Fairness and Contract Design. Econometrica 75, 2007.

Raphael Eidenbenz, GameNets ‘0917 Outline Introduction: Grid Computing Combinatorial Agency –Binary Model –Results by Babaioff, Feldman, Nisan Combinatorial Agency with Audits –First Facts –AND technology –OR technology Conclusion Outlook

Raphael Eidenbenz, GameNets ‘0918 Anonymous Technologies Success function t depends only on number of agents exerting high effort –t m : success probability if m agents exert high effort Optimal payments Principal utility Optimal #audits

Raphael Eidenbenz, GameNets ‘0919 AND-Technology Project succeeds if all agents succeed Success function t m =δ m ¢ γ n-m There is one transition point v * –for v · v *, contract no agent –for v ¸ v *, contract with all agents and conduct k * audits Theorem

Raphael Eidenbenz, GameNets ‘0920 AND-Technology: Principal Utility

Raphael Eidenbenz, GameNets ‘0921 MAJORITY Technology Optimal payment where Principal utility