Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.

Slides:



Advertisements
Similar presentations
Truthful Mechanisms for Combinatorial Auctions with Subadditive Bidders Speaker: Shahar Dobzinski Based on joint works with Noam Nisan & Michael Schapira.
Advertisements

Algorithmic mechanism design Vincent Conitzer
6.896: Topics in Algorithmic Game Theory Lecture 20 Yang Cai.
(More on) characterizing dominant-strategy implementation in quasilinear environments (see, e.g., Nisan’s review: Chapter 9 of Algorithmic Game Theory.
Approximating optimal combinatorial auctions for complements using restricted welfare maximization Pingzhong Tang and Tuomas Sandholm Computer Science.
Voting and social choice Vincent Conitzer
CS 886: Electronic Market Design Social Choice (Preference Aggregation) September 20.
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Multi-item auctions with identical items limited supply: M items (M smaller than number of bidders, n). Three possible bidder types: –Unit-demand bidders.
Complexity of manipulating elections with few candidates Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
1 Regret-based Incremental Partial Revelation Mechanism Design Nathanaël Hyafil, Craig Boutilier AAAI 2006 Department of Computer Science University of.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
6.853: Topics in Algorithmic Game Theory Fall 2011 Matt Weinberg Lecture 24.
Using computational hardness as a barrier against manipulation Vincent Conitzer
Using computational hardness as a barrier against manipulation Vincent Conitzer
Algorithmic Applications of Game Theory Lecture 8 1.
Mechanism Design and the VCG mechanism The concept of a “mechanism”. A general (abstract) solution for welfare maximization: the VCG mechanism. –This is.
Complexity Results about Nash Equilibria
Speaker: Ariel Procaccia Joint work with: Michael Zuckerman, Jeff Rosenschein Hebrew University of Jerusalem.
Ron Lavi Presented by Yoni Moses.  Introduction ◦ Combining computational efficiency with game theoretic needs  Monotonicity Conditions ◦ Cyclic Monotonicity.
Ties Matter: Complexity of Voting Manipulation Revisited based on joint work with Svetlana Obraztsova (NTU/PDMI) and Noam Hazon (CMU) Edith Elkind (Nanyang.
Distributed Multiagent Resource Allocation In Diminishing Marginal Return Domains Yoram Bachrach(Hebew University) Jeffrey S. Rosenschein (Hebrew University)
CPS Voting and social choice
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Limitations of VCG-Based Mechanisms Shahar Dobzinski Joint work with Noam Nisan.
Agent Technology for e-Commerce Chapter 10: Mechanism Design Maria Fasli
An Algorithm for Automatically Designing Deterministic Mechanisms without Payments Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie.
Computational Criticisms of the Revelation Principle Vincent Conitzer, Tuomas Sandholm AMEC V.
Junta Distributions and the Average Case Complexity of Manipulating Elections A. D. Procaccia & J. S. Rosenschein.
Complexity of unweighted coalitional manipulation under some common voting rules Lirong XiaVincent Conitzer COMSOC08, Sep. 3-5, 2008 TexPoint fonts used.
Complexity of Mechanism Design Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Automated Mechanism Design: Complexity Results Stemming From the Single-Agent Setting Vincent Conitzer and Tuomas Sandholm Computer Science Department.
Reshef Meir School of Computer Science and Engineering Hebrew University, Jerusalem, Israel Joint work with Maria Polukarov, Jeffery S. Rosenschein and.
Social choice theory = preference aggregation = truthful voting Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Collusion and the use of false names Vincent Conitzer
Introduction complexity has been suggested as a means of precluding strategic behavior. Previous studies have shown that some voting protocols are hard.
Social choice (voting) Vincent Conitzer > > > >
CPS 173 Mechanism design Vincent Conitzer
CPS Voting and social choice Vincent Conitzer
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 21.
The Cost and Windfall of Manipulability Abraham Othman and Tuomas Sandholm Carnegie Mellon University Computer Science Department.
Mechanism Design CS 886 Electronic Market Design University of Waterloo.
Automated Design of Multistage Mechanisms Tuomas Sandholm (Carnegie Mellon) Vincent Conitzer (Carnegie Mellon) Craig Boutilier (Toronto)
Mechanism design. Goal of mechanism design Implementing a social choice function f(u 1, …, u |A| ) using a game Center = “auctioneer” does not know the.
Regret Minimizing Equilibria of Games with Strict Type Uncertainty Stony Brook Conference on Game Theory Nathanaël Hyafil and Craig Boutilier Department.
Complexity of Determining Nonemptiness of the Core Vincent Conitzer, Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Automated Mechanism Design Tuomas Sandholm Presented by Dimitri Mostinski November 17, 2004.
Mechanism design for computationally limited agents Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Mechanism Design II CS 886:Electronic Market Design Sept 27, 2004.
CPS Preference elicitation/ iterative mechanisms Vincent Conitzer
Mechanism design (strategic “voting”) Tuomas Sandholm Professor Computer Science Department Carnegie Mellon University.
Avoiding manipulation in elections through computational complexity Vincent Conitzer Computer Science Department Carnegie Mellon University Guest lecture.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Bayesian Algorithmic Mechanism Design Jason Hartline Northwestern University Brendan Lucier University of Toronto.
11/24/2008CS Common Voting Rules as Maximum Likelihood Estimators - Matthew Kay 1 Common Voting Rules as Maximum Likelihood Estimators Vincent Conitzer,
Computing Shapley values, manipulating value division schemes, and checking core membership in multi-issue domains Vincent Conitzer, Tuomas Sandholm Computer.
Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm.
Bayesian games and mechanism design
Mechanism design for computationally limited agents (last lecture discussed the case where valuation determination was complex) Tuomas Sandholm Computer.
CPS Mechanism design Michael Albert and Vincent Conitzer
Social choice theory = preference aggregation = voting assuming agents tell the truth about their preferences Tuomas Sandholm Professor Computer Science.
Applied Mechanism Design For Social Good
Vincent Conitzer Mechanism design Vincent Conitzer
Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer
Preference elicitation/ iterative mechanisms
Vincent Conitzer Computer Science Department
CPS Preference elicitation/ iterative mechanisms
Vincent Conitzer CPS Mechanism design Vincent Conitzer
Presentation transcript:

Mechanism design for computationally limited agents (previous slide deck discussed the case where valuation determination was complex) Tuomas Sandholm Computer Science Department Carnegie Mellon University

Part I Mechanisms that are computationally (worst-case) hard to manipulate

Voting mechanisms that are worst-case hard to manipulate Bartholdi, Tovey, and Trick The computational difficulty of manipulating an election, Social Choice and Welfare, Bartholdi and Orlin. Single Transferable Vote Resists Strategic Voting, Social Choice and Welfare, Conitzer, V., Sandholm, T., Lange, J When are elections with few candidates hard to manipulate? JACM. Conitzer, V. and Sandholm, T Universal Voting Protocol Tweaks to Make Manipulation Hard. International Joint Conference on Artificial Intelligence (IJCAI).Universal Voting Protocol Tweaks to Make Manipulation Hard. Elkin & Lipmaa …

2 nd -chance mechanism [in paper “Computationally Feasible VCG Mechanisms” by Nisan & Ronen, EC-00]Computationally Feasible VCG Mechanisms (Interesting unrelated fact: Any VCG mechanism that is maximal in range is incentive compatible) Observation: only way an agent can improve its utility in a VCG mechanism where an approximation algorithm is used is by helping the algorithm find a higher-welfare allocation Second-chance mechanism: let each agent i submit a valuation fn v i and an appeal fn l i : V->V. Mechanism (using alg k) computes k(v), k(l i (v)), k(l 2 (v)), … and picks the among those the allocation that maximizes welfare. Pricing based on unappealed v.

Other mechanisms that are worst-case hard to manipulate O’Connell and Stearns Polynomial Time Mechanisms for Collective Decision Making, SUNYA-CS-00-1 …

Part II Usual-case hardness of manipulation

Problems with mechanisms that are worst-case hard to manipulate Worst-case hardness does not imply hardness in practice If agents cannot find a manipulation, they might still not tell the truth –Solution: mechanisms like the one in Part III of this slide deck.

Impossibility of usual-case hardness For voting: –Procaccia & Rosenschein JAIR-97 Assumes constant number of candidates Impossibility of avg-case hardness for Junta distributions (that seem hard) –Conizer & Sandholm AAAI-06 Any voting rule, any number of candidates, weighted voters, coalitional manipulation Thm. cannot be usually hard to manipulate if –It is weakly monotone (either c2 does not win, or if everyone ranks c2 first and c1 last then c1 does not win), and –If there exists a manipulation by the manipulators, then with high probability the manipulators can only decide between two candidates –Elections can be Manipulated Often by E. Friedgut, G. Kalai, and N. Nisan. Draft, 2007.Elections can be Manipulated Often For 3 candidates Shows that randomly selected manipulations work with non-vanishing probability –Still open directions available Multi-stage voting protocols Combining randomization and manipulation hardness… Open for other settings

Problems with mechanisms that are worst-case hard to manipulate Worst-case hardness does not imply hardness in practice If agents cannot find a manipulation, they might still not tell the truth –Solution: mechanisms like the one in Part III of this slide deck.

Part III Based on “Computational Criticisms of the Revelation Principle” by Conitzer & Sandholm

Mechanism design One outcome must be selected Select based on agents’ reported preferences (or types) mechanism outcome types Agents report strategically, rather than truthfully Mechanism is called truthful if truthful = strategic

mechanism outcome types The revelation principle Key tool in mechanism design If there exists mechanism that performs well when agents act strategically, then there exists a truthful mechanism that performs just as well P1P1 P2P2 P3P3 types new mechanism

Computational criticisms of the revelation principle Revelation principle says nothing about computational implications of using direct, truthful mechanisms Does restricting oneself to such mechanisms lead to computational hassles? YES If the participating agents have computational limits, does restricting oneself to such mechanisms lead to loss in objective (e.g. social welfare)? YES

Criticizing one-step mechanisms Theorem. There are settings where: –Executing the optimal single-step mechanism requires an exponential amount of communication and computation –There exists an entirely equivalent two-step mechanism that only requires a linear amount of communication and computation Holds both for dominant strategies and Bayes-Nash implementation

Criticizing truthful mechanisms Theorem. There are settings where: –Executing the optimal truthful (in terms of social welfare) mechanism is NP-complete –There exists an insincere mechanism, where The center only carries out polynomial computation Finding a beneficial insincere revelation is NP-complete for the agents If the agents manage to find the beneficial insincere revelation, the insincere mechanism is just as good as the optimal truthful one Otherwise, the insincere mechanism is strictly better (in terms of s.w.) Holds both for dominant strategies and Bayes-Nash implementation

Proof (in story form) k of the n employees are needed for a project Head of organization must decide, taking into account preferences of two additional parties: –Head of recruiting –Job manager for the project Some employees are “old friends”: Head of recruiting prefers at least one pair of old friends on team (utility 2) Job manager prefers no old friends on team (utility 1) Job manager sometimes (not always) has private information on exactly which k would make good team (utility 3) –(n choose k) + 1 types for job manager (uniform distribution)

Proof (in story form)… Recruiting: +2 utility for pair of friends Job manager: +1 utility for no pair of friends, +3 for the exactly right team (if exists) Claim: if job manager reports specific team preference, must give that team in optimal truthful mechanism Claim: if job manager reports no team preference, optimal truthful mechanism must give team without old friends to the job manager (if possible) –Otherwise job manager would be better off reporting type corresponding to such a team Thus, mechanism must find independent set of k employees, which is NP-complete

Proof (in story form)… Recruiting: +2 utility for pair of friends Job manager: +1 utility for no pair of friends, +3 for the exactly right team (if exists) Alternative (insincere!) mechanism: –If job manager reports specific team preference, give that team –Otherwise, give team with at least one pair of friends Easy to execute To manipulate, job manager needs to solve (NP-complete) independent set problem –If job manager succeeds (or no manipulation exists), get same outcome as best truthful mechanism –Otherwise, get strictly better outcome

Criticizing truthful mechanisms… Suppose utilities can only be computed by (sometimes costly) queries to oracle Then get similar theorem: –Using insincere mechanism, can shift burden of exponential number of costly queries to agent –If agent fails to make all those queries, outcome can only get better oracle u(t, o)? u(t, o) = 3

Is there a systematic approach? Previous result is for very specific setting How do we take such computational issues into account in general in mechanism design? What is the correct tradeoff? –Cautious: make sure that computationally unbounded agents would not make mechanism worse than best truthful mechanism (like previous result) –Aggressive: take a risk and assume agents are probably somewhat bounded Recent results on these manipulation-optimal mechanisms in [Othman & Sandholm SAGT-09]