Download presentation
Presentation is loading. Please wait.
1
Group Strategyproofness and No Subsidy via LP-Duality By Kamal Jain and Vijay V. Vazirani
2
Abstract In this article Jain and Vazirani introduce a fairness criterion on service providers, which they call “No Subsidy” In their second result they give budget balanced and group strategyproof cost sharing method for cost function that is neither submodular nor supermodular
3
Cost function C(S) denotes the cost incurred by the company to serve the users in S. S U, U – all the customers (users) of the company. Each user, i, has utility u i ’ for receiving the news. User i enjoys benefit of u i ’ – x i. Each user may misreport this utility as some other number u i For the rest of discussion, utility of user i is u i Definitions
4
Definitions (cont.) A cost sharing mechanism determines which user receive service and at what price. A cost sharing method is a function ξ which distributes the cost of the service between users receiving it.
5
The cost sharing method is cross monotonic if i Q, Q R ξ (Q,i) ξ (R,i) It is weakly cross monotonic if Q R i Q ξ (Q,i) i Q ξ (R,i)
6
Definitions (cont.) More formally, ξ takes two arguments, a set of users Q and user i, and returns a non-negative real number, satisfying 1.If i Q, then ξ (Q,i) = 0 2.Else, i Q ξ (Q,i) = C(Q), where C(Q) represents the cost of serving the Q (not necessary the optimal cost)
7
The Model Jain and Vazirani use example of service provider company that broadcasts news on the net. Consider graph G = (V, E), with edge weights c e and marked node root (service provider). Other nodes are users. Messages are sent using multicasting. Each message can be duplicated at any node at no cost. Edge e charges c e to transfer message from one end to other. The cost of broadcasting a message is total price charged by the edges.
8
The Model (cont.) Each edge assumed to be of infinite capacity, so the message can be sent through the shortest path. Hence we can assume that c e satisfy the triangle inequality
9
All users report their utilities u i and now provider should decide about three things: A set Q of users, selected to receive a message A tree T containing Q to broadcast the message For each user i, the price x i to be charged as a cost of delivering the message
10
Computational constraint Decisions should be made in polynomial time
11
Economic constraints Optimum No Positive Transfers (NPT) Voluntary Participation (VP) Consumer Sovereignty (CS) Budget-balance (BB) Efficiency Group Strategyproof
12
But … The first constraint can’t be met unless P = NP It is also impossible to find strategyproof mechanism that is both budget balanced and efficient, so we drop efficiency. Other constraints can be captured by a cross monotonic sharing method (Moulin and Shenker)
13
For every cross monotonic cost sharing method Moulin and Shenker give a mechanism M( ξ ) which computes Q and x i = ξ (Q,i) : 1.Q is initialized to U 2.If user i Q and u i < ξ (Q,i), then drop i from Q. Keep repeating this step in arbitrary order until no such user found 3.Set x i = ξ (Q,i)
14
Theorem 1 (Moulin and Shenker) For any cross monotonic cost sharing method ξ, the mechanism M( ξ ) is budget balanced, meets NPT, VP, CS and is group strategyproof. Theorem 2 (Moulin and Shenker) Suppose U is the set of all users and C: 2 U R + is a submodular cost function. If a cost sharing mechanism is budget balanced, meets NPT, VP, CS and is group strategyproof then it is equivalent to M( ξ ) for some cross monotonic cost sharing method, ξ.
15
No Subsidy condition If Q is the set of users selected to receive the service and x i is the cost of service asked from user i, then for any R Q, i R x i C(R) Where C(R) is the cost of serving R
16
No Subsidy (cont.) Budget balanced, NPT, VP, CS and group strategyproof cost sharing mechanism is not necessary no subsidy : Users a and b with utilities u a and u b. Cost function: C() = 0; C(a) = C(b) = 1; C(a,b) = 3
17
Fractional set A fractional set S f is a set S and function f : S [0,1] (for each element e of S, f tells “which part of e is in S”) Union of two fractional sets S1 f 1 S2 f 2 is S1 S2 with function f = min (f 1 + f 2, 1) Fractional sets S1, S2, … Sn cover S if S1 S2 … Sn = S
18
Covering property Cost function C is said to exhibit the covering property if for any set S of users and for any covering of S = j f j S j C(S) j f j C(S j ) Where each S j is set of users
19
The theorem Suppose U is the set of all users and C: 2 U R + is a cost function. There is a cost sharing mechanism which satisfies budget balance, meets NPT, VP, CS and also satisfies the No Subsidy condition if and only if C exhibits the covering property.
20
Proof Lemma 1 : Suppose U is the set of all users and C: 2 U R + is a cost function. There is a budget balanced, NPT,VP, CS and No Subsidy cost sharing mechanism if and only if there is a weakly cross monotonic cost sharing method Lemma 2: Suppose U is the set of all users and C: 2 U R + is a cost function. There exist a weakly cross monotonic cost sharing method for C if and only if C exhibits the covering property.
21
1. The theorem follows from the two lemmas 2. From lemma 1 and from Moulin and Shenker theorem 2 follows that if C is submodular function and a cost sharing mechanism is BB, NPT, VP, CS and is group strategyproof, then it satisfies No Subsidy condition too. 3. From the theorem and from Moulin and Shenker theorem 1 follows that submodular functions are subclass of functions that exhibit the covering property.
22
The cost sharing method In this section, a costsharing method for multicasting is presented. It achieves budget balance and is crossmonotone, and for any set Q of users chosen for distribution, finds a tree of cost at most twice the optimal Steiner tree containing the root and users Q. The method utilizes two facts: If the edge costs satisfy the triangle inequality, the cost of a minimum spanning tree on the set of required vertices is within twice the cost of an optimal Steiner tree containing all required vertices. (Kou, Markowsky, Berman) There is an exact linear programming relaxation for the minimum spanning tree problem, i.e., a relaxation that always has optimal integral solutions. (Edmonds)
23
In minimum branching problem, we are given a directed graph with non negative costs on the directed edges, and one of the vertices is marked as root. The problem is to find a minimum cost tree containing all vertices and directed into the root. The transformation from the minimum spanning tree problem in an undirected graph to the minimum branching problem is straightforward. Simply replace each undirected edge e of G by two directed edges each of cost of e, and ask for a minimum cost branching directed into the root. Let us denote this directed graph by H = (V, E’) S V is valid if it is non-empty and does not contain root Let (S) = { (u v) E’ | u S and v S} and F (S) = { (u v) E’ | F E’, u S and v S}
24
LP relaxation LP relaxation: Minimize e E’ c e x e Subject to e | e (S) x e 1, valid set S x e 0, e E’ DLP: Maximize (valid set S) y S Subject to S | e (S) y S c e, e E’ y S 0, valid set S
25
Edge e feels dual y S if y S > 0 and e (S). Edge e is tight if the total amount of dual it feels equals its cost. The dual program is trying to maximize the sum of the dual variables y S subject to the condition that no edge feels more dual than its cost, i.e., no edge is overtight. Set S V is unsatisfied if it is valid and F (S) = Any minimal unsatisfied set is said to be active
26
Algorithm (minimum branching) 1.(Initialization) F ; for each S V, y S 0 2.(Edge augmentation) While there exists an unsatisfied set do: Find all active sets w.r.t. F. For each such set S, raise its dual variable y S until some edge e goes tight; F F {e} 3.Let e 1, e 2, … e l be the ordered list of edges in F. 4.(Reverse delete) For j = l downto 1 do: If there are no unsatisfied sets w.r.t. F – {e j }, then F F {e j } 5.Return F For every valid S such that y S > 0 | F (S) | = 1 e F c e = (valid set S) y S
27
Given a set Q of recipients, the Algorithm is used to find a minimum spanning tree containing Q and the root. The costsharing method, ξ, simply distributes each raised dual equally among all vertices contained in this dual. So, the amount charged to user i is ξ (Q, i) = (valid set S) ( y S / |S|) For this costsharing method ξ, the mechanism M( ξ ) is budget balanced, meets NPT, VP, CS, is group strategyproof, and satisfies No Subsidy.
28
Appendix 1 Cost function is submodular if 1. C( ) = 0 2. Q 1, Q 2 (subsets of users): C(Q 1 ) + C(Q 2 ) C(Q 1 Q 2 ) + C(Q 1 Q 2 ) Cost function is supermodular if the second condition is reversed
29
Appendix 2 Cost sharing mechanism is budget balanced if the total amount it charges from the receivers S is same as C(S). It is efficient if it maximizes over all possible S, the sum of the utilities of users in S minus C(S) It is strategyproof if the dominant strategy of each user is to reveal the true value of his utility. It is group strategyproof if it holds for coalitions.
30
Appendix 3 LP is min subject to Ax b x 0 c, x – vectors in R n b – vector in R m A – matrix n x m DLP is max subject to yA c y 0
31
Appendix 3 (cont.) Duality theorem If LP has a solution then DLP has a solution and: min = max
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.