-
On Approximate Welfare- and Revenue-Maximizing Equilibria for Size-Interchangeable Bidders
Authors:
Enrique Areyan Viqueira,
Amy Greenwald,
Victor Naroditskiy
Abstract:
In a Walrasian equilibrium (WE), all bidders are envy-free (EF), meaning that their allocation maximizes their utility; and the market clears (MC), meaning that the price of unallocated goods is zero. EF is desirable to ensure the long-term viability of the market. MC ensures that demand meets supply. Any allocation that is part of a WE is also welfare-maximizing; however, it need not be revenue-m…
▽ More
In a Walrasian equilibrium (WE), all bidders are envy-free (EF), meaning that their allocation maximizes their utility; and the market clears (MC), meaning that the price of unallocated goods is zero. EF is desirable to ensure the long-term viability of the market. MC ensures that demand meets supply. Any allocation that is part of a WE is also welfare-maximizing; however, it need not be revenue-maximizing. Furthermore, WE need not exist, e.g., in markets where bidders have combinatorial valuations. The traditional approach to simultaneously addressing both existence and low revenue is to relax the MC condition and instead require the price of unallocated goods be some, positive reserve price. The resulting solution concept, known as Envy-Free Pricing (EFP), has been studied in some special cases, e.g., single-minded bidders. In this paper, we go one step further; we relax EF as well as MC. We propose a relaxation of the EF condition where only winners are envy-free, and further relax the MC condition so that unallocated goods are priced at least at the reserve. We call this new solution concept Restricted Envy-Free Pricing (REFP). We investigate what REFP entails for single-minded bidders, and show that for size-interchangeable bidders (a generalization of single-minded introduced in this paper) we can compute a REFP in polynomial time, given a fixed allocation. As in the study of EFP, we remain interested in maximizing seller revenue. Instead of computing an outcome that simultaneously yields an allocation and corresponding prices, one could first solve for an allocation that respects a reserve price, and then solve for a corresponding set of supporting prices, each one at least the reserve. This two-step process fails in the case of EFP since, given a fixed allocation, envy-free prices need not exist. However, restricted envy-free prices always exist...
△ Less
Submitted 10 August, 2017;
originally announced August 2017.
-
Towards a Fair Allocation of Rewards in Multi-Level Marketing
Authors:
Talal Rahwan,
Victor Naroditskiy,
Tomasz Michalak,
Michael Wooldridge,
Nicholas R Jennings
Abstract:
An increasing number of businesses and organisations rely on existing users for finding new users or spreading a message. One of the widely used "refer-a-friend" mechanisms offers an equal reward to both the referrer and the invitee. This mechanism provides incentives for direct referrals and is fair to the invitee. On the other hand, multi-level marketing and recent social mobilisation experiment…
▽ More
An increasing number of businesses and organisations rely on existing users for finding new users or spreading a message. One of the widely used "refer-a-friend" mechanisms offers an equal reward to both the referrer and the invitee. This mechanism provides incentives for direct referrals and is fair to the invitee. On the other hand, multi-level marketing and recent social mobilisation experiments focus on mechanisms that incentivise both direct and indirect referrals. Such mechanisms share the reward for inviting a new member among the ancestors, usually in geometrically decreasing shares. A new member receives nothing at the time of joining. We study fairness in multi-level marketing mechanisms. We show how characteristic function games can be used to model referral marketing, show how the canonical fairness concept of the Shapley value can be applied to this setting, and establish the complexity of finding the Shapley value in each class, and provide a comparison of the Shapley value-based mechanism to existing referral mechanisms.
△ Less
Submitted 2 April, 2014;
originally announced April 2014.
-
RoxyBot-06: Stochastic Prediction and Optimization in TAC Travel
Authors:
Amy Greenwald,
Seong Jae Lee,
Victor Naroditskiy
Abstract:
In this paper, we describe our autonomous bidding agent, RoxyBot, who emerged victorious in the travel division of the 2006 Trading Agent Competition in a photo finish. At a high level, the design of many successful trading agents can be summarized as follows: (i) price prediction: build a model of market prices; and (ii) optimization: solve for an approximately optimal set of bids, given this mo…
▽ More
In this paper, we describe our autonomous bidding agent, RoxyBot, who emerged victorious in the travel division of the 2006 Trading Agent Competition in a photo finish. At a high level, the design of many successful trading agents can be summarized as follows: (i) price prediction: build a model of market prices; and (ii) optimization: solve for an approximately optimal set of bids, given this model. To predict, RoxyBot builds a stochastic model of market prices by simulating simultaneous ascending auctions. To optimize, RoxyBot relies on the sample average approximation method, a stochastic optimization technique.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
Targeted Social Mobilisation in a Global Manhunt
Authors:
Alex Rutherford,
Manuel Cebrian,
Iyad Rahwan,
Sohan Dsouza,
James McInerney,
Victor Naroditskiy,
Matteo Venanzi,
Nicholas R. Jennings,
J. R. deLara,
Eero Wahlstedt,
Steven U. Miller
Abstract:
Social mobilization, the ability to mobilize large numbers of people via social networks to achieve highly distributed tasks, has received significant attention in recent times. This growing capability, facilitated by modern communication technology, is highly relevant to endeavors which require the search for individuals that posses rare information or skill, such as finding medical doctors durin…
▽ More
Social mobilization, the ability to mobilize large numbers of people via social networks to achieve highly distributed tasks, has received significant attention in recent times. This growing capability, facilitated by modern communication technology, is highly relevant to endeavors which require the search for individuals that posses rare information or skill, such as finding medical doctors during disasters, or searching for missing people. An open question remains, as to whether in time-critical situations, people are able to recruit in a targeted manner, or whether they resort to so-called blind search, recruiting as many acquaintances as possible via broadcast communication. To explore this question, we examine data from our recent success in the U.S. State Department's Tag Challenge, which required locating and photographing 5 target persons in 5 different cities in the United States and Europe in less than 12 hours, based only on a single mug-shot. We find that people are able to consistently route information in a targeted fashion even under increasing time pressure. We derive an analytical model for global mobilization and use it to quantify the extent to which people were targeting others during recruitment. Our model estimates that approximately 1 in 3 messages were of targeted fashion during the most time-sensitive period of the challenge.This is a novel observation at such short temporal scales, and calls for opportunities for devising viral incentive schemes that provide distance- or time-sensitive rewards to approach the target geography more rapidly, with applications in multiple areas from emergency preparedness, to political mobilization.
△ Less
Submitted 6 April, 2014; v1 submitted 18 April, 2013;
originally announced April 2013.
-
Crowdsourcing Dilemma
Authors:
Victor Naroditskiy,
Nicholas R. Jennings,
Pascal Van Hentenryck,
Manuel Cebrian
Abstract:
Crowdsourcing offers unprecedented potential for solving tasks efficiently by tapping into the skills of large groups of people. A salient feature of crowdsourcing---its openness of entry---makes it vulnerable to malicious behavior. Such behavior took place in a number of recent popular crowdsourcing competitions. We provide game-theoretic analysis of a fundamental tradeoff between the potential f…
▽ More
Crowdsourcing offers unprecedented potential for solving tasks efficiently by tapping into the skills of large groups of people. A salient feature of crowdsourcing---its openness of entry---makes it vulnerable to malicious behavior. Such behavior took place in a number of recent popular crowdsourcing competitions. We provide game-theoretic analysis of a fundamental tradeoff between the potential for increased productivity and the possibility of being set back by malicious behavior. Our results show that in crowdsourcing competitions malicious behavior is the norm, not the anomaly---a result contrary to the conventional wisdom in the area. Counterintuitively, making the attacks more costly does not deter them but leads to a less desirable outcome. These findings have cautionary implications for the design of crowdsourcing competitions.
△ Less
Submitted 22 February, 2014; v1 submitted 12 April, 2013;
originally announced April 2013.
-
Possible and Necessary Winner Problem in Social Polls
Authors:
Serge Gaspers,
Victor Naroditskiy,
Nina Narodytska,
Toby Walsh
Abstract:
Social networks are increasingly being used to conduct polls. We introduce a simple model of such social polling. We suppose agents vote sequentially, but the order in which agents choose to vote is not necessarily fixed. We also suppose that an agent's vote is influenced by the votes of their friends who have already voted. Despite its simplicity, this model provides useful insights into a number…
▽ More
Social networks are increasingly being used to conduct polls. We introduce a simple model of such social polling. We suppose agents vote sequentially, but the order in which agents choose to vote is not necessarily fixed. We also suppose that an agent's vote is influenced by the votes of their friends who have already voted. Despite its simplicity, this model provides useful insights into a number of areas including social polling, sequential voting, and manipulation. We prove that the number of candidates and the network structure affect the computational complexity of computing which candidate necessarily or possibly can win in such a social poll. For social networks with bounded treewidth and a bounded number of candidates, we provide polynomial algorithms for both problems. In other cases, we prove that computing which candidates necessarily or possibly win are computationally intractable.
△ Less
Submitted 7 February, 2013;
originally announced February 2013.