-
Competition Complexity in Multi-Item Auctions: Beyond VCG and Regularity
Authors:
Hedyeh Beyhaghi,
Linda Cai,
Yiding Feng,
Yingkai Li,
S. Matthew Weinberg
Abstract:
We quantify the value of the monopoly's bargaining power in terms of competition complexity--that is, the number of additional bidders the monopoly must attract in simple auctions to match the expected revenue of the optimal mechanisms (c.f., Bulow and Klemperer, 1996, Eden et al., 2017)--within the setting of multi-item auctions. We show that for simple auctions that sell items separately, the co…
▽ More
We quantify the value of the monopoly's bargaining power in terms of competition complexity--that is, the number of additional bidders the monopoly must attract in simple auctions to match the expected revenue of the optimal mechanisms (c.f., Bulow and Klemperer, 1996, Eden et al., 2017)--within the setting of multi-item auctions. We show that for simple auctions that sell items separately, the competition complexity is $Θ(\frac{n}α)$ in an environment with $n$ original bidders under the slightly stronger assumption of $α$-strong regularity, in contrast to the standard regularity assumption in the literature, which requires $Ω(n \cdot \ln \frac{m}{n})$ additional bidders (Feldman et al., 2018). This significantly reduces the value of learning the distribution to design the optimal mechanisms, especially in large markets with many items for sale. For simple auctions that sell items as a grand bundle, we establish a constant competition complexity bound in a single-bidder environment when the number of items is small or when the value distribution has a monotone hazard rate. Some of our competition complexity results also hold when we compete against the first best benchmark (i.e., optimal social welfare).
△ Less
Submitted 10 June, 2025;
originally announced June 2025.
-
Bias-preserving and error-detectable entangling operations in a superconducting dual-rail system
Authors:
Nitish Mehta,
James D. Teoh,
Taewan Noh,
Ankur Agrawal,
Amos Anderson,
Beau Birdsall,
Avadh Brahmbhatt,
Winfred Byrd,
Marc Cacioppo,
Anthony Cabrera,
Leo Carroll,
Jonathan Chen,
Tzu-Chiao Chien,
Richard Chamberlain,
Jacob C. Curtis,
Doreen Danso,
Sanjana Renganatha Desigan,
Francesco D'Acounto,
Bassel Heiba Elfeky,
S. M. Farzaneh,
Chase Foley,
Benjamin Gudlewski,
Hannah Hastings,
Robert Johnson,
Nishaad Khedkar
, et al. (47 additional authors not shown)
Abstract:
For useful quantum computation, error-corrected machines are required that can dramatically reduce the inevitable errors experienced by physical qubits. While significant progress has been made in approaching and exceeding the surface-code threshold in superconducting platforms, large gains in the logical error rate with increasing system size remain out of reach. This is due both to the large num…
▽ More
For useful quantum computation, error-corrected machines are required that can dramatically reduce the inevitable errors experienced by physical qubits. While significant progress has been made in approaching and exceeding the surface-code threshold in superconducting platforms, large gains in the logical error rate with increasing system size remain out of reach. This is due both to the large number of required physical qubits and the need to operate far below threshold. Importantly, by exploiting the biases and structure of the physical errors, this threshold can be raised. Erasure qubits achieve this by detecting certain errors at the hardware level. Dual-rail qubits encoded in superconducting cavities are a promising erasure qubit wherein the dominant error, photon loss, can be detected and converted to an erasure. In these approaches, the complete set of operations, including two qubit gates, must be high performance and preserve as much of the desirable hierarchy or bias in the errors as possible. Here, we design and realize a novel two-qubit gate for dual-rail erasure qubits based on superconducting microwave cavities. The gate is high-speed ($\sim$500 ns duration), and yields a residual gate infidelity after error detection below 0.1%. Moreover, we experimentally demonstrate that this gate largely preserves the favorable error structure of idling dual-rail qubits, making it ideal for error correction. We measure low erasure rates of $\sim$0.5% per gate, as well as low and asymmetric dephasing errors that occur at least three times more frequently on control qubits compared to target qubits. Bit-flip errors are practically nonexistent, bounded at the few parts per million level. This error asymmetry has not been well explored but is extremely useful in quantum error correction and flag-qubit contexts, where it can create a faster path to effective error-corrected systems.
△ Less
Submitted 6 May, 2025; v1 submitted 13 March, 2025;
originally announced March 2025.
-
Selfish mining under general stochastic rewards
Authors:
Maryam Bahrani,
Michael Neuder,
S. Matthew Weinberg
Abstract:
Selfish mining, a strategy where Proof-of-Work consensus participants selectively withhold blocks, allows miners to earn disproportionately high revenue. The vast majority of the selfish mining literature focuses exclusively on block rewards. Carlsten et al. [2016] is a notable exception, which observes that similar strategic behavior may be profitable in a zero-block-reward regime if miners are c…
▽ More
Selfish mining, a strategy where Proof-of-Work consensus participants selectively withhold blocks, allows miners to earn disproportionately high revenue. The vast majority of the selfish mining literature focuses exclusively on block rewards. Carlsten et al. [2016] is a notable exception, which observes that similar strategic behavior may be profitable in a zero-block-reward regime if miners are compensated with transaction fees alone. As of February 2025, neither model fully captures miner incentives. The block reward remains 3.125 BTC, yet some blocks yield significantly higher revenue. For example, congestion during the launch of the Babylon protocol in August 2024 caused transaction fees to spike from 0.14 BTC to 9.52 BTC, a $68\times$ increase in fee rewards within two blocks. We present a framework for considering strategic behavior under more general miner reward functions that could be stochastic, variable in time, and/or ephemeral. This model can capture many existing reward sources (sometimes called Miner/Maximal Extractable Value or MEV) in blockchains today. We use our framework to examine the profitability of cutoff selfish mining strategies for any reward function identically distributed across forks. Our analysis requires a novel reward calculation technique to capture non-linearity in general rewards. We instantiate these results in a combined reward function that much more accurately represents miner incentives as they exist in Bitcoin today. This reward function includes block rewards and linear-in-time transaction fees, which have been studied in isolation. It also introduces a third random reward motivated by the aforementioned transaction fee spike. This instantiation enables us to (i) make qualitative observations, (ii) make quantitative claims, and (iii) confirm the theoretical analysis using Monte Carlo simulations.
△ Less
Submitted 27 February, 2025;
originally announced February 2025.
-
A Bicriterion Concentration Inequality and Prophet Inequalities for $k$-Fold Matroid Unions
Authors:
Noga Alon,
Nick Gravin,
Tristan Pollner,
Aviad Rubinstein,
Hongao Wang,
S. Matthew Weinberg,
Qianfan Zhang
Abstract:
We investigate prophet inequalities with competitive ratios approaching $1$, seeking to generalize $k$-uniform matroids. We first show that large girth does not suffice: for all $k$, there exists a matroid of girth $\geq k$ and a prophet inequality instance on that matroid whose optimal competitive ratio is $\frac{1}{2}$. Next, we show $k$-fold matroid unions do suffice: we provide a prophet inequ…
▽ More
We investigate prophet inequalities with competitive ratios approaching $1$, seeking to generalize $k$-uniform matroids. We first show that large girth does not suffice: for all $k$, there exists a matroid of girth $\geq k$ and a prophet inequality instance on that matroid whose optimal competitive ratio is $\frac{1}{2}$. Next, we show $k$-fold matroid unions do suffice: we provide a prophet inequality with competitive ratio $1-O(\sqrt{\frac{\log k}{k}})$ for any $k$-fold matroid union. Our prophet inequality follows from an online contention resolution scheme.
The key technical ingredient in our online contention resolution scheme is a novel bicriterion concentration inequality for arbitrary monotone $1$-Lipschitz functions over independent items which may be of independent interest. Applied to our particular setting, our bicriterion concentration inequality yields "Chernoff-strength" concentration for a $1$-Lipschitz function that is not (approximately) self-bounding.
△ Less
Submitted 20 November, 2024; v1 submitted 18 November, 2024;
originally announced November 2024.
-
Atomic Clock Ensemble in Space
Authors:
L. Cacciapuoti,
A. Busso,
R. Jansen,
S. Pataraia,
T. Peignier,
S. Weinberg,
P. Crescence,
A. Helm,
J. Kehrer,
S. Koller,
R. Lachaud,
T. Niedermaier,
F. -X. Esnault,
D. Massonnet,
D. Goujon,
J. Pittet,
A. Perri,
Q. Wang,
S. Liu,
W. Schaefer,
T. Schwall,
I. Prochazka,
A. Schlicht,
U. Schreiber,
P. Laurent
, et al. (3 additional authors not shown)
Abstract:
The Atomic Clock Ensemble in Space (ACES) mission is developing high performance clocks and links for space to test Einstein's theory of general relativity. From the International Space Station, the ACES payload will distribute a clock signal with fractional frequency stability and accuracy of 1E-16 establishing a worldwide network to compare clocks in space and on the ground. ACES will provide an…
▽ More
The Atomic Clock Ensemble in Space (ACES) mission is developing high performance clocks and links for space to test Einstein's theory of general relativity. From the International Space Station, the ACES payload will distribute a clock signal with fractional frequency stability and accuracy of 1E-16 establishing a worldwide network to compare clocks in space and on the ground. ACES will provide an absolute measurement of Einstein's gravitational redshift, it will search for time variations of fundamental constants, contribute to test topological dark matter models, and perform Standard Model Extension tests. Moreover, the ground clocks connected to the ACES network will be compared over different continents and used to measure geopotential differences at the clock locations. After solving some technical problems, the ACES flight model is now approaching its completion. System tests involving the laser-cooled Cs clock PHARAO, the active H-maser SHM and the on-board frequency comparator FCDP have measured the performance of the clock signal delivered by ACES. The ACES microwave link MWL is currently under test. The single-photon avalanche detector of the optical link ELT has been tested and will now be integrated in the ACES payload. The ACES mission concept, its scientific objectives, and the recent test results are discussed here together with the major milestones that will lead us to the ACES launch.
△ Less
Submitted 5 November, 2024;
originally announced November 2024.
-
Revisiting the Primitives of Transaction Fee Mechanism Design
Authors:
Aadityan Ganesh,
Clayton Thomas,
S. Matthew Weinberg
Abstract:
Transaction Fee Mechanism Design studies auctions run by untrusted miners for transaction inclusion in a blockchain. Under previously-considered desiderata, an auction is considered `good' if, informally-speaking, each party (i.e., the miner, the users, and coalitions of both miners and users) has no incentive to deviate from the fixed and pre-determined protocol.
In this paper, we propose a nov…
▽ More
Transaction Fee Mechanism Design studies auctions run by untrusted miners for transaction inclusion in a blockchain. Under previously-considered desiderata, an auction is considered `good' if, informally-speaking, each party (i.e., the miner, the users, and coalitions of both miners and users) has no incentive to deviate from the fixed and pre-determined protocol.
In this paper, we propose a novel desideratum for transaction fee mechanisms. We say that a TFM is off-chain influence proof when the miner cannot achieve additional revenue by running a separate auction off-chain. While the previously-highlighted EIP-1559 is the gold-standard according to prior desiderata, we show that it does not satisfy off-chain influence proofness. Intuitively, this holds because a Bayesian revenue-maximizing miner can strictly increase profits by persuasively threatening to censor any bids that do not transfer a tip directly to the miner off-chain.
On the other hand, we reconsider the Cryptographic (multi-party computation assisted) Second Price Auction mechanism, which is technically not `simple for miners' according to previous desiderata (since miners may wish to set a reserve by fabricating bids). We show that, in a slightly different model where the miner is allowed to set the reserve directly, this auction satisfies simplicity for users and miners, and off-chain influence proofness.
Finally, we prove a strong impossibility result: no mechanism satisfies all previously-considered properties along with off-chain influence proofness, even with unlimited supply, and even after soliciting input from the miner.
△ Less
Submitted 9 October, 2024;
originally announced October 2024.
-
Optimal RANDAO Manipulation in Ethereum
Authors:
Kaya Alpturer,
S. Matthew Weinberg
Abstract:
It is well-known that RANDAO manipulation is possible in Ethereum if an adversary controls the proposers assigned to the last slots in an epoch. We provide a methodology to compute, for any fraction $α$ of stake owned by an adversary, the maximum fraction $f(α)$ of rounds that a strategic adversary can propose. We further implement our methodology and compute $f(\cdot)$ for all $α$. For example, w…
▽ More
It is well-known that RANDAO manipulation is possible in Ethereum if an adversary controls the proposers assigned to the last slots in an epoch. We provide a methodology to compute, for any fraction $α$ of stake owned by an adversary, the maximum fraction $f(α)$ of rounds that a strategic adversary can propose. We further implement our methodology and compute $f(\cdot)$ for all $α$. For example, we conclude that an optimal strategic participant with $5\%$ of the stake can propose a $5.048\%$ fraction of rounds, $10\%$ of the stake can propose a $10.19\%$ fraction of rounds, and $20\%$ of the stake can propose a $20.68\%$ fraction of rounds.
△ Less
Submitted 29 September, 2024;
originally announced September 2024.
-
Communication Separations for Truthful Auctions: Breaking the Two-Player Barrier
Authors:
Shiri Ron,
Clayton Thomas,
S. Matthew Weinberg,
Qianfan Zhang
Abstract:
We study the communication complexity of truthful combinatorial auctions, and in particular the case where valuations are either subadditive or single-minded, which we denote with $\mathsf{SubAdd}\cup\mathsf{SingleM}$. We show that for three bidders with valuations in $\mathsf{SubAdd}\cup\mathsf{SingleM}$, any deterministic truthful mechanism that achieves at least a $0.366$-approximation requires…
▽ More
We study the communication complexity of truthful combinatorial auctions, and in particular the case where valuations are either subadditive or single-minded, which we denote with $\mathsf{SubAdd}\cup\mathsf{SingleM}$. We show that for three bidders with valuations in $\mathsf{SubAdd}\cup\mathsf{SingleM}$, any deterministic truthful mechanism that achieves at least a $0.366$-approximation requires $\exp(m)$ communication. In contrast, a natural extension of [Fei09] yields a non-truthful $\mathrm{poly}(m)$-communication protocol that achieves a $\frac{1}{2}$-approximation, demonstrating a gap between the power of truthful mechanisms and non-truthful protocols for this problem.
Our approach follows the taxation complexity framework laid out in [Dob16b], but applies this framework in a setting not encompassed by the techniques used in past work. In particular, the only successful prior application of this framework uses a reduction to simultaneous protocols which only applies for two bidders [AKSW20], whereas our three-player lower bounds are stronger than what can possibly arise from a two-player construction (since a trivial truthful auction guarantees a $\frac{1}{2}$-approximation for two players).
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
Profitable Manipulations of Cryptographic Self-Selection are Statistically Detectable
Authors:
Linda Cai,
Jingyi Liu,
S. Matthew Weinberg,
Chenghan Zhou
Abstract:
Cryptographic Self-Selection is a common primitive underlying leader-selection for Proof-of-Stake blockchain protocols. The concept was first popularized in Algorand [CM19], who also observed that the protocol might be manipulable. [FHWY22] provide a concrete manipulation that is strictly profitable for a staker of any size (and also prove upper bounds on the gains from manipulation).
Separately…
▽ More
Cryptographic Self-Selection is a common primitive underlying leader-selection for Proof-of-Stake blockchain protocols. The concept was first popularized in Algorand [CM19], who also observed that the protocol might be manipulable. [FHWY22] provide a concrete manipulation that is strictly profitable for a staker of any size (and also prove upper bounds on the gains from manipulation).
Separately, [YSZ23, BM24] initiate the study of undetectable profitable manipulations of consensus protocols with a focus on the seminal Selfish Mining strategy [ES14] for Bitcoin's Proof-of-Work longest-chain protocol. They design a Selfish Mining variant that, for sufficiently large miners, is strictly profitable yet also indistinguishable to an onlooker from routine latency (that is, a sufficiently large profit-maximizing miner could use their strategy to strictly profit over being honest in a way that still appears to the rest of the network as though everyone is honest but experiencing mildly higher latency. This avoids any risk of negatively impacting the value of the underlying cryptocurrency due to attack detection).
We investigate the detectability of profitable manipulations of the canonical cryptographic self-selection leader selection protocol introduced in [CM19] and studied in [FHWY22], and establish that for any player with $α< \frac{3-\sqrt{5}}{2} \approx 0.38$ fraction of the total stake, every strictly profitable manipulation is statistically detectable. Specifically, we consider an onlooker who sees only the random seed of each round (and does not need to see any other broadcasts by any other players). We show that the distribution of the sequence of random seeds when any player is profitably manipulating the protocol is inconsistent with any distribution that could arise by honest stakers being offline or timing out (for a natural stylized model of honest timeouts).
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Computing Optimal Manipulations in Cryptographic Self-Selection Proof-of-Stake Protocols
Authors:
Matheus V. X. Ferreira,
Aadityan Ganesh,
Jack Hourigan,
Hannah Huh,
S. Matthew Weinberg,
Catherine Yu
Abstract:
Cryptographic Self-Selection is a paradigm employed by modern Proof-of-Stake consensus protocols to select a block-proposing "leader." Algorand [Chen and Micali, 2019] proposes a canonical protocol, and Ferreira et al. [2022] establish bounds $f(α,β)$ on the maximum fraction of rounds a strategic player can lead as a function of their stake $α$ and a network connectivity parameter $β$. While both…
▽ More
Cryptographic Self-Selection is a paradigm employed by modern Proof-of-Stake consensus protocols to select a block-proposing "leader." Algorand [Chen and Micali, 2019] proposes a canonical protocol, and Ferreira et al. [2022] establish bounds $f(α,β)$ on the maximum fraction of rounds a strategic player can lead as a function of their stake $α$ and a network connectivity parameter $β$. While both their lower and upper bounds are non-trivial, there is a substantial gap between them (for example, they establish $f(10\%,1) \in [10.08\%, 21.12\%]$), leaving open the question of how significant of a concern these manipulations are. We develop computational methods to provably nail $f(α,β)$ for any desired $(α,β)$ up to arbitrary precision, and implement our method on a wide range of parameters (for example, we confirm $f(10\%,1) \in [10.08\%, 10.15\%]$).
Methodologically, estimating $f(α,β)$ can be phrased as estimating to high precision the value of a Markov Decision Process whose states are countably-long lists of real numbers. Our methodological contributions involve (a) reformulating the question instead as computing to high precision the expected value of a distribution that is a fixed-point of a non-linear sampling operator, and (b) provably bounding the error induced by various truncations and sampling estimations of this distribution (which appears intractable to solve in closed form). One technical challenge, for example, is that natural sampling-based estimates of the mean of our target distribution are \emph{not} unbiased estimators, and therefore our methods necessarily go beyond claiming sufficiently-many samples to be close to the mean.
△ Less
Submitted 21 June, 2024;
originally announced June 2024.
-
Settling the Communication Complexity of VCG-based Mechanisms for all Approximation Guarantees
Authors:
Frederick V. Qiu,
S. Matthew Weinberg
Abstract:
We consider truthful combinatorial auctions with items $M = [m]$ for sale to $n$ bidders, where each bidder $i$ has a private monotone valuation $v_i : 2^M \to R_+$. Among truthful mechanisms, maximal-in-range (MIR) mechanisms achieve the best-known approximation guarantees among all poly-communication deterministic truthful mechanisms in all previously-studied settings. Our work settles the commu…
▽ More
We consider truthful combinatorial auctions with items $M = [m]$ for sale to $n$ bidders, where each bidder $i$ has a private monotone valuation $v_i : 2^M \to R_+$. Among truthful mechanisms, maximal-in-range (MIR) mechanisms achieve the best-known approximation guarantees among all poly-communication deterministic truthful mechanisms in all previously-studied settings. Our work settles the communication necessary to achieve any approximation guarantee via an MIR mechanism. Specifically:
Let MIRsubmod$(m,k)$ denote the best approximation guarantee achievable by an MIR mechanism using $2^k$ communication between bidders with submodular valuations over $m$ items. Then for all $k = Ω(\log(m))$, MIRsubmod$(m,k) = Ω(\sqrt{m/(k\log(m/k))})$. When $k = Θ(\log(m))$, this improves the previous best lower bound for poly-comm. MIR mechanisms from $Ω(m^{1/3}/\log^{2/3}(m))$ to $Ω(\sqrt{m}/\log(m))$. We also have MIRsubmod$(m,k) = O(\sqrt{m/k})$. Moreover, our mechanism is optimal w.r.t. the value query and succinct representation models. When $k = Θ(\log(m))$, this improves the previous best approximation guarantee for poly-comm. MIR mechanisms from $O(\sqrt{m})$ to $O(\sqrt{m/\log(m)})$.
Let also MIRgen$(m,k)$ denote the best approximation guarantee achievable by an MIR mechanism using $2^k$ communication between bidders with general valuations over $m$ items. Then for all $k = Ω(\log(m))$, MIRgen$(m,k) = Ω(m/k)$. When $k = Θ(\log(m))$, this improves the previous best lower bound for poly-comm. MIR mechanisms from $Ω(m/\log^2(m))$ to $Ω(m/\log(m))$. We also have MIRgen$(m,k) = O(m/k)$. Moreover, our mechanism is optimal w.r.t. the value query and succinct representation models. When $k = Θ(\log(m))$, this improves the previous best approximation guarantee for poly-comm. MIR mechanisms from $O(m/\sqrt{\log(m)})$ to $O(m/\log(m))$.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
Settling the Competition Complexity of Additive Buyers over Independent Items
Authors:
Mahsa Derakhshan,
Emily Ryu,
S. Matthew Weinberg,
Eric Xue
Abstract:
The competition complexity of an auction setting is the number of additional bidders needed such that the simple mechanism of selling items separately (with additional bidders) achieves greater revenue than the optimal but complex (randomized, prior-dependent, Bayesian-truthful) optimal mechanism without the additional bidders. Our main result settles the competition complexity of $n$ bidders with…
▽ More
The competition complexity of an auction setting is the number of additional bidders needed such that the simple mechanism of selling items separately (with additional bidders) achieves greater revenue than the optimal but complex (randomized, prior-dependent, Bayesian-truthful) optimal mechanism without the additional bidders. Our main result settles the competition complexity of $n$ bidders with additive values over $m < n$ independent items at $Θ(\sqrt{nm})$. The $O(\sqrt{nm})$ upper bound is due to [BW19], and our main result improves the prior lower bound of $Ω(\ln n)$ to $Ω(\sqrt{nm})$.
Our main result follows from an explicit construction of a Bayesian IC auction for $n$ bidders with additive values over $m<n$ independent items drawn from the Equal Revenue curve truncated at $\sqrt{nm}$ ($\mathcal{ER}_{\le \sqrt{nm}}$), which achieves revenue that exceeds $\text{SRev}_{n+\sqrt{nm}}(\mathcal{ER}_{\le \sqrt{nm}}^m)$.
Along the way, we show that the competition complexity of $n$ bidders with additive values over $m$ independent items is exactly equal to the minimum $c$ such that $\text{SRev}_{n+c}(\mathcal{ER}_{\le p}^m) \geq \text{Rev}_n(\mathcal{ER}_{\le p}^m)$ for all $p$ (that is, some truncated Equal Revenue witnesses the worst-case competition complexity). Interestingly, we also show that the untruncated Equal Revenue curve does not witness the worst-case competition complexity when $n > m$: $\text{SRev}_n(\mathcal{ER}^m) = nm+O_m(\ln (n)) \leq \text{SRev}_{n+O_m(\ln (n))}(\mathcal{ER}^m)$, and therefore our result can only follow by considering all possible truncations.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Contracting with a Learning Agent
Authors:
Guru Guruganesh,
Yoav Kolumbus,
Jon Schneider,
Inbal Talgam-Cohen,
Emmanouil-Vasileios Vlatakis-Gkaragkounis,
Joshua R. Wang,
S. Matthew Weinberg
Abstract:
Many real-life contractual relations differ completely from the clean, static model at the heart of principal-agent theory. Typically, they involve repeated strategic interactions of the principal and agent, taking place under uncertainty and over time. While appealing in theory, players seldom use complex dynamic strategies in practice, often preferring to circumvent complexity and approach uncer…
▽ More
Many real-life contractual relations differ completely from the clean, static model at the heart of principal-agent theory. Typically, they involve repeated strategic interactions of the principal and agent, taking place under uncertainty and over time. While appealing in theory, players seldom use complex dynamic strategies in practice, often preferring to circumvent complexity and approach uncertainty through learning. We initiate the study of repeated contracts with a learning agent, focusing on agents who achieve no-regret outcomes.
Optimizing against a no-regret agent is a known open problem in general games; we achieve an optimal solution to this problem for a canonical contract setting, in which the agent's choice among multiple actions leads to success/failure. The solution has a surprisingly simple structure: for some $α> 0$, initially offer the agent a linear contract with scalar $α$, then switch to offering a linear contract with scalar $0$. This switch causes the agent to ``free-fall'' through their action space and during this time provides the principal with non-zero reward at zero cost. Despite apparent exploitation of the agent, this dynamic contract can leave \emph{both} players better off compared to the best static contract. Our results generalize beyond success/failure, to arbitrary non-linear contracts which the principal rescales dynamically.
Finally, we quantify the dependence of our results on knowledge of the time horizon, and are the first to address this consideration in the study of strategizing against learning agents.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Optimal Stopping with Multi-Dimensional Comparative Loss Aversion
Authors:
Linda Cai,
Joshua Gardner,
S. Matthew Weinberg
Abstract:
Despite having the same basic prophet inequality setup and model of loss aversion, conclusions in our multi-dimensional model differs considerably from the one-dimensional model of Kleinberg et al. For example, Kleinberg et al. gives a tight closed-form on the competitive ratio that an online decision-maker can achieve as a function of $λ$, for any $λ\geq 0$. In our multi-dimensional model, there…
▽ More
Despite having the same basic prophet inequality setup and model of loss aversion, conclusions in our multi-dimensional model differs considerably from the one-dimensional model of Kleinberg et al. For example, Kleinberg et al. gives a tight closed-form on the competitive ratio that an online decision-maker can achieve as a function of $λ$, for any $λ\geq 0$. In our multi-dimensional model, there is a sharp phase transition: if $k$ denotes the number of dimensions, then when $λ\cdot (k-1) \geq 1$, no non-trivial competitive ratio is possible. On the other hand, when $λ\cdot (k-1) < 1$, we give a tight bound on the achievable competitive ratio (similar to Kleinberg et al.). As another example, Kleinberg et al. uncovers an exponential improvement in their competitive ratio for the random-order vs. worst-case prophet inequality problem. In our model with $k\geq 2$ dimensions, the gap is at most a constant-factor. We uncover several additional key differences in the multi- and single-dimensional models.
△ Less
Submitted 26 September, 2023; v1 submitted 25 September, 2023;
originally announced September 2023.
-
Simple and Optimal Online Contention Resolution Schemes for $k$-Uniform Matroids
Authors:
Atanas Dinev,
S. Matthew Weinberg
Abstract:
We provide a simple $(1-O(\frac{1}{\sqrt{k}}))$-selectable Online Contention Resolution Scheme for $k$-uniform matroids against a fixed-order adversary. If $A_i$ and $G_i$ denote the set of selected elements and the set of realized active elements among the first $i$ (respectively), our algorithm selects with probability $1-\frac{1}{\sqrt{k}}$ any active element $i$ such that…
▽ More
We provide a simple $(1-O(\frac{1}{\sqrt{k}}))$-selectable Online Contention Resolution Scheme for $k$-uniform matroids against a fixed-order adversary. If $A_i$ and $G_i$ denote the set of selected elements and the set of realized active elements among the first $i$ (respectively), our algorithm selects with probability $1-\frac{1}{\sqrt{k}}$ any active element $i$ such that $|A_{i-1}| + 1 \leq (1-\frac{1}{\sqrt{k}})\cdot \mathbb{E}[|G_i|]+\sqrt{k}$. This implies a $(1-O(\frac{1}{\sqrt{k}}))$ prophet inequality against fixed-order adversaries for $k$-uniform matroids that is considerably simpler than previous algorithms [Ala14, AKW14, JMZ22].
We also prove that no OCRS can be $(1-Ω(\sqrt{\frac{\log k}{k}}))$-selectable for $k$-uniform matroids against an almighty adversary. This guarantee is matched by the (known) simple greedy algorithm that accepts every active element with probability $1-Θ(\sqrt{\frac{\log k}{k}})$ [HKS07].
△ Less
Submitted 24 November, 2023; v1 submitted 18 September, 2023;
originally announced September 2023.
-
Undetectable Selfish Mining
Authors:
Maryam Bahrani,
S. Matthew Weinberg
Abstract:
Seminal work of Eyal and Sirer (2014) establishes that a strategic Bitcoin miner may strictly profit by deviating from the intended Bitcoin protocol, using a strategy now termed *selfish mining*. More specifically, any miner with $>1/3$ of the total hashrate can earn bitcoin at a faster rate by selfish mining than by following the intended protocol (depending on network conditions, a lower fractio…
▽ More
Seminal work of Eyal and Sirer (2014) establishes that a strategic Bitcoin miner may strictly profit by deviating from the intended Bitcoin protocol, using a strategy now termed *selfish mining*. More specifically, any miner with $>1/3$ of the total hashrate can earn bitcoin at a faster rate by selfish mining than by following the intended protocol (depending on network conditions, a lower fraction of hashrate may also suffice).
One convincing critique of selfish mining in practice is that the presence of a selfish miner is *statistically detectable*: the pattern of orphaned blocks created by the presence of a selfish miner cannot be explained by natural network delays. Therefore, if an attacker chooses to selfish mine, users can detect this, and this may (significantly) negatively impact the value of BTC. So while the attacker may get slightly more bitcoin by selfish mining, these bitcoin may be worth significantly less USD.
We develop a selfish mining variant that is provably *statistically undetectable*: the pattern of orphaned blocks is statistically identical to a world with only honest miners but higher network delay. Specifically, we consider a stylized model where honest miners with network delay produce orphaned blocks at each height independently with probability $β'$. We propose a selfish mining strategy that instead produces orphaned blocks at each height independently with probability $β> β'$. We further show that our strategy is strictly profitable for attackers with $38.2\% \ll 50\%$ of the total hashrate (and this holds for all natural orphan rates $β'$).
△ Less
Submitted 4 February, 2024; v1 submitted 13 September, 2023;
originally announced September 2023.
-
Selling to Multiple No-Regret Buyers
Authors:
Linda Cai,
S. Matthew Weinberg,
Evan Wildenhain,
Shirley Zhang
Abstract:
We consider the problem of repeatedly auctioning a single item to multiple i.i.d buyers who each use a no-regret learning algorithm to bid over time. In particular, we study the seller's optimal revenue, if they know that the buyers are no-regret learners (but only that their behavior satisfies some no-regret property -- they do not know the precise algorithm/heuristic used).
Our main result des…
▽ More
We consider the problem of repeatedly auctioning a single item to multiple i.i.d buyers who each use a no-regret learning algorithm to bid over time. In particular, we study the seller's optimal revenue, if they know that the buyers are no-regret learners (but only that their behavior satisfies some no-regret property -- they do not know the precise algorithm/heuristic used).
Our main result designs an auction that extracts revenue equal to the full expected welfare whenever the buyers are "mean-based" (a property satisfied by standard no-regret learning algorithms such as Multiplicative Weights, Follow-the-Perturbed-Leader, etc.). This extends a main result of [BMSW18] which held only for a single buyer.
Our other results consider the case when buyers are mean-based but never overbid. On this front, [BMSW18] provides a simple LP formulation for the revenue-maximizing auction for a single-buyer. We identify several formal barriers to extending this approach to multiple buyers.
△ Less
Submitted 9 July, 2023;
originally announced July 2023.
-
q-Partitioning Valuations: Exploring the Space Between Subadditive and Fractionally Subadditive Valuations
Authors:
Kiril Bangachev,
S. Matthew Weinberg
Abstract:
For a set $M$ of $m$ elements, we define a decreasing chain of classes of normalized monotone-increasing valuation functions from $2^M$ to $\mathbb{R}_{\geq 0}$, parameterized by an integer $q \in [2,m]$. For a given $q$, we refer to the class as $q$-partitioning. A valuation function is subadditive if and only if it is $2$-partitioning, and fractionally subadditive if and only if it is $m$-partit…
▽ More
For a set $M$ of $m$ elements, we define a decreasing chain of classes of normalized monotone-increasing valuation functions from $2^M$ to $\mathbb{R}_{\geq 0}$, parameterized by an integer $q \in [2,m]$. For a given $q$, we refer to the class as $q$-partitioning. A valuation function is subadditive if and only if it is $2$-partitioning, and fractionally subadditive if and only if it is $m$-partitioning. Thus, our chain establishes an interpolation between subadditive and fractionally subadditive valuations. We show that this interpolation is smooth, interpretable , and non-trivial. We interpolate prior results that separate subadditive and fractionally subadditive for all $q \in \{2,\ldots, m\}$. Two highlights are the following:(i) An $Ω\left(\frac{\log \log q}{\log \log m}\right)$-competitive posted price mechanism for $q$-partitioning valuations. Note that this matches asymptotically the state-of-the-art for both subadditive ($q=2$) [DKL20], and fractionally subadditive ($q=m$) [FGL15]. (ii)Two upper-tail concentration inequalities on $1$-Lipschitz, $q$-partitioning valuations over independent items. One extends the state-of-the-art for $q=m$ to $q<m$, the other improves the state-of-the-art for $q=2$ for $q > 2$. Our concentration inequalities imply several corollaries that interpolate between subadditive and fractionally subadditive, for example: $\mathbb{E}[v(S)]\le (1 + 1/\log q)\text{Median}[v(S)] + O(\log q)$. To prove this, we develop a new isoperimetric inequality using Talagrand's method of control by $q$ points, which may be of independent interest. We also discuss other probabilistic inequalities and game-theoretic applications of $q$-partitioning valuations, and connections to subadditive MPH-$k$ valuations [EFNTW19].
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Tight Bounds on 3-Team Manipulations in Randomized Death Match
Authors:
Atanas Dinev,
S. Matthew Weinberg
Abstract:
Consider a round-robin tournament on n teams, where a winner must be (possibly randomly) selected as a function of the results from the ${n \choose 2}$ pairwise matches. A tournament rule is said to be k-SNM-$α$ if no set of k teams can ever manipulate the ${k \choose 2}$ pairwise matches between them to improve 2 the joint probability that one of these k teams wins by more than $α$. Prior work id…
▽ More
Consider a round-robin tournament on n teams, where a winner must be (possibly randomly) selected as a function of the results from the ${n \choose 2}$ pairwise matches. A tournament rule is said to be k-SNM-$α$ if no set of k teams can ever manipulate the ${k \choose 2}$ pairwise matches between them to improve 2 the joint probability that one of these k teams wins by more than $α$. Prior work identifies multiple simple tournament rules that are 2-SNM-1/3 (Randomized Single Elimination Bracket [SSW17], Randomized King of the Hill [SWZZ20], Randomized Death Match [DW21]), which is optimal for k = 2 among all Condorcet-consistent rules (that is, rules that select an undefeated team with probability 1).
Our main result establishes that Randomized Death Match is 3-SNM-(31/60), which is tight (for Randomized Death Match). This is the first tight analysis of any Condorcet-consistent tournament rule and at least three manipulating teams. Our proof approach is novel in this domain: we explicitly find the most-manipulable tournament, and directly show that no other tournament can be more manipulable.
In addition to our main result, we establish that Randomized Death Match disincentivizes Sybil attacks (where a team enters multiple copies of themselves into the tournament, and arbitrarily manipulates the outcomes of matches between their copies). Specifically, for any tournament, and any team u that is not a Condorcet winner, the probability that u or one of its Sybils wins in Randomized Death Match approaches 0 as the number of Sybils approaches $\infty$.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
Quantum Neural Networks for a Supply Chain Logistics Application
Authors:
Randall Correll,
Sean J. Weinberg,
Fabio Sanches,
Takanori Ide,
Takafumi Suzuki
Abstract:
Problem instances of a size suitable for practical applications are not likely to be addressed during the noisy intermediate-scale quantum (NISQ) period with (almost) pure quantum algorithms. Hybrid classical-quantum algorithms have potential, however, to achieve good performance on much larger problem instances. We investigate one such hybrid algorithm on a problem of substantial importance: vehi…
▽ More
Problem instances of a size suitable for practical applications are not likely to be addressed during the noisy intermediate-scale quantum (NISQ) period with (almost) pure quantum algorithms. Hybrid classical-quantum algorithms have potential, however, to achieve good performance on much larger problem instances. We investigate one such hybrid algorithm on a problem of substantial importance: vehicle routing for supply chain logistics with multiple trucks and complex demand structure. We use reinforcement learning with neural networks with embedded quantum circuits. In such neural networks, projecting high-dimensional feature vectors down to smaller vectors is necessary to accommodate restrictions on the number of qubits of NISQ hardware. However, we use a multi-head attention mechanism where, even in classical machine learning, such projections are natural and desirable. We consider data from the truck routing logistics of a company in the automotive sector, and apply our methodology by decomposing into small teams of trucks, and we find results comparable to human truck assignment.
△ Less
Submitted 2 December, 2022; v1 submitted 30 November, 2022;
originally announced December 2022.
-
On the cut-query complexity of approximating max-cut
Authors:
Orestis Plevrakis,
Seyoon Ragavan,
S. Matthew Weinberg
Abstract:
We consider the problem of query-efficient global max-cut on a weighted undirected graph in the value oracle model examined by [RSW18]. Graph algorithms in this cut query model and other query models have recently been studied for various other problems such as min-cut, connectivity, bipartiteness, and triangle detection. Max-cut in the cut query model can also be viewed as a natural special case…
▽ More
We consider the problem of query-efficient global max-cut on a weighted undirected graph in the value oracle model examined by [RSW18]. Graph algorithms in this cut query model and other query models have recently been studied for various other problems such as min-cut, connectivity, bipartiteness, and triangle detection. Max-cut in the cut query model can also be viewed as a natural special case of submodular function maximization: on query $S \subseteq V$, the oracle returns the total weight of the cut between $S$ and $V \backslash S$.
Our first main technical result is a lower bound stating that a deterministic algorithm achieving a $c$-approximation for any $c > 1/2$ requires $Ω(n)$ queries. This uses an extension of the cut dimension to rule out approximation (prior work of [GPRW20] introducing the cut dimension only rules out exact solutions). Secondly, we provide a randomized algorithm with $\tilde{O}(n)$ queries that finds a $c$-approximation for any $c < 1$. We achieve this using a query-efficient sparsifier for undirected weighted graphs (prior work of [RSW18] holds only for unweighted graphs).
To complement these results, for most constants $c \in (0,1]$, we nail down the query complexity of achieving a $c$-approximation, for both deterministic and randomized algorithms (up to logarithmic factors). Analogously to general submodular function maximization in the same model, we observe a phase transition at $c = 1/2$: we design a deterministic algorithm for global $c$-approximate max-cut in $O(\log n)$ queries for any $c < 1/2$, and show that any randomized algorithm requires $Ω(n/\log n)$ queries to find a $c$-approximate max-cut for any $c > 1/2$. Additionally, we show that any deterministic algorithm requires $Ω(n^2)$ queries to find an exact max-cut (enough to learn the entire graph).
△ Less
Submitted 23 April, 2024; v1 submitted 8 November, 2022;
originally announced November 2022.
-
An Improved Lower Bound for Matroid Intersection Prophet Inequalities
Authors:
Raghuvansh R. Saxena,
Santhoshini Velusamy,
S. Matthew Weinberg
Abstract:
We consider prophet inequalities subject to feasibility constraints that are the intersection of $q$ matroids. The best-known algorithms achieve a $Θ(q)$-approximation, even when restricted to instances that are the intersection of $q$ partition matroids, and with i.i.d.~Bernoulli random variables. The previous best-known lower bound is $Θ(\sqrt{q})$ due to a simple construction of [Kleinberg-Wein…
▽ More
We consider prophet inequalities subject to feasibility constraints that are the intersection of $q$ matroids. The best-known algorithms achieve a $Θ(q)$-approximation, even when restricted to instances that are the intersection of $q$ partition matroids, and with i.i.d.~Bernoulli random variables. The previous best-known lower bound is $Θ(\sqrt{q})$ due to a simple construction of [Kleinberg-Weinberg STOC 2012] (which uses i.i.d.~Bernoulli random variables, and writes the construction as the intersection of partition matroids).
We establish an improved lower bound of $q^{1/2+Ω(1/\log \log q)}$ by writing the construction of [Kleinberg-Weinberg STOC 2012] as the intersection of asymptotically fewer partition matroids. We accomplish this via an improved upper bound on the product dimension of a graph with $p^p$ disjoint cliques of size $p$, using recent techniques developed in [Alon-Alweiss European Journal of Combinatorics 2020].
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake
Authors:
Matheus V. X. Ferreira,
Ye Lin Sally Hahn,
S. Matthew Weinberg,
Catherine Yu
Abstract:
Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols, such as Algorand. In cryptographic self-selection, each round $r$ has a seed $Q_r$. In round $r$, each account owner is asked to digitally sign $Q_r$, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known func…
▽ More
Cryptographic Self-Selection is a subroutine used to select a leader for modern proof-of-stake consensus protocols, such as Algorand. In cryptographic self-selection, each round $r$ has a seed $Q_r$. In round $r$, each account owner is asked to digitally sign $Q_r$, hash their digital signature to produce a credential, and then broadcast this credential to the entire network. A publicly-known function scores each credential in a manner so that the distribution of the lowest scoring credential is identical to the distribution of stake owned by each account. The user who broadcasts the lowest-scoring credential is the leader for round $r$, and their credential becomes the seed $Q_{r+1}$. Such protocols leave open the possibility of a selfish-mining style attack: a user who owns multiple accounts that each produce low-scoring credentials in round $r$ can selectively choose which ones to broadcast in order to influence the seed for round $r+1$. Indeed, the user can pre-compute their credentials for round $r+1$ for each potential seed, and broadcast only the credential (among those with a low enough score to be the leader) that produces the most favorable seed.
We consider an adversary who wishes to maximize the expected fraction of rounds in which an account they own is the leader. We show such an adversary always benefits from deviating from the intended protocol, regardless of the fraction of the stake controlled. We characterize the optimal strategy; first by proving the existence of optimal positive recurrent strategies whenever the adversary owns last than $38\%$ of the stake. Then, we provide a Markov Decision Process formulation to compute the optimal strategy.
△ Less
Submitted 16 July, 2022;
originally announced July 2022.
-
Credible, Strategyproof, Optimal, and Bounded Expected-Round Single-Item Auctions for all Distributions
Authors:
Meryem Essaidi,
Matheus V. X. Ferreira,
S. Matthew Weinberg
Abstract:
We consider a revenue-maximizing seller with a single item for sale to multiple buyers with i.i.d. valuations. Akbarpour and Li (2020) show that the only optimal, credible, strategyproof auction is the ascending price auction with reserves which has unbounded communication complexity. Recent work of Ferreira and Weinberg (2020) circumvents their impossibility result assuming the existence of crypt…
▽ More
We consider a revenue-maximizing seller with a single item for sale to multiple buyers with i.i.d. valuations. Akbarpour and Li (2020) show that the only optimal, credible, strategyproof auction is the ascending price auction with reserves which has unbounded communication complexity. Recent work of Ferreira and Weinberg (2020) circumvents their impossibility result assuming the existence of cryptographically secure commitment schemes, and designs a two-round credible, strategyproof, optimal auction. However, their auction is only credible when buyers' valuations are MHR or $α$-strongly regular: they show their auction might not be credible even when there is a single buyer drawn from a non-MHR distribution. In this work, under the same cryptographic assumptions, we identify a new single-item auction that is credible, strategyproof, revenue optimal, and terminates in constant rounds in expectation for all distributions with finite monopoly price.
△ Less
Submitted 29 May, 2022;
originally announced May 2022.
-
On Infinite Separations Between Simple and Optimal Mechanisms
Authors:
C. Alexandros Psomas,
Ariel Schvartzman,
S. Matthew Weinberg
Abstract:
We consider a revenue-maximizing seller with $k$ heterogeneous items for sale to a single additive buyer, whose values are drawn from a known, possibly correlated prior $\mathcal{D}$. It is known that there exist priors $\mathcal{D}$ such that simple mechanisms -- those with bounded menu complexity -- extract an arbitrarily small fraction of the optimal revenue. This paper considers the opposite d…
▽ More
We consider a revenue-maximizing seller with $k$ heterogeneous items for sale to a single additive buyer, whose values are drawn from a known, possibly correlated prior $\mathcal{D}$. It is known that there exist priors $\mathcal{D}$ such that simple mechanisms -- those with bounded menu complexity -- extract an arbitrarily small fraction of the optimal revenue. This paper considers the opposite direction: given a correlated distribution $\mathcal{D}$ witnessing an infinite separation between simple and optimal mechanisms, what can be said about $\mathcal{D}$?
Previous work provides a framework for constructing such $\mathcal{D}$: it takes as input a sequence of $k$-dimensional vectors satisfying some geometric property, and produces a $\mathcal{D}$ witnessing an infinite gap. Our first main result establishes that this framework is without loss: every $\mathcal{D}$ witnessing an infinite separation could have resulted from this framework. Even earlier work provided a more streamlined framework. Our second main result establishes that this restrictive framework is not tight. That is, we provide an instance $\mathcal{D}$ witnessing an infinite gap, but which provably could not have resulted from the restrictive framework.
As a corollary, we discover a new kind of mechanism which can witness these infinite separations on instances where the previous ''aligned'' mechanisms do not.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
Supply Chain Logistics with Quantum and Classical Annealing Algorithms
Authors:
Sean J. Weinberg,
Fabio Sanches,
Takanori Ide,
Kazumitzu Kamiya,
Randall Correll
Abstract:
Noisy intermediate-scale quantum (NISQ) hardware is almost universally incompatible with full-scale optimization problems of practical importance which can have many variables and unwieldy objective functions. As a consequence, there is a growing body of literature that tests quantum algorithms on miniaturized versions of problems that arise in an operations research setting. Rather than taking th…
▽ More
Noisy intermediate-scale quantum (NISQ) hardware is almost universally incompatible with full-scale optimization problems of practical importance which can have many variables and unwieldy objective functions. As a consequence, there is a growing body of literature that tests quantum algorithms on miniaturized versions of problems that arise in an operations research setting. Rather than taking this approach, we investigate a problem of substantial commercial value, multi-truck vehicle routing for supply chain logistics, at the scale used by a corporation in their operations. Such a problem is too complex to be fully embedded on any near-term quantum hardware or simulator; we avoid confronting this challenge by taking a hybrid workflow approach: we iteratively assign routes for trucks by generating a new binary optimization problem instance one truck at a time. Each instance has $\sim 2500$ quadratic binary variables, putting it in a range that is feasible for NISQ quantum computing, especially quantum annealing hardware. We test our methods using simulated annealing and the D-Wave Hybrid solver as a place-holder in wait of quantum hardware developments. After feeding the vehicle routes suggested by these runs into a highly realistic classical supply chain simulation, we find excellent performance for the full supply chain. Our work gives a set of techniques that can be adopted in contexts beyond vehicle routing to apply NISQ devices in a hybrid fashion to large-scale problems of commercial interest.
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
Formal Barriers to Simple Algorithms for the Matroid Secretary Problem
Authors:
Maryam Bahrani,
Hedyeh Beyhaghi,
Sahil Singla,
S. Matthew Weinberg
Abstract:
Babaioff et al. [BIK2007] introduced the matroid secretary problem in 2007, a natural extension of the classic single-choice secretary problem to matroids, and conjectured that a constant-competitive online algorithm exists. The conjecture still remains open despite substantial partial progress, including constant-competitive algorithms for numerous special cases of matroids, and an…
▽ More
Babaioff et al. [BIK2007] introduced the matroid secretary problem in 2007, a natural extension of the classic single-choice secretary problem to matroids, and conjectured that a constant-competitive online algorithm exists. The conjecture still remains open despite substantial partial progress, including constant-competitive algorithms for numerous special cases of matroids, and an $O(\log \log \text{rank})$-competitive algorithm in the general case.
Many of these algorithms follow principled frameworks. The limits of these frameworks are previously unstudied, and prior work establishes only that a handful of particular algorithms cannot resolve the matroid secretary conjecture. We initiate the study of impossibility results for frameworks to resolve this conjecture. We establish impossibility results for a natural class of greedy algorithms and for randomized partition algorithms, both of which contain known algorithms that resolve special cases.
△ Less
Submitted 7 November, 2021;
originally announced November 2021.
-
Unsupervised Diffeomorphic Surface Registration and Non-Linear Modelling
Authors:
Balder Croquet,
Daan Christiaens,
Seth M. Weinberg,
Michael Bronstein,
Dirk Vandermeulen,
Peter Claes
Abstract:
Registration is an essential tool in image analysis. Deep learning based alternatives have recently become popular, achieving competitive performance at a faster speed. However, many contemporary techniques are limited to volumetric representations, despite increased popularity of 3D surface and shape data in medical image analysis. We propose a one-step registration model for 3D surfaces that int…
▽ More
Registration is an essential tool in image analysis. Deep learning based alternatives have recently become popular, achieving competitive performance at a faster speed. However, many contemporary techniques are limited to volumetric representations, despite increased popularity of 3D surface and shape data in medical image analysis. We propose a one-step registration model for 3D surfaces that internalises a lower dimensional probabilistic deformation model (PDM) using conditional variational autoencoders (CVAE). The deformations are constrained to be diffeomorphic using an exponentiation layer. The one-step registration model is benchmarked against iterative techniques, trading in a slightly lower performance in terms of shape fit for a higher compactness. We experiment with two distance metrics, Chamfer distance (CD) and Sinkhorn divergence (SD), as specific distance functions for surface data in real-world registration scenarios. The internalised deformation model is benchmarked against linear principal component analysis (PCA) achieving competitive results and improved generalisability from lower dimensions.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Short Quantum Circuits in Reinforcement Learning Policies for the Vehicle Routing Problem
Authors:
Fabio Sanches,
Sean Weinberg,
Takanori Ide,
Kazumitsu Kamiya
Abstract:
Quantum computing and machine learning have potential for symbiosis. However, in addition to the hardware limitations from current devices, there are still basic issues that must be addressed before quantum circuits can usefully incorporate with current machine learning tasks. We report a new strategy for such an integration in the context of attention models used for reinforcement learning. Agent…
▽ More
Quantum computing and machine learning have potential for symbiosis. However, in addition to the hardware limitations from current devices, there are still basic issues that must be addressed before quantum circuits can usefully incorporate with current machine learning tasks. We report a new strategy for such an integration in the context of attention models used for reinforcement learning. Agents that implement attention mechanisms have successfully been applied to certain cases of combinatorial routing problems by first encoding nodes on a graph and then sequentially decoding nodes until a route is selected. We demonstrate that simple quantum circuits can used in place of classical attention head layers while maintaining performance. Our method modifies the networks used in [1] by replacing key and query vectors for every node with quantum states that are entangled before being measured. The resulting hybrid classical-quantum agent is tested in the context of vehicle routing problems where its performance is competitive with the original classical approach. We regard our model as a prototype that can be scaled up and as an avenue for further study on the role of quantum computing in reinforcement learning.
△ Less
Submitted 15 September, 2021;
originally announced September 2021.
-
Proof-of-Stake Mining Games with Perfect Randomness
Authors:
Matheus V. X. Ferreira,
S. Matthew Weinberg
Abstract:
Proof-of-Stake blockchains based on a longest-chain consensus protocol are an attractive energy-friendly alternative to the Proof-of-Work paradigm. However, formal barriers to "getting the incentives right" were recently discovered, driven by the desire to use the blockchain itself as a source of pseudorandomness \cite{brown2019formal}.
We consider instead a longest-chain Proof-of-Stake protocol…
▽ More
Proof-of-Stake blockchains based on a longest-chain consensus protocol are an attractive energy-friendly alternative to the Proof-of-Work paradigm. However, formal barriers to "getting the incentives right" were recently discovered, driven by the desire to use the blockchain itself as a source of pseudorandomness \cite{brown2019formal}.
We consider instead a longest-chain Proof-of-Stake protocol with perfect, trusted, external randomness (e.g. a randomness beacon). We produce two main results.
First, we show that a strategic miner can strictly outperform an honest miner with just $32.5\%$ of the total stake. Note that a miner of this size {\em cannot} outperform an honest miner in the Proof-of-Work model. This establishes that even with access to a perfect randomness beacon, incentives in Proof-of-Work and Proof-of-Stake longest-chain protocols are fundamentally different.
Second, we prove that a strategic miner cannot outperform an honest miner with $30.8\%$ of the total stake. This means that, while not quite as secure as the Proof-of-Work regime, desirable incentive properties of Proof-of-Work longest-chain protocols can be approximately recovered via Proof-of-Stake with a perfect randomness beacon.
The space of possible strategies in a Proof-of-Stake mining game is {\em significantly} richer than in a Proof-of-Work game. Our main technical contribution is a characterization of potentially optimal strategies for a strategic miner, and in particular, a proof that the corresponding infinite-state MDP admits an optimal strategy that is positive recurrent.
△ Less
Submitted 14 December, 2021; v1 submitted 8 July, 2021;
originally announced July 2021.
-
Prior-free Dynamic Mechanism Design With Limited Liability
Authors:
Mark Braverman,
Jon Schneider,
S. Matthew Weinberg
Abstract:
We study the problem of repeatedly auctioning off an item to one of $k$ bidders where: a) bidders have a per-round individual rationality constraint, b) bidders may leave the mechanism at any point, and c) the bidders' valuations are adversarially chosen (the prior-free setting). Without these constraints, the auctioneer can run a second-price auction to "sell the business" and receive the second…
▽ More
We study the problem of repeatedly auctioning off an item to one of $k$ bidders where: a) bidders have a per-round individual rationality constraint, b) bidders may leave the mechanism at any point, and c) the bidders' valuations are adversarially chosen (the prior-free setting). Without these constraints, the auctioneer can run a second-price auction to "sell the business" and receive the second highest total value for the entire stream of items. We show that under these constraints, the auctioneer can attain a constant fraction of the "sell the business" benchmark, but no more than $2/e$ of this benchmark.
In the course of doing so, we design mechanisms for a single bidder problem of independent interest: how should you repeatedly sell an item to a (per-round IR) buyer with adversarial valuations if you know their total value over all rounds is $V$ but not how their value changes over time? We demonstrate a mechanism that achieves revenue $V/e$ and show that this is tight.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
On the Development of Effective Field Theory
Authors:
Steven Weinberg
Abstract:
This is a lightly edited version of the talk given on September 30, 2020 to inaugurate the international seminar series {\it All Things EFT}. It reviews some of the early history of effective field theories, and concludes with a discussion of the implications of effective field theory for future discovery.
This is a lightly edited version of the talk given on September 30, 2020 to inaugurate the international seminar series {\it All Things EFT}. It reviews some of the early history of effective field theories, and concludes with a discussion of the implications of effective field theory for future discovery.
△ Less
Submitted 11 January, 2021;
originally announced January 2021.
-
Approximately Strategyproof Tournament Rules in the Probabilistic Setting
Authors:
Kimberly Ding,
S. Matthew Weinberg
Abstract:
We consider the manipulability of tournament rules which map the results of $\binom{n}{2}$ pairwise matches and select a winner. Prior work designs simple tournament rules such that no pair of teams can manipulate the outcome of their match to improve their probability of winning by more than $1/3$, and this is the best possible among any Condorcet-consistent tournament rule (which selects an unde…
▽ More
We consider the manipulability of tournament rules which map the results of $\binom{n}{2}$ pairwise matches and select a winner. Prior work designs simple tournament rules such that no pair of teams can manipulate the outcome of their match to improve their probability of winning by more than $1/3$, and this is the best possible among any Condorcet-consistent tournament rule (which selects an undefeated team whenever one exists) [Schneider et al., 2017, Schvartzman et al., 2020]. These lower bounds require the manipulators to know precisely the outcome of all future matches.
We take a beyond worst-case view and instead consider tournaments which are "close to uniform": the outcome of all matches are independent, and no team is believed to win any match with probability exceeding $1/2+\varepsilon$. We show that Randomized Single Elimination Bracket [Schneider et al., 2017] and a new tournament rule we term Randomized Death Match have the property that no pair of teams can manipulate the outcome of their match to improve their probability of winning by more than $\varepsilon/3 + 2\varepsilon^2/3$, for all $\varepsilon$, and this is the best possible among any Condorcet-consistent tournament rule.
Our main technical contribution is a recursive framework to analyze the manipulability of certain forms of tournament rules. In addition to our main results, this view helps streamline previous analysis of Randomized Single Elimination Bracket, and may be of independent interest.
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
Exponential Communication Separations between Notions of Selfishness
Authors:
Aviad Rubinstein,
Raghuvansh R. Saxena,
Clayton Thomas,
S. Mathew Weinberg,
Junyao Zhao
Abstract:
We consider the problem of implementing a fixed social choice function between multiple players (which takes as input a type $t_i$ from each player $i$ and outputs an outcome $f(t_1,\ldots, t_n)$), in which each player must be incentivized to follow the protocol. In particular, we study the communication requirements of a protocol which: (a) implements $f$, (b) implements $f$ and computes payments…
▽ More
We consider the problem of implementing a fixed social choice function between multiple players (which takes as input a type $t_i$ from each player $i$ and outputs an outcome $f(t_1,\ldots, t_n)$), in which each player must be incentivized to follow the protocol. In particular, we study the communication requirements of a protocol which: (a) implements $f$, (b) implements $f$ and computes payments that make it ex-post incentive compatible (EPIC) to follow the protocol, and (c) implements $f$ and computes payments in a way that makes it dominant-strategy incentive compatible (DSIC) to follow the protocol.
We show exponential separations between all three of these quantities, already for just two players. That is, we first construct an $f$ such that $f$ can be implemented in communication $c$, but any EPIC implementation of $f$ (with any choice of payments) requires communication $\exp(c)$. This answers an open question of [FS09, BBS13]. Second, we construct an $f$ such that an EPIC protocol implements $f$ with communication $C$, but all DSIC implementations of $f$ require communication $\exp(C)$.
△ Less
Submitted 2 June, 2021; v1 submitted 29 December, 2020;
originally announced December 2020.
-
Optimal Multi-Dimensional Mechanisms are not Locally-Implementable
Authors:
S. Matthew Weinberg,
Zixin Zhou
Abstract:
We introduce locality: a new property of multi-bidder auctions that formally separates the simplicity of optimal single-dimensional multi-bidder auctions from the complexity of optimal multi-dimensional multi-bidder auctions. Specifically, consider the revenue-optimal, Bayesian Incentive Compatible auction for buyers with valuations drawn from $\vec{D}:=\times_i D_i$, where each distribution has s…
▽ More
We introduce locality: a new property of multi-bidder auctions that formally separates the simplicity of optimal single-dimensional multi-bidder auctions from the complexity of optimal multi-dimensional multi-bidder auctions. Specifically, consider the revenue-optimal, Bayesian Incentive Compatible auction for buyers with valuations drawn from $\vec{D}:=\times_i D_i$, where each distribution has support-size $n$. This auction takes as input a valuation profile $\vec{v}$ and produces as output an allocation of the items and prices to charge, $Opt_{\vec{D}}(\vec{v})$. When each $D_i$ is single-dimensional, this mapping is locally-implementable: defining each input $v_i$ requires $Θ(\log n)$ bits, and $Opt_{\vec{D}}(\vec{v})$ can be fully determined using just $Θ(\log n)$ bits from each $D_i$. This follows immediately from Myerson's virtual value theory [Mye81].
Our main result establishes that optimal multi-dimensional mechanisms are not locally-implementable: in order to determine the output $Opt_{\vec{D}}(\vec{v})$ on one particular input $\vec{v}$, one still needs to know (essentially) the entire distribution $\vec{D}$. Formally, $Ω(n)$ bits from each $D_i$ is necessary: (essentially) enough to fully describe $D_i$, and exponentially more than the $Θ(\log n)$ needed to define the input $v_i$. We show that this phenomenon already occurs with just two bidders, even when one bidder is single-dimensional, and when the other bidder is barely multi-dimensional. More specifically, the multi-dimensional bidder is ``inter-dimensional'' from the FedEx setting with just two days [FGKK16].
Our techniques are fairly robust: we additionally establish that optimal mechanisms for single-dimensional buyers with budget constraints are not locally-implementable. This occurs with just two bidders, even when one has no budget constraint, and even when the other's budget is public.
△ Less
Submitted 4 November, 2021; v1 submitted 19 November, 2020;
originally announced November 2020.
-
Separating the Communication Complexity of Truthful and Non-Truthful Combinatorial Auctions
Authors:
Sepehr Assadi,
Hrishikesh Khandeparkar,
Raghuvansh R. Saxena,
S. Matthew Weinberg
Abstract:
We provide the first separation in the approximation guarantee achievable by truthful and non-truthful combinatorial auctions with polynomial communication. Specifically, we prove that any truthful mechanism guaranteeing a $(\frac{3}{4}-\frac{1}{240}+\varepsilon)$-approximation for two buyers with XOS valuations over $m$ items requires $\exp(Ω(\varepsilon^2 \cdot m))$ communication, whereas a non-…
▽ More
We provide the first separation in the approximation guarantee achievable by truthful and non-truthful combinatorial auctions with polynomial communication. Specifically, we prove that any truthful mechanism guaranteeing a $(\frac{3}{4}-\frac{1}{240}+\varepsilon)$-approximation for two buyers with XOS valuations over $m$ items requires $\exp(Ω(\varepsilon^2 \cdot m))$ communication, whereas a non-truthful algorithm by Dobzinski and Schapira [SODA 2006] and Feige [2009] is already known to achieve a $\frac{3}{4}$-approximation in $poly(m)$ communication.
We obtain our separation by proving that any {simultaneous} protocol ({not} necessarily truthful) which guarantees a $(\frac{3}{4}-\frac{1}{240}+\varepsilon)$-approximation requires communication $\exp(Ω(\varepsilon^2 \cdot m))$. The taxation complexity framework of Dobzinski [FOCS 2016] extends this lower bound to all truthful mechanisms (including interactive truthful mechanisms).
△ Less
Submitted 14 November, 2020;
originally announced November 2020.
-
Massless Particles in Higher Dimensions
Authors:
Steven Weinberg
Abstract:
In spacetimes of any dimensionality, the massless particle states that can be created and destroyed by a field in a given representation of the Lorentz group are severely constrained by the condition that the invariant Abelian subgroup of the little group must leave these states invariant. A number of examples are given of the massless one-particle states that can be described by various tensor an…
▽ More
In spacetimes of any dimensionality, the massless particle states that can be created and destroyed by a field in a given representation of the Lorentz group are severely constrained by the condition that the invariant Abelian subgroup of the little group must leave these states invariant. A number of examples are given of the massless one-particle states that can be described by various tensor and spinor-tensor fields, and a speculation is offered for the general case.
△ Less
Submitted 12 October, 2020;
originally announced October 2020.
-
Radial Cutoffs and Holographic Entanglement
Authors:
Brianna Grado-White,
Donald Marolf,
Sean J. Weinberg
Abstract:
Tensor networks, $T\bar{T}$, and broader notions of a holographic principle all motivate the idea that some notion of gravitational holography should persist in the presence of a radial cutoff. But in the absence of time-reflection symmetry, the areas of Hubeny-Rangamani-Takayanagi surfaces anchored to the radial cutoff generally violate strong subadditivity, even when the associated boundary regi…
▽ More
Tensor networks, $T\bar{T}$, and broader notions of a holographic principle all motivate the idea that some notion of gravitational holography should persist in the presence of a radial cutoff. But in the absence of time-reflection symmetry, the areas of Hubeny-Rangamani-Takayanagi surfaces anchored to the radial cutoff generally violate strong subadditivity, even when the associated boundary regions are spacelike separated as defined by both bulk and boundary notions of causality. We thus propose an alternate definition of cutoff-holographic entropy using a restricted maximin prescription anchored to a codimension 2 cutoff surface. For bulk solutions that respect the null energy condition, we show that the resulting areas satisfy SSA, entanglement wedge nesting, and monogamy of mutual information in parallel with cutoff free results in AdS. These results hold even when the cutoff surface fails to be convex.
△ Less
Submitted 3 September, 2020; v1 submitted 16 August, 2020;
originally announced August 2020.
-
On the (in)-approximability of Bayesian Revenue Maximization for a Combinatorial Buyer
Authors:
Natalie Collina,
S. Matthew Weinberg
Abstract:
We consider a revenue-maximizing single seller with $m$ items for sale to a single buyer whose value $v(\cdot)$ for the items is drawn from a known distribution $D$ of support $k$. A series of works by Cai et al. establishes that when each $v(\cdot)$ in the support of $D$ is additive or unit-demand (or $c$-demand), the revenue-optimal auction can be found in $\operatorname{poly}(m,k)$ time.
We s…
▽ More
We consider a revenue-maximizing single seller with $m$ items for sale to a single buyer whose value $v(\cdot)$ for the items is drawn from a known distribution $D$ of support $k$. A series of works by Cai et al. establishes that when each $v(\cdot)$ in the support of $D$ is additive or unit-demand (or $c$-demand), the revenue-optimal auction can be found in $\operatorname{poly}(m,k)$ time.
We show that going barely beyond this, even to matroid-based valuations (a proper subset of Gross Substitutes), results in strong hardness of approximation. Specifically, even on instances with $m$ items and $k \leq m$ valuations in the support of $D$, it is not possible to achieve a $1/m^{1-\varepsilon}$-approximation for any $\varepsilon>0$ to the revenue-optimal mechanism for matroid-based valuations in (randomized) poly-time unless NP $\subseteq$ RP (note that a $1/k$-approximation is trivial).
Cai et al.'s main technical contribution is a black-box reduction from revenue maximization for valuations in class $\mathcal{V}$ to optimizing the difference between two values in class $\mathcal{V}$. Our main technical contribution is a black-box reduction in the other direction (for a wide class of valuation classes), establishing that their reduction is essentially tight.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Decentralized Reinforcement Learning: Global Decision-Making via Local Economic Transactions
Authors:
Michael Chang,
Sidhant Kaushik,
S. Matthew Weinberg,
Thomas L. Griffiths,
Sergey Levine
Abstract:
This paper seeks to establish a framework for directing a society of simple, specialized, self-interested agents to solve what traditionally are posed as monolithic single-agent sequential decision problems. What makes it challenging to use a decentralized approach to collectively optimize a central objective is the difficulty in characterizing the equilibrium strategy profile of non-cooperative g…
▽ More
This paper seeks to establish a framework for directing a society of simple, specialized, self-interested agents to solve what traditionally are posed as monolithic single-agent sequential decision problems. What makes it challenging to use a decentralized approach to collectively optimize a central objective is the difficulty in characterizing the equilibrium strategy profile of non-cooperative games. To overcome this challenge, we design a mechanism for defining the learning environment of each agent for which we know that the optimal solution for the global objective coincides with a Nash equilibrium strategy profile of the agents optimizing their own local objectives. The society functions as an economy of agents that learn the credit assignment process itself by buying and selling to each other the right to operate on the environment state. We derive a class of decentralized reinforcement learning algorithms that are broadly applicable not only to standard reinforcement learning but also for selecting options in semi-MDPs and dynamically composing computation graphs. Lastly, we demonstrate the potential advantages of a society's inherent modular structure for more efficient transfer learning.
△ Less
Submitted 14 August, 2020; v1 submitted 5 July, 2020;
originally announced July 2020.
-
Radial Lattice Quantization of 3D $φ^4$ Field Theory
Authors:
Richard C. Brower,
George T. Fleming,
Andrew D. Gasbarro,
Dean Howarth,
Timothy G. Raben,
Chung-I Tan,
Evan S. Weinberg
Abstract:
The quantum extension of classical finite elements, referred to as quantum finite elements ({\bf QFE})~\cite{Brower:2018szu,Brower:2016vsl}, is applied to the radial quantization of 3d $φ^4$ theory on a simplicial lattice for the $\mathbb R \times \mathbb S^2$ manifold. Explicit counter terms to cancel the one- and two-loop ultraviolet defects are implemented to reach the quantum continuum theory.…
▽ More
The quantum extension of classical finite elements, referred to as quantum finite elements ({\bf QFE})~\cite{Brower:2018szu,Brower:2016vsl}, is applied to the radial quantization of 3d $φ^4$ theory on a simplicial lattice for the $\mathbb R \times \mathbb S^2$ manifold. Explicit counter terms to cancel the one- and two-loop ultraviolet defects are implemented to reach the quantum continuum theory. Using the Brower-Tamayo~\cite{Brower:1989mt} cluster Monte Carlo algorithm, numerical results support the QFE ansatz that the critical conformal field theory (CFT) is reached in the continuum with the full isometries of $\mathbb R \times \mathbb S^2$ restored. The Ricci curvature term, while technically irrelevant in the quantum theory, is shown to dramatically improve the convergence opening, the way for high precision Monte Carlo simulation to determine the CFT data: operator dimensions, trilinear OPE couplings and the central charge.
△ Less
Submitted 28 June, 2020;
originally announced June 2020.
-
Auction learning as a two-player game
Authors:
Jad Rahme,
Samy Jelassi,
S. Matthew Weinberg
Abstract:
Designing an incentive compatible auction that maximizes expected revenue is a central problem in Auction Design. While theoretical approaches to the problem have hit some limits, a recent research direction initiated by Duetting et al. (2019) consists in building neural network architectures to find optimal auctions. We propose two conceptual deviations from their approach which result in enhance…
▽ More
Designing an incentive compatible auction that maximizes expected revenue is a central problem in Auction Design. While theoretical approaches to the problem have hit some limits, a recent research direction initiated by Duetting et al. (2019) consists in building neural network architectures to find optimal auctions. We propose two conceptual deviations from their approach which result in enhanced performance. First, we use recent results in theoretical auction design (Rubinstein and Weinberg, 2018) to introduce a time-independent Lagrangian. This not only circumvents the need for an expensive hyper-parameter search (as in prior work), but also provides a principled metric to compare the performance of two auctions (absent from prior work). Second, the optimization procedure in previous work uses an inner maximization loop to compute optimal misreports. We amortize this process through the introduction of an additional neural network. We demonstrate the effectiveness of our approach by learning competitive or strictly improved auctions compared to prior work. Both results together further imply a novel formulation of Auction Design as a two-player game with stationary utility functions.
△ Less
Submitted 25 October, 2021; v1 submitted 10 June, 2020;
originally announced June 2020.
-
DAYENU: A Simple Filter of Smooth Foregrounds for Intensity Mapping Power Spectra
Authors:
Aaron Ewall-Wice,
Nicholas Kern,
Joshua S. Dillon,
Adrian Liu,
Aaron Parsons,
Saurabh Singh,
Adam Lanman,
Paul La Plante,
Nicolas Fagnoni,
Eloy de Lera Acedo,
David R. DeBoer,
Chuneeta Nunhokee,
Philip Bull,
Tzu-Ching Chang,
T. Joseph Lazio,
James Aguirre,
Sean Weinberg
Abstract:
We introduce DAYENU, a linear, spectral filter for HI intensity mapping that achieves the desirable foreground mitigation and error minimization properties of inverse co-variance weighting with minimal modeling of the underlying data. Beyond 21 cm power-spectrum estimation, our filter is suitable for any analysis where high dynamic-range removal of spectrally smooth foregrounds in irregularly (or…
▽ More
We introduce DAYENU, a linear, spectral filter for HI intensity mapping that achieves the desirable foreground mitigation and error minimization properties of inverse co-variance weighting with minimal modeling of the underlying data. Beyond 21 cm power-spectrum estimation, our filter is suitable for any analysis where high dynamic-range removal of spectrally smooth foregrounds in irregularly (or regularly) sampled data is required, something required by many other intensity mapping techniques. Our filtering matrix is diagonalized by Discrete Prolate Spheroidal Sequences which are an optimal basis to model band-limited foregrounds in 21 cm intensity mapping experiments in the sense that they maximally concentrate power within a finite region of Fourier space. We show that DAYENU enables the access of large-scale line-of-sight modes that are inaccessible to tapered DFT estimators. Since these modes have the largest SNRs, DAYENU significantly increases the sensitivity of 21 cm analyses over tapered Fourier transforms. Slight modifications allow us to use DAYENU as a linear replacement for iterative delay CLEANing (DAYENUREST). We refer readers to the Code section at the end of this paper for links to examples and code.
△ Less
Submitted 25 October, 2020; v1 submitted 23 April, 2020;
originally announced April 2020.
-
Multigrid for Chiral Lattice Fermions: Domain Wall
Authors:
Richard C. Brower,
M. A. Clark,
Dean Howarth,
Evan S. Weinberg
Abstract:
Critical slowing down for the Krylov Dirac solver presents a major obstacle to further advances in lattice field theory as it approaches the continuum solution. We propose a new multi-grid approach for chiral fermions, applicable to both the 5-d domain wall or 4-d Overlap operator. The central idea is to directly coarsen the 4-d Wilson kernel, giving an effective domain wall or overlap operator on…
▽ More
Critical slowing down for the Krylov Dirac solver presents a major obstacle to further advances in lattice field theory as it approaches the continuum solution. We propose a new multi-grid approach for chiral fermions, applicable to both the 5-d domain wall or 4-d Overlap operator. The central idea is to directly coarsen the 4-d Wilson kernel, giving an effective domain wall or overlap operator on each level. We provide here an explicit construction for the Shamir domain wall formulation with numerical tests for the 2-d Schwinger prototype, demonstrating near ideal multi-grid scaling. The framework is designed for a natural extension to 4-d lattice QCD chiral fermions, such as the Möbius, Zolotarev or Borici domain wall discretizations or directly to a rational expansion of the 4-d Overlap operator. For the Shamir operator, the effective overlap operator is isolated by the use of a Pauli-Villars preconditioner in the spirit of the Kähler-Dirac spectral map used in a recent staggered MG algorithm [1].
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Credible, Truthful, and Two-Round (Optimal) Auctions via Cryptographic Commitments
Authors:
Matheus V. X. Ferreira,
S. Matthew Weinberg
Abstract:
We consider the sale of a single item to multiple buyers by a revenue-maximizing seller. Recent work of Akbarpour and Li formalizes \emph{credibility} as an auction desideratum, and prove that the only optimal, credible, strategyproof auction is the ascending price auction with reserves (Akbarpour and Li, 2019).
In contrast, when buyers' valuations are MHR, we show that the mild additional assum…
▽ More
We consider the sale of a single item to multiple buyers by a revenue-maximizing seller. Recent work of Akbarpour and Li formalizes \emph{credibility} as an auction desideratum, and prove that the only optimal, credible, strategyproof auction is the ascending price auction with reserves (Akbarpour and Li, 2019).
In contrast, when buyers' valuations are MHR, we show that the mild additional assumption of a cryptographically secure commitment scheme suffices for a simple \emph{two-round} auction which is optimal, strategyproof, and credible (even when the number of bidders is only known by the auctioneer).
We extend our analysis to the case when buyer valuations are $α$-strongly regular for any $α> 0$, up to arbitrary $\varepsilon$ in credibility. Interestingly, we also prove that this construction cannot be extended to regular distributions, nor can the $\varepsilon$ be removed with multiple bidders.
△ Less
Submitted 25 May, 2020; v1 submitted 3 April, 2020;
originally announced April 2020.
-
A Permutation-Equivariant Neural Network Architecture For Auction Design
Authors:
Jad Rahme,
Samy Jelassi,
Joan Bruna,
S. Matthew Weinberg
Abstract:
Designing an incentive compatible auction that maximizes expected revenue is a central problem in Auction Design. Theoretical approaches to the problem have hit some limits in the past decades and analytical solutions are known for only a few simple settings. Computational approaches to the problem through the use of LPs have their own set of limitations. Building on the success of deep learning,…
▽ More
Designing an incentive compatible auction that maximizes expected revenue is a central problem in Auction Design. Theoretical approaches to the problem have hit some limits in the past decades and analytical solutions are known for only a few simple settings. Computational approaches to the problem through the use of LPs have their own set of limitations. Building on the success of deep learning, a new approach was recently proposed by Duetting et al. (2019) in which the auction is modeled by a feed-forward neural network and the design problem is framed as a learning problem. The neural architectures used in that work are general purpose and do not take advantage of any of the symmetries the problem could present, such as permutation equivariance. In this work, we consider auction design problems that have permutation-equivariant symmetry and construct a neural architecture that is capable of perfectly recovering the permutation-equivariant optimal mechanism, which we show is not possible with the previous architecture. We demonstrate that permutation-equivariant architectures are not only capable of recovering previous results, they also have better generalization properties.
△ Less
Submitted 25 October, 2021; v1 submitted 1 March, 2020;
originally announced March 2020.
-
Binary Scoring Rules that Incentivize Precision
Authors:
Eric Neyman,
Georgy Noarov,
S. Matthew Weinberg
Abstract:
All proper scoring rules incentivize an expert to predict \emph{accurately} (report their true estimate), but not all proper scoring rules equally incentivize \emph{precision}. Rather than treating the expert's belief as exogenously given, we consider a model where a rational expert can endogenously refine their belief by repeatedly paying a fixed cost, and is incentivized to do so by a proper sco…
▽ More
All proper scoring rules incentivize an expert to predict \emph{accurately} (report their true estimate), but not all proper scoring rules equally incentivize \emph{precision}. Rather than treating the expert's belief as exogenously given, we consider a model where a rational expert can endogenously refine their belief by repeatedly paying a fixed cost, and is incentivized to do so by a proper scoring rule.
Specifically, our expert aims to predict the probability that a biased coin flipped tomorrow will land heads, and can flip the coin any number of times today at a cost of $c$ per flip. Our first main result defines an \emph{incentivization index} for proper scoring rules, and proves that this index measures the expected error of the expert's estimate (where the number of flips today is chosen adaptively to maximize the predictor's expected payoff). Our second main result finds the unique scoring rule which optimizes the incentivization index over all proper scoring rules.
We also consider extensions to minimizing the $\ell^{th}$ moment of error, and again provide an incentivization index and optimal proper scoring rule. In some cases, the resulting scoring rule is differentiable, but not infinitely differentiable. In these cases, we further prove that the optimum can be uniformly approximated by polynomial scoring rules.
Finally, we compare common scoring rules via our measure, and include simulations confirming the relevance of our measure even in domains outside where it provably applies.
△ Less
Submitted 29 May, 2021; v1 submitted 25 February, 2020;
originally announced February 2020.
-
Optimal Mechanism Design for Single-Minded Agents
Authors:
Nikhil Devanur,
Kira Goldner,
Raghuvansh Saxena,
Ariel Schvartzman,
S. Matthew Weinberg
Abstract:
We consider revenue-optimal mechanism design in the interdimensional setting, where one dimension is the 'value' of the buyer, and one is a 'type' that captures some auxiliary information. One setting is the FedEx Problem, for which FGKK [2016] characterize the optimal mechanism for a single agent. We ask: how far can such characterizations go? In particular, we consider single-minded agents. A se…
▽ More
We consider revenue-optimal mechanism design in the interdimensional setting, where one dimension is the 'value' of the buyer, and one is a 'type' that captures some auxiliary information. One setting is the FedEx Problem, for which FGKK [2016] characterize the optimal mechanism for a single agent. We ask: how far can such characterizations go? In particular, we consider single-minded agents. A seller has heterogenous items. A buyer has a value v for a specific subset of items S, and obtains value v iff he gets (at least) all the items in S. We show:
1. Deterministic mechanisms are optimal for distributions that satisfy the "declining marginal revenue" (DMR) property; we give an explicit construction of the optimal mechanism.
2. Without DMR, the result depends on the structure of the directed acyclic graph (DAG) representing the partial order among types. When the DAG has out-degree at most 1, we characterize the optimal mechanism a la FedEx.
3. Without DMR, when the DAG has some node with out-degree at least 2, we show that in this case the menu complexity is unbounded: for any M, there exist distributions over (v,S) pairs such that the menu complexity of the optimal mechanism is at least M.
4. For the case of 3 types, we show that for all distributions there exists an optimal mechanism of finite menu complexity. This is in contrast to 2 additive heterogenous items or which the menu complexity could be uncountable [MV07; DDT15].
In addition, we prove that optimal mechanisms for Multi-Unit Pricing (without DMR) can have unbounded menu complexity. We also propose an extension where the menu complexity of optimal mechanisms can be countable but not uncountable.
Together these results establish that optimal mechanisms in interdimensional settings are both much richer than single-dimensional settings, yet also vastly more structured than multi-dimensional settings.
△ Less
Submitted 15 February, 2020;
originally announced February 2020.
-
When to Limit Market Entry under Mandatory Purchase
Authors:
Meryem Essaidi,
Kira Goldner,
S. Matthew Weinberg
Abstract:
We study a problem inspired by regulated health insurance markets, such as those created by the government in the Affordable Care Act Exchanges or by employers when they contract with private insurers to provide plans for their employees. The market regulator can choose to do nothing, running a Free Market, or can exercise her regulatory power by limiting the entry of providers (decreasing consume…
▽ More
We study a problem inspired by regulated health insurance markets, such as those created by the government in the Affordable Care Act Exchanges or by employers when they contract with private insurers to provide plans for their employees. The market regulator can choose to do nothing, running a Free Market, or can exercise her regulatory power by limiting the entry of providers (decreasing consumer welfare by limiting options, but also decreasing revenue via enhanced competition). We investigate whether limiting entry increases or decreases the utility (welfare minus revenue) of the consumers who purchase from the providers, specifically in settings where the outside option of "purchasing nothing" is prohibitively undesirable.
We focus primarily on the case where providers are symmetric. We propose a sufficient condition on the distribution of consumer values for (a) a unique symmetric equilibrium to exist in both markets and (b) utility to be higher with limited entry. (We also establish that these conclusions do not necessarily hold for all distributions, and therefore some condition is necessary.) Our techniques are primarily based on tools from revenue maximization, and in particular Myerson's virtual value theory. We also consider extensions to settings where providers have identical costs for providing plans, and to two providers with an asymmetric distribution.
△ Less
Submitted 15 February, 2020;
originally announced February 2020.
-
Joseph Polchinski: A Biographical Memoir
Authors:
Raphael Bousso,
Fernando Quevedo,
Steven Weinberg
Abstract:
Joseph Polchinski (1954-2018), one of the the leading theoretical physicists of the past 50 years, was an exceptionally broad and deep thinker. He made fundamental contributions to quantum field theory, advancing the role of the renormalization group, and to cosmology, addressing the cosmological constant problem. Polchinski's work on D-branes revolutionized string theory and led to the discovery…
▽ More
Joseph Polchinski (1954-2018), one of the the leading theoretical physicists of the past 50 years, was an exceptionally broad and deep thinker. He made fundamental contributions to quantum field theory, advancing the role of the renormalization group, and to cosmology, addressing the cosmological constant problem. Polchinski's work on D-branes revolutionized string theory and led to the discovery of a nonperturbative quantum theory of gravity. His recent, incisive reformulation of the black hole information paradox presents us with a profound challenge. Joe was deeply devoted to his family, a beloved colleague and advisor, an excellent writer, and an accomplished athlete.
△ Less
Submitted 26 March, 2020; v1 submitted 6 February, 2020;
originally announced February 2020.