Results 1 - 10
of
110
Mechanism design via differential privacy
- Proceedings of the 48th Annual Symposium on Foundations of Computer Science
, 2007
"... We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents, which must encourage players to honestly report information. Specifically, we show that the recent notion of differen ..."
Abstract
-
Cited by 212 (3 self)
- Add to MetaCart
(Show Context)
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents, which must encourage players to honestly report information. Specifically, we show that the recent notion of differential privacy [15, 14], in addition to its own intrinsic virtue, can ensure that participants have limited effect on the outcome of the mechanism, and as a consequence have limited incentive to lie. More precisely, mechanisms with differential privacy are approximate dominant strategy under arbitrary player utility functions, are automatically resilient to coalitions, and easily allow repeatability. We study several special cases of the unlimited supply auction problem, providing new results for digital goods auctions, attribute auctions, and auctions with arbitrary structural constraints on the prices. As an important prelude to developing a privacy-preserving auction mechanism, we introduce and study a generalization of previous privacy work that accommodates the high sensitivity of the auction setting, where a single participant may dramatically alter the optimal fixed price, and a slight change in the offered price may take the revenue from optimal to zero. 1
Truthful and Near-Optimal Mechanism Design via Linear Programming
"... We give a general technique to obtain approximation mechanisms that are truthful in expectation.We show that for packing domains, any ff-approximation algorithm that also bounds the integrality gapof the LP relaxation of the problem by ff can be used to construct an ff-approximation mechanismthat is ..."
Abstract
-
Cited by 134 (12 self)
- Add to MetaCart
We give a general technique to obtain approximation mechanisms that are truthful in expectation.We show that for packing domains, any ff-approximation algorithm that also bounds the integrality gapof the LP relaxation of the problem by ff can be used to construct an ff-approximation mechanismthat is truthful in expectation. This immediately yields a variety of new and significantly improved results for various problem domains and furthermore, yields truthful (in expectation) mechanisms withguarantees that match the best known approximation guarantees when truthfulness is not required. In particular, we obtain the first truthful mechanisms with approximation guarantees for a variety of multi-parameter domains. We obtain truthful (in expectation) mechanisms achieving approximation guarantees of O( p m) for combinatorial auctions (CAs), (1 + ffl) for multi-unit CAs with B = \Omega (log m) copies ofeach item, and 2 for multi-parameter knapsack problems (multi-unit auctions). Our construction is based on considering an LP relaxation of the problem and using the classicVCG [25, 9, 12] mechanism to obtain a truthful mechanism in this fractional domain. We argue that the (fractional) optimal solution scaled down by ff, where ff is the integrality gap of the problem, canbe represented as a convex combination of integer solutions, and by viewing this convex combination as specifying a probability distribution over integer solutions, we get a randomized, truthful in expectationmechanism. Our construction can be seen as a way of exploiting VCG in a computational tractable way even when the underlying social-welfare maximization problem is NP-hard.
Approximation algorithms for combinatorial auctions with complement-free bidders
- In Proceedings of the 37th Annual ACM Symposium on Theory of Computing (STOC
, 2005
"... We exhibit three approximation algorithms for the allocation problem in combinatorial auctions with complement free bidders. The running time of these algorithms is polynomial in the number of items m and in the number of bidders n, even though the “input size ” is exponential in m. The first algori ..."
Abstract
-
Cited by 133 (25 self)
- Add to MetaCart
(Show Context)
We exhibit three approximation algorithms for the allocation problem in combinatorial auctions with complement free bidders. The running time of these algorithms is polynomial in the number of items m and in the number of bidders n, even though the “input size ” is exponential in m. The first algorithm provides an O(log m) approximation. The second algorithm provides an O ( √ m) approximation in the weaker model of value oracles. This algorithm is also incentive compatible. The third algorithm provides an improved 2-approximation for the more restricted case of “XOS bidders”, a class which strictly contains submodular bidders. We also prove lower bounds on the possible approximations achievable for these classes of bidders. These bounds are not tight and we leave the gaps as open problems. 1
On Profit-Maximizing Envy-free Pricing
"... We study the problem of pricing items for sale to consumers so as to maximize the seller’s revenue. We assume that for each consumer, we know the maximum amount he would be willing to pay for each bundle of items, and want to find pricings of the items with corresponding allocations that maximize se ..."
Abstract
-
Cited by 122 (12 self)
- Add to MetaCart
We study the problem of pricing items for sale to consumers so as to maximize the seller’s revenue. We assume that for each consumer, we know the maximum amount he would be willing to pay for each bundle of items, and want to find pricings of the items with corresponding allocations that maximize seller profit and at the same time are envy-free, which is a natural fairness criterion requiring that consumers are maximally happy with the outcome they receive given the pricing. We study this problem for two important classes of inputs: unit demand consumers, who want to buy at most one item from among a selection they are interested in, and single-minded consumers, who want to buy one particular subset, but only if they can afford it. We show that computing envy-free prices to maximize the seller’s revenue is APX-hard in both of these cases, and give a logarithmic approximation algorithm for them. For several interesting special cases, we derive polynomial-time algorithms. Furthermore, we investigate some connections with the corresponding mechanism design problem, in which the consumer’s preferences are private values: for this case, we give a log-competitive truthful mechanism.
Frugal path mechanisms
, 2002
"... We consider the problem of selecting a low cost s − t path in a graph, where the edge costs are a secret known only to the various economic agents who own them. To solve this problem, Nisan and Ronen applied the celebrated Vickrey-Clarke-Groves (VCG) mechanism, which pays a premium to induce the edg ..."
Abstract
-
Cited by 119 (2 self)
- Add to MetaCart
(Show Context)
We consider the problem of selecting a low cost s − t path in a graph, where the edge costs are a secret known only to the various economic agents who own them. To solve this problem, Nisan and Ronen applied the celebrated Vickrey-Clarke-Groves (VCG) mechanism, which pays a premium to induce the edges to reveal their costs truthfully. We observe that this premium can be unacceptably high. There are simple instances where the mechanism pays Θ(k) times the actual cost of the path, even if there is an alternate path available that costs only (1 + ɛ) times as much. This inspires the frugal path problem, which is to design a mechanism that selects a path and induces truthful cost revelation without paying such a high premium. This paper contributes negative results on the frugal path problem. On two large classes of graphs, including ones having three node-disjoint s − t paths, we prove that no reasonable mechanism can always avoid paying a high premium to induce truthtelling. In particular, we introduce a general class of min function mechanisms, and show that all min function mechanisms can be forced to overpay just as badly as VCG. On the other hand, we prove that (on two large classes of graphs) every truthful mechanism satisfying some reasonable properties is a min function mechanism. 1
Truthful randomized mechanisms for combinatorial auctions
- IN STOC
, 2006
"... We design two computationally-efficient incentive-compatible mechanisms for combinatorial auctions with general bidder preferences. Both mechanisms are randomized, and are incentive-compatible in the universal sense. This is in contrast to recent previous work that only addresses the weaker notion o ..."
Abstract
-
Cited by 105 (17 self)
- Add to MetaCart
(Show Context)
We design two computationally-efficient incentive-compatible mechanisms for combinatorial auctions with general bidder preferences. Both mechanisms are randomized, and are incentive-compatible in the universal sense. This is in contrast to recent previous work that only addresses the weaker notion of incentive compatibility in expectation. The first mechanism obtains an O(pm)-approximation of the optimal social welfare for arbitrary bidder valuations -- this is the best approximation possible in polynomial time. The second one obtains an O(log2 m)- approximation for a subclass of bidder valuations that includes all submodular bidders. This improves over the best previously obtained incentive-compatible mechanism for this class which only provides an O(pm)-approximation.
Approximation Techniques for Utilitarian Mechanism Design
, 2005
"... This paper deals with the design of efficiently computable incentive compatible, or truthful, mechanisms for combinatorial optimization problems with multi-parameter agents. We focus on approximation algorithms for NP-hard mechanism design problems. These algorithms need to satisfy certain monotonic ..."
Abstract
-
Cited by 92 (5 self)
- Add to MetaCart
This paper deals with the design of efficiently computable incentive compatible, or truthful, mechanisms for combinatorial optimization problems with multi-parameter agents. We focus on approximation algorithms for NP-hard mechanism design problems. These algorithms need to satisfy certain monotonicity properties to ensure truthfulness. Since most of the known approximation techniques do not fulfill these properties, we study alternative techniques. Our first contribution is a quite general method to transform a pseudopolynomial algorithm into a monotone FPTAS. This can be applied to various problems like, e.g., knapsack, constrained shortest path, or job scheduling with deadlines. For example, the monotone FPTAS for the knapsack problem gives a very efficient, truthful mechanism for single-minded multi-unit auctions. The best previous result for such auctions was a 2-approximation. In addition, we present a monotone PTAS for the generalized assignment problem with any bounded number of parameters per agent. The most efficient way to solve packing integer programs (PIPs) is LP-based randomized rounding, which also is in general not monotone. We show that primal-dual greedy algorithms achieve almost the same approximation ratios for PIPs as randomized rounding. The advantage is that these algorithms are inherently monotone. This way, we can significantly improve the approximation ratios of truthful mechanisms for various fundamental mechanism design problems like single-minded combinatorial auctions (CAs), unsplittable flow routing and multicast routing. Our approximation algorithms can also be used for the winner determination in CAs with general bidders specifying their bids through an oracle.
Combination Can Be Hard: Approximability of the Unique Coverage Problem
- In Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms
, 2006
"... Abstract We prove semi-logarithmic inapproximability for a maximization problem called unique coverage:given a collection of sets, find a subcollection that maximizes the number of elements covered exactly once. Specifically, assuming that NP 6 ` BPTIME(2n " ) for an arbitrary "> ..."
Abstract
-
Cited by 77 (2 self)
- Add to MetaCart
Abstract We prove semi-logarithmic inapproximability for a maximization problem called unique coverage:given a collection of sets, find a subcollection that maximizes the number of elements covered exactly once. Specifically, assuming that NP 6 ` BPTIME(2n " ) for an arbitrary "> 0, we prove O(1 / logoe n) inapproximability for some constant oe = oe("). We also prove O(1 / log1/3- " n) inapproximability, forany "> 0, assuming that refuting random instances of 3SAT is hard on average; and prove O(1 / log n)inapproximability under a plausible hypothesis concerning the hardness of another problem, balanced bipartite independent set. We establish an \Omega (1 / log n)-approximation algorithm, even for a moregeneral (budgeted) setting, and obtain an \Omega (1 / log B)-approximation algorithm when every set hasat most B elements. We also show that our inapproximability results extend to envy-free pricing, animportant problem in computational economics. We describe how the (budgeted) unique coverage problem, motivated by real-world applications, has close connections to other theoretical problemsincluding max cut, maximum coverage, and radio broadcasting. 1 Introduction In this paper we consider the approximability of the following natural maximization analog of set cover: Unique Coverage Problem. Given a universe U = {e1,..., en} of elements, and given a collection S = {S1,..., Sm} of subsets of U. Find a subcollection S0 ` S to maximize the number of elements that are uniquely covered, i.e., appear in exactly one set of S 0.
Approximation algorithms and online mechanisms for item pricing
, 2007
"... We present approximation and online algorithms for problems of pricing a collection of items for sale so as to maximize the seller’s revenue in an unlimited supply setting. Our first result is an O(k)-approximation algorithm for pricing items to single-minded bidders who each want at most k items. ..."
Abstract
-
Cited by 76 (9 self)
- Add to MetaCart
We present approximation and online algorithms for problems of pricing a collection of items for sale so as to maximize the seller’s revenue in an unlimited supply setting. Our first result is an O(k)-approximation algorithm for pricing items to single-minded bidders who each want at most k items. This improves over work of Briest and Krysta (2006) who achieve an O(k2) bound. For the case k = 2, where we obtain a 4-approximation, this can be viewed as the following graph vertex pricing problem: given a (multi) graph G with valuations wi j on the edges, find prices pi ≥ 0 for the vertices to maximize {(i, j):wi j≥pi+p j} (pi + p j). We also improve the approximation of Guruswami et al. (2005) for the “highway problem” in which all desired subsets are intervals on a line, from O(logm+ logn) to O(logn), where m is the number of bidders and n is the number of items. Our approximation algorithms can
On the hardness of being truthful
- In Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS
"... Abstract The central problem in computational mechanism design is the tension between incentive compatibility and computational ef ciency. We establish the rst significant approximability gap between algorithms that are both truthful and computationally-ef cient, and algorithms that only achieve on ..."
Abstract
-
Cited by 63 (8 self)
- Add to MetaCart
(Show Context)
Abstract The central problem in computational mechanism design is the tension between incentive compatibility and computational ef ciency. We establish the rst significant approximability gap between algorithms that are both truthful and computationally-ef cient, and algorithms that only achieve one of these two desiderata. This is shown in the context of a novel mechanism design problem which we call the COMBINATORIAL PUB-LIC PROJECT PROBLEM (CPPP). CPPP is an abstraction of many common mechanism design situations, ranging from elections of kibbutz committees to network design. Our computational-complexity result is one of the rst impossibility results connecting mechanism design to complexity theory; its novel proof technique involves an application of the Sauer-Shelah Lemma and may be of wider applicability, both within and without mechanism design.