• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Distributed Algorithmic Mechanism Design: Recent Results and Future Directions (2002)

Cached

  • Download as a PDF

Download Links

  • [dialm.insa-lyon.fr]
  • [www.icsi.berkeley.edu]
  • [cs.brown.edu]
  • [oz.stern.nyu.edu]
  • [pages.stern.nyu.edu]
  • [pages.stern.nyu.edu]
  • [cs-www.cs.yale.edu]
  • [www.cs.yale.edu]
  • [www.cs.yale.edu]
  • [cs-www.cs.yale.edu]
  • [www-net.cs.umass.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Joan Feigenbaum , Scott Shenker
Citations:283 - 24 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

Citations

1754 Counterspeculation, auctions, and competitive sealed tenders - Vickrey - 1961 (Show Context)

Citation Context

... : O # # represents his valuations of each of the system states, and p i is his payment. For such problems, there is a class of strategyproof mechanisms, called Vickrey-Clarke-Groves (VCG) mechanisms =-=[13, 29, 64]-=-, that result in the system state that optimizes P i v i (o). Direct strategyproof mechanisms provide a conceptually simple, if not always ideal (see Section 7), way to achieve strategyproof SCFs. How...

1512 Evolution and the Theory of Games - Smith, J - 1982 (Show Context)

Citation Context

...ponses to rational beliefs about the other agents' strategy choices [10, 57]), evolutionarily stable strategies (agents imitate the successful strategies used by others in previous rounds of the game =-=[62]-=-), and dominant strategies (agents only choose strategies that, regardless of how other agents play, never result in lower payo#s than any other strategy). To date, most of the AMD and DAMD literature...

1290 A case for end system multicast - CHU, RAO, et al. - 2000 (Show Context)

Citation Context

...s, each node has a set of neighbors to whom it forwards queries. There have also been many proposals for application-layer networks to perform unicast routing (e.g., [4]) and multicast routing (e.g., =-=[12]-=-). These overlay networks are formed by algorithms that assume nodes are obedient and ignore their own incentives. Clearly, obedience may not be in a node's best interest. In the case of P2P file shar...

1251 A Measurement Study of Peer-to-Peer File Sharing Systems," - Saroiu, Gummadi, et al. - 2002 (Show Context)

Citation Context

...ugh this is theoretically appealing, it is contradicted by preliminary measurement studies suggesting that there is a very wide range of node capabilities (in bandwidth, CPU, and disk) in P2P systems =-=[59]-=-. Wide heterogeneities may lead to significantly increased efficiency in P2P systems; that is, the highly capable nodes can act as semi-centralized repositories. Open Problem 19. How does the performa...

1160 Resilient overlay networks. - Andersen, Balakrishnan, et al. - 2001 (Show Context)

Citation Context

...e, in many P2P file-sharing systems, each node has a set of neighbors to whom it forwards queries. There have also been many proposals for application-layer networks to perform unicast routing (e.g., =-=[4]-=-) and multicast routing (e.g., [12]). These overlay networks are formed by algorithms that assume nodes are obedient and ignore their own incentives. Clearly, obedience may not be in a node's best int...

976 Multipart pricing of public goods - Clarke - 1971 (Show Context)

Citation Context

... : O # # represents his valuations of each of the system states, and p i is his payment. For such problems, there is a class of strategyproof mechanisms, called Vickrey-Clarke-Groves (VCG) mechanisms =-=[13, 29, 64]-=-, that result in the system state that optimizes P i v i (o). Direct strategyproof mechanisms provide a conceptually simple, if not always ideal (see Section 7), way to achieve strategyproof SCFs. How...

840 Completeness theorems for non-cryptographic fault-tolerant distributed computation - Ben-Or, Goldwasser, et al. - 1988 (Show Context)

Citation Context

...annot "compose" a direct distributed algorithmic mechanism with a standard SMFE protocol, for several fundamental reasons: . The strategic models may be di#erent. Some standard SMFE techniqu=-=es (e.g., [9, 11]-=-) apply to networks in which at least a constant fraction of the agents are obedient; the other agents are often assumed to be Byzantine adversaries. Although one usually does not have to design distr...

778 Incentives in teams - Groves - 1973 (Show Context)

Citation Context

... and lying to the mechanism, then at least one agent in the group suffers. An important class of problems are those in which the utilities are quasilinear, and the outcome space O factors into a set of system states O and a set of payment states P ⊆ n that represent a vector of payoffs (or charges). At a particular outcome o = (o, p), agent i’s utility factors into ui(o) = vi(o) + pi, where vi : O → represents his valuations of each of the system states, and pi is his payment. For such problems, there is a class of strategyproof mechanisms, called Vickrey-Clarke-Groves (VCG) mechanisms [13, 29, 64], that result in the system state that optimizes P i vi(o). Direct strategyproof mechanisms provide a conceptually simple, if not always ideal (see Section 7), way to achieve strategyproof SCFs. However, there are many cases in which the desired result, i.e., the desired social choice function F , is not strategyproof. To describe how to realize such nonstrategyproof SCFs, we now introduce indirect mechanisms. Here, one designs a mechanism < M,S >, where S is a strategy space, and M : Sn → O maps vectors of strategies into outcomes.2 These are called indirect mechanisms, because the agents no...

662 Algorithmic mechanism design - Nisan, Ronen, et al. - 2001 (Show Context)

Citation Context

...intelligence (e.g., [55, 61]), and marketbased computation (e.g., [65]) --- the first work in TCS to address incentives and computational complexity simultaneously was Nisan and Ronen's seminal paper =-=[52] on algori-=-thmic mechanism design (AMD). This paper put forth a formal model of centralized computation that combined incentive compatibility (the &quot;mechanism design&quot; part) with computational tractabili...

621 Prediction How People Play Games: Reinforcement Learning - Erev, Roth - 1998 (Show Context)

Citation Context

... strategies at different rates. New definitions of learning and new solution concepts that attempt to capture these aspects of Internetbased, repeated games have been proposed by, e.g., Erev and Roth =-=[17]-=- and Friedman and Shenker [24]. Which, if any, of these solution concepts and game-theoretic definitions of learning will play a central role in the emerging theory of DAMD is a wide open question. Mo...

613 Free riding on Gnutella - Adar, Huberman - 2000 (Show Context)

Citation Context

...,&quot; in which individual users o#er up their resources -- content, access bandwidth, storage, and CPU -- for the greater good. However, initial studies show that there is a serious &quot;free rider=-= problem&quot; [2]-=-. It may be that, without some systematic way of providing incentives for users to share their files, these P2P systems will become increasingly centralized, with only a few commercially supported nod...

551 I.Multiparty unconditionally secure protocols - Chaum, Crépeau, et al. - 1988 (Show Context)

Citation Context

...annot &quot;compose&quot; a direct distributed algorithmic mechanism with a standard SMFE protocol, for several fundamental reasons: . The strategic models may be di#erent. Some standard SMFE techniqu=-=es (e.g., [9, 11]-=-) apply to networks in which at least a constant fraction of the agents are obedient; the other agents are often assumed to be Byzantine adversaries. Although one usually does not have to design distr...

453 Rationalizable strategic behavior and the problem of perfection, - Pearce - 1984 (Show Context)

Citation Context

...nilaterally increase his utility. Other solution concepts include rationalizable strategies (agents use strategies that are best responses to rational beliefs about the other agents' strategy choices =-=[10, 57]-=-), evolutionarily stable strategies (agents imitate the successful strategies used by others in previous rounds of the game [62]), and dominant strategies (agents only choose strategies that, regardle...

350 Resource pricing and the evolution of congestion control. Automatica 35 - Gibbens, Kelly - 1998 (Show Context)

Citation Context

...incentive compatibility and computational tractability -- be jointly addressed. Although many subdisciplines of computer science have a long history of using game theory --- such as networking (e.g., =-=[21, 25, 35]-=-), distributed artificial intelligence (e.g., [55, 61]), and marketbased computation (e.g., [65]) --- the first work in TCS to address incentives and computational complexity simultaneously was Nisan ...

334 the internet - Algorithms - 2001 (Show Context)

Citation Context

...ous open problems, some very specific and others quite general, concerning the foundations and applications of DAMD. Additional material about the AMD and DAMD research agendas can be found in, e.g., =-=[50, 51, 54]-=-. 2. MD TO AMD TO DAMD In essence, game theory is the study of what happens when independent agents act selfishly. Mechanism design asks how one can design systems so that agents' selfish behavior res...

284 Sharing the cost of multicast transmissions - Feigenbaum, Papadimitriou, et al. - 2000 (Show Context)

Citation Context

...l model of centralized computation that combined incentive compatibility (the &quot;mechanism design&quot; part) with computational tractability (the &quot;algorithmic&quot; part). Feigenbaum, Papadim=-=itriou, and Shenker [20]-=- extended this to distributed algorithmic mechanism design (DAMD), in which the same goals of incentive compatibility and computational tractability are present, but, in addition, the agents, the rele...

268 A BGP-based mechanism for lowestcost routing - Feigenbaum, Papadimitriou, et al. - 2002 (Show Context)

Citation Context

... in control of those nodes). However, the situation is significantly more complicated when the computational and strategic aspects become intertwined. For instance, an important issue not resolved in =-=[19]-=- is the need to reconcile the strategic model with the computational model. On the one hand, the problem formulation in [19] captures the fact that ASs may have incentives to lie about costs in order ...

261 competitive sealed tenders - Vickrey, “Counterspeculation - 1961
236 An analysis of BGP convergence properties. - Griffin, Wilfong - 1999 (Show Context)

Citation Context

...GP-compatible distributed algorithm is given that computes these prices. This algorithm requires only minor and straightforward modifications of the BGP computational model given by Gri#n and Wilfong =-=[28]-=-. Specifically, the algorithm in [19] requires a small constant-factor increase in both the table sizes and the message sizes of BGP, but it does not require any new messages or any new infrastructura...

231 Nash equilibrium and welfare optimality - Maskin - 1999 (Show Context)

Citation Context

...nt solution concepts; see Jackson [32] for an overview. With the Nash-equilibrium solution concept, one can design mechanisms to achieve a very wide range of non-strategyproof social choice functions =-=[38]-=-. When M = F and S = U , we reduce to the direct2 Our assumption that all agents are equivalent, made for notational simplicity, renders all strategy spaces the same; in general, we could have di#eren...

216 Computationally feasible VCG mechanisms. - Nisan, Ronen - 2007 (Show Context)

Citation Context

...nsider the virtual implementation literature [39, 1], in which mechanisms produce lotteries over outcomes, to be a form of approximation. We don't discuss virtual implementation here. Nisan and Ronen =-=[53]-=- were the first to address the question of approximate computation in AMD. They considered VCG mechanisms in which optimal outcomes are NP-hard to compute (as they are in combinatorial auctions). They...

212 Distance-Bounding Protocols,” - Brands, Chaum - 1994
201 Strategyproof sharing of submodular costs: budget balance versus efficiency 18 - Moulin, Shenker, et al. - 1999 (Show Context)

Citation Context

...e, straightforward extensions of existing protocols are easier to deploy than de novo designs. cast transmission (the sum of the valuations minus the total transmission cost). Economic considerations =-=[47]-=- point to two strategyproof mechanisms that are worthy of algorithmic consideration: marginal-cost (MC) and Shapley-value (SH). The MC mechanism is e#cient, which means that it chooses the receiver se...

192 Incentives and incomplete information - d’Aspremont, Grard-Varet - 1979 (Show Context)

Citation Context

...e nonstrategyproof SCFs with direct mechanisms by invoking different solution concepts. For example, one can achieve e#- ciency and budget balance using the Bayesian-Nash-equilibrium solution concept =-=[7, 14]-=- -- something that is impossible using the dominant-strategy solution concept [27, 58]. It is important to note that, although the mechanism is chosen by the system designer, the solution concept is s...

160 Algorithms, games, and the Internet,” in - Papadimitriou - 2001 (Show Context)

Citation Context

...echnical foundations of DAMD; we discuss the notion of hardness in DAMD problems (Section 4), the role of approximations (Section 5), aspects of strategic models (Section 6), the use of indirect mechanisms (Section 7), and alternative solution concepts (Section 8). We then end the paper in Section 9 with a discussion of several promising applications of DAMD. Throughout Sections 4-9, we pose numerous open problems, some very specific and others quite general, concerning the foundations and applications of DAMD. Additional material about the AMD and DAMD research agendas can be found in, e.g., [50, 51, 54]. 2. MD TO AMD TO DAMD In essence, game theory is the study of what happens when independent agents act selfishly. Mechanism design asks how one can design systems so that agents’ selfish behavior results in the desired system-wide goals. The “mechanisms” in this field are output specifications and payments to agents that incentivize them to behave in ways that lead to the desired system-wide result. For example, consider the problem of routing. Agents may be individual routers within a network or entire autonomous domains. Each agent incurs a cost when it transports a packet, and this cost is...

158 Iterative Combinatorial Auctions: Achieving Economic and Computational Efficiency - Parkes - 2001 (Show Context)

Citation Context

...be jointly addressed. Although many subdisciplines of computer science have a long history of using game theory --- such as networking (e.g., [21, 25, 35]), distributed artificial intelligence (e.g., =-=[55, 61]-=-), and marketbased computation (e.g., [65]) --- the first work in TCS to address incentives and computational complexity simultaneously was Nisan and Ronen's seminal paper [52] on algorithmic mechanis...

139 Architecting noncooperative networks - Korilis, Lazar, et al. - 1995 (Show Context)

Citation Context

...incentive compatibility and computational tractability -- be jointly addressed. Although many subdisciplines of computer science have a long history of using game theory --- such as networking (e.g., =-=[21, 25, 35]-=-), distributed artificial intelligence (e.g., [55, 61]), and marketbased computation (e.g., [65]) --- the first work in TCS to address incentives and computational complexity simultaneously was Nisan ...

131 Secure Multi-party Computation (working draft, - Goldreich - 1998 (Show Context)

Citation Context

...d lead to indirect mechanisms, because agents would not be revealing their utilities but instead would be using strategies drawn from some other strategy space. For an overview of SMFE, see Goldreich =-=[26]. One cannot always -=-apply SMFE techniques &quot;o# the shelf &quot; to DAMD. In particular, one often cannot &quot;compose&quot; a direct distributed algorithmic mechanism with a standard SMFE protocol, for several funda...

130 A microeconomic approach to optimal resource allocation in distributed computer systems - Kurose, Simha - 1989
119 Frugal path mechanisms. - Archer, Tardos - 2002
119 A crash course in implementation theory. - Jackson - 2001 (Show Context)

Citation Context

...ill be incentive-compatible. There is a large game-theory literature on which SCFs can be achieved for di#erent notions of &quot;incentive compatibility,&quot; e.g., for di#erent solution concepts; se=-=e Jackson [32]-=- for an overview. With the Nash-equilibrium solution concept, one can design mechanisms to achieve a very wide range of non-strategyproof social choice functions [38]. When M = F and S = U , we reduce...

119 The Characterization of Implementable Choice Rules, - Roberts - 1979 (Show Context)

Citation Context

...s. For example, one can achieve e#- ciency and budget balance using the Bayesian-Nash-equilibrium solution concept [7, 14] -- something that is impossible using the dominant-strategy solution concept =-=[27, 58]-=-. It is important to note that, although the mechanism is chosen by the system designer, the solution concept is supposed to reflect reality. The solution concept thus depends greatly on the context (...

114 Calibrated learning and correlated equilibrium. - Foster, Vohra - 1997 (Show Context)

Citation Context

...s, according to the MilgromRoberts definition [42], then the play asymptotically heads towards the serially undominated set. If the learning algorithms are calibrated in the sense of Foster and Vohra =-=[23]-=-, then the solution concept is the set of correlated equilibria. Internet-based agents typically have very little information even about their own payo# functions and know still less about those of ot...

108 Achieving budget-balance with Vickrey-based payment schemes in exchanges - Parkes (Show Context)

Citation Context

...efly review three of them here. Approximation of equilibria is considered in the gametheory literature independent of distributed-algorithmic concerns. 13 For example, Schummer [60] and Parkes et al. =-=[56]-=- consider #-dominance. A strategy vector (s1 , . . . , sn) is an #- dominant equilibrium if, for every agent i, every strategy t i , and every set of other players' strategies (t1 , . . . , t i-1 , t ...

100 The division problem with single-peaked preferences: a characterization of the uniform rules”, Econometrica - Sprumont - 1991 (Show Context)

Citation Context

...ategic design goals need only be approximated? Characterization results that should be considered include the Moulin-Sprumont characterization of strategyproof mechanisms with single-peaked utilities =-=[45, 63]-=- and the BarberaJackson characterization of strategyproof exchange markets [8]. 6. STRATEGIC MODELS In this section, we look more carefully at an aspect of DAMD that we have thus far oversimplified. I...

99 Vickrey prices and shortest paths: what is an edge worth?” - Hershberger, Suri - 2001 (Show Context)

Citation Context

...ra#c at all. In the model of Feigenbaum et al. [19], which is an extension of an earlier (centralized) LCP-mechanism model proposed by Nisan and Ronen [52] and studied further by Hershberger and Suri =-=[30]-=-, each AS incurs a per-packet cost for carrying tra#c, where the cost represents the additional load imposed on the internal AS network by this tra#c. Furthermore, the model also assumes that, to comp...

99 Adaptive and sophisticated learning in normal form games. Games and Economic Behavior 3:82--100 - Milgrom, Roberts - 1991 (Show Context)

Citation Context

...strategies, and reach an equilibrium through repeated play. The resulting solution concept depends on how the agents learn. If agents are adaptive learners, according to the MilgromRoberts definition =-=[42]-=-, then the play asymptotically heads towards the serially undominated set. If the learning algorithms are calibrated in the sense of Foster and Vohra [23], then the solution concept is the set of corr...

93 Competitive generalized auctions. - Fiat, Goldberg, et al. - 2002 (Show Context)

Citation Context

...ects of multicast cost sharing. By contrast, in the scenario in which the multicast delivery is done by a monopoly content owner, profit maximization is the natural mechanism-design goal. Fiat et al. =-=[22]-=- provide several novel cost-sharing mechanisms for this scenario. Finally, we note that, in the problem as we have stated it here, the potential receivers are strategic, but the networks(i.e., the uni...

91 A concept of egalitarianism under participation constraints - Dutta, Ray - 1989 (Show Context)

Citation Context

... reasons discussed at length by Moulin and Shenker [47], but it is only one of several group-strategyproof, budget-balanced mechanisms in the literature that have properties NPT, VP, CS, and SYM; see =-=[16, 33]-=- for more examples. It is shown in [18] that no group-strategyproof, budget-balanced multicast cost-sharing mechanism that satisfies conditions NPT, VP, CS, and SYM can have low absolute network compl...

89 A Market Protocol for Decentralized Task Allocation,” - Walsh, Wellman - 1998 (Show Context)

Citation Context

...ines of computer science have a long history of using game theory --- such as networking (e.g., [21, 25, 35]), distributed artificial intelligence (e.g., [55, 61]), and marketbased computation (e.g., =-=[65]-=-) --- the first work in TCS to address incentives and computational complexity simultaneously was Nisan and Ronen's seminal paper [52] on algorithmic mechanism design (AMD). This paper put forth a for...

89 Rationalizable Strategic Behavior,” Econometrica, - Bernheim - 1984
73 A Cryptographic Solution to a Game-Theoretic Problem,” - Dodis, Halevi, et al. - 2000 (Show Context)

Citation Context

...ard SMFE literature [26], work that might be relevant to Open Problem 12 includes but is not limited to the papers of Naor and Nissim [48], Naor, Pinkas, and Sumner [49], and Dodis, Halevi, and Rabin =-=[15]-=-. Thus far, our motivation for considering indirect mechanisms has been the desire to preserve agents' privacy, and we have observed that low network complexity and agent privacy may be hard to achiev...

66 Nash equilibrium and welfare optimality”, Review of Economic Studies - Maskin - 1999
52 Incentives in teams. Econometrica 41 - Groves - 1973
50 Adaptive and Sophisticated Learning in - MILGROM, ROBERTS - 1991 (Show Context)

Citation Context

...is the “right” solution concept for interdomain routing? The game-theory literature contains a very rich set of solution concepts to which we cannot possibly do justice here. For example, one can consider “repeated-play” settings in which each agent knows its own payoff function but not those of others; as the game continues, agents learn more about the payoff functions of others, adapt their own strategies, and reach an equilibrium through repeated play. The resulting solution concept depends on how the agents learn. If agents are adaptive learners, according to the MilgromRoberts definition [42], then the play asymptotically heads towards the serially undominated set. If the learning algorithms are calibrated in the sense of Foster and Vohra [23], then the solution concept is the set of correlated equilibria. Internet-based agents typically have very little information even about their own payoff functions and know still less about those of other agents. All they know is which strategy they played and what the resulting payoff was. In addition, the payoff functions change over time in unpredictable and sudden ways, reflecting the dynamic nature of the Internet infrastructure. Further...

49 An economy for flow control in computer networks - Ferguson, Nikolaou, et al. - 1989 (Show Context)

Citation Context

...he TCS literature traditionally did the opposite. The emergence of the Internet as a standard platform for distributed computation has radically changed this state of affairs: Ownership, operation, and use by many selfinterested, independent parties give the Internet the characteristics of an economy as well as those of a computer. This development requires that these previously separable concerns – incentive compatibility and computational tractability – be jointly addressed. Although many subdisciplines of computer science have a long history of using game theory — such as networking (e.g., [21, 25, 35]), distributed artificial intelligence (e.g., [55, 61]), and marketbased computation (e.g., [65]) — the first work in TCS to address incentives and computational complexity simultaneously was Nisan and Ronen’s seminal paper [52] on algorithmic mechanism design (AMD). This paper put forth a formal model of centralized computation that combined incentive compatibility (the “mechanism design” part) with computational tractability (the “algorithmic” part). Feigenbaum, Papadimitriou, and Shenker [20] extended this to distributed algorithmic mechanism design (DAMD), in which the same goals of incent...

49 On strategy-proofness and single-peakedness - Moulin - 1980 (Show Context)

Citation Context

...ategic design goals need only be approximated? Characterization results that should be considered include the Moulin-Sprumont characterization of strategyproof mechanisms with single-peaked utilities =-=[45, 63]-=- and the BarberaJackson characterization of strategyproof exchange markets [8]. 6. STRATEGIC MODELS In this section, we look more carefully at an aspect of DAMD that we have thus far oversimplified. I...

43 A New Approach to the Implementation Problem,” - Matsushima - 1988 (Show Context)

Citation Context

...ctable, given the information available to agent i, and that the computation of M() is tractable, given a strategy vector (s1 , . . . , sn ). 13 One can consider the virtual implementation literature =-=[39, 1]-=-, in which mechanisms produce lotteries over outcomes, to be a form of approximation. We don't discuss virtual implementation here. Nisan and Ronen [53] were the first to address the question of appro...

40 Biased Replacement Policies for Web Caches: Differential Quality-of-Service and Aggregate User Value,” - Kelly, Chan, et al. - 1999 (Show Context)

Citation Context

...me important pages uncached, and yielding sub-optimal performance. Thus, the system needs to provide incentives designed to have the caches report their true operating costs. 10 Open Problem 16. Develop distributed algorithmic mechanisms for caching in which clients are induced to reveal their true preferences, and caches are induced to implement the optimal resource allocation. Demonstrate that these caching mechanisms can be built as scalable extensions to existing distributed caching protocols and provide provable performance guarantees. Some aspects of this problem are addressed in, e.g., [34]. 9.2 Peer-to-Peer File Sharing Peer-to-peer (P2P) file-sharing networks, e.g., Gnutella, KaZaA, and Freenet, are the ne plus ultra of autonomous distributed systems; each machine belongs to a different user, and there is no central administrative authority. Thus, incentive issues are likely to be very important to the future of P2P technology; this provides a great opportunity for DAMD research. P2P file-sharing represents a shift from purely commercial content-distribution systems (e.g., content providers paying CDNs to distribute their content) to a “gift economy,” in which individual users...

38 Algorithms for Selfish Agents: Mechanism Design for Distributed Computation,” - Nisan - 1999 (Show Context)

Citation Context

...ous open problems, some very specific and others quite general, concerning the foundations and applications of DAMD. Additional material about the AMD and DAMD research agendas can be found in, e.g., =-=[50, 51, 54]-=-. 2. MD TO AMD TO DAMD In essence, game theory is the study of what happens when independent agents act selfishly. Mechanism design asks how one can design systems so that agents' selfish behavior res...

36 oral communications, - Mitchell - 1983 (Show Context)

Citation Context

...gorithm designed to compute this mechanism; even if the ASs input their true costs, what is to stop them from running a di#erent algorithm that computes prices more favorable to them? Mitchell et al. =-=[43]-=- have observed that, if ASs are required to sign all of the messages that they send and to verify all of the messages that they receive from their neighbors, then the protocol in [19] can be modified ...

35 Economic principles of multi-agent systems, - Boutilier, Shoham, et al. - 1997 (Show Context)

Citation Context

...be jointly addressed. Although many subdisciplines of computer science have a long history of using game theory --- such as networking (e.g., [21, 25, 35]), distributed artificial intelligence (e.g., =-=[55, 61]-=-), and marketbased computation (e.g., [65]) --- the first work in TCS to address incentives and computational complexity simultaneously was Nisan and Ronen's seminal paper [52] on algorithmic mechanis...

31 Hardness results for multicast cost sharing,” - Feigenbaum, Krishnamurthy, et al. - 2003 (Show Context)

Citation Context

...r set and cost shares by sending just two modest-sized messages over each l # L and doing two very simple calculations at each node. On the other hand, the SH mechanism has bad network complexity: In =-=[18]-=-, it is shown that any algorithm, deterministic or randomized, that computes SH must, in the worst case, send# |P |) bits over linearly many links. Before turning to our next representative DAMD probl...

31 Partial equilibrium approach to the free rider problem,” - Green, Kohlberg, et al. - 1976 (Show Context)

Citation Context

...S = U , we reduce to the direct2Our assumption that all agents are equivalent, made for notational simplicity, renders all strategy spaces the same; in general, we could have different strategy spaces Si. 2 mechanism case, and so our preceding discussion applies to direct mechanisms as well. That is, one can achieve nonstrategyproof SCFs with direct mechanisms by invoking different solution concepts. For example, one can achieve efficiency and budget balance using the Bayesian-Nash-equilibrium solution concept [7, 14] – something that is impossible using the dominant-strategy solution concept [27, 58]. It is important to note that, although the mechanism is chosen by the system designer, the solution concept is supposed to reflect reality. The solution concept thus depends greatly on the context (e.g., is it a repeated game or a single-shot game, do agents collude, do they know about the other agents, do they know about the other agents’ strategic choices, etc.). Because the Internet is somewhat different from traditional game-theoretic contexts, the traditional solution concepts may not be sufficient; we shall return to this issue in Section 8. The game-theory literature on mechanism desi...

30 Strategy-proof exchange. - Barbera, Jackson - 1995 (Show Context)

Citation Context

... be considered include the Moulin-Sprumont characterization of strategyproof mechanisms with single-peaked utilities [45, 63] and the BarberaJackson characterization of strategyproof exchange markets =-=[8]-=-. 6. STRATEGIC MODELS In this section, we look more carefully at an aspect of DAMD that we have thus far oversimplified. It need not be the case that all parties in a distributed, algorithmic mechanis...

29 Strategy-proof exchange”, Econometrica - Barberà, Jackson - 1995
26 Virtual implementation in Nash equilibrium - Abreu, Sen - 1991 (Show Context)

Citation Context

...ctable, given the information available to agent i, and that the computation of M() is tractable, given a strategy vector (s1 , . . . , sn ). 13 One can consider the virtual implementation literature =-=[39, 1]-=-, in which mechanisms produce lotteries over outcomes, to be a form of approximation. We don't discuss virtual implementation here. Nisan and Ronen [53] were the first to address the question of appro...

18 Pricing multicasting in more practical network models,” - Adler, Rubenstein - 2002 (Show Context)

Citation Context

...edient, centralized computational device that is distinct from the strategic agents who supply the inputs; similarly, it is the case for previous work on distributed multicast cost-sharing mechanisms =-=[5, 3, 18, 20, 22, 33, 41]-=-, where the mechanism is executed on an obedient, distributed computational device (i.e., the multicast tree) that is distinct from the strategic agents (who are resident at various nodes of the tree ...

16 A game-theoretic approach to decentralized flow control of markovian queue networks”, Performance, - Hsiao, Lazar - 1987
16 A Dominant-StrategyDouble Auction - McAfee - 1992
15 The Characterization of Implementable Choice Rules,” in Aggregation and Revelation of Preferences, North-Holland, - Roberts - 1979 (Show Context)

Citation Context

...S = U , we reduce to the direct2Our assumption that all agents are equivalent, made for notational simplicity, renders all strategy spaces the same; in general, we could have different strategy spaces Si. 2 mechanism case, and so our preceding discussion applies to direct mechanisms as well. That is, one can achieve nonstrategyproof SCFs with direct mechanisms by invoking different solution concepts. For example, one can achieve efficiency and budget balance using the Bayesian-Nash-equilibrium solution concept [7, 14] – something that is impossible using the dominant-strategy solution concept [27, 58]. It is important to note that, although the mechanism is chosen by the system designer, the solution concept is supposed to reflect reality. The solution concept thus depends greatly on the context (e.g., is it a repeated game or a single-shot game, do agents collude, do they know about the other agents, do they know about the other agents’ strategic choices, etc.). Because the Internet is somewhat different from traditional game-theoretic contexts, the traditional solution concepts may not be sufficient; we shall return to this issue in Section 8. The game-theory literature on mechanism desi...

14 Incremental cost sharing: characterization by strategyproofness,” - Moulin - 1999
8 Applications of approximation to cooperative games,” - Jain, Vazirani - 2001 (Show Context)

Citation Context

... reasons discussed at length by Moulin and Shenker [47], but it is only one of several group-strategyproof, budget-balanced mechanisms in the literature that have properties NPT, VP, CS, and SYM; see =-=[16, 33]-=- for more examples. It is shown in [18] that no group-strategyproof, budget-balanced multicast cost-sharing mechanism that satisfies conditions NPT, VP, CS, and SYM can have low absolute network compl...

7 Calibrated Learning and Correlated Equilibrium,” Games and Economic Behavior 21 - Foster, Vohra - 1997
6 Virtual Implementation in - Abreu, Sen - 1991 (Show Context)

Citation Context

...ery set of other players’ strategies (t1, . . . , ti−1, ti+1, . . . , tn), the inequality ui(M(t1, . . . , ti−1, si, ti+1, . . . , tn)) + # ≥ ui(M(t1, . . . , ti−1, ti, ti+1, . . . , tn)) holds – so, si may not be a best possible strategy, but it is always within # of best possible, regardless of what other agents do. In the AMD context, one also insists that, for all i, the computation of si is tractable, given the information available to agent i, and that the computation of M(·) is tractable, given a strategy vector (s1, . . . , sn). 13One can consider the virtual implementation literature [39, 1], in which mechanisms produce lotteries over outcomes, to be a form of approximation. We don’t discuss virtual implementation here. Nisan and Ronen [53] were the first to address the question of approximate computation in AMD. They considered VCG mechanisms in which optimal outcomes are NP-hard to compute (as they are in combinatorial auctions). They pointed out that, if an optimal outcome is replaced by a computationally tractable, approximately optimal outcome, the resulting mechanism may no longer be strategyproof. The above discussion of how we should define “approximating the SH mechanism...

5 Rationalizable Strategic Behavior,&quot; Econometrica 52 - Bernheim - 1984 (Show Context)

Citation Context

...nilaterally increase his utility. Other solution concepts include rationalizable strategies (agents use strategies that are best responses to rational beliefs about the other agents' strategy choices =-=[10, 57]-=-), evolutionarily stable strategies (agents imitate the successful strategies used by others in previous rounds of the game [62]), and dominant strategies (agents only choose strategies that, regardle...

4 Profit-Maximizing Multicast Pricing by Approximating Fixed Points,” submitted. http://www.cc.gatech.edu/ people/home/aranyak/multicast.ps - Mehta, Shenker, et al. (Show Context)

Citation Context

...edient, centralized computational device that is distinct from the strategic agents who supply the inputs; similarly, it is the case for previous work on distributed multicast cost-sharing mechanisms =-=[5, 3, 18, 20, 22, 33, 41]-=-, where the mechanism is executed on an obedient, distributed computational device (i.e., the multicast tree) that is distinct from the strategic agents (who are resident at various nodes of the tree ...

3 The Property-Rights Doctrine and Demand Revelation under Incomplete Information,” - Arrow - 1979 (Show Context)

Citation Context

...e nonstrategyproof SCFs with direct mechanisms by invoking different solution concepts. For example, one can achieve e#- ciency and budget balance using the Bayesian-Nash-equilibrium solution concept =-=[7, 14]-=- -- something that is impossible using the dominant-strategy solution concept [27, 58]. It is important to note that, although the mechanism is chosen by the system designer, the solution concept is s...

3 Biased replacement policies for web caches: Dierential quality-of-service and aggregate user value - Kelly, Chan, et al. - 1999 (Show Context)

Citation Context

...hese caching mechanisms can be built as scalable extensions to existing distributed caching protocols and provide provable performance guarantees. Some aspects of this problem are addressed in, e.g., =-=[34]-=-. 9.2 Peer-to-Peer File Sharing Peer-to-peer (P2P) file-sharing networks, e.g., Gnutella, KaZaA, and Freenet, are the ne plus ultra of autonomous distributed systems; each machine belongs to a di#eren...

3 A Measurement Studyof Peer-to-Peer File Sharing Systems - Saroiu, Gummadi, et al. - 2002
2 Incentives in teams,&quot; Econometrica 41 - Groves - 1973 (Show Context)

Citation Context

... : O # # represents his valuations of each of the system states, and p i is his payment. For such problems, there is a class of strategyproof mechanisms, called Vickrey-Clarke-Groves (VCG) mechanisms =-=[13, 29, 64]-=-, that result in the system state that optimizes P i v i (o). Direct strategyproof mechanisms provide a conceptually simple, if not always ideal (see Section 7), way to achieve strategyproof SCFs. How...

2 Communication-Preserving Protocols for Secure Function Evaluation,” - Naor, Nissim - 2001 (Show Context)

Citation Context

...ents is unknown to each individual agent. In addition to the standard SMFE literature [26], work that might be relevant to Open Problem 12 includes but is not limited to the papers of Naor and Nissim =-=[48]-=-, Naor, Pinkas, and Sumner [49], and Dodis, Halevi, and Rabin [15]. Thus far, our motivation for considering indirect mechanisms has been the desire to preserve agents' privacy, and we have observed t...

2 Privacy-Preserving Auctions and Mechanism Design,” - Naor, Pinkas, et al. - 1999 (Show Context)

Citation Context

...ual agent. In addition to the standard SMFE literature [26], work that might be relevant to Open Problem 12 includes but is not limited to the papers of Naor and Nissim [48], Naor, Pinkas, and Sumner =-=[49]-=-, and Dodis, Halevi, and Rabin [15]. Thus far, our motivation for considering indirect mechanisms has been the desire to preserve agents' privacy, and we have observed that low network complexity and ...

2 Computationallyfeasible VCG mechanisms - Nisan, Ronen - 2000
2 Resource Pricing and the - Gibbens, Kelly - 1999 (Show Context)

Citation Context

...he TCS literature traditionally did the opposite. The emergence of the Internet as a standard platform for distributed computation has radically changed this state of affairs: Ownership, operation, and use by many selfinterested, independent parties give the Internet the characteristics of an economy as well as those of a computer. This development requires that these previously separable concerns – incentive compatibility and computational tractability – be jointly addressed. Although many subdisciplines of computer science have a long history of using game theory — such as networking (e.g., [21, 25, 35]), distributed artificial intelligence (e.g., [55, 61]), and marketbased computation (e.g., [65]) — the first work in TCS to address incentives and computational complexity simultaneously was Nisan and Ronen’s seminal paper [52] on algorithmic mechanism design (AMD). This paper put forth a formal model of centralized computation that combined incentive compatibility (the “mechanism design” part) with computational tractability (the “algorithmic” part). Feigenbaum, Papadimitriou, and Shenker [20] extended this to distributed algorithmic mechanism design (DAMD), in which the same goals of incent...

1 Learning and Implementation on the Internet,&quot; http://www.icir.org/shenker/decent.ps - Friedman, Shenker (Show Context)

Citation Context

.... New definitions of learning and new solution concepts that attempt to capture these aspects of Internetbased, repeated games have been proposed by, e.g., Erev and Roth [17] and Friedman and Shenker =-=[24]-=-. Which, if any, of these solution concepts and game-theoretic definitions of learning will play a central role in the emerging theory of DAMD is a wide open question. Moreover, we have yet to underst...

1 La#ont, &quot;Partial equilibrium approach to the free rider problem - Green, Kohlberg, et al. - 1976 (Show Context)

Citation Context

...s. For example, one can achieve e#- ciency and budget balance using the Bayesian-Nash-equilibrium solution concept [7, 14] -- something that is impossible using the dominant-strategy solution concept =-=[27, 58]-=-. It is important to note that, although the mechanism is chosen by the system designer, the solution concept is supposed to reflect reality. The solution concept thus depends greatly on the context (...

1 A Dominant-Strategy Double Auction,” - McAfee - 1992 (Show Context)

Citation Context

...retain the strategic properties of the original mechanism exactly and approximate one or more of its other properties. This type of approximation is studied in the economics literature as well (e.g., =-=[37]-=-), but not for the purpose of reducing computational or communication costs. An important and open research issue is to explore alternative notions of approximation, as well as to design computational...

1 Rationality as a Paradigm for Internet Computing,” Invited Talk at the U - Nisan (Show Context)

Citation Context

...ous open problems, some very specific and others quite general, concerning the foundations and applications of DAMD. Additional material about the AMD and DAMD research agendas can be found in, e.g., =-=[50, 51, 54]-=-. 2. MD TO AMD TO DAMD In essence, game theory is the study of what happens when independent agents act selfishly. Mechanism design asks how one can design systems so that agents' selfish behavior res...

1 Almost-dominant Strategy Implementation,&quot; http://www.kellogg.nwu.edu/ faculty/schummer/ftp/research/esp.pdf - Schummer (Show Context)

Citation Context

...n put forth, and we briefly review three of them here. Approximation of equilibria is considered in the gametheory literature independent of distributed-algorithmic concerns. 13 For example, Schummer =-=[60]-=- and Parkes et al. [56] consider #-dominance. A strategy vector (s1 , . . . , sn) is an #- dominant equilibrium if, for every agent i, every strategy t i , and every set of other players' strategies (...

1 Resilient OverlayNetworks - Andersen, Balakrishnan, et al. - 2001
1 Hardness Results for Multicast Cost Sharing,” Yale UniversityTechnical Report YALEU/DCS/TR1232 - Feigenbaum, Krishnamurthy, et al. - 2002
1 Secure Multi-partyComputation (working draft, Version 1.1 - Goldreich - 1998
1 Vickreyprices and shortest paths: What is an edge worth - Hershberger, Suri - 2001
1 Profit-Maximizing Multicast Pricing byApproximating Fixed - Mehta, Shenker, et al.
1 Incremental cost sharing: characterization bystrategyproofness,” Social Choice and Welfare 16 - Moulin - 1999
1 Rationalityas a Paradigm for Internet Computing,” Invited Talk at the U - Nisan
1 Almost-dominant Strategy Implementation,” http://www.kellogg.nwu.edu/ faculty/schummer/ftp/research/esp.pdf - Schummer
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University