Results 1  10
of
208
Truthful Mechanisms for OneParameter Agents
"... In this paper, we show how to design truthful (dominant strategy) mechanisms for several combinatorial problems where each agent’s secret data is naturally expressed by a single positive real number. The goal of the mechanisms we consider is to allocate loads placed on the agents, and an agent’s sec ..."
Abstract

Cited by 191 (4 self)
 Add to MetaCart
In this paper, we show how to design truthful (dominant strategy) mechanisms for several combinatorial problems where each agent’s secret data is naturally expressed by a single positive real number. The goal of the mechanisms we consider is to allocate loads placed on the agents, and an agent’s secret data is the cost she incurs per unit load. We give an exact characterization for the algorithms that can be used to design truthful mechanisms for such load balancing problems using appropriate side payments. We use our characterization to design polynomial time truthful mechanisms for several problems in combinatorial optimization to which the celebrated VCG mechanism does not apply. For scheduling related parallel machines (QjjCmax), we give a 3approximation mechanism based on randomized rounding of the optimal fractional solution. This problem is NPcomplete, and the standard approximation algorithms (greedy loadbalancing or the PTAS) cannot be used in truthful mechanisms. We show our mechanism to be frugal, in that the total payment needed is only a logarithmic factor more than the actual costs incurred by the machines, unless one machine dominates the total processing power. We also give truthful mechanisms for maximum flow, Qjj P Cj (scheduling related machines to minimize the sum of completion times), optimizing an affine function over a fixed set, and special cases of uncapacitated facility location. In addition, for Qjj P wjCj (minimizing the weighted sum of completion times), we prove a lower bound of 2 p 3 for the best approximation ratio achievable by a truthful mechanism.
Regulating a Monopolist with Unknown Costs
 Ecnometrica
, 1982
"... you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, noncommercial use. Please contact the publisher regarding any further use of this work. Publisher contact inform ..."
Abstract

Cited by 161 (0 self)
 Add to MetaCart
you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, noncommercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at
Economic mechanism design for computerized agents
 In USENIX workshop on Electronic Commerce
, 1995
"... The field of economic mechanism design has been an active area of research in economics for at least 20 years. This field uses the tools of economics and game theory to design "rules of interaction " for economic transactions that will, in principle, yield some desired outcome. In this pap ..."
Abstract

Cited by 160 (1 self)
 Add to MetaCart
The field of economic mechanism design has been an active area of research in economics for at least 20 years. This field uses the tools of economics and game theory to design "rules of interaction " for economic transactions that will, in principle, yield some desired outcome. In this paper I provide an overview of this subject for an audience interested in applications to electronic commerce and discuss some special problems that arise in this context.
Achieving BudgetBalance with VickreyBased Payment Schemes in Exchanges
 In Proceedings of the 17th International Joint Conference on Artificial Intelligence
, 2001
"... Generalized Vickrey mechanisms have received wide attention in the literature because they are efficient and strategyproof, i.e. truthful bidding is optimal whatever the bids of other agents. However it is wellknown that it is impossible for an exchange, with multiple buyers and sellers, to be ..."
Abstract

Cited by 98 (18 self)
 Add to MetaCart
Generalized Vickrey mechanisms have received wide attention in the literature because they are efficient and strategyproof, i.e. truthful bidding is optimal whatever the bids of other agents. However it is wellknown that it is impossible for an exchange, with multiple buyers and sellers, to be efficient and budgetbalanced, even putting strategyproofness to one side. A marketmaker in an efficient exchange must make more payments than it collects. We enforce budgetbalance as a hard constraint, and explore payment rules to distribute surplus after an exchange clears to minimize distance to Vickrey payments. Different rules lead to different levels of truthrevelation and efficiency. Experimental and theoretical analysis suggest a simple Threshold scheme, which gives surplus to agents with payments further than a certain threshold value from their Vickrey payments. The scheme appears able to exploit agent uncertainty about bids from other agents to reduce manipulation and boost allocative efficiency in comparison with other simple rules.
A crash course in implementation theory
 SOC CHOICE WELFARE
, 2001
"... This paper is meant to familiarize the audience with some of the fundamental results in the theory of implementation and provide a quick progression to some open questions in the literature. ..."
Abstract

Cited by 72 (2 self)
 Add to MetaCart
This paper is meant to familiarize the audience with some of the fundamental results in the theory of implementation and provide a quick progression to some open questions in the literature.
Generalized scoring rules and the frequency of coalitional manipulability
 In Proceedings of the Ninth ACM Conference on Electronic Commerce (EC
, 2008
"... We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This clas ..."
Abstract

Cited by 61 (18 self)
 Add to MetaCart
We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based only on the sum of these vectors—more specifically, only on the order (in terms of score) of the sum’s components. This class is extremely general: we do not know of any commonly studied rule that is not a generalized scoring rule. We then study the coalitional manipulation problem for generalized scoring rules. We prove that under certain natural assump), then tions, if the number of manipulators is O(n p) (for any p < 1 2 the probability that a random profile is manipulable is O(n p − 1 2), where n is the number of voters. We also prove that under another set of natural assumptions, if the number of manipulators is Ω(n p) (for any p> 1) and o(n), then the probability that a random pro2 file is manipulable (to any possible winner under the voting rule) is 1 − O(e −Ω(n2p−1)). We also show that common voting rules satisfy these conditions (for the uniform distribution). These results generalize earlier results by Procaccia and Rosenschein as well as even earlier results on the probability of an election being tied.
Hybrid voting protocols and hardness of manipulation
 In Proceedings of the 16th International Symposium on Algorithms and Computation
, 2005
"... This paper addresses the problem of constructing voting protocols that are hard to manipulate. We describe a general technique for obtaining a new protocol by combining two or more base protocols, and study the resulting class of (voteonce) hybrid voting protocols, which also includes most previous ..."
Abstract

Cited by 55 (4 self)
 Add to MetaCart
This paper addresses the problem of constructing voting protocols that are hard to manipulate. We describe a general technique for obtaining a new protocol by combining two or more base protocols, and study the resulting class of (voteonce) hybrid voting protocols, which also includes most previously known manipulationresistant protocols. We show that for many choices of underlying base protocols, including some that are easily manipulable, their hybrids are NPhard to manipulate, and demonstrate that this method can be used to produce manipulationresistant protocols with unique combinations of useful features. 1