Design and Analysis of Sponsored Search Mechanisms

Total Page:16

File Type:pdf, Size:1020Kb

Design and Analysis of Sponsored Search Mechanisms DESIGN AND ANALYSIS OF SPONSORED SEARCH MECHANISMS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Renato Paes Leme December 2012 c 2012 Renato Paes Leme ALL RIGHTS RESERVED DESIGN AND ANALYSIS OF SPONSORED SEARCH MECHANISMS Renato Paes Leme, Ph.D. Cornell University 2012 Auctions have become the standard way of allocating resources in electronic markets. Two main reasons why designing auctions is hard are the need to cope with strategic behavior of the agents, who will constantly adjust their bids seeking more items at lower prices, and the fact that the environment is highly dynamic and uncertain. Many market designs which became de-facto industrial standards allow strategic manipulation by the agents, but nevertheless display good behavior in practice. In this thesis, we analyze why such designs turned out to be so successful despite strategic behavior and environment uncertainty. Our goal is to learn from this analysis and to use the lessons learned to design new auction mechanisms; as well as fine-tune the existing ones. We illustrate this research line through the analysis and design of Ad Auc- tions mechanisms. We do so by studying the equilibrium behavior of a game induced by Ad Auctions, and show that all equilibria have good welfare and revenue properties. Next, we present new Ad Auction designs that take into ac- count richer features such as budgets, multiple keywords, heterogeneous slots and online supply. BIOGRAPHICAL SKETCH Renato Paes Leme was born in December 1st, 1984 in Rio de Janeiro, where he spent most of his life. There in the tropics, he got a BEng in Computer Engi- neering from Instituto Militar de Engenharia in 2007 and a MSc in Mathematics from Instituto Nacional de Matematica Pura e Aplicada in the same year. He then moved to Ithaca (not quite in the tropics, but beautiful nevertheless) where he expects to get a PhD in Computer Science with a minor in Operations Re- search from Cornell University in December 2012. iii I dedicate this thesis to my parents Irio and Sylvia and to my brother Pedro. iv ACKNOWLEDGEMENTS I want thank Eva´ Tardos for guiding me through this amazing journey that was my PhD education. Eva´ was the main force shaping my view of science and my taste for research problems. The researcher I am today, I owe to her. What I’ll miss more about Cornell will undoubtely be the conversations I had with her. I remember countless visits to her office when Eva´ was always patient and took time to walk with me over many angles of the question - technical and non- technical. Above all, I thank her for the care and attention she had for me in the past four years. I am lucky to have been at such a wonderful place as Cornell, where I found many great mentors, who were sources of inspiration and example for me. I’d like to thank David Shmoys for suggesting interesting problems and for teach- ing me a lot about linear programming and scheduling. Also, thanks David for being my co-advisor and for being always a great source of advice. Many thanks to Bobby Kleinberg for being a great mentor, a great inspiration and for always being able to hint me in the right direction. I am grateful to Jon Klein- berg for his “Structure of Information Networks” class, which was the first class I took at Cornell and filled my mind with all sorts of interesting questions to think about. To David Williamson for his “Approximation Algorithms” class from which I learned a great deal of useful techniques that I later applied in my research. Thanks to Emin G ¨un Sirer for serving on my committee and for general advice. To many others faculty members that I had the pleasure to be in contact with during my PhD years, many thanks. I was very fortunate to be able to spend some part of my PhD years travelling and visiting various institutions and research labs. A special thanks for my industry mentors Moshe Babaioff (who hosted me for a semester in Microsoft v Research Sillicon Valley), Jennifer Chayes and Christian Borgs (for hosting me in Microsoft Research New England for one summer and then for many following visits) and Vahab Mirrokni (for hosting me in Google NYC for two summers and countless many visits during the semester). I was also fortunate to spend two months in the Institute of Advanced Studies in the Hebrew University of Jerusalem (thanks to Noam Nisan and Michal Feldman for organizing the AGT semester, bringing together all the great AGT researchers to the same place and creating such a stimulating research environment). I also had the pleasure to visit MIT-CSAIL for one semester (thanks to Silvio Micali and Costis Daskalakis for hosting me). I made several friends among my research collaborators, and I’d like to thank them all for all the fun moments doing research together. In special, I’ll like to thank Vasilis Syrgkanis for being a great friend and such a fun research collaborator. I specially remember solving the main question in our SODA pa- per while on the beach in Netanya and the many times we discussed game the- ory while eating shakshouka for breakfast in Jerusalem. Thanks also to Brendan Lucier for a very fruitful collaboration on GSP auc- tions and for teaching me many interesting techniques. Thanks to Gagan Goel with whom I learned a lot about truthful auctions and submodular functions and teaching me how to appreciate NYC (in particular showing me where to get good southern Indian food). One other gift I got from Cornell is many good friends who made my life here fun and interesting. They formed an important part of my PhD: Bruno Abrahao, Daniel Hauagge, Guilherme Pinto, Hussam Abu-Libdeh, Ashwin Baranidyuru, Daniel Fleischman, Shahar Dobzinski, Sigal Oren, Georgios Pil- iouras and Marcos Salles. vi A special thanks to my friends Thiago Pereira and Thiago Costa for being my great friends for a very long time, since we were all undergrads in Brazil. They both shared with me moments during our undergrad and masters and the anxiety applying for a PhD. We went together through moments of the happi- ness and dispair in our doctoral studies and sharing them along the way was very important to me. I thank Thiago Costa and Andrei Roman for making my year in Boston so fun and for providing me warmth with your friendship. I also thank Thiago Pereira for introducing me to the ICPC contest during our under- grad years, which was my initial contact with algorithms. It was very fun to spend many nights programming with him and Rafael Paulino. Thiago Pereira should also get the credit for introducing me to travelling - thanks for many interesting trips we had through Europe. I want to thank my friends from Brazil: Rodrigo, Alexandre, Nathalia, Cechin and Nicodemos. There are many great things that happened while I was in Boston, but noth- ing compared to meeting my dear Carol. Thanks for all the beautiful moments we had since then and for always inspiring me in my research and beyond. Thanks for filling my life with joy. Above all, I’d like to thank my parents Irio and Sylvia, who always loved me and supported me in all my decisions. They taught me to be persistent and never give up on problems, which was definitely very useful in research and in life overall. The love of my parents, my brother Pedro and all my family have been my constant support all this years. To you I dedicate this thesis. vii TABLE OF CONTENTS BiographicalSketch.............................. iii Dedication ................................... iv Acknowledgements.............................. v TableofContents ............................... viii ListofTables.................................. xi ListofFigures ................................. xii 1 Introduction 1 1.1 Comparing Algorithms in Strategic Settings (or Mechanism Design for Algorithmists) . 2 1.2 TheMainInquiryofthisThesis . 4 1.3 AnalysisApproachtoSponsoredSearch . 8 1.3.1 SponsoredSearchAuctionsandGSP. 8 1.3.2 SocialWelfare .......................... 12 1.3.3 Robustness ........................... 13 1.3.4 Revenue ............................. 15 1.3.5 Relatedwork .......................... 17 1.4 DesigningSponsoredSearchMechanisms . 18 1.4.1 BudgetConstraints. 19 1.4.2 OnlineSupply.......................... 22 1.4.3 RelatedWork .......................... 25 1.5 Roadmap................................. 28 1.6 BibliographicNotes. .. .. .. .. .. .. .. 29 2 Technical Preliminaries 31 2.1 BasicNotation.............................. 31 2.2 MechanismDesignBasics . 32 2.3 SolutionConcepts............................ 33 2.4 BayesianSolutionConcepts . 36 2.5 PriceofAnarchyandRevenue . 38 2.6 VCG Mechanism: a generic welfare-maximizing mechanism ... 39 2.7 SponsoredSearchEnvironment . 41 2.7.1 Single-keywordenvironment . 41 2.7.2 GeometricRepresentation . 42 2.7.3 Multi-keywordenvironment . 43 2.8 PolyhedralandPolymatroidalEnvironments . .. 44 2.8.1 Sponsored Search as a Polymatroidal Environment . 45 2.8.2 Qualityfactors ......................... 47 2.9 GeneralizedSecondPriceAuction . 48 2.9.1 Nooverbidding......................... 49 viii 3 Efficiency of Equilibria in GSP 51 3.1 PriceofStability............................. 51 3.2 PriceofAnarchywithUncertainty . 59 3.3 Pure Nash Equilibria in the Full Information Setting . ..... 65 3.3.1 Weaklyfeasibleallocations . 65 3.3.2 TwoandThreeslotscase. 67 3.3.3 GoldenRatioUpperBoundforthePriceofAnarchy. 70 3.4 Computational search for the GSP Price of Anarchy . .. 73 3.5 QualityofLearningOutcomesinGSP . 76 3.5.1 Learninginthefullinformationsetting . 76 3.5.2 Learningwithuncertainty. 78 4 Revenue of Equilibria in GSP 80 4.1 RevenuewithUncertainty . 81 4.1.1 Usefulsetoftools. .. .. .. .. .. .. 82 4.1.2 RevenuewithoutReserves:BadExamples . 83 4.1.3 Warmup:MHRValuations . 84 4.1.4 Regularvaluations . 86 4.1.5 BayesianRevenuewithWell-separatedCTRs . 89 4.2 RevenueinFullInformationGSP . 93 4.2.1 FullInformationRevenue:Examples . 94 4.2.2 RevenueBoundinFullInformation . 94 4.3 TradeoffbetweenRevenueandEfficiency . 99 4.3.1 EquilibriumhierarchyforGSP . 100 4.3.2 Envy-freeandefficientequilibrium . 101 4.3.3 Costofefficiency:definitionandexample .
Recommended publications
  • Potential Games. Congestion Games. Price of Anarchy and Price of Stability
    8803 Connections between Learning, Game Theory, and Optimization Maria-Florina Balcan Lecture 13: October 5, 2010 Reading: Algorithmic Game Theory book, Chapters 17, 18 and 19. Price of Anarchy and Price of Staility We assume a (finite) game with n players, where player i's set of possible strategies is Si. We let s = (s1; : : : ; sn) denote the (joint) vector of strategies selected by players in the space S = S1 × · · · × Sn of joint actions. The game assigns utilities ui : S ! R or costs ui : S ! R to any player i at any joint action s 2 S: any player maximizes his utility ui(s) or minimizes his cost ci(s). As we recall from the introductory lectures, any finite game has a mixed Nash equilibrium (NE), but a finite game may or may not have pure Nash equilibria. Today we focus on games with pure NE. Some NE are \better" than others, which we formalize via a social objective function f : S ! R. Two classic social objectives are: P sum social welfare f(s) = i ui(s) measures social welfare { we make sure that the av- erage satisfaction of the population is high maxmin social utility f(s) = mini ui(s) measures the satisfaction of the most unsatisfied player A social objective function quantifies the efficiency of each strategy profile. We can now measure how efficient a Nash equilibrium is in a specific game. Since a game may have many NE we have at least two natural measures, corresponding to the best and the worst NE. We first define the best possible solution in a game Definition 1.
    [Show full text]
  • Price of Competition and Dueling Games
    Price of Competition and Dueling Games Sina Dehghani ∗† MohammadTaghi HajiAghayi ∗† Hamid Mahini ∗† Saeed Seddighin ∗† Abstract We study competition in a general framework introduced by Immorlica, Kalai, Lucier, Moitra, Postlewaite, and Tennenholtz [19] and answer their main open question. Immorlica et al. [19] considered classic optimization problems in terms of competition and introduced a general class of games called dueling games. They model this competition as a zero-sum game, where two players are competing for a user’s satisfaction. In their main and most natural game, the ranking duel, a user requests a webpage by submitting a query and players output an or- dering over all possible webpages based on the submitted query. The user tends to choose the ordering which displays her requested webpage in a higher rank. The goal of both players is to maximize the probability that her ordering beats that of her opponent and gets the user’s at- tention. Immorlica et al. [19] show this game directs both players to provide suboptimal search results. However, they leave the following as their main open question: “does competition be- tween algorithms improve or degrade expected performance?” (see the introduction for more quotes) In this paper, we resolve this question for the ranking duel and a more general class of dueling games. More precisely, we study the quality of orderings in a competition between two players. This game is a zero-sum game, and thus any Nash equilibrium of the game can be described by minimax strategies. Let the value of the user for an ordering be a function of the position of her requested item in the corresponding ordering, and the social welfare for an ordering be the expected value of the corresponding ordering for the user.
    [Show full text]
  • Prophylaxy Copie.Pdf
    Social interactions and the prophylaxis of SI epidemics on networks Géraldine Bouveret, Antoine Mandel To cite this version: Géraldine Bouveret, Antoine Mandel. Social interactions and the prophylaxis of SI epi- demics on networks. Journal of Mathematical Economics, Elsevier, 2021, 93, pp.102486. 10.1016/j.jmateco.2021.102486. halshs-03165772 HAL Id: halshs-03165772 https://halshs.archives-ouvertes.fr/halshs-03165772 Submitted on 17 Mar 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Social interactions and the prophylaxis of SI epidemics on networkssa G´eraldineBouveretb Antoine Mandel c March 17, 2021 Abstract We investigate the containment of epidemic spreading in networks from a nor- mative point of view. We consider a susceptible/infected model in which agents can invest in order to reduce the contagiousness of network links. In this setting, we study the relationships between social efficiency, individual behaviours and network structure. First, we characterise individual and socially efficient behaviour using the notions of communicability and exponential centrality. Second, we show, by computing the Price of Anarchy, that the level of inefficiency can scale up to lin- early with the number of agents.
    [Show full text]
  • Strategic Behavior in Queues
    Strategic behavior in queues Lecturer: Moshe Haviv1 Dates: 31 January – 4 February 2011 Abstract: The course will first introduce some concepts borrowed from non-cooperative game theory to the analysis of strategic behavior in queues. Among them: Nash equilibrium, socially optimal strategies, price of anarchy, evolutionarily stable strategies, avoid the crowd and follow the crowd. Various decision models will be considered. Among them: to join or not to join an M/M/1 or an M/G/1 queue, when to abandon the queue, when to arrive to a queue, and from which server to seek service (if at all). We will also look at the application of cooperative game theory concepts to queues. Among them: how to split the cost of waiting among customers and how to split the reward gained when servers pooled their resources. Program: 1. Basic concepts in strategic behavior in queues: Unobservable and observable queueing models, strategy profiles, to avoid or to follow the crowd, Nash equilibrium, evolutionarily stable strategy, social optimization, the price of anarchy. 2. Examples: to queue or not to queue, priority purchasing, retrials and abandonment, server selection. 3. Competition between servers. Examples: price war, capacity competition, discipline competition. 4. When to arrive to a queue so as to minimize waiting and tardiness costs? Examples: Poisson number of arrivals, fluid approximation. 5. Basic concepts in cooperative game theory: The Shapley value, the core, the Aumann-Shapley prices. Ex- amples: Cooperation among servers, charging customers based on the externalities they inflict on others. Bibliography: [1] M. Armony and M. Haviv, Price and delay competition between two service providers, European Journal of Operational Research 147 (2003) 32–50.
    [Show full text]
  • Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction
    Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction Renato Paes Leme Eva´ Tardos Department of Computer Science Department of Computer Science Cornell University, Ithaca, NY Cornell University, Ithaca, NY [email protected] [email protected] Abstract—The Generalized Second Price Auction has for advertisements and slots higher on the page are been the main mechanism used by search companies more valuable (clicked on by more users). The bids to auction positions for advertisements on search pages. are used to determine both the assignment of bidders In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full to slots, and the fees charged. In the simplest model, information setting, socially optimal Nash equilibria are the bidders are assigned to slots in order of bids, and known to exist (i.e., the Price of Stability is 1). This paper the fee for each click is the bid occupying the next is the first to prove bounds on the price of anarchy, and slot. This auction is called the Generalized Second Price to give any bounds in the Bayesian setting. Auction (GSP). More generally, positions and payments Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated in the Generalized Second Price Auction depend also on strategies. In the full information setting we prove a bound the click-through rates associated with the bidders, the of 1.618 for the price of anarchy for pure Nash equilibria, probability that the advertisement will get clicked on by and a bound of 4 for mixed Nash equilibria.
    [Show full text]
  • Efficiency of Mechanisms in Complex Markets
    EFFICIENCY OF MECHANISMS IN COMPLEX MARKETS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Vasileios Syrgkanis August 2014 ⃝c 2014 Vasileios Syrgkanis ALL RIGHTS RESERVED EFFICIENCY OF MECHANISMS IN COMPLEX MARKETS Vasileios Syrgkanis, Ph.D. Cornell University 2014 We provide a unifying theory for the analysis and design of efficient simple mechanisms for allocating resources to strategic players, with guaranteed good properties even when players participate in many mechanisms simultaneously or sequentially and even when they use learning algorithms to identify how to play and have incomplete information about the parameters of the game. These properties are essential in large scale markets, such as electronic marketplaces, where mechanisms rarely run in isolation and the environment is too complex to assume that the market will always converge to the classic economic equilib- rium or that the participants will have full knowledge of the competition. We propose the notion of a smooth mechanism, and show that smooth mech- anisms possess all the aforementioned desiderata in large scale markets. We fur- ther give guarantees for smooth mechanisms even when players have budget constraints on their payments. We provide several examples of smooth mech- anisms and show that many simple mechanisms used in practice are smooth (such as formats of position auctions, uniform price auctions, proportional bandwidth allocation mechanisms, greedy combinatorial auctions). We give algorithmic characterizations of which resource allocation algorithms lead to smooth mechanisms when accompanied by appropriate payment schemes and show a strong connection with greedy algorithms on matroids.
    [Show full text]
  • Intrinsic Robustness of the Price of Anarchy
    Intrinsic Robustness of the Price of Anarchy Tim Roughgarden Department of Computer Science Stanford University 353 Serra Mall, Stanford, CA 94305 [email protected] ABSTRACT ble to eliminate in many situations, with large networks be- The price of anarchy, defined as the ratio of the worst-case ing one obvious example. The past ten years have provided objective function value of a Nash equilibrium of a game and an encouraging counterpoint to this widespread equilibrium that of an optimal outcome, quantifies the inefficiency of self- inefficiency: in a number of interesting application domains, ish behavior. Remarkably good bounds on this measure have decentralized optimization by competing individuals prov- been proved in a wide range of application domains. How- ably approximates the optimal outcome. ever, such bounds are meaningful only if a game’s partici- A rigorous guarantee of this type requires a formal behav- pants successfully reach a Nash equilibrium. This drawback ioral model, in order to define“the outcome of self-interested motivates inefficiency bounds that apply more generally to behavior”. The majority of previous research studies pure- weaker notions of equilibria, such as mixed Nash equilibria, strategy Nash equilibria, defined as follows. Each player i correlated equilibria, or to sequences of outcomes generated selects a strategy si from a set Si (like a path in a network). by natural experimentation strategies, such as simultaneous The cost Ci(s) incurred by a player i in a game is a function regret-minimization. of the entire vector s of players’ chosen strategies, which We prove a general and fundamental connection between is called a strategy profile or an outcome.
    [Show full text]
  • A Game-Theoretic Model of Attention in Social Networks
    A Game-theoretic Model of Attention in Social Networks Ashish Goel ⇤ Farnaz Ronaghi † March 25, 2012 Abstract We model the economics of producing content in online social networks such as Facebook and Twitter. We propose a game-theoretic model within which we quantify inefficiencies from contributions by strategic users in online environments. Attention and information are assumed to be the main motivation for user contributions. We treat attention as a mechanism for sharing the profit from consuming information and introduce a general framework for analyzing dynamics of contributions in online environments. We analyze the proposed model and identify conditions for existence and efficient computation of pure-strategy Nash equilibrium. We prove a bicriteria bound on the price of anarchy; in particular we show that the social welfare from central control over level of contribution by users is no larger than the social welfare from strategic agents with twice as large consumption utilities. We then construct and analyze a family of production games that have an arbitrarily large price of anarchy. We also prove non- robustness of the price of anarchy for a particular instance of the introduced family, establishing a distinction between the games studied here and network congestion games. 1 Introduction Social networking websites allow users to sign up and keep in touch with others by friending them. Users are allowed to post short status updates, photos, videos and links depending on the social network. Despite the di↵erences between these networks, one feature is common to many of them: Users see a linear news feed reflecting a chronologically sorted ordering of posts from friends whenever she logs into each of these sites [BCK+10].
    [Show full text]
  • Congestion Games with Multisets of Resources and Applications in Synthesis
    Congestion Games with Multisets of Resources and Applications in Synthesis Guy Avni1, Orna Kupferman1, and Tami Tamir2 1 School of Computer Science and Engineering, The Hebrew University, Jerusalem, Israel 2 School of Computer Science, The Interdisciplinary Center, Israel Abstract In classical congestion games, players’ strategies are subsets of resources. We introduce and study multiset congestion games, where players’ strategies are multisets of resources. Thus, in each strategy a player may need to use each resource a different number of times, and his cost for using the resource depends on the load that he and the other players generate on the resource. Beyond the theoretical interest in examining the effect of a repeated use of resources, our study enables better understanding of non-cooperative systems and environments whose behavior is not covered by previously studied models. Indeed, congestion games with multiset-strategies arise, for example, in production planing and network formation with tasks that are more involved than reachability. We study in detail the application of synthesis from component libraries: different users synthesize systems by gluing together components from a component library. A component may be used in several systems and may be used several times in a system. The performance of a component and hence the system’s quality depends on the load on it. Our results reveal how the richer setting of multisets congestion games affects the stability and equilibrium efficiency compared to standard congestion games. In particular, while we present very simple instances with no pure Nash equilibrium and prove tighter and simpler lower bounds for equilibrium inefficiency, we are also able to show that some of the positive results known for affine and weighted congestion games apply to the richer setting of multisets.
    [Show full text]
  • Learning Graphical Games from Behavioral Data: Sufficient and Necessary Conditions
    Learning Graphical Games from Behavioral Data: Sufficient and Necessary Conditions Asish Ghoshal Jean Honorio [email protected] [email protected] Department of Computer Science, Purdue University, West Lafayette, IN, U.S.A. - 47907. Abstract identified, from congressional voting records, the most influential senators in the U.S. congress — a small In this paper we obtain sufficient and neces- set of senators whose collective behavior forces every sary conditions on the number of samples re- other senator to a unique choice of vote. Irfan and quired for exact recovery of the pure-strategy Ortiz [4] also observed that the most influential sena- Nash equilibria (PSNE) set of a graphical tors were strikingly similar to the gang-of-six senators, game from noisy observations of joint actions. formed during the national debt ceiling negotiations of We consider sparse linear influence games — 2011. Further, using graphical games, Honorio and Or- a parametric class of graphical games with tiz [6] showed that Obama’s influence on Republicans linear payoffs, and represented by directed increased in the last sessions before candidacy, while graphs of n nodes (players) and in-degree of McCain’s influence on Republicans decreased. at most k.Weshowthatonecanefficiently The problems in algorithmic game theory described recover the PSNE set of a linear influence above, i.e., computing the Nash equilibria, comput- game with k2 log n samples, under very O ing the price of anarchy or finding the most influ- general observation models. On the other ential agents, require a known graphical game which hand, we show that ⌦(k log n) samples are is not available apriori in real-world settings.
    [Show full text]
  • Closing the Price of Anarchy Gap in the Interdependent Security Game
    Closing the Price of Anarchy Gap in the Interdependent Security Game Parinaz Naghizadeh and Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, Michigan, 48109-2122 Email: {naghizad, mingyan}@umich.edu Abstract—The reliability and security of a user in an intercon- these papers, under-investment in security is verified by finding nected system depends on all users’ collective effort in security. the levels of effort exerted in a Nash equilibrium of the IDS Consequently, investments in security technologies by strategic game, and comparing them with the socially optimal levels of users is typically modeled as a public good problem, known as the Interdependent Security (IDS) game. The equilibria for such investment. games are often inefficient, as selfish users free-ride on positive The increasing number of unprotected devices connected to externalities of others’ contributions. In this paper, we present a the Internet, the constant emergence of new security threats, mechanism that implements the socially optimal equilibrium in and the insufficiency of improved security technologies in an IDS game through a message exchange process, in which users compensating for the under-investment problem [7], motivates submit proposals about the security investment and tax/price profiles of one another. This mechanism is different from existing the study of mechanisms for improving network security. solutions in that (1) it results in socially optimal levels of Several methods for increasing users’ investments, and thus the investment, closing the Price of Anarchy gap in the IDS game, (2) reliability of the interconnected system, have been proposed in it is applicable to a general model of user interdependencies.
    [Show full text]
  • A Revisionist History of Algorithmic Game Theory
    A Revisionist History of Algorithmic Game Theory Moshe Y. Vardi Rice University Theoretical Computer Science: Vols. A and B van Leeuwen, 1990: Handbook of Theoretical Computer Science Volume A: algorithms and complexity • Volume B: formal models and semantics (“logic”) • E.W. Dijkstra, EWD Note 611: “On the fact that the Atlantic Ocean has two sides” North-American TCS (FOCS&STOC): Volume A. • European TCS (ICALP): Volumes A&B • A Key Theme in FOCS/STOC: Algorithmic Game Theory – algorithm design for strategic environments 1 Birth of AGT: The ”Official” Version NEW YORK, May 16, 2012 – ACM’s Special Interest Group on Algorithms and Computation Theory (SIGACT) together with the European Association for Theoretical Computer Science (EATCS) will recognize three groups of researchers for their contributions to understanding how selfish behavior by users and service providers impacts the behavior of the Internet and other complex computational systems. The papers were presented by Elias Koutsoupias and Christos Papadimitriou, Tim Roughgarden and Eva Tardos, and Noam Nisan and Amir Ronen. They will receive the 2012 Godel¨ Prize, sponsored jointly by SIGACT and EATCS for outstanding papers in theoretical computer science at the International Colloquium on Automata, Languages and Programming (ICALP), July 9–13, in Warwick, UK. 2 Three seminal papers Koutsoupias&Papadimitriou, STACS 1999: Worst- • case Equilibira – introduced the “price of anarchy” concept, a measure of the extent to which competition approximates cooperation, quantifying how much utility is lost due to selfish behaviors on the Internet, which operates without a system designer or monitor striving to achieve the “social optimum.” Roughgarden & Tardos, FOCS 2000: How Bad is • Selfish Routing? – studied the power and depth of the “price of anarchy” concept as it applies to routing traffic in large-scale communications networks to optimize the performance of a congested network.
    [Show full text]