Algorithmic Game Theory
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Potential Games. Congestion Games. Price of Anarchy and Price of Stability
8803 Connections between Learning, Game Theory, and Optimization Maria-Florina Balcan Lecture 13: October 5, 2010 Reading: Algorithmic Game Theory book, Chapters 17, 18 and 19. Price of Anarchy and Price of Staility We assume a (finite) game with n players, where player i's set of possible strategies is Si. We let s = (s1; : : : ; sn) denote the (joint) vector of strategies selected by players in the space S = S1 × · · · × Sn of joint actions. The game assigns utilities ui : S ! R or costs ui : S ! R to any player i at any joint action s 2 S: any player maximizes his utility ui(s) or minimizes his cost ci(s). As we recall from the introductory lectures, any finite game has a mixed Nash equilibrium (NE), but a finite game may or may not have pure Nash equilibria. Today we focus on games with pure NE. Some NE are \better" than others, which we formalize via a social objective function f : S ! R. Two classic social objectives are: P sum social welfare f(s) = i ui(s) measures social welfare { we make sure that the av- erage satisfaction of the population is high maxmin social utility f(s) = mini ui(s) measures the satisfaction of the most unsatisfied player A social objective function quantifies the efficiency of each strategy profile. We can now measure how efficient a Nash equilibrium is in a specific game. Since a game may have many NE we have at least two natural measures, corresponding to the best and the worst NE. We first define the best possible solution in a game Definition 1. -
MICROECONOMICS and POLICY ANALYSIS - U8213 Professor Rajeev H
MICROECONOMICS AND POLICY ANALYSIS - U8213 Professor Rajeev H. Dehejia Class Notes - Spring 2001 Auctions Wednesday, February 14 Reading: Handout, Thaler, Milgram There are two basic forms of auctions: Sealed bid submissions and open bids. In a sealed bid auction individuals do not know what others are bidding. Two types of Sealed Bid Auctions: 1st Price sealed bid auction: The highest bid submitted will be the winning bid. The winner pays what he/she bid. 2nd Price sealed bid auction: Everyone submits sealed bids and the winner is the one who submits the highest bid BUT the price paid by the winner is the 2nd highest bid submitted. Two types of open auctions: English auction: The bidding starts low and incrementally rises until someone is the highest bidder and no one is willing to outbid the highest bidder. Dutch auction: The price starts very high and is keeps going down until someone bids. The first person to bid wins. Why Study Auctions? 1) Auctions can be an efficient method of valuing goods. For example: rights to air waves, signals and bandwidth. The government auctioned off parts of the spectrum in anticipation of new technology. The auctions were appealing because well- structured auctions get people to reveal the true valuation of the good. The company (private entity) actually ends up paying to the government what the good is worth to them. It turned out with these auctions that the willingness to pay for a slice of the spectrum, as revealed by the auction outcome, was much higher than expected. 2) Procurement: Governments and entities want to procure goods and services at the lowest possible price (like an auction in reverse). -
Electronic Commerce (Algorithmic Game Theory) (Tentative Syllabus)
EECS 547: Electronic Commerce (Algorithmic Game Theory) (Tentative Syllabus) Lecture: Tuesday and Thursday 10:30am-Noon in 1690 BBB Section: Friday 3pm-4pm in EECS 3427 Email: [email protected] Instructor: Grant Schoenebeck Office Hours: Wednesday 3pm and by appointment; 3636 BBBB Graduate Student Instructor: Biaoshuai Tao Office Hours: 4-5pm Friday in Learning Center (between BBB and Dow in basement) Introduction: As the internet draws together strategic actors, it becomes increasingly important to understand how strategic agents interact with computational artifacts. Algorithmic game theory studies both how to models strategic agents (game theory) and how to design systems that take agent strategies into account (mechanism design). On-line auction sites (including search word auctions), cyber currencies, and crowd-sourcing are all obvious applications. However, even more exist such as designing non- monetary award systems (reputation systems, badges, leader-boards, Facebook “likes”), recommendation systems, and data-analysis when strategic agents are involved. In this particular course, we will especially focus on information elicitation mechanisms (crowd- sourcing). Description: Modeling and analysis for strategic decision environments, combining computational and economic perspectives. Essential elements of game theory, including solution concepts and equilibrium computation. Design of mechanisms for resource allocation and social choice, for example as motivated by problems in electronic commerce and social computing. Format: The two weeks will be background lectures. The next half of the class will be seminar style and will focus on crowd-sourcing, and especially information elicitation mechanisms. Each class period, the class will read a paper (or set of papers), and a pair of students will briefly present the papers and lead a class discussion. -
Putting Auction Theory to Work
Putting Auction Theory to Work Paul Milgrom With a Foreword by Evan Kwerel © 2003 “In Paul Milgrom's hands, auction theory has become the great culmination of game theory and economics of information. Here elegant mathematics meets practical applications and yields deep insights into the general theory of markets. Milgrom's book will be the definitive reference in auction theory for decades to come.” —Roger Myerson, W.C.Norby Professor of Economics, University of Chicago “Market design is one of the most exciting developments in contemporary economics and game theory, and who can resist a master class from one of the giants of the field?” —Alvin Roth, George Gund Professor of Economics and Business, Harvard University “Paul Milgrom has had an enormous influence on the most important recent application of auction theory for the same reason you will want to read this book – clarity of thought and expression.” —Evan Kwerel, Federal Communications Commission, from the Foreword For Robert Wilson Foreword to Putting Auction Theory to Work Paul Milgrom has had an enormous influence on the most important recent application of auction theory for the same reason you will want to read this book – clarity of thought and expression. In August 1993, President Clinton signed legislation granting the Federal Communications Commission the authority to auction spectrum licenses and requiring it to begin the first auction within a year. With no prior auction experience and a tight deadline, the normal bureaucratic behavior would have been to adopt a “tried and true” auction design. But in 1993 there was no tried and true method appropriate for the circumstances – multiple licenses with potentially highly interdependent values. -
Shill Bidding in English Auctions
Shill Bidding in English Auctions Wenli Wang Zoltan´ Hidvegi´ Andrew B. Whinston Decision and Information Analysis, Goizueta Business School, Emory University, Atlanta, GA, 30322 Center for Research on Electronic Commerce, Department of MSIS, The University of Texas at Austin, Austin, TX 78712 ¡ wenli [email protected] ¡ [email protected] [email protected] First version: January, 2001 Current revision: September 6, 2001 Shill bidding in English auction is the deliberate placing bids on the seller’s behalf to artificially drive up the price of his auctioned item. Shill bidding has been known to occur in auctions of high-value items like art and antiques where bidders’ valuations differ and the seller’s payoff from fraud is high. We prove that private- value English auctions with shill bidding can result in a higher expected seller profit than first and second price sealed-bid auctions. To deter shill bidding, we introduce a mechanism which makes shill bidding unprofitable. The mechanism emphasizes the role of an auctioneer who charges the seller a commission fee based on the difference between the winning bid and the seller’s reserve. Commission rates vary from market to market and are mathematically determined to guarantee the non-profitability of shill bidding. We demonstrate through examples how this mechanism works and analyze the seller’s optimal strategy. The Internet provides auctions accessible to the general pub- erature on auction theories, which currently are insufficient to lic. Anyone can easily participate in online auctions, either as guide online practices. a seller or a buyer, and the value of items sold ranges from a One of the emerging issues is shill bidding, which has become few dollars to millions. -
How Auctions Amplify House-Price Fluctuations
How Auctions Amplify House-Price Fluctuations Alina Arefeva∗ Wisconsin School of Business, University of Wisconsin-Madison Download current version at http://www.aarefeva.com/ First draft: May 29, 2015 This draft: June 12, 2019 Abstract I develop a dynamic search model of the housing market where house prices are deter- mined in auctions rather than by Nash bargaining as in the housing search model from the literature. The model with auctions generates fluctuations between booms and busts. Dur- ing the boom multiple buyers compete for one house, while in the bust buyers are choosing among several houses. The model improves on the performance of the model with Nash bargaining by producing highly volatile house prices which helps to solve the puzzle of ex- cess volatility of house prices. Higher volatility arises because of the competition between buyers with heterogeneous values. With heterogeneous valuations, the price determination becomes important for the quantitative properties of the model. With Nash bargaining, the buyer is chosen randomly among all interested buyers. Then the average of buyers' house values determines the house price. In the auction model, the buyer is chosen by the maximum bid among all interested buyers, so the highest value determines the house prices. During the boom, the highest values increase more than the average values, making the sales price more volatile. This high volatility is constrained efficient since the equilibrium in the model decentralizes the solution of the social planner problem, constrained by the search frictions. Keywords: housing, real estate, volatility, search and matching, pricing, liquidity, Nash bargaining, auctions, bidding wars JEL codes: E30, C78, D44, R21, E44, R31, D83 ∗I am grateful for the support and guidance of my advisors Robert Hall, Monika Piazzesi, Pablo Kurlat. -
Game Theory 2021
More Mechanism Design Game Theory 2021 Game Theory 2021 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 More Mechanism Design Game Theory 2021 Plan for Today In this second lecture on mechanism design we are going to generalise beyond the basic scenario of auctions|as much as we can manage: • Revelation Principle: can focus on direct-revelation mechanisms • formal model of direct-revelation mechanisms with money • incentive compatibility of the Vickrey-Clarke-Groves mechanism • other properties of VCG for special case of combinatorial auctions • impossibility of achieving incentive compatibility more generally Much of this is also (somewhat differently) covered by Nisan (2007). N. Nisan. Introduction to Mechanism Design (for Computer Scientists). In N. Nisan et al. (eds.), Algorithmic Game Theory. Cambridge University Press, 2007. Ulle Endriss 2 More Mechanism Design Game Theory 2021 Reminder Last time we saw four auction mechanisms for selling a single item: English, Dutch, first-price sealed-bid, Vickrey. The Vickrey auction was particularly interesting: • each bidder submits a bid in a sealed envelope • the bidder with the highest bid wins, but pays the price of the second highest bid (unless it's below the reservation price) It is a direct-revelation mechanism (unlike English and Dutch auctions) and it is incentive-compatible, i.e., truth-telling is a dominant strategy (unlike for Dutch and FPSB auctions). Ulle Endriss 3 More Mechanism Design Game Theory 2021 The Revelation Principle Revelation Principle: Any outcome that is implementable in dominant strategies via some mechanism can also be implemented by means of a direct-revelation mechanism making truth-telling a dominant strategy. -
Umi-Umd-1475.Pdf (1.983Mb)
ABSTRACT Title of Dissertation / Thesis: PERFORMANCE AND ANALYSIS OF SPOT TRUCK -LOAD PROCUREMENT MARKETS USING SEQUENTIAL AUCTIONS Miguel Andres Figliozzi, Ph.D., 2004 Dissertation / Thesis Directed By: Professor Hani Mahmassani, Civil and Env ironmental Engineering Department Competition in a transportation marketplace is studied under different supply/demand conditions, auction formats, and carriers’ behavioral assumptions. Carriers compete in a spot truck -load procurement market (TLPM) using sequential auctions. Carrier participation in a TLPM requires the ongoing solution of two distinct problems: profit maximization problem (chose best bid) and fleet management problem (best fleet assignment to serve acquired shipments). Sequential aucti ons are used to model an ongoing transportation market, where carrier competition is used to study carriers’ dynamic vehicle routing technologies and decision making processes. Given the complexity of the bidding/fleet management problem, carriers can tack le it with different levels of sophistication. Carriers’ decision making processes and rationality/bounded rationality assumptions are analyzed. A framework to study carrier behavior in TL sequential auctions is presented. Carriers’ behavior is analyzed as a function of fleet management technology, auction format, carrier bounded rationality, market settings, and decision making complexity. The effects of fleet management technology asymmetries on a competitive marketplace are studied. A methodology to com pare dynamic fleet management technologies -
Ascending Auctions with Package Bidding
Frontiers of Theoretical Economics Volume 1, Issue 1 2002 Article 1 Ascending Auctions with Package Bidding Lawrence M. Ausubel∗ Paul R. Milgrom† ∗University of Maryland, [email protected] †Stanford University, [email protected] Copyright c 2002 by the authors. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, elec- tronic, mechanical, photocopying, recording, or otherwise, without the prior written permis- sion of the publisher, bepress, which has been given certain exclusive rights by the author. Frontiers of Theoretical Economics is produced by The Berkeley Electronic Press (bepress). http://www.bepress.com/bejte Ascending Auctions with Package Bidding Lawrence M. Ausubel and Paul R. Milgrom Abstract A family of ascending package auction models is introduced in which bidders may determine their own packages on which to bid. In the proxy auction (revelation game) versions, the outcome is a point in the core of the exchange economy for the reported preferences. When payoffs are linear in money and goods are substitutes, sincere reporting constitutes a Nash equilibrium and the outcome coincides with the Vickrey auction outcome. Even when goods are not substitutes, ascending proxy auction equilibria lie in the core with respect to the true preferences. Compared to the Vickrey auction, the proxy auctions generate higher equilibrium revenues, are less vulnerable to shill bidding and collusion, can handle budget constraints much more robustly, and may provide better ex ante investment incentives. KEYWORDS: auction theory, FCC auctions, package bidding, combinatorial bidding, activity rule, bid Improvement rule, e-commerce, electronic commerce Ausubel and Milgrom: Ascending Package Auctions 1. -
Auctions & Competitive Bidding
Auctions & Competitive Bidding When planned and executed appropriately, auctions and other competitive market mechanisms can achieve important objectives in selling or acquiring products, assets, resources, rights, and obligations. However, expertise, experience, and reputation are needed to ensure success. For two decades, CRA has designed, conducted, and monitored high-stakes auctions and other competitive transaction mechanisms in many industries and in more than a dozen countries. Our consultants also have helped clients participate successfully in auctions. Whether you want to maximize the value of your assets, minimize your procurement costs, or achieve other objectives, you’ll find the expertise, experience, reputation, and support you need at CRA. Full range of services software such as our Auction Management System (AMS), CRA provides a complete range of services to ensure success. demos, mock auctions, training, and hosting services for auctions We combine theory, market analysis, business principles, and and other trading events. We use our multilingual capabilities practical experience tailored to industry realities in developing and experience to conduct trading events in several languages. and implementing strategies and market mechanisms that best CRA has designed and managed more than 150 successful meet clients’ objectives. We achieve lower information and trading events with transaction values ranging from hundreds transaction costs, improved market information, increased of thousands to billions of dollars. value, lower costs, and improved price realizations that benefit sellers and buyers. This enhances seller-buyer relationships and Auction software, trading platforms, and hosting enables market participants to make better business decisions, CRA develops and customizes software applications, systems, invest their resources and assets more profitably, and manage trading platforms, and tools used to manage auctions and their risks better. -
Introduction to Auctions Protocols Revenue and Optimal Auctions Common Value Auctions
Auctions Kate Larson Introduction Auction Protocols Common Auction Introduction to Auctions Protocols Revenue and Optimal Auctions Common Value Auctions Vulnerabilities Kate Larson in Auctions Beyond Single Cheriton School of Computer Science Item Auctions University of Waterloo Summary Outline Auctions Kate Larson 1 Introduction Introduction Auction Protocols 2 Auction Protocols Common Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Revenue and Optimal Auctions Auctions Common Value Auctions Vulnerabilities in Auctions Beyond Single 3 Vulnerabilities in Auctions Item Auctions Summary 4 Beyond Single Item Auctions 5 Summary Auctions Auctions Kate Larson Methods for allocating goods, tasks, resources,... Introduction Participants Auction auctioneer Protocols Common Auction bidders Protocols Revenue and Optimal Auctions Enforced agreement between auctioneer and the Common Value Auctions winning bidder(s) Vulnerabilities in Auctions Easily implementable (e.g. over the Internet) Beyond Single Conventions Item Auctions Summary Auction: one seller and multiple buyers Reverse auction: one buyer and multiple sellers Todays lecture will discuss the theory in the context of auctions, but this applies to reverce auctions as well (at least in 1-item settings). Auction Settings Auctions Kate Larson Introduction Private value: the value of the good depends only on Auction the agent’s own preferences Protocols e.g a cake that is not resold of showed off Common Auction Protocols Revenue and Common value: an agent’s value of an item is Optimal Auctions Common Value determined entirely by others’ values (valuation of the Auctions item is identical for all agents) Vulnerabilities in Auctions e.g. treasury bills Beyond Single Item Auctions Correlated value (interdependent value): agent’s Summary value for an item dpends partly on its own preferences and partly on others’ value for it e.g. -
Sok: Tools for Game Theoretic Models of Security for Cryptocurrencies
SoK: Tools for Game Theoretic Models of Security for Cryptocurrencies Sarah Azouvi Alexander Hicks Protocol Labs University College London University College London Abstract form of mining rewards, suggesting that they could be prop- erly aligned and avoid traditional failures. Unfortunately, Cryptocurrencies have garnered much attention in recent many attacks related to incentives have nonetheless been years, both from the academic community and industry. One found for many cryptocurrencies [45, 46, 103], due to the interesting aspect of cryptocurrencies is their explicit consid- use of lacking models. While many papers aim to consider eration of incentives at the protocol level, which has motivated both standard security and game theoretic guarantees, the vast a large body of work, yet many open problems still exist and majority end up considering them separately despite their current systems rarely deal with incentive related problems relation in practice. well. This issue arises due to the gap between Cryptography Here, we consider the ways in which models in Cryptog- and Distributed Systems security, which deals with traditional raphy and Distributed Systems (DS) can explicitly consider security problems that ignore the explicit consideration of in- game theoretic properties and incorporated into a system, centives, and Game Theory, which deals best with situations looking at requirements based on existing cryptocurrencies. involving incentives. With this work, we offer a systemati- zation of the work that relates to this problem, considering papers that blend Game Theory with Cryptography or Dis- Methodology tributed systems. This gives an overview of the available tools, and we look at their (potential) use in practice, in the context As we are covering a topic that incorporates many different of existing blockchain based systems that have been proposed fields coming up with an extensive list of papers would have or implemented.