AAE Example, 466–467, 476 Aborting Games, 188, 190 Adaptive Behavior, 81 Adaptive Limited-Supply Auction, 424–427 Adoption A

AAE Example, 466–467, 476 Aborting Games, 188, 190 Adaptive Behavior, 81 Adaptive Limited-Supply Auction, 424–427 Adoption A

P1: SBT 9780521872829main CUNY1061-Nisan 0 521 87282 0 July 17, 2007 18:55 Index AAE example, 466–467, 476 single-dimensional domains, 303–310 aborting games, 188, 190 submodularity, 623–624 adaptive behavior, 81 theorems, 305, 307, 309, 315, 318, 324 adaptive limited-supply auction, 424–427 Arrow–Debreu market model, 103, 104, adoption as coordination problem, 636 121–122, 136 adverse selection, 677 Arrow’s theorem, 212–213, 239 advertisements. See sponsored search auctions artificial equilibrium, 61 affiliate search engines, 712 ascending auctions, 289–294 affine maximizer, 228, 317, 320 ascending price auction, 126 affinely independent, 57 assortative assignment, 704 agents. See players asymmetries in information security, 636–639 aggregation of preferences. See mechanism atomic bids, 280, 282 design atomic selfish routing, 461, 465–468, 470–472, aggregation problem, 651–655 475–477, 482–483 algorithmic mechanism design. See also atomic splittable model, 483 mechanism design; distributed algorithmic attribute auction, 344 mechanism design auctions allocation in combinatorial auction, 268, adaptive, limited-supply, 424–427 270–272 ascending, 289–294 AMD. See algorithmic mechanism design bidding languages, 279–283 “AND” technology, 603–606 call market, 654–655 announcement strategies, 685–686 combinatorial. See combinatorial auctions anonymous games, 40 competitive framework, 344–345 anonymous rules, 247, 250 convergence rates, 342–344 approximate core, 389–391 deterministic optimal price, 340 approximate equilibria, 45, 138, 143, 167 digital goods, 332, 338, 340, 345–346 ApproximateTreeNash, 166–168, 176 dynamic, with expiring items, 412, 420–424 approximation mechanisms, computationally examples in mechanism design, 209–210, efficient 220–221 alternative solution concepts, 321–327 first price (Bayesian analysis), 20, 234–236 dominant strategy, impossibilities of, frugality, 350–354 317–320 iterative, 283–287 history, 327 known single-minded combinatorial, 418 multidimensional domains, 310–317 lower bounds, 346–347 overview, 301–303 profit maximization, 331–332, 336 737 P1: SBT 9780521872829main CUNY1061-Nisan 0 521 87282 0 July 17, 2007 18:55 738 index auctions (cont.) single-value, 322 random sampling optimal price (RSOP) sponsored search auctions. See sponsored auction, 341–342 search auctions random sampling profit extraction, 348–349 bidding languages, 279–283, 295, 310 single-item, 332, 337 bilateral network formation game, 507 sponsored search auctions. See sponsored bilateral trade, 220–221 search auctions bimatrix game, 30, 54–57, 62, 152 symmetric, 340 binding inequality, 57–59 truthful combinatorial, 316–317 BitTorrent, 570, 589, 596, 600–601 Vickrey auction. See Vickrey auction blocking coalition, 253–255 automated market makers, 662–665, 670 blocking pair, 255, 256, 507 autonomous systems (ASes), 364–365, blogs, 622, 627, 630 370–371, 373–379, 487, 507 BNIC. See Bayes-Nash incentive-compatible axiomatic method, 404 Bondareva–Shapley theorem, 388, 389, 391, 407 backward induction, 69 Boolean circuit, 41, 43 balanced flow, 111–116, 119 Boolean events, 658, 661 balls into bins problem, 451–452, 530 Boolean market model, 666, 668 bandwidth-sharing game, 6–7, 452–455, 587, bootstrapping problems, 636, 647, 689 588 Borda count, 211 banking and security, 634, 647 Border Gateway Protocol (BGP), 372, 374, 376, barter-based system, 600–601 378–379, 381 basis matrix, 65 bounded communication, 356 battle of the sexes game, 7, 12 Braess’s Paradox, 464–465, 475, 481 Bayes’ rule, 667 Brandes’ algorithm, 645 Bayesian first price auction, 20 brittle and nonbrittle comparators, 43 Bayesian-Nash implementation, 233–237, 416, broadcast and secure channels, 185, 201 431–436 Brouwer’s fixpoint theorem, 32, 41–43 Bayesian network structured market, 662 budget balanced, 22, 392, 393, 501 Bayesian optimal mechanism design, 333, budget constraints. See sponsored search 335–338, 357 auctions behavior strategy, 67 bundle-price ascending auctions, 292–295 sequence form, 71 bundles of items. See combinatorial auctions best response bundling, 356 in graphical games, 162 and learning in games, 18 call market auction, 654–655 max-weight best response policy, 524 capacity augmentation, 479–480 and Nash equilibrium, 30–31, 54, 497 capacity investments, 590 in peer-to-peer networks, 605 Cascade Model, 620–621, 624–625 polyhedron, 57–59 cascading behavior in networks for identical machines, 522–524 contagion threshold, 615–616 in reputation systems, 686 finding influential sets of nodes, 622–627 in strict incomplete information games, general social contagion, 618–622 223 history, 630–631 best response polyhedron, 57 networked coordination games, 614–618 BGP. See Border Gateway Protocol (BGP) online data empirical studies, 627–630 bid format and price formation, 666–667 overview, 613–614 bid vector, 453–454 theorems, 617, 618, 624–626 bidders CE. See correlated equilibrium bidding languages, 279–283 cell structure, 644–645 in combinatorial auctions, 267–268 censorship resistance, 640–643 exposure problem, 292 centrality attacks, 645 iterative auctions (query model), 283–287 CEPE auction. See consensus estimate profit single-minded, 270–275, 295, 323–324, 332 extraction (CEPE) auction P1: SBT 9780521872829main CUNY1061-Nisan 0 521 87282 0 July 17, 2007 18:55 index 739 CES. See constant elasticity of substitution oligopoly pricing and equilibrium, 582–583 (CES) overview, 571–572 cheap pseudonyms, 597, 679, 683 pricing and efficiency with congestion “cheap talk” preamble phase, 188 externalities, 579–582 Chernoff bound, 532, 533–535 pricing and resource allocation theoretic chicken game, 45–46 models, 578–579, 584–587 churn, 594 theorems, 584, 585 Clarke pivot rule, 219–221, 561 compact prediction markets, 661–662 clearing prices. See market clearing prices competitive analysis, 344–345, 351, 352–354, click through rate (CTR), 701–704, 707, 712 413, 417, 421 clique strategy, 644–646, 721–722 competitive auctions, 345–349, 355 coalition game. See cooperative game theory competitive digital goods auction, 345–346 coalition-proof equilibrium, 192 competitive equilibrium coalitions of agents, 250, See also collusions definition, 292 coarsest common refinement, 653 large communications networks, 572–578 Cobb-Douglas functions, 139, 143, 146, 155 price takers, 546–547 collective utility function, 405 smooth market-clearing mechanism, 552 collusion-proof ex-post Nash equilibria, 376 social welfare, 293 collusions, 189, 191, 199, 356, 597 competitive ratio, 345–348, 354, 357, 358, 422, combinatorial auctions 425 alternative solution concepts, 321–327 complementary slackness, 74 applications of, 269–270 complementary slackness conditions, 104, 109 ascending auctions, 289–294 complements vs. substitutes, 268, 290, 292 bidding languages, 279–283 complete information models, 239 communication complexity, 287–289 completely labeled, 58, 59, 61–63, 66 computationally efficient mechanisms. See complex networks and topology, 643–646 approximation mechanisms compound prediction markets, 659–661 definitions and problem, 267–269 computational aspects of prediction markets. history, 295–296 See prediction markets iterative auctions (query model), 283–287 computational evolutionary game theory linear programming relaxation, 275–277 classical evolutionary model, 718–720 multidimensional domains, 310–317 computational complexity of evolutionarily single-minded case, 270–275, 332, 418 stable strategies, 720–723 theorems, 273, 277, 278, 282, 285, 288, 289, evolutionary dynamics applied to selfish 291, 294 routing, 723–728 truthful, 316–317 future research, 733 Walrasian equilibrium, 277–279 graphs, 728–733 combinatorial prediction markets, 657–662, history, 733–734 670 overview, 717–718 combined value trading, 658, 672 theorems, 719, 723, 727, 731 combining expert advice. See external regret computational indistinguishability, 185 Internet routing, 376–379 computational manipulation example, 366–367 commitment types, 682 computationally efficient mechanisms. See common value model, 238 approximation mechanisms communication complexity in combinatorial computer science and game theory, 363–364 auctions, 287–289, 295 computer science vs. economics, 301–303 communications networks concave games. See submodular games alternative pricing and incentive approaches, conditional equilibrium, 164, 176 587–590 conditional securities, 659 efficiency analysis, 583–584 Condorcet’s paradox, 211 future research, 589–590 congestion control algorithm, 576–577 large networks (competitive models), congestion games, 41, 463, 482, 497–498, 572–578 579–582 monopoly pricing and equilibrium, 582 consensus, 349–350 P1: SBT 9780521872829main CUNY1061-Nisan 0 521 87282 0 July 17, 2007 18:55 740 index consensus estimates, 356 Markov networks, 170–174 consensus estimate profit extraction (CEPE) mediators, removing, 192–195 auction, 350 vs. Nash equilibria, 47–48 constant elasticity of substitution (CES), 139, overview, 14–16, 45–47 149–151, 155 regret minimization, 88–92 constant sum games, 89–90 in succinct games, 48–49 constraint satisfaction programming (CSP), 169 and swap regret minimization, 90–91 consumer demand and constant elasticity of cost benchmark, 352 substitution, 149–150 cost function, 462, 663–665 consumer sovereignty (CS), 392 cost matrix, 4, 5, 8 consumer surplus, 580 cost-sharing contact process, 630 and cooperative games, 385–387 contagion threshold, 615–618, 620 core, 387–391 contingent claims/contracts. See prediction facility location game, 397–402 markets and fair division, 21–22, 347 continuous

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us