TEred \addauthorICblue \addauthorAVorange \addauthorAEmagenta
Plant-and-Steal: Truthful Fair Allocations via Predictions††thanks: The work of I.R. Cohen was supported in part by ISF grant 1737/21. The work of A. Eden was supported by the Israel Science Foundation (grant No. 533/23). The work of A. Vasilyan was done while visiting Bar-Ilan university as a part of the MISTI-Israel program, supported by the Zuckerman Institute.
Abstract
We study truthful mechanisms for approximating the Maximin-Share (MMS) allocation of agents with additive valuations for indivisible goods. Algorithmically, constant factor approximations exist for the problem for any number of agents. When adding incentives to the mix, a jarring result by Amanatidis, Birmpas, Christodoulou, and Markakis [EC 2017] shows that the best possible approximation for two agents and items is . We adopt a learning-augmented framework to investigate what is possible when some prediction on the input is given. For two agents, we give a truthful mechanism that takes agents’ ordering over items as prediction. When the prediction is accurate, we give a -approximation to the MMS (consistency), and when the prediction is off, we still get an -approximation to the MMS (robustness). We further show that the mechanism’s performance degrades gracefully in the number of “mistakes” in the prediction; i.e., we interpolate (up to constant factors) between the two extremes: when there are no mistakes, and when there is a maximum number of mistakes. We also show an impossibility result on the obtainable consistency for mechanisms with finite robustness. For the general case of agents, we give a 2-approximation mechanism for accurate predictions, with relaxed fallback guarantees. Finally, we give experimental results which illustrate when different components of our framework, made to insure consistency and robustness, come into play.
1 Introduction
Allocating items among self interested agents in a “fair” way is an age-old problem, with many applications such as splitting inheritance and allocating courses to students. As a starting point, consider the case of two agents. When the items are divisible, the famous cut-and-choose procedure achieves fairness in two senses. Firstly, no agent wants to switch their allocation with the other; i.e., there is no envy among the agents. Secondly, each agent gets a bundle of items which they value at least as much as their value for all the items divided by 2; that is, each one gets their “fair share”. When moving to the case of indivisible goods, which is relevant to scenarios such as splitting inheritance and allocating courses, things get trickier. For instance, if there’s a single item, the agent that does not receive that item does not get an envy-free allocation, nor do they get their “fair share” according to the previous definitions. Therefore, it is clear that some fairness needs to be sacrificed in this case.
The study of fair allocations with indivisible goods has been a fruitful research direction, with many meaningful notions of fairness studied (see survey by Amanatidis et al. [10]). In this paper, we focus on the notion of the Maximin Share, or MMS, introduced by Budish [18]. For two agents, this notion captures the value an agent will ensure if we implement the cut-and-choose procedure. That is, assume Alice splits the items into two bundles, and then Bob takes one of them (adversarially), and Alice gets the second one. The MMS captures exactly how much value Alice can guarantee for herself. Generalizing the notion for agents is pretty straightforward — the MMS is the minimum value Alice can guarantee for herself when she partitions the items into bundles, assuming bundles are taken adversarially.
We study the case where agents have additive valuations over goods.111Agent with an additive valuation has a value for every item, and their value for bundle is . For the case of two agents, the allocation produced by the cut-and-choose procedure guarantees each of the agents their MMS value. For more than two agents, the existence of such an allocation is not longer guaranteed. Indeed, Kurokawa et al. [30] show an instance of three agents, where in every allocation, at least one of the agents does not get their MMS value. Since allocating all the agents their MMS value is not always feasible, various papers studied the existence of approximately optimal allocation. An allocation is an -approximate MMS allocation for if every agents gets at least an fraction of their MMS value. Feige et al. [22] introduce an instance where one cannot find an -approximate allocation for . On the other hand, [30] show there always exists -approximation. The factor was gradually improved [16, 24, 23, 8, 4, 3, 5], where the state-of-the-art algorithm achieves an approximation of [3]. It is worth noting that simple variants of Round-Robin and water-filling algorithms already achieve -approximation. When adding incentives to the mix, matters become even more complicated.
Amanatidis et al. [7] study the case of two additive agents and items, where the algorithm (or mechanism) does not know the values of the agents. Thus, the algorithm’s designer is faced with the task of devising an allocation rule such that (i) agents will maximize their allocated value by bidding truthfully, and (ii) the resulting allocation is an -approximate MMS allocation for an as close to 1 as possible. [7] show that the cost of dealing with self-interested agents might be dire. Namely, they show that no incentive-compatible algorithm can approximate the MMS to a factor better than , and this is matched by the following trivial mechanism — first agent picks their favorite item, and the second agent gets the rest. We note that although allocating each agent all items with probability gives each agent an expected value which is at least as large as their MMS, this solution is not deemed fair, as one agent might end up with no items at all, while their counterpart will receive all items. Thus, the fair division literature mainly considers ex-post guarantees.
For ,222For , the MMS of each agent is trivially 0. The problem becomes more interesting for a trivial truthful algorithm that lets the first agents pick a single item in some order and gives the last agent the rest achieves an -approximation, and no better mechanism is known. It is conjectured that one cannot drop the dependence in for . We are left with a stark disparity. On the one hand, assuming agents values are public information, good approximate solutions are known. On the other hand, when considering private values, it seems that only trivial approximations are possible. The goal of this paper is to bridge these two regimes using predictions.
We study the problem of truthful allocations that approximate the MMS, taking a learning-augmented point of view. In the learning-augmented framework, the algorithm designer aims to tackle some intrinsic hardness of the problem at hand, which might arise due to computational constraints, space constraints, input arriving piecemeal online, or incentive constraints, among others. To help the designer overcome these constraints, the algorithm is given some side information which is a function of the input, or a prediction, in order to improve the algorithm’s performance. The hope is that if the prediction is accurate, then the performance is greatly improved over the performance without the prediction (termed consistency). On the other end, if the prediction is inaccurate then the performance of the algorithm is comparable to the performance of the best algorithm that is not given access to predictions (termed robustness). The learning-augmented framework has proven useful in bypassing impossibilities that arise due to incentive issues [14, 1, 25, 15, 39, 32, 13].
When designing a learning-augmented mechanism, one should think of realistic predictions. For instance, predicting the entire valuation profile of all agents seems to be a strong assumption. A more plausible assumption is to have some ordinal ranking over the items of the agents. Indeed, it seems unlikely that the algorithm can accurately predict Alice’s value for a car, but it is plausible that the algorithm can guess that Alice values the car more than she values the table. Ideally, the algorithm’s performance should remain robust if the predicted ordering is almost perfect, with only a few pairs of items whose real ordering is swapped in the prediction. Another desired property is to make the prediction as space-efficient as possible, following the intuition that smaller predictions are easier to observe. In this paper we devise learning-augmented truthful mechanisms for the problem of approximate-MMS allocations, while taking into considerations the issues mentioned above.
1.1 Our Results and Techniques
We start by studying the two agent case. Recall that in the two agent case, [7] show that no truthful mechanism gets a better approximation than to the MMS. We aim at getting:
-
1.
Constant consistency: when the predictions are accurate, we want to get a constant approximation to the MMS.
-
2.
Near-optimal robustness: when the predictions are off, we want to get as close as possible to the optimal -approximation we can obtain by truthful mechanisms.
Plant-and-Steal Framework.
In Section 3 we present a framework for devising learning-augmented mechanisms for approximating the MMS with two agents. The intuition behind the framework is as follows — in order to get better approximation guarantees, one must use the predictions in order to get a good allocation. But in case the predictions are off, only using the predictions cannot guarantee any finite approximation to the MMS. Therefore, in case the predictions are off, we must use the reports to ensure each agent gets at least one valuable item. In doing so, the mechanism should still maintains a nearly optimal allocation according to the predictions.
Our framework, which we term Plant-and-Steal is given the set of goods, an allocation procedure , the prediction and reports . The framework operates as follows:
-
1.
It first applies on the predictions to divide the set of goods into two bundles . The procedure should be an allocation procedure with good MMS guarantees. We use different allocation procedures depending on the type of prediction given and on the consistency-robustness tradeoffs we are aiming for.
-
2.
Planting phase: For each agent , it picks ’s favorite item in set according to prediction, and “plants” this item in the bundle of the other agent . Let denote the sets that result in this planting phase.
-
3.
Stealing phase: To obtain the final allocation, each agent now “steals” back their favorite item from set of agent according to reports. Notice this is the first and only place where we use agents’ reports.
This procedure is trivially truthful because the only step where we use agents’ reports is the one where they pick exactly one item to steal back from , and this only depends on predictions, and not reports (Lemma 3.1). To obtain robustness, we notice that each agent gets one of their two favorite items according to their true valuations (Lemma 3.2). This implies a robustness of . We show that if the allocations produced by are more balanced, we get improved robustness guarantees (Lemma 3.4).
Ordering Predictions.
In Section 4, we study learning-augmented mechanisms when the predictions given are the preference orders over items of the agents (rather than the values). In the case where the predictions are preference orders, we instantiate the Plant-and-Steal framework with a Round-Robin-based allocation procedure. [8] show that preceding the Round-Robin procedure with an initial allocation of large items (of worth greater than ) gives a 2-approximation to the MMS. We observe that in the case of two agents, one can run the Round-Robin procedure as is, without the initial allocation phase, and still obtain the 2-approximation. The gain in using the standard procedure is that the allocation is as balanced as possible. To show consistency, we notice that by the properties of the Round-Robin procedure, each agent values her favorite item more then any item in the other agent’s set , except for the other agent’s favorite item. Since is obtained by adding ’s favorite item to and removing ’s favorite item from it, in case the predictions are accurate, takes back the item the mechanism planted in , and vice-versa. Thus, we end up with the original allocation , obtaining a consistency of 2. Since each agent gets at least items, including one of their top two items, we can show that we obtain a robustness guarantee of . This almost completely matches the lower bound from [7].
Amanatidis et al. [6] study truthful mechanisms when the agents’ rankings are global. For two agents, they were able to show that slightly modifying the Round-Robin procedure, to let the second agent choose two items each time, obtains an improved approximation ratio of to the MMS. When using the modified Round-Robin as the allocation procedure in the Plant-and-Steal framework, we get an improved consistency of , but since the final allocation is less balanced, our robustness guarantee becomes .
We then study the performance of the Plant-and-Steal framework when using the Round-Robin procedure, when the prediction given is not fully accurate, but accurate to some degree. To quantify the prediction’s accuracy, we adopt the Kendall tau distance measure (or the bubble-sort distance). The Kendall tau distance counts the number of pairs of elements swapped in the two orderings. For our purpose, we consider the Kendall tau distance between the predicted preference order and the order induced by the true valuations. In order to simplify the analysis, we apply the zero-one principle. By the zero-one principle, it is enough to show that our mechanism achieves the desired approximation guarantee in instances where the values for the items are either 1’s or 0’s. We first show that for such instances, the initial allocation of the Round-Robin procedure, , achieves an additive approximation to the MMS (this is also true for the mechanisms with global rankings from [6]). This does not guarantee, however, any multiplicative approximation. Thus, we must leverage the fact that the agents get to “steal back” an item according to their true valuations. We therefore are able to show that combining the Plant-and-Steal framework with a Round-Robin allocation procedure obtains -approximation to the MMS when the Kendall tau distance between the predictions and the valuations is . Since goes from 0 to , we recover the constant consistency when there are no errors, and the robustness when the number of errors is maximal.
General Predictions.
In Section 5, we study the two-agent case where the mechanism is given access to predictions which are not necessarily the preference order of the agents. We first show that for any prediction given to the learning-augmented mechanism, no mechanism can simultaneously be -consistent while maintaining finite robustness for . For the proof, we leverage the characterization of two-agent truthful mechanisms by [7].
We then study small-space predictions. The Round-Robin-based mechanisms described above require an -bit prediction (to describe an arbitrary allocation of items). We first notice that we can implement a water-filling type allocation procedure using -bit predictions. This already achieves a constant consistency along with robustness. We then devise a more refined allocation procedure, which requires -bit predictions, and achieves consistency along with robustness.
Note that the work of [20] showed how to learn an -approximate MMS allocation in the context of the model of [31] in which the valuations are sampled i.i.d. from a distribution under a small item assumption. We remark that combining this learned allocation with our Plant-and-Steal framework immediately gives a truthful, -consistent and -robust mechanism.
General number of agents .
Finally, in Section 6, we devise a learning-augmented truthful mechanism for additive agents. We obtain a 2-consistent mechanism, while relaxing the robustness guarantees of the mechanism. We take a similar approach to the works of [18, 27, 28, 2, 5], who compete against a relaxed benchmark of the MMS value for agents, and try to minimize . We obtain a -approximation to the MMS for agents when the predictions are off. Our mechanism uses the modified Round-Robin procedure from [8] to determine the initial allocation using the predictions. It then applies a recursive plant-and-steal procedure where in each stage of the recursion, agents are partitioned into two sets. For each set of agents, the mechanism “plants” their current favorite item according to prediction in the combined bundle of items of the other set, and “steals” back an item according to her reports. In order to ensure consistency, the internal order in which each set of agents steal should be the same as their order in the corresponding Round-Robin round. In order to get our robustness guarantee, we carefully choose the order at each Round-Robin round. We then show each agent gets at least their th most preferred item according to their true valuation.
Experiments.
Finally, In Section 7, we demonstrate how several components in our design come into play when experimenting with synthetic data. We run different variants of mechanism on two player instances, and show that when predictions are accurate, then only using predictions is nearly optimal, if predictions are noisy, then the stealing component ensures robustness, and our Plant-and-Steal framework achieves best-of-both-worlds guarantees.
We summarize the known bounds for learning-augmented truthful mechanisms for MMS approximation in Table 1.
1.2 Related Works
The notion of the maximin share allocation was introduced by Budish [18] as an ordinal notion, and extended to the notion we adopt by Bouveret and Lemaître [17]. Using machine learning advice in algorithm design was used in theory [21, 37] and practice [29]. The learning-augmented framework of studying consistency-robustness tradeoffs was introduced by Lykouris and Vassilvitskii [33]. [34, 38] studied the performance of algorithms using imprecise predictions.
Fair division with incentives.
The two closest papers to ours are Amanatidis et al. [6, 7]. In [6], they initiate the study of truthful mechanisms for approximating the MMS value for agents with additive valuations. They show that no truthful mechanism can get an approximation better than for the MMS in the case of 2 agents and 4 items. They give the best known approximation guarantee for agents and items of . Finally they consider the public ranking model, where the ranking over items is public information. Using this, they are able to obtain a -approximation algorithm. One can view this as an algorithm that is given a prediction over the input, but does not provide robustness guarantees. [7] Fully characterize truthful mechanism for 2 agents with additive valuations. They use this characterization to provide a strong lower bound of for any truthful mechanism.
[12] design truthful mechanisms for dichotomous submodular valuations that maximize welfare, along with desirable fairness properties such as EFX and NSW. For additive binary valuations, they also maximize the MMS in a truthful manner. [26] bypass the impossibilities imposed by [7, 36] for truthful fair allocations with indivisible and divisible goods by considering Bayesian Incentive Compatible mechanisms with symmetric priors. They are able to obtain EF-1 allocations for indivisible goods and proportional allocations for indivisible goods.
Finally, [9] study the Nash equilibrium for simple mechanisms for agents with additive valuations. They show that for every number of agents, the Pure Nash equilibrium of the Round-Robin procedure produces an EF-1 allocation. For two agents, they show that the Pure Nash equilibrium of Plaut and Roughgarden [35] cut-and-choose procedure produces an EFX and MMS allocation.
1-out-of-.
As stated above, the MMS value of an agent is defined by the highest value an agent can guarantee for themselves when partitioning the items into different bundles, where is the number of agents, and then getting the lowest valued bundle. Thus, an agent get a value larger than the worst one-out-of- bundles that define the MMS.
Noticing that finding an allocation that satisfies the MMS value of each agent is a demanding task (which was shown to be infeasible in some cases by Kurokawa et al. [30]), Budish [18] relaxed the notion and defined the 1-out-of- MMS to be the worst bundle out of the bundles that define the MMS when partitioning the items using an additional bundle. [18] showed it is possible to achieve this benchmark when adding a small number of access goods. There has been an effort to find the smallest for which an allocation that guarantees a 1-out-of- MMS for each agent exists. [2] were able to show the existence for , [27, 28] achieved , and recently, [5] showed the smallest up-to-date . In our -agent mechanism, our robustness guarantee approximates this relaxed benchmark for .
Learning Augmented Mechanisms.
Agrawal et al. [1] and Xu and Lu [39] first explored the learning augmented framework in a mechanism design setting, where [1] studied the facility location problem while [39] applied the framework to several settings such as revenue-maximization, path auctions, scheduling and two-facility games. [14] give nearly optimal consistency-robustness tradeoffs to the strategyproof scheduling with unrelated machines. [25] use predictions to design mechanisms with improved Price of Anarchy bounds. [32, 19] study revenue maximization auctions with predictions, and [13] devise bicriteria mechanisms.
2 Preliminaries
In the setting we study, there is a set of agents and a set of indivisible items. Each agent has a private additive valuation over the items, unknown to the mechanism designer, where the value of agent for item is (also denoted as ). For a bundle of items, .
The fairness notion we focus on is the following.
Definition 2.1 (Maximin Share).
The Maximin Share (MMS) of agent with valuation and agents is
that is, if were to partition the items into bundles, and then of those bundles are taken adversarially, what is the value can guarantee for themselves. When clear from the context, we omit and use to denote the MMS of with agents.
We are interested in mechanisms that produce approximately optimal allocations, as defined next.
Definition 2.2 (-approximate MMS Allocation).
An allocation is -approximate MMS allocation for and a natural number if for every agent ,
When , we say the allocation is a -approximate MMS allocation.
We study mechanism that get some prediction on the input.
Definition 2.3 (Learning Augmented Mechanism).
A learning-augmented mechanism takes agents’ reports and predictions in some prediction space , and outputs a partition of the items
where agent gets .
For learning-augmented mechanisms, truthfulness should hold for any possible prediction .
Definition 2.4.
A learning-augmented mechanism is truthful if for every agent and every possible report of other agents and every possible prediction ,
for every .
We next define the consistency and robustness measures according to which we measure the performance of our mechanisms.
Definition 2.5 (-consistency).
Consider a prediction function which takes a valuation profile and outputs a prediction in prediction space . A learning-augmented mechanism is -consistent for and prediction function if for every valuation profile and every prediction , is an -approximate MMS allocation.
Definition 2.6 (-robust).
A learning-augmented mechanism is -robust for and natural number if for every valuation profile and every prediction , is an -approximate MMS allocation. If , we say the mechanism is -robust.
For ease of presentation, for valuation , report and prediction , we use to denote both the th highest good according to the valuation/report/prediction and its value. Note that, we may use for , in this case,. For , i.e., the highest good we use .
2.1 Ordering Predictions and Kendall tau Distance
Most of our mechanisms use predictions which take the form of an ordering over agents items. That is, outputs a vector of orderings , where is the th highest valued item of in according to . Accordingly, for agent , let be the th highest valued item according to . For two items , We use to denote that is higher ranked than according to .
When studying imprecise predictions, we want to quantify the degree to which the prediction is inaccurate. For this, we use the following measure. For an agent , we define our noise level with respect to the Kendall tau distance (also known as bubble-sort distance) between and .
Definition 2.7 (Kendall tau distance).
The Kendall tau distance counts the number of pairwise disagreements between two orders. For ’s valuation and predicted preference order , we define
That is, the number of pairs of items where the prediction got their relative ordering wrong. We also denote .
We note that the Kendall tau distance between and , , can go from to .
3 Plant-and-Steal Framework
In this section, we present the framework which is used to devise learning-augmented mechanisms for two agents. The ideas presented here also inspire the highly complex learning-augmented mechanism for agents. As described in Section 1.1, the Plant-and-Steal framework takes an allocation procedure , as well agents’ predictions and reports. It first uses on the predictions to derive an initial allocation . Then, it “plants” agent ’s favorite item of set according predictions in set , . Let be the sets resulting from the planting phase. Finally, each agent “steals” back their favorite item in , , according to reports.
For , and agent , let (,) be the max valued item in according to (). for and , denote and . The Plant-and-Steal framework is presented in Mechanism 1.
We now show that for any allocation function and predictions given to the framework, the resulting mechanism is truthful.
Lemma 3.1 (Truthfulness Lemma).
For any allocation procedure , Plant-and-Steal mechanism using is truthful.
Proof.
We show that agent 1 is better off reporting their true valuation, a symmetric argument holds for agent 2. First, notice that sets and are determined using predictions, ignoring the reports. Next, notice that the item is chosen only using agent 2’s report. Therefore, the only way agent 1 can affect their allocation is by choosing which item in is allocated to them. agent 1 gets their favorite item in according to their report. Therefore, it is clear that the agent maximize their utility by reporting their true value. ∎
Since the framework is truthful, from now on, we assume that . Next, we show that the Plant-and-Steal mechanism ensures that for each agent, an item is allocated with a value that is at least as good as their second-best option according to their value.
Lemma 3.2.
Consider the allocation returned by Plant-and-Steal with some allocation procedure . For any agent , then or .
Proof.
Consider some agent . We claim for every partition of the items into two non-empty sets, , is always guaranteed to have one of their two favorite items according to their true valuation in . This is because either (1) has one of their two favorite items in , , and gets their favorite item from ; or ’s two favorite items are in , and in this case, gets all items from but one, so is guaranteed one of them. ∎
We next claim that if gets one of their two favorite items and any additional items, ’s value is an -approximation to .
Lemma 3.3.
For any agent , let be a subset of the items of size and or then
Proof.
Let , by the definition of such exists. Let , by the definition of , we have and . Consider a partition
By definition, . We have,
where the before last inequality is since if for some , then ; therefore and are two disjoint non empty subsets and , hence the maximum number of elements in one of these subsets is . ∎
We immediately get the following.
Lemma 3.4 (Robustness Lemma).
Let be an allocation rule guaranteeing , then when Plant-and-Steal uses , the resulting mechanism is -robust.
4 Ordering Predictions
In this section, we consider the case of two agents, where the predictions (and in fact, also the reports) given to the mechanism are preference orders of agents over items. Our mechanisms makes use of the Plant-and-Steal framework instantiated by Round-Robin based allocation procedures. In Section 4.1 we present our two round-robin allocation procedures, and give their approximation guarantees when the input is accurate. In Section 4.2 we prove the robustness and consistency guarantees. In Section 4.3 we quantify the accuracy of the predictions using the Kendall tau distance, and obtain fine-grained approximation results, where the approximation smoothly degrades in the accuracy.
Amanatidis et al. [6] studied mechanisms where the preference orders of the agents over items are public (while valuations are private). They showed that no truthful mechanism can achieve a better approximation than in this setting. This implies that when the predictions are preference orders, no learning-augmented mechanism can obtain consistency better than , no matter if the robustness is bounded or not.
Proposition 4.1 (Corollary of Amanatidis et al. [6]).
No mechanism that is given preference orders as predictions can obtain consistency for any .
4.1 Round-Robin Allocation Procedures
The two allocation procedures we use to instantiate the Plant-and-Steal framework take as input preference orders of agents over items:
-
•
Balanced-Round-Robin: the agents take turns, and at each turn, an agent takes their highest ranked remaining item. This results in a balanced allocation.
-
•
1-2-Round-Robin: the agents take turns, where we compensate the second agent, who might not get their favorite item, to take two items each turn.
Consider the allocation procedure depicted in Algorithm 2.
Notice that to implement the allocation procedure of Balanced-Round-Robin, it only needs to receive preference orders over items. Let be agent ’s allocation by the algorithm, where is the ’th choice of agent . We observe the following.
Observation 4.1.
The output of the Balanced-Round-Robin procedure, satisfies:
-
1.
, .
-
2.
For each agent and round , ; that is, in round an agent gets one of their top items.
Amanatidis et al. [8] show that first allocating large items to agents, and then using a Round-Robin to allocate the remaining items to the remaining agents, gives a 2-approximation to the MMS. We observe that for two agents, Round-Robin as is, without the initial step, achieves this approximation guarantee. The proof of the following Lemma is deferred to Appendix B.
Lemma 4.1.
Let be the allocation of Balanced-Round-Robin. For every agent , .
One can show that the agent that picks first actually gets a value at least as large as their MMS, while for the second agent this analysis is indeed tight.333Consider the case where the agents’ valuations are . According to Round-Robing allocation, the first item will be assigned to agent 1, and agent 2 will have items of value 1, while . In order to compensate agent 2, 1-2-Round-Robin lets this agent pick two items each round. See Algorithm 3 for details.
Let be agent ’s th choice in 1-2-Round-Robin, we observe the following.
Observation 4.2.
The output of the 1-2-Round-Robin procedure, satisfies:
-
1.
and .
-
2.
, and .
Amanatidis et al. [6] show that 1-2-Round-Robin guarantees each agent of their MMS.
Lemma 4.2 (Amanatidis et al. [6]).
Let be the allocation of 1-2-Round-Robin. For every agent , .
For completeness, We provide the proof of the approximation in Appendix B.
We next use the two allocation procedures to instantiate the Plant-and-Steal framework.
4.2 Round-Robin-Based Mechanisms
We analyze the two mechanisms:
-
•
B-RR-Plant-and-Steal: The mechanism which results from instantiating Plant-and-Steal with Balanced-Round-Robin as .
-
•
1-2-RR-Plant-and-Steal: The mechanism which results from instantiating Plant-and-Steal with 1-2-Round-Robin as .
We first show that if the predictions correspond to the preference orders of the real valuations, then both B-RR-Plant-and-Steal and 1-2-RR-Plant-and-Steal output the same allocation as Balanced-Round-Robin and 1-2-Round-Robin.
Lemma 4.3.
When predictions correspond to actual values, B-RR-Plant-and-Steal (1-2-RR-Plant-and-Steal) outputs the same allocation as Balanced-Round-Robin (1-2-Round-Robin).
Proof.
We prove the claim for B-RR-Plant-and-Steal. The proof for 1-2-RR-Plant-and-Steal is identical.
Let be the first item assigned in Balanced-Round-Robin to agent 1. By definition, is agent 1’s favorite item in according to . Clearly, in Plant-and-Steal, is also agent 1’s favorite item in according to . Hence, . By the definition of Plant-and-Steal, . Since we assume the prediction corresponds to agent 1’s actual value, is also agent 1’s favorite item in , which implies .
Similarly Let be the first item assigned in Balanced-Round-Robin to agent 2. By definition, is agent 2’s favorite item in according to . Since , . Therefore, is also agent 2’s favorite item in according to . Hence, . Since we established that , we have that and . Since we assume the prediction corresponds to agent 1’s actual value, is also agent 1’s favorite item in , implying . We get that and as required. ∎
We are now ready to prove the performance guarantees of our mechanisms.
Theorem 4.1.
Mechanism B-RR-Plant-and-Steal is truthful, -consistent and -robust.
Proof.
By Lemma 3.1, the mechanism is truthful. By 4.1, each agent receives at least items; combining with Lemma 3.4, we get that the mechanism is -robust. Finally, if predictions correspond to valuations, by Lemma 4.1 and Lemma 4.3, the allocation is a -approximation to the MMS. Thus, the mechanism is -consistent. ∎
We note that by Amanatidis et al. [7], our robustness guarantee matches the optimal obtainable approximation by any truthful mechanism (up to the rounding).
We next show that in 1-2-RR-Plant-and-Steal we are able to achieve a better consistency, while slightly weakening the robustness guarantee. Due to similarity to the proof of Theorem 4.1, we defer the proof of the following Theorem to Appendix B.
Theorem 4.2.
Mechanism 1-2-RR-Plant-and-Steal is truthful, -consistent and -robust.
4.3 Noisy Predictions
We now analyze Mechanism B-RR-Plant-and-Steal’s performance under varying levels of noise. Consider the case where the Kendall tau distance between and is at most . Our goal is to relate the value agent gets from the allocation, to their maximin share . To simplify the analysis, we compare what gets to the worst possible set of items might get when running the Round-Robin procedure using the agents’ real preferences . In Eq. (10) of Lemma 4.1, we show that
(1) |
We further simplify the analysis by applying the zero-one principle444Applied in [11], for instance, in the context of packet routing.. The zero-one principle basically let’s us reduce to instances where the values are either 0’s or 1’s. For threshold , let
Accordingly, let .
By the zero-one principle, for two sets , in order to show that approximates , it is enough to show that approximates for every threshold .
Lemma 4.4.
For and for any two sets , if for every threshold , , then .
Proof.
Let () and (). We have the following.
where we use the identity .
∎
Thus, we will show that when the Kendall tau distance is , for every threshold , for some . Recall that is the set of items assigned to after running the Round-Robin procedure on the predictions . We first show that for Kendall tau distance , the additive approximation gives to is .
Lemma 4.5.
If the Kendall tau distance between and is at most , then for any threshold , we have that .
Proof.
Let be the number of items agent gets by Mechanism B-RR-Plant-and-Steal. Let be the items assigned to agent in the Round-Robin according to the predicted orderings , where is the item allocated to in the th round of Round-Robin. First, by 4.1, we have:
(2) |
For a fixed , let be the number of values larger than threshold in . We show that if the Kendall tau distance is at most , then it must be the case that
(3) |
Note that for since gets every second item by the sorted values of agent . This implies that if then for . Moreover, if then for by Eq. (2). Thus, if there are strictly more than items whose rank according to the true valuation is at most , and their rank according to the prediction is at least . We show that this implies that the Kendall tau distance is larger than , yielding a contradiction. Formally, let
be the set of items whose rank is at most according to the real values but not according to the predictions, and let
be the set of items whose rank is strictly larger than according to the real values but not according to the predictions. By the above, , and for each pair ,
-
1.
rank according to is at most and rank according to is at least ;
-
2.
rank according to is at most and rank according to is at least .
That is, and are ordered oppositely in the ordering according to and . Since there are such pairs, we get that the Kendall tau distance is strictly greater than , a contradiction. ∎
We note that although gives an additive approximation to , it can still be the case that the Kendall tau distance is constant, yet does not give any multiplicative approximation to .555Indeed, consider the case where there are four goods which both agents value at . If agent ’s prediction orders the last two items higher then the first two items, we will get that , while . Therefore, we must use the fact that agent gets to “steal” an item according to their true valuation in the Plant-and-Steal procedure in order to get our approximation guarantee. We now prove our approximation guarantees.
Theorem 4.3.
Consider a prediction and valuations such that , then Mechanism B-RR-Plant-and-Steal gives a -approximation to the MMS.
Proof.
We use the zero-one principle to show that Lemma 4.4 holds for sets and with . The proof then follows by Eq. (1).
Notice that , because in the “stealing” phase, agent might not take the “planted” item from back, and the other agent might take one item from .666In fact, this holds for any noise in the valuations of the other agent. Moreover, by Lemma 3.2, either or are in . Therefore, for every threshold ,
(4) | |||||
where the inequality follows Lemma 4.5.
If , then and Lemma 4.4 holds with . Therefore, the interesting case is when . Consider the ratio which we want to bound. Since implies that
On the other hand, by Eq. (4), setting for implies that , which yields
We get that Lemma 4.4 holds for and with . Thus,
where the last inequality follows Eq. (1). ∎
We note that a similar analysis for Mechanism 1-2-RR-Plant-and-Steal will show a similar dependence in (up to constant factors).
5 Non-ordering Predictions
In this Section, we consider the case where predictions are not necessarily preference orders over items. In Section 5.1, we show that for any prediction the mechanism might get, consistency is bounded away from 1. Sections 5.2, 5.3, we study succinct predictions, i.e. predictions about general structure of the preferences of two agents. Section 5.2 presents a -consistent and -robust mechanism, whose consistency relies on the correctness of only a -bit prediction about the preferences of the two agents. In Section 5.3, we show that a -consistent and -robust mechanism exists, whose consistency relies on correctly predicting only bit about the preferences of the two agents.
5.1 No Mechanism with Consistency and Bounded Robustness
In Appendix C.1, we show that no mechanism can simultaneously achieve a consistency guarantee strictly lower than and any bounded robustness guarantee no matter which prediction is given. We use the elegant characterization of [7] for 2-agent mechanisms and show that in any truthful mechanism with finite approximation ratio, if the valuations are identical, then each agent gets at least one of the two largest items. Thus in the instance where the prediction is , each agent gets one item of value . This implies that there is an agent with an allocation of value (and an agent with value ), while .
Theorem 5.1.
For any , there is no truthful a mechanism with consistency and bounded robustness.
5.2 -Consistent, -Robust Mechanism Using a -Space Prediction
Let us formally define a mechanism that uses a space- prediction
Definition 5.1.
A learning-augmented mechanism is a space- mechanism if the prediction space can be represented by the elements of .
We first give a simple mechanism that only requires bits of information about the valuations and . It will only need to know an index in together with a bit . The mechanism will utilize the Plant-and-Steal framework in conjunction with the well-known water-filling allocation procedure:
We see that, in order to predict the behaviour of the mechanism above, one only needs to predict accurately the index on which the mechanism terminates, as well as a bit that encodes whether the algorithm terminates due to the condition being satisfied or due to the condition being satisfied. This can be encoded using bits.
We also see that the The Plant-and-Steal framework when used with the Water-Filling allocation procedure gives a truthful -consistent and a -robust777Note that which implies that the algorithm is -robust. allocation mechanism. The truthfulness and robustness follow immediately from Lemmas 3.1 and 3.4 respectively.
The -consistency holds for the following reason. It is a well-known fact (see i.e. [10]) that the partition given by the water-filling algorithm satisfies and . By inspecting the Plant-and-Steal framework (Algorithm 1), we see that both agent 1 and agent 2 will either (i) retain their most preferred item in and respectively or (ii) Lose this item, but obtain an item that they prefer even more. Overall, this implies that in the worst case the difference will equal to the value of the second-most favorite item of Agent 1 in . This implies that . Analogously, we see that .
5.3 -Consistent, -Robust Mechanism Using a -Space Prediction
We now show that a better consistency of can be achieved at the cost predicting bits of information about the valuations and . We will also obtain a better robustness of . To do this, we will use the Plant-and-Steal framework in conjunction with the Cut-and-Balance allocation procedure.
-
•
-
•
if additionally satisfying , for some
We first explain how the mechanisms above can be implemented by only obtaining bits of information about the valuations and . This follows from the following proposition, the proof of which is given in Appendix C.2.
Proposition 5.1.
Suppose . There is a partition and indices and with , such that the partition defined as and satisfies and .
Additionally, there exist integers and such that the set satisfies , , and if then also satisfies , where and .
The main ideas for proving Proposition 5.1 are: (i) using the sets and to handle elements whose value is large, and separate the remaining items into the set (ii) Showing that the remaining items can be separated into well-behaved subsets of the form .
The proposition above implies that the sets and can be represented exactly via sets and , together with the indices . We will also need to know the index . Since the sets and have a size of , all this information amounts to bits as claimed.
The following proposition implies the truthfulness, the robustness and the consistency of the mechanism that combines the Cut-and-Balance allocation procedure with the Plant-and-Steal framework.
Theorem 5.2.
The Plant-and-Steal framework, when used with Cut-and-Balance allocation procedure, gives a truthful, -consistent and a -robust allocation mechanism.
Proof.
Truthfulness follows from Lemma 3.1. Since the sets and both have size at most , the robustness follows via Lemma 3.4.
The proof of -consistency is deferred to Appendix C.3. The main challenge for showing the bound on consistency is the fact that both the Cut-and-Balance allocation procedure and the Plant-and-Steal framework can reduce the consistency by a factor of . Naively, one would expect the overall consistency to be close to , given that each stage can lose a factor of in consistency. However, our insight is that for the instances, on which the Cut-and-Balance allocation procedure loses a factor of in consistency, the Plant-and-Steal framework will have consistency close to , and vice versa. This allows us to prove a tighter bound of on the consistency of our overall algorithm. ∎
6 Mechanisms for agents
In this section we provide a learning-augmented mechanism for agents, Learning-Augmented-MMS-for--Agents. The mechanism we devise ensures that if the predictions are accurate, then each agent gets an allocation with value at least (2 consistency). On the other hand, we show that for any prediction, every agent gets at least for (robustness).
Theorem 6.1.
The Learning-Augmented-MMS-for--Agents Mechanism (Mechanism 6) is truthful, 2-consistent and -robust for .
6.1 An Overview
The Mechanism.
The mechanism works in three phases. In the first phase, it uses the predictions in order to obtain a partial allocation to agents with high predicted items (which are then removed from the set of active agents, so that we can now that for all agents, all predicted values are small). Then, in the second stage, the mechanism uses the predictions in order to obtain a tentative allocation, by running a Round-Robin procedure, where items are tentatively allocated to agents according to their predictions. In the third and final phase, the tentative allocation is used to implement a recursive plant and steal procedure, where the “planting” is done from the tentative allocations according to predictions, but the “stealing” is done according to the agents’ reports and results in a final allocation.
![Refer to caption](extracted/5658062/figures/12.png)
![Refer to caption](extracted/5658062/figures/34.png)
Consistency.
In the case the predictions are accurate, the initial allocation phase will take care of agents with high valued items (of value larger than ). Then, in the second phase, the tentative allocation will be exactly identical to a Round-Robin allocation (made according to true valuations). Finally, in the third phase, since agents steal in the same order they were allocated the items in the Round-Robin allocation, and since the predictions are accurate, the agents “steal” back the same item the mechanism plants. Since a Round-Robin allocation achieves when there are no agents with high valued items [8], correctness follows.
Robustness.
In the case the predictions are inaccurate, we show that every agent still gets at least . Here we rely on the plant-and-steal phase to ensure that each agent gets at least their highest-valued item according to their true valuation. This property provides our robustness guarantee. We notice that reversing the order between the first and subsequent rounds of the Round-Robin procedure (and thus, the stealing phases) gives an enhanced robustness guarantee.
Prediction.
In the description of the mechanism, we assume the mechanism is given a prediction of agents valuations. We note that in order to implement the mechanism it is enough to be given access to agents’ preference order over items, and an additional information indicating which items are worth more than for each agent .
Below, we first give a detailed description of the mechanism, and then we conclude by proving Theorem 6.1.
6.2 Implementation Details
As discussed, in order to utilize the Round-Robin mechanism, we first allocate a single item to each agent with a high predicted value.
Before describing the tentative allocation mechanism, we first give a procedure, Allocate-Best, which performs a single round of Round-Robin according to a specific order, and preferences (either predictions or reports), denote .
The tentative allocation mechanism repeatedly invokes Allocate-Best according to given predictions, until all items are tentatively allocated. As previously mentioned, the first round of the tentative allocation is performed according to the given order, and in all subsequent rounds, the order is reversed (recall that reversing the order enhances the robustness guarantees).
The final phase in the mechanism is a recursive plant and steal algorithm. The input to this algorithm is an ordered set of agents , along with their predictions, reports, and a tentative allocation for each agent. At each recursive invocation, the algorithm splits the set of agents into two (almost) equal-size ordered sets and . Then the mechanism “plants” for the agent in each set their highest (according to predictions) valued item in their tentative allocation in the tentative set of the agent in Then we perform one round of Round-Robin, where the items available to the agents of set are those tentatively allocated to the agents of (after the planting phase), and the allocations are determined according to agents reports. See Figure 1 for an illustration of a single round of plant and steal. The algorithm then recurses on each of the sets and , until all sets are of size . At this point, the single agent in the set is further allocated its remaining tentatively allocated items, and the process terminates.
Given the above implementation details, it remains to prove Theorem 6.1 regarding truthfulness, consistency and robustness of the mechanism. The proof is given below.
6.3 Proof of Theorem 6.1
In this section we prove Theorem 6.1, which we now recall.
See 6.1
First, we give a simple observation regarding Algorithm 7.
Observation 6.1.
The followings hold for Algorithm Allocate-Large.
-
1.
If the reports equal the true valuations, and agent is allocated an item , then .
-
2.
After the algorithm completes its run, there are no remaining agents in with large predicted values for the remaining items in .
We continue to prove each of the properties specified in Theorem 6.1 separately, starting with truthfulness.
Lemma 6.1 (Truthfulness).
Mechanism Learning-Augmented-MMS-for--agents (Mechanism 6) is truthful.
Proof.
Algorithm Tentative-Allocation-Round-Robin (Algorithm 9) only depends on agents predictions and not their reports. Hence, we only need to consider the use of the reports in Algorithms 9 and 10.
For every agent , either they are allocated a single item in Algorithms 9, or participates in the recursive plant ant steal, and this is determined according to the predictions, so in particular has no affect on this. Thus, we can consider the two independent events separately. In the first case, where is allocated a single item, it is the item that maximizes their report over remaining items at that point, so that has no incentive to lie.
In the second case, participates in the plant and steal phase. Observe that in this case, whenever chooses an item from some set , it will have no future interaction with this set. That is, fix a recursive call and assume without loss of generality that . Then after the planting step, is allocated the item in that maximizes their reports. Then, in following recursive steps, only continues to interact with items in , so ’s choice does not affect the identity of the items from which will be able to choose from in future rounds. Hence, ’s only incentive is to maximize the value of its allocated value in each round, implying truthfulness. ∎
Due to the above lemma, from now on we assume agents report truthfully, i.e., that for every agent , . We turn to show the mechanism is consistent, we rely on the following theorem.
Theorem 6.2 (Lemma 2 in [10] (based on Theorem 3.5 in [8])).
If for every and , , then the Round-Robin algorithm returns an allocation that is .
Furthermore, their analysis holds when changing the order of allocation between the different rounds of the Round-Robin.
We are now ready to prove the mechanism is consistent.
Lemma 6.2 (Consistency).
If the set of predictions is accurate, then for every , .
Proof.
First consider agents that were allocated an item in Algorithm Allocate-Large (Algorithm 7). If the predictions are accurate, then each such agent is allocated an item such that and so the statement holds. Moreover, at the end of this step, there are no remaining agents with large predicted values, hence, no agents with large values remain.
If the set of predictions is accurate, then the tentative allocation determined according to agents’ predictions in Algorithm Tentative-Allocation-Round-Robin ( Algorithm 9) is identical to a Round-Robin mechanism according to valuations, with reversing the order between the first and all subsequent rounds. Furthermore, by the above, there are no agents with large values when the Round-Robin is invoked. Therefore, by Theorem 6.2, it holds that for every , . We shall prove that for every agent , its final allocation equals its tentative allocation, , concluding the proof.
We prove that in depth of the recursion, every agent is allocated the item in . We prove the claim by induction on the depth of the recursion, and the agent in that round that is allocated some value.
We first prove for , . In the plant phase, plants in . Then, in the stealing phase, during the invocation of Algorithm 8, agent is the first to choose an item from , which in particular contains . Hence, the first item in is allocated into . We now assume the claim holds for and and prove it for . Assume without loss of generality that is odd so that .
In step of the planting phase, the mechanism plants ’s (the proof for is identical) first (according to value ) item in . Then, during the tentative allocation phase, agent is the to choose among the items in minus the items that were allocated to the agents that were before her in the tentative Round-Robin. By the induction hypothesis, every agent preceding her chose the item the mechanism planted for them previously in that round. Therefore, the item that the mechanism planted for agent is still available. Moreover, let denote the set of items after rounds of the tentative Round-Robin in Algorithm 9. Further let denote the set of items after rounds of the Allocate-Best algorithm invoked in the stealing phase with the set , i.e., . Since the order in which the agents plant and steal in each round of the recursion is equivalent to the order in which the corresponding tentative allocation round was performed, it holds that . Since , and , it holds that equals . Therefore will choose to as claimed.
Proving the claim for a general is almost identical. At the planting phase of the round, the mechanism plants for every agent their item of in and vice versa. A similar argument to the one above, shows that this item will remain available until its their turn to choose an item for allocation, as by the recursion hypothesis, all agents preceding in the Round-Robin will select the items the mechanism planted for them. Hence, the item in will be allocated to .
Finally, once the set agent belongs to becomes a singleton, by our halting condition, , so together with the previous argument, we get that for every , as needed. ∎
We continue to prove that the mechanism is robust. We first prove in Lemma 6.3 that for each agent , , and then prove in Lemma 6.5 that the value of this item is not too small compared to .
Lemma 6.3.
For every agent , .
Proof.
We first prove the claim for agents that were allocated a value during the invocation of Algorithm 7. By the definition of the algorithm and its truthfulness when agent is allocated an item, at most items were previously allocated to other agents. Hence, she can always choose her highest valued item. Therefore, we have , as claimed.
We continue to prove the claim for the set of agents with no large predicted values. Consider the agent in , , and consider the following coloring process. Initially, color all items in black. We will then color all items was able to choose from green, and items allocated before she had the chance to choose from gray (note that these colors are unrelated to the ones in the figure). Note that an item turns green when it belongs to the tentative allocation of opposite set to ’s and has not been taken by agents preceding her in the allocation order. We claim that by the time no black items remain, at most have turned gray, implying that at some point during the recursion, could have chosen their highest valued item (according to ).
We let denote the set of agents to which belongs to at depth of the recursion, starting with . At each recursive call, is partitioned into . We further let denote the index of the set to which belongs to: . We will separately bound the number of items turned gray due to agents in and .
In the first iteration, for , let denote the tentative sets allocated to the agents of and after the planting phase (i.e., at the beginning of the stealing phase).
The number of items that turn gray due to agents in is , since has access to all items in excluding the items that were allocated to the agents in her set preceding her in the ordering. (The rest of the items in turn green.)
Turning to , each agent in the opposite set to hers, , is allocated a single item (from ) before continuing to the next round of the recursion. Therefore, (and no item turns green).
The recursion then continues with and in reversed order (due to the order being reversed). Therefore, at the beginning of the second iteration, is in location in . After the partition phase, is in set and in location . Hence, due to agents in her set preceding here in the ordering. Also, due to allocations to agents in the opposite set to hers.
From now on, the order is preserved, so for every , and .
We continue by bounding . Observe that if is even then , and if is odd, then either is odd and is even or vice versa. In the first case, and we recurse with which is of size . In the second case, and we recurse with of size . Hence, we have the following recursion formula. For even , , and for odd either (a) or (b) . In Claim 6.4 below, we prove that for such a function, if it also holds that and , then . Therefore, we get that .
We continue to bound . The sum can be bounded by , where is the number of indices for which the fraction is rounded up. Observe that for every , can be bounded above by as exactly equals the number of 1 bits in the binary representation of . Hence, the overall number of items that turn gray can be bounded as follows:
(5) | ||||
(6) | ||||
(7) | ||||
(8) |
Therefore, the number of items that turn gray by the end of the recursion is at most , and so get their highest valued item . ∎
We now prove the claim regarding the cost of the recursion that was used in the previous lemma.
Lemma 6.4.
Let be such that if is even and either (a) or (b) for odd . Also assume . Then .
Proof.
We prove the claim by induction on . By and so the induction basis holds. We now assume correctness for all values smaller than and prove for .
If is even then , so the claim holds.
If is odd, then in case (a), , and in case (b), . ∎
Finally, we prove that the highest valued item allocated to each agent is not too small compared to their MMS.
Lemma 6.5.
Consider an MMS for agent , and let be the highest valued item of in her allocation. Then
Proof.
Consider an MMS allocation of for , and let be the set such that . By the assumption on , its value is higher then the highest valued item in , . Therefore, , implying Since (as at least items must be allocated to the additional agents, it holds that . ∎
7 Experimental Results
In this section, we give experiments which illustrate the role of different components of our framework for two players under various noise levels of the predictions.888The experiments, reproducible via Matlab (2022b) at https://tinyurl.com/PlantStealExperiments, were performed on a standard PC (Intel i9, 32GB RAM) in about 30 minutes. The predictions we use for our experiments are the predicted values of the items. The noise we introduce permutes the vectors of values to match the instance’s Kendall tau distance, and uses the permuted vector as prediction. We show that our framework is almost optimal for small amounts of noise while still showing resilience for higher noise levels. Moreover, we study the performance of variants which only use specific components of our framework.
When using predictions, our initial allocation procedure is a cut-and-choose procedure, implemented as follows:
-
•
We use the first player’s prediction to implement a water filling algorithm which sorts the items by values, and then partitions the items into two sets using a greedy procedure that assigns each item to the set with current lowest value.
-
•
We use the second player’s prediction to allocated the agent the set with the higher predicted value of the two.
This allocation ensures that the second agent obtains their MMS value according to the prediction. In the data we generates, we observe that in a sampled valuation, the two sets chosen by the water filling algorithm gives the two sets the same value, up to 0.5%, which ensures that the lowest valued set obtains a -approximation to the MMS.
We inspect the following mechanisms:
-
1.
Random: a mechanism that ignores reports and predictions and randomly partitions the items into two sets of size .
-
2.
Random-Steal: a mechanism that ignores predictions, randomly partitions the items into two sets of size , and then implements the stealing phase where each player takes their favorite item from the other player’s set according to reports.
-
3.
Partition: a mechanism that ignores reports, and partitions the items according to predictions, using the cut-and-choose procedure described above.
-
4.
Partition-Steal: a mechanism that partitions the items according to predictions, using the cut-and-choose procedure described above, and then implements the stealing phase where each player takes their favorite item from the other player’s set according to reports.
-
5.
Partition-Plant-Steal: a mechanism that implements the Plant-and-Steal framework. partitions the items according to predictions, using the cut-and-choose procedure described above, “plants” each player’s favorite item according to predictions, and then “steals” each player’s favorite item from the other player’s set according to reports.
Experiments.
We consider two-player scenarios with items. For each distance measure, we generate valuation profiles. For each pair of valuation profiles and corresponding Kendall tau distance, we generate predictions based on the distance. We then assess the performance of the mechanisms described earlier on these instances. We examine two distinct cases regarding the relationship between the players’ preference orders: the Correlated case, where both players have identical preference orders, although their valuation magnitudes differ, and the Uncorrelated case, where the preference orders of the players are generated independently and chosen uniformly at random. Further details on the procedures used to generate the valuations and predictions are provided in Appendix A.
Benchmark.
We plot the percentage of these instances where both players get at least of their MMS value for
Results.
The results are shown in Figure 2. We first examine the performance of the two mechanisms that do not use predictions, Random and Random-Steal. Scenarios with correlated values perform significantly worse, as there is a non-negligible probability of an unbalanced partition of the relatively few high and medium valued items in a random partition. For values of , the Random strategy success rate is and , respectively, under correlated preferences, compared to and under uncorrelated preferences. Moreover, adding the stealing component significantly improves the success rate only in the uncorrelated case, as Random-Steal achieves success rates of and . In the correlated case, as each player has a highly valuable item stolen, their obtained value is not expected to increase.
In the mechanisms that use predictions, Partition, Partition-Steal and Partition-Plant-Steal, the performance degrades as a function of noise, as expected. When comparing the performance of Partition, which only relies on the prediction component of our framework, and Random-Steal, which only relies on the stealing component of our framework, we notice that in the uncorrelated case, for small amount of noise guarantee a higher success rate, while as the noise increases, the stealing component becomes more instrumental to the performance. This is in tact with the theoretical results, where using the prediction is crucial to achieve the consistency guarantees, which take place when the prediction is accurate, while stealing is important to achieve robustness guarantees in case the prediction is inaccurate. As described above, in the case where the valuations are correlated, stealing is not expected to help. Interestingly, on fully noisy input, even Random outperforms Partition as Partition might partition the items into unequally-sized sets, which performs worse than the equally-sized sets Random outputs.
Our experiments show that Partition-Plant-Steal performs as well as the Partition strategy for small amounts of noise and outperforms it on uncorrelated instances for large amounts of noise. Moreover, for any amount of noise, it outperforms Random-Steal and converges to it for a fully noisy input. This illustrates the “best of both worlds” tradeoff obtained by our framework.
Finally, when comparing the Partition-Plant-Steal strategy to the Partition-Steal strategy, we observe that Partition-Plant-Steal outperforms Partition-Steal in the correlated case with a small amount of noise (worst-case scenario) for , as planting guarantees your favorite items would not be taken. In other scenarios, Partition-Steal outperforms Partition-Plant-Steal because “planting” removes a valuable item from the player’s set that might be taken otherwise, especially in the uncorrelated case.
References
- Agrawal et al. [2022] Priyank Agrawal, Eric Balkanski, Vasilis Gkatzelis, Tingting Ou, and Xizhi Tan. Learning-augmented mechanism design: Leveraging predictions for facility location. In David M. Pennock, Ilya Segal, and Sven Seuken, editors, EC ’22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11 - 15, 2022, pages 497–528. ACM, 2022. doi: 10.1145/3490486.3538306. URL https://doi.org/10.1145/3490486.3538306.
- Aigner-Horev and Segal-Halevi [2022] Elad Aigner-Horev and Erel Segal-Halevi. Envy-free matchings in bipartite graphs and their applications to fair division. Inf. Sci., 587:164–187, 2022. doi: 10.1016/J.INS.2021.11.059. URL https://doi.org/10.1016/j.ins.2021.11.059.
- Akrami and Garg [2023] Hannaneh Akrami and Jugal Garg. Breaking the 3/4 barrier for approximate maximin share. CoRR, abs/2307.07304, 2023. doi: 10.48550/ARXIV.2307.07304. URL https://doi.org/10.48550/arXiv.2307.07304.
- Akrami et al. [2023a] Hannaneh Akrami, Jugal Garg, Eklavya Sharma, and Setareh Taki. Simplification and improvement of MMS approximation. In Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China, pages 2485–2493. ijcai.org, 2023a. doi: 10.24963/IJCAI.2023/276. URL https://doi.org/10.24963/ijcai.2023/276.
- Akrami et al. [2023b] Hannaneh Akrami, Jugal Garg, and Setareh Taki. Improving approximation guarantees for maximin share. CoRR, abs/2307.12916, 2023b. doi: 10.48550/ARXIV.2307.12916. URL https://doi.org/10.48550/arXiv.2307.12916.
- Amanatidis et al. [2016] Georgios Amanatidis, Georgios Birmpas, and Evangelos Markakis. On truthful mechanisms for maximin share allocations. In Subbarao Kambhampati, editor, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016, pages 31–37. IJCAI/AAAI Press, 2016. URL http://www.ijcai.org/Abstract/16/012.
- Amanatidis et al. [2017a] Georgios Amanatidis, Georgios Birmpas, George Christodoulou, and Evangelos Markakis. Truthful allocation mechanisms without payments: Characterization and implications on fairness. In Constantinos Daskalakis, Moshe Babaioff, and Hervé Moulin, editors, Proceedings of the 2017 ACM Conference on Economics and Computation, EC ’17, Cambridge, MA, USA, June 26-30, 2017, pages 545–562. ACM, 2017a. doi: 10.1145/3033274.3085147. URL https://doi.org/10.1145/3033274.3085147.
- Amanatidis et al. [2017b] Georgios Amanatidis, Evangelos Markakis, Afshin Nikzad, and Amin Saberi. Approximation algorithms for computing maximin share allocations. ACM Trans. Algorithms, 13(4):52:1–52:28, 2017b. doi: 10.1145/3147173. URL https://doi.org/10.1145/3147173.
- Amanatidis et al. [2021] Georgios Amanatidis, Georgios Birmpas, Federico Fusco, Philip Lazos, Stefano Leonardi, and Rebecca Reiffenhäuser. Allocating indivisible goods to strategic agents: Pure nash equilibria and fairness. In Michal Feldman, Hu Fu, and Inbal Talgam-Cohen, editors, Web and Internet Economics - 17th International Conference, WINE 2021, Potsdam, Germany, December 14-17, 2021, Proceedings, volume 13112 of Lecture Notes in Computer Science, pages 149–166. Springer, 2021. doi: 10.1007/978-3-030-94676-0“˙9. URL https://doi.org/10.1007/978-3-030-94676-0_9.
- Amanatidis et al. [2023] Georgios Amanatidis, Haris Aziz, Georgios Birmpas, Aris Filos-Ratsikas, Bo Li, Hervé Moulin, Alexandros A. Voudouris, and Xiaowei Wu. Fair division of indivisible goods: Recent progress and open questions. Artif. Intell., 322:103965, 2023. doi: 10.1016/J.ARTINT.2023.103965. URL https://doi.org/10.1016/j.artint.2023.103965.
- Azar and Richter [2004] Yossi Azar and Yossi Richter. The zero-one principle for switching networks. In László Babai, editor, Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004, pages 64–71. ACM, 2004. doi: 10.1145/1007352.1007369. URL https://doi.org/10.1145/1007352.1007369.
- Babaioff et al. [2021] Moshe Babaioff, Tomer Ezra, and Uriel Feige. Fair and truthful mechanisms for dichotomous valuations. In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2-9, 2021, pages 5119–5126. AAAI Press, 2021. doi: 10.1609/AAAI.V35I6.16647. URL https://doi.org/10.1609/aaai.v35i6.16647.
- Balcan et al. [2023] Maria-Florina Balcan, Siddharth Prasad, and Tuomas Sandholm. Bicriteria multidimensional mechanism design with side information. CoRR, abs/2302.14234, 2023. doi: 10.48550/ARXIV.2302.14234. URL https://doi.org/10.48550/arXiv.2302.14234.
- Balkanski et al. [2023a] Eric Balkanski, Vasilis Gkatzelis, and Xizhi Tan. Strategyproof scheduling with predictions. In Yael Tauman Kalai, editor, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, USA, volume 251 of LIPIcs, pages 11:1–11:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2023a. doi: 10.4230/LIPICS.ITCS.2023.11. URL https://doi.org/10.4230/LIPIcs.ITCS.2023.11.
- Balkanski et al. [2023b] Eric Balkanski, Vasilis Gkatzelis, Xizhi Tan, and Cherlin Zhu. Online mechanism design with predictions. CoRR, abs/2310.02879, 2023b. doi: 10.48550/ARXIV.2310.02879. URL https://doi.org/10.48550/arXiv.2310.02879.
- Barman and Krishnamurthy [2020] Siddharth Barman and Sanath Kumar Krishnamurthy. Approximation algorithms for maximin fair division. ACM Trans. Economics and Comput., 8(1):5:1–5:28, 2020. doi: 10.1145/3381525. URL https://doi.org/10.1145/3381525.
- Bouveret and Lemaître [2016] Sylvain Bouveret and Michel Lemaître. Characterizing conflicts in fair division of indivisible goods using a scale of criteria. Auton. Agents Multi Agent Syst., 30(2):259–290, 2016. doi: 10.1007/S10458-015-9287-3. URL https://doi.org/10.1007/s10458-015-9287-3.
- Budish [2011] Eric Budish. The combinatorial assignment problem: Approximate competitive equilibrium from equal incomes. Journal of Political Economy, 119(6):1061–1103, 2011.
- Caragiannis and Kalantzis [2024] Ioannis Caragiannis and Georgios Kalantzis. Randomized learning-augmented auctions with revenue guarantees. CoRR, abs/2401.13384, 2024. doi: 10.48550/ARXIV.2401.13384. URL https://doi.org/10.48550/arXiv.2401.13384.
- Cohen and Panigrahi [2023] Ilan Reuven Cohen and Debmalya Panigrahi. A General Framework for Learning-Augmented Online Allocation. In 50th International Colloquium on Automata, Languages, and Programming (ICALP 2023), volume 261 of Leibniz International Proceedings in Informatics (LIPIcs), pages 43:1–43:21, 2023. ISBN 978-3-95977-278-5. doi: 10.4230/LIPIcs.ICALP.2023.43.
- Devanur and Hayes [2009] Nikhil R. Devanur and Thomas P. Hayes. The adwords problem: online keyword matching with budgeted bidders under random permutations. In John Chuang, Lance Fortnow, and Pearl Pu, editors, Proceedings 10th ACM Conference on Electronic Commerce (EC-2009), Stanford, California, USA, July 6–10, 2009, pages 71–78. ACM, 2009. doi: 10.1145/1566374.1566384. URL https://doi.org/10.1145/1566374.1566384.
- Feige et al. [2021] Uriel Feige, Ariel Sapir, and Laliv Tauber. A tight negative example for MMS fair allocations. In Michal Feldman, Hu Fu, and Inbal Talgam-Cohen, editors, Web and Internet Economics - 17th International Conference, WINE 2021, Potsdam, Germany, December 14-17, 2021, Proceedings, volume 13112 of Lecture Notes in Computer Science, pages 355–372. Springer, 2021. doi: 10.1007/978-3-030-94676-0“˙20. URL https://doi.org/10.1007/978-3-030-94676-0_20.
- Garg et al. [2019] Jugal Garg, Peter McGlaughlin, and Setareh Taki. Approximating maximin share allocations. In Jeremy T. Fineman and Michael Mitzenmacher, editors, 2nd Symposium on Simplicity in Algorithms, SOSA 2019, January 8-9, 2019, San Diego, CA, USA, volume 69 of OASIcs, pages 20:1–20:11. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019. doi: 10.4230/OASICS.SOSA.2019.20. URL https://doi.org/10.4230/OASIcs.SOSA.2019.20.
- Ghodsi et al. [2018] Mohammad Ghodsi, Mohammad Taghi Hajiaghayi, Masoud Seddighin, Saeed Seddighin, and Hadi Yami. Fair allocation of indivisible goods: Improvements and generalizations. In Éva Tardos, Edith Elkind, and Rakesh Vohra, editors, Proceedings of the 2018 ACM Conference on Economics and Computation, Ithaca, NY, USA, June 18-22, 2018, pages 539–556. ACM, 2018. doi: 10.1145/3219166.3219238. URL https://doi.org/10.1145/3219166.3219238.
- Gkatzelis et al. [2022] Vasilis Gkatzelis, Kostas Kollias, Alkmini Sgouritsa, and Xizhi Tan. Improved price of anarchy via predictions. In David M. Pennock, Ilya Segal, and Sven Seuken, editors, EC ’22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11 - 15, 2022, pages 529–557. ACM, 2022. doi: 10.1145/3490486.3538296. URL https://doi.org/10.1145/3490486.3538296.
- Gkatzelis et al. [2023] Vasilis Gkatzelis, Alexandros Psomas, Xizhi Tan, and Paritosh Verma. Getting more by knowing less: Bayesian incentive compatible mechanisms for fair division. CoRR, abs/2306.02040, 2023. doi: 10.48550/ARXIV.2306.02040. URL https://doi.org/10.48550/arXiv.2306.02040.
- Hosseini and Searns [2021] Hadi Hosseini and Andrew Searns. Guaranteeing maximin shares: Some agents left behind. In Zhi-Hua Zhou, editor, Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI 2021, Virtual Event / Montreal, Canada, 19-27 August 2021, pages 238–244. ijcai.org, 2021. doi: 10.24963/IJCAI.2021/34. URL https://doi.org/10.24963/ijcai.2021/34.
- Hosseini et al. [2023] Hadi Hosseini, Andrew Searns, and Erel Segal-Halevi. Ordinal maximin share approximation for goods (extended abstract). In Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China, pages 6894–6899. ijcai.org, 2023. doi: 10.24963/IJCAI.2023/778. URL https://doi.org/10.24963/ijcai.2023/778.
- Kraska et al. [2018] Tim Kraska, Alex Beutel, Ed H. Chi, Jeffrey Dean, and Neoklis Polyzotis. The case for learned index structures. In Gautam Das, Christopher M. Jermaine, and Philip A. Bernstein, editors, Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference 2018, Houston, TX, USA, June 10-15, 2018, pages 489–504. ACM, 2018. doi: 10.1145/3183713.3196909. URL https://doi.org/10.1145/3183713.3196909.
- Kurokawa et al. [2018] David Kurokawa, Ariel D. Procaccia, and Junxing Wang. Fair enough: Guaranteeing approximate maximin shares. J. ACM, 65(2):8:1–8:27, 2018. doi: 10.1145/3140756. URL https://doi.org/10.1145/3140756.
- Lavastida et al. [2021] T Lavastida, B Moseley, R Ravi, and C Xu. Learnable and instance-robust predictions for online matching, flows and load balancing. In European Symposium on Algorithms, 2021.
- Lu et al. [2023] Pinyan Lu, Zongqi Wan, and Jialin Zhang. Competitive auctions with imperfect predictions. CoRR, abs/2309.15414, 2023. doi: 10.48550/ARXIV.2309.15414. URL https://doi.org/10.48550/arXiv.2309.15414.
- Lykouris and Vassilvitskii [2021] Thodoris Lykouris and Sergei Vassilvitskii. Competitive caching with machine learned advice. J. ACM, 68(4):24:1–24:25, 2021. doi: 10.1145/3447579. URL https://doi.org/10.1145/3447579.
- Mitzenmacher [2000] Michael Mitzenmacher. How useful is old information? IEEE Trans. Parallel Distributed Syst., 11(1):6–20, 2000. doi: 10.1109/71.824633. URL https://doi.org/10.1109/71.824633.
- Plaut and Roughgarden [2020] Benjamin Plaut and Tim Roughgarden. Almost envy-freeness with general valuations. SIAM J. Discret. Math., 34(2):1039–1068, 2020. doi: 10.1137/19M124397X. URL https://doi.org/10.1137/19M124397X.
- Tao [2022] Biaoshuai Tao. On existence of truthful fair cake cutting mechanisms. In David M. Pennock, Ilya Segal, and Sven Seuken, editors, EC ’22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11 - 15, 2022, pages 404–434. ACM, 2022. doi: 10.1145/3490486.3538321. URL https://doi.org/10.1145/3490486.3538321.
- Vee et al. [2010] Erik Vee, Sergei Vassilvitskii, and Jayavel Shanmugasundaram. Optimal online assignment with forecasts. In David C. Parkes, Chrysanthos Dellarocas, and Moshe Tennenholtz, editors, Proceedings 11th ACM Conference on Electronic Commerce (EC-2010), Cambridge, Massachusetts, USA, June 7-11, 2010, pages 109–118. ACM, 2010. doi: 10.1145/1807342.1807360. URL https://doi.org/10.1145/1807342.1807360.
- Wierman and Nuyens [2008] Adam Wierman and Misja Nuyens. Scheduling despite inexact job-size information. In Zhen Liu, Vishal Misra, and Prashant J. Shenoy, editors, Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2008, Annapolis, MD, USA, June 2-6, 2008, pages 25–36. ACM, 2008. doi: 10.1145/1375457.1375461. URL https://doi.org/10.1145/1375457.1375461.
- Xu and Lu [2022] Chenyang Xu and Pinyan Lu. Mechanism design with predictions. In Luc De Raedt, editor, Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI 2022, Vienna, Austria, 23-29 July 2022, pages 571–577. ijcai.org, 2022. doi: 10.24963/IJCAI.2022/81. URL https://doi.org/10.24963/ijcai.2022/81.
Appendix A Experimental Supplement
Generating valuations.
To generate interesting valuations for the players, we use a multi-step function to generate item values, since if the values are close together, any balanced partition obtains good MMS guarantees, without considering reports and predictions. Specifically, we consider a three-step (High-Med-Low) random valuation function, where each player has a high valuation with a probability of , a medium valuation with a probability of , and a low valuation with a probability of . The high valuation is , the medium valuation are and the low valuations are the rest of the values are . Figure 3 shows the value distribution generated by our process for two players. we generate values over items.
We generate valuations satisfying one of the two types of relations between players’ preferences:
-
•
Correlated: the two preference orders are identical (but not the values).
-
•
Uncorrelated: Both preference orders are chosen independently and uniformly at random.
Generating predictions.
To generate predictions, we take valuations and permute elements randomly to create noise. We generate predictions under varying noise levels according to the Kendall tau distance between the valuations and the predictions. We very the Kendall tau distance between to , where corresponds to the expected noise level of a random permutation of items. To randomly choose a permutation of a certain noise level, we start with the ordered permutation and then choose two indices u.a.r. and swap items and for if it increases the Kendall Tau distance by one. We repeat this process until the distance of the resulting permutation equals the desired value.
Appendix B Deferred proofs from Section 4
Proof of Lemma 4.1.
By Observation 4.1, we have , therefore
(9) |
Since ’s favorite item must be absent from some set of the sets defining the MMS value,
Since the are ordered, , hence . Therefore,
(10) |
Proof of Lemma 4.2.
We first prove the approximation for player 1 (the first player to be allocated). First, observe that . Let be the worst possible allocation agent 1 might get in the 1-2-Round-Robin allocation. Notice that . By Observation 4.2, . Therefore, .
Now consider player 2. As stated in the proof of Lemma 4.1, . Let
First, notice that
Moreover, by Observation 4.2, we have, , and Therefore,
∎
Proof of Theorem 4.2.
By Lemma 3.1, the mechanism is truthful. By 4.1, each agent receives at least items; combining with Lemma 3.4, we get that the mechanism is -robust. Finally, if predictions correspond to valuations, by Lemma 4.2 and Lemma 4.3, the allocation is -approximation to the MMS. Thus, the mechanism is -consistent. ∎
Appendix C Deferred proofs from Section 5
C.1 No Mechanism with Bounded Robustness and Consistency
In [7] they define the following family of mechanisms.
Definition C.1 (Singleton Picking-Exchange Mechanisms [7]).
A mechanism is a singleton picking-exchange mechanism if for each , there is exactly one of two sets: either , or for a single item . If is non-empty, then the mechanism lets player pick item that maximizes , and gets . If both are non-empty, then the agents exchange the two items and if and Notice that if , either or is empty and there will be no exchange.
[7] showed the following.
Lemma C.1.
In order for a mechanism to be truthful and have a bounded approximation, it has to be a singleton picking-exchange mechanism
We make use of this characterization in our impossibility.
See 5.1
Proof.
Consider the case where . Notice that for the predictions, . We show that for any singleton-picking-exchange mechanism, no agent obtains both large items (of value ). Consider agent 1 (the argument is symmetric for agent 2). If is non-empty, then if both large items are in , surely 1 will only get one of them. If both large items are in , then agent will surely pick one of them, and agent 1 will only get one of them. If one large item is in and the other is in , each agent will pick the large item in . If agent 2 has a large item in , then since is non-empty, is empty and agent will keep the large item. Now consider the case where is non-empty. In this case, contains one item, and is empty. Since can contain at most one item, and there are more than 2 items, in this case, , and . Therefore, contains at least one large item. Since agent 2 will always pick the large item, agent one only gets one large item. We conclude that for any singleton picking-exchange mechanism, the large items are split among the agents. Since there are 3 small items, there must be an agent that gets at most one small item, and this agent has an overall value of at most , while the MMS is . Thus the claim follows. ∎
C.2 Proof of Proposition 5.1
We first show the following, which implies the first half of Proposition 5.1.
Proposition C.1.
There exists a partition and and indices in such that , for the sets and we have
-
•
-
•
-
•
.
-
•
For every in and in we have . Analogously, for every in and in we have
-
•
There are satisfying and ,
We do this by inspecting two types of items, large items, with value greater than , and small items items with value at most . We first show that there are large items, therefore, separating these items into two bundles require at most intervals. Moreover, we can find a separation of the larges items into two sets, , and a single index such that all small items to the left of (including) together with form , and all items to the right of (excluding) together with form , such that satisfy the approximation requirement. It is easy to see that this increases the number of intervals by at most 1.
We start by showing there are not too many large items.
Lemma C.2.
There are at most items with value strictly greater than for agent 1.
Proof.
Let items with value greater than be the large items. Suppose there are at least large items. If is even, consider a partition such that each gets at least large items and the rest are allocated arbitrarily. If is odd, consider the allocation in which each gets large items and the rest are allocated arbitrarily. In either case, each gets at least large items. Thus, a contradiction. ∎
We are now ready to prove Proposition C.1.
Proof of Proposition C.1.
Consider the set of large items, , and let be the set of small items.
We give a constructive proof which finds both sets and an index satisfying the condition stated in the lemma. Let
We use the following procedure to find .
-
1.
Let and .
-
2.
While :
-
(a)
Let and .
-
(b)
If
-
•
.
-
•
-
(c)
Else:
-
•
.
-
•
-
(a)
-
3.
Set .
We consider two cases:
Case 1: (or symmetrically, ). Without loss of generality, suppose that We first show that if then . Notice that since gets all the small items, it must be the case that Suppose there’s a different partition such that Without loss of generality, let (otherwise, we can rename both bundles). By the definition of it must be the case that . Thus, Since , it must be that
a contradiction.
On the other hand, if , by condition 2b of the above procedure, it must be the case that when was equal ,
Thus,
We get that
(11) |
where the second inequality follows since
Case 2: . In this case, since both and were moved, there were some values of and such that and some values such that . Assume initially that . Since at each step of the procedure, the lower-valued bundle can increase by at most , when the first item is added to such that , it must be the case that It is easy to see that the invariant where is kept throughout the run of the procedure. Therefore, this also holds for the final and . Thus, we can use the same reasoning of Eq. (11) to conclude that
Thus, the sets and have a form and and have the form required. If we can swap our definitions for the sets and , thus ensuring that . Due to our definitions of and we have for every in and in we have . Analogously, for every in and in we have .
We can ensure that There are satisfying
by adding such values from to (we see that after this all other properties still hold). Overall, we see that , as required. ∎
Now, we proceed to proving the second half of Proposition 5.1. We will need the following lemma.
Lemma C.3.
Let and be positive integers satisfying , and let be a function map** to non-negative real numbers. Then, there exist a pair of integers and in such that and
Proof.
We prove the lemma using the probabilistic method. Let be a uniformly random integer in , and choose and such that
We see that indeed a set chosen as above can be represented as a union of two intervals. Now, since is chosen uniformly at random form , we see that for every element in we have
Thus via linearity of expectation we have:
Thus, since is non-negative for all values of , we see that for some specific choice of it has to be the case that
which finishes the proof. ∎
Now, we apply the lemma above. If we can satisfy Proposition C.1 by:
-
1.
First choosing a partition such that and .
-
2.
Define , put the smallest elements of into , and define to contain the rest of elements in .
-
3.
Define , , .
Overall, this allocates to be the bottom elements of . We see that this suffices to guarantee the properties that needs to satisfy in Proposition 5.1.
Therefore, henceforth we can assume that . Since and , and this implies that Thus, we can ensure that using a subset .
If we only need choose to satisfy and . First of all, since every element in is larger than any element in , we see that this is also true in average
(12) |
Then, applying Lemma C.3 to the set we see that there exist disjoint subsets and of such that
(13) |
Combing Equations 12 and 13, we see that taking satisfies and the other requirements of Proposition 5.1.
Now, suppose . Since by Proposition C.1, the set does not contain the two largest elements and of , as well as the fact that every element in is at least as large as any element in , we see that every every element in is either in or greater than every element in . this implies that:
(14) |
Then, we can again apply applying Lemma C.3 to the set we see that there exist disjoint subsets and of such that
(15) |
Combing Equations 14 and 15, we see that taking satisfies as required in Proposition 5.1. Note that this also implies that since , have the top two largest values of in . Overall, this finishes the proof of Proposition 5.1.
C.3 Proof of -consistency.
It remains to show that the algorithm is -consistent. We will be referencing the variables and within the Plant-And-Steal framework (Algorithm 1).
We first reason about agent 2. First, notice that since agent 2 has a higher value for ,
Since the mechanism had a chance to pick item from as , it must be the case that (and possibly ). If , then , and
Otherwise, , and
(16) |
Since is the item with the highest value for agent 2 in Combining with Eq. (16), we get that
Moreover,
Thus,
as desired.
It is left to show that If , then
In this case, the same exact arguments used for agent 2 can be harnessed to show that Thus, it is left to consider the case where .
Consider the partition that is set in the first step of Cut-and-Balance-and-Choose. Since , we have
If , we have that
where the first inequality follows since .
Note also that if i.e., , if then since , similarly if then , finally we have and an in the first case.
Therefore, we assume and , and let
where the first inequality is since, . The second inequality is since , the third inequality is by definition since by our assumption that . Finally, we have have since
where the last inequality is since . Since we handles the case earlier, we can here assume in which case the set is required to satisfy . Therefore, we have .
which implies that , finishing the proof.