-
Disrupting Bipartite Trading Networks: Matching for Revenue Maximization
Authors:
Luca D'Amico-Wong,
Yannai A. Gonczarowski,
Gary Qiurui Ma,
David C. Parkes
Abstract:
We model the role of an online platform disrupting a market with unit-demand buyers and unit-supply sellers. Each seller can transact with a subset of the buyers whom she already knows, as well as with any additional buyers to whom she is introduced by the platform. Given these constraints on trade, prices and transactions are induced by a competitive equilibrium. The platform's revenue is proport…
▽ More
We model the role of an online platform disrupting a market with unit-demand buyers and unit-supply sellers. Each seller can transact with a subset of the buyers whom she already knows, as well as with any additional buyers to whom she is introduced by the platform. Given these constraints on trade, prices and transactions are induced by a competitive equilibrium. The platform's revenue is proportional to the total price of all trades between platform-introduced buyers and sellers.
In general, we show that the platform's revenue-maximization problem is computationally intractable. We provide structural results for revenue-optimal matchings and isolate special cases in which the platform can efficiently compute them. Furthermore, in a market where the maximum increase in social welfare that the platform can create is $ΔW$, we prove that the platform can attain revenue $Ω(ΔW/\log(\min\{n,m\}))$, where $n$ and $m$ are the numbers of buyers and sellers, respectively. When $ΔW$ is large compared to welfare without the platform, this gives a polynomial-time algorithm that guarantees a logarithmic approximation of the optimal welfare as revenue. We also show that even when the platform optimizes for revenue, the social welfare is at least an $O(\log(\min\{n,m\}))$-approximation to the optimal welfare. Finally, we prove significantly stronger bounds for revenue and social welfare in homogeneous-goods markets.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Algorithmic Collusion by Large Language Models
Authors:
Sara Fish,
Yannai A. Gonczarowski,
Ran I. Shorrer
Abstract:
The rise of algorithmic pricing raises concerns of algorithmic collusion. We conduct experiments with algorithmic pricing agents based on Large Language Models (LLMs), and specifically GPT-4. We find that (1) LLM-based agents are adept at pricing tasks, (2) LLM-based pricing agents autonomously collude in oligopoly settings to the detriment of consumers, and (3) variation in seemingly innocuous ph…
▽ More
The rise of algorithmic pricing raises concerns of algorithmic collusion. We conduct experiments with algorithmic pricing agents based on Large Language Models (LLMs), and specifically GPT-4. We find that (1) LLM-based agents are adept at pricing tasks, (2) LLM-based pricing agents autonomously collude in oligopoly settings to the detriment of consumers, and (3) variation in seemingly innocuous phrases in LLM instructions ("prompts") may increase collusion. These results extend to auction settings. Our findings underscore the need for antitrust regulation regarding algorithmic pricing, and uncover regulatory challenges unique to LLM-based pricing agents.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
Multi-District School Choice: Playing on Several Fields
Authors:
Yannai A. Gonczarowski,
Michael Yin,
Shirley Zhang
Abstract:
We extend the seminal model of Pathak and Sönmez (2008) to a setting with multiple school districts, each running its own separate centralized match, and focus on the case of two districts. In our setting, in addition to each student being either sincere or sophisticated, she is also either constrained - able to apply only to schools within her own district of residence - or unconstrained - able t…
▽ More
We extend the seminal model of Pathak and Sönmez (2008) to a setting with multiple school districts, each running its own separate centralized match, and focus on the case of two districts. In our setting, in addition to each student being either sincere or sophisticated, she is also either constrained - able to apply only to schools within her own district of residence - or unconstrained - able to choose any single district within which to apply. We show that several key results from Pathak and Sönmez (2008) qualitatively flip: A sophisticated student may prefer for a sincere student to become sophisticated, and a sophisticated student may prefer for her own district to use Deferred Acceptance over the Boston Mechanism, irrespective of the mechanism used by the other district. We furthermore investigate the preferences of students over the constraint levels of other students. Many of these phenomena appear abundantly in large random markets.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Stable Menus of Public Goods: A Matching Problem
Authors:
Sara Fish,
Yannai A. Gonczarowski,
Sergiu Hart
Abstract:
We study a matching problem between agents and public goods, in settings without monetary transfers. Since goods are public, they have no capacity constraints. There is no exogenously defined budget of goods to be provided. Rather, each provided good must justify its cost, leading to strong complementarities in the "preferences" of goods. Furthermore, goods that are in high demand given other alre…
▽ More
We study a matching problem between agents and public goods, in settings without monetary transfers. Since goods are public, they have no capacity constraints. There is no exogenously defined budget of goods to be provided. Rather, each provided good must justify its cost, leading to strong complementarities in the "preferences" of goods. Furthermore, goods that are in high demand given other already-provided goods must also be provided. The question of the existence of a stable solution (a menu of public goods to be provided) exhibits a rich combinatorial structure. We uncover sufficient conditions and necessary conditions for guaranteeing the existence of a stable solution, and derive both positive and negative results for strategyproof stable matching.
△ Less
Submitted 17 February, 2024;
originally announced February 2024.
-
Common Knowledge, Regained
Authors:
Yannai A. Gonczarowski,
Yoram Moses
Abstract:
For common knowledge to arise in dynamic settings, all players must simultaneously come to know it has arisen. Consequently, common knowledge cannot arise in many realistic settings with timing frictions. This counterintuitive observation of Halpern and Moses (1990) was discussed by Arrow et al. (1987) and Aumann (1989), was called a paradox by Morris (2014), and has evaded satisfactory resolution…
▽ More
For common knowledge to arise in dynamic settings, all players must simultaneously come to know it has arisen. Consequently, common knowledge cannot arise in many realistic settings with timing frictions. This counterintuitive observation of Halpern and Moses (1990) was discussed by Arrow et al. (1987) and Aumann (1989), was called a paradox by Morris (2014), and has evaded satisfactory resolution for four decades. We resolve this paradox by proposing a new definition for common knowledge, which coincides with the traditional one in static settings but is more permissive in dynamic settings. Under our definition, common knowledge can arise without simultaneity, particularly in canonical examples of the Haplern-Moses paradox. We demonstrate its usefulness by deriving for it an agreement theorem à la Aumann (1976), showing it arises in the setting of Geanakoplos and Polemarchakis (1982) with timing frictions added, and applying it to characterize equilibrium behavior in a dynamic coordination game.
△ Less
Submitted 23 April, 2024; v1 submitted 7 November, 2023;
originally announced November 2023.
-
The Distortion of Binomial Voting Defies Expectation
Authors:
Yannai A. Gonczarowski,
Gregory Kehne,
Ariel D. Procaccia,
Ben Schiffer,
Shirley Zhang
Abstract:
In computational social choice, the distortion of a voting rule quantifies the degree to which the rule overcomes limited preference information to select a socially desirable outcome. This concept has been investigated extensively, but only through a worst-case lens. Instead, we study the expected distortion of voting rules with respect to an underlying distribution over voter utilities. Our main…
▽ More
In computational social choice, the distortion of a voting rule quantifies the degree to which the rule overcomes limited preference information to select a socially desirable outcome. This concept has been investigated extensively, but only through a worst-case lens. Instead, we study the expected distortion of voting rules with respect to an underlying distribution over voter utilities. Our main contribution is the design and analysis of a novel and intuitive rule, binomial voting, which provides strong distribution-independent guarantees for both expected distortion and expected welfare.
△ Less
Submitted 7 December, 2023; v1 submitted 27 June, 2023;
originally announced June 2023.
-
Zero-Knowledge Mechanisms
Authors:
Ran Canetti,
Amos Fiat,
Yannai A. Gonczarowski
Abstract:
A powerful feature in mechanism design is the ability to irrevocably commit to the rules of a mechanism. Commitment is achieved by public declaration, which enables players to verify incentive properties in advance and the outcome in retrospect. However, public declaration can reveal superfluous information that the mechanism designer might prefer not to disclose, such as her target function or pr…
▽ More
A powerful feature in mechanism design is the ability to irrevocably commit to the rules of a mechanism. Commitment is achieved by public declaration, which enables players to verify incentive properties in advance and the outcome in retrospect. However, public declaration can reveal superfluous information that the mechanism designer might prefer not to disclose, such as her target function or private costs. Avoiding this may be possible via a trusted mediator; however, the availability of a trusted mediator, especially if mechanism secrecy must be maintained for years, might be unrealistic. We propose a new approach to commitment, and show how to commit to, and run, any given mechanism without disclosing it, while enabling the verification of incentive properties and the outcome -- all without the need for any mediators. Our framework is based on zero-knowledge proofs -- a cornerstone of modern cryptographic theory. Applications include non-mediated bargaining with hidden yet binding offers.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Structural Complexities of Matching Mechanisms
Authors:
Yannai A. Gonczarowski,
Clayton Thomas
Abstract:
We study various novel complexity measures for two-sided matching mechanisms, applied to the two canonical strategyproof matching mechanisms, Deferred Acceptance (DA) and Top Trading Cycles (TTC). Our metrics are designed to capture the complexity of various structural (rather than computational) concerns, in particular ones of recent interest within economics. We consider a unified, flexible appr…
▽ More
We study various novel complexity measures for two-sided matching mechanisms, applied to the two canonical strategyproof matching mechanisms, Deferred Acceptance (DA) and Top Trading Cycles (TTC). Our metrics are designed to capture the complexity of various structural (rather than computational) concerns, in particular ones of recent interest within economics. We consider a unified, flexible approach to formalizing our questions: Define a protocol or data structure performing some task, and bound the number of bits that it requires. Our main results apply this approach to four questions of general interest; for mechanisms matching applicants to institutions, our questions are:
(1) How can one applicant affect the outcome matching?
(2) How can one applicant affect another applicant's set of options?
(3) How can the outcome matching be represented / communicated?
(4) How can the outcome matching be verified?
Holistically, our results show that TTC is more complex than DA, formalizing previous intuitions that DA has a simpler structure than TTC. For question (2), our result gives a new combinatorial characterization of which institutions are removed from each applicant's set of options when a new applicant is added in DA; this characterization may be of independent interest. For question (3), our result gives new tight lower bounds proving that the relationship between the matching and the priorities is more complex in TTC than in DA. We nonetheless showcase that this higher complexity of TTC is nuanced: By constructing new tight lower-bound instances and new verification protocols, we prove that DA and TTC are comparable in complexity under questions (1) and (4). This more precisely delineates the ways in which TTC is more complex than DA, and emphasizes that diverse considerations must factor into gauging the complexity of matching mechanisms.
△ Less
Submitted 30 March, 2024; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Strategyproofness-Exposing Mechanism Descriptions
Authors:
Yannai A. Gonczarowski,
Ori Heffetz,
Clayton Thomas
Abstract:
A menu description presents a mechanism to player $i$ in two steps. Step (1) uses the reports of other players to describe $i$'s menu: the set of $i$'s potential outcomes. Step (2) uses $i$'s report to select $i$'s favorite outcome from her menu. Can menu descriptions better expose strategyproofness, without sacrificing simplicity? We propose a new, simple menu description of Deferred Acceptance.…
▽ More
A menu description presents a mechanism to player $i$ in two steps. Step (1) uses the reports of other players to describe $i$'s menu: the set of $i$'s potential outcomes. Step (2) uses $i$'s report to select $i$'s favorite outcome from her menu. Can menu descriptions better expose strategyproofness, without sacrificing simplicity? We propose a new, simple menu description of Deferred Acceptance. We prove that -- in contrast with other common matching mechanisms -- this menu description must differ substantially from the corresponding traditional description. We demonstrate, with a lab experiment on two elementary mechanisms, the promise and challenges of menu descriptions.
△ Less
Submitted 10 July, 2023; v1 submitted 27 September, 2022;
originally announced September 2022.
-
Revenue Maximization for Buyers with Costly Participation
Authors:
Yannai A. Gonczarowski,
Nicole Immorlica,
Yingkai Li,
Brendan Lucier
Abstract:
We study mechanisms for selling a single item when buyers have private costs for participating in the mechanism. An agent's participation cost can also be interpreted as an outside option value that she must forego to participate. This substantially changes the revenue maximization problem, which becomes non-convex in the presence of participation costs. For multiple buyers, we show how to constru…
▽ More
We study mechanisms for selling a single item when buyers have private costs for participating in the mechanism. An agent's participation cost can also be interpreted as an outside option value that she must forego to participate. This substantially changes the revenue maximization problem, which becomes non-convex in the presence of participation costs. For multiple buyers, we show how to construct a $(2+ε)$-approximately revenue-optimal mechanism in polynomial time. Our approach makes use of a many-buyers-to-single-buyer reduction, and in the single-buyer case our mechanism improves to an FPTAS. We also bound the menu size and the sample complexity for the optimal single-buyer mechanism. Moreover, we show that posting a single price in the single-buyer case is in fact optimal under the assumption that either (1) the participation cost is independent of the value, and the value distribution has decreasing marginal revenue or monotone hazard rate; or (2) the participation cost is a concave function of the value. When there are multiple buyers, we show that sequential posted pricing guarantees a large fraction of the optimal revenue under similar conditions.
△ Less
Submitted 5 November, 2023; v1 submitted 5 March, 2021;
originally announced March 2021.
-
Esca** Cannibalization? Correlation-Robust Pricing for a Unit-Demand Buyer
Authors:
Moshe Babaioff,
Michal Feldman,
Yannai A. Gonczarowski,
Brendan Lucier,
Inbal Talgam-Cohen
Abstract:
We consider a robust version of the revenue maximization problem, where a single seller wishes to sell $n$ items to a single unit-demand buyer. In this robust version, the seller knows the buyer's marginal value distribution for each item separately, but not the joint distribution, and prices the items to maximize revenue in the worst case over all compatible correlation structures. We devise a co…
▽ More
We consider a robust version of the revenue maximization problem, where a single seller wishes to sell $n$ items to a single unit-demand buyer. In this robust version, the seller knows the buyer's marginal value distribution for each item separately, but not the joint distribution, and prices the items to maximize revenue in the worst case over all compatible correlation structures. We devise a computationally efficient (polynomial in the support size of the marginals) algorithm that computes the worst-case joint distribution for any choice of item prices. And yet, in sharp contrast to the additive buyer case (Carroll, 2017), we show that it is NP-hard to approximate the optimal choice of prices to within any factor better than $n^{1/2-ε}$. For the special case of marginal distributions that satisfy the monotone hazard rate property, we show how to guarantee a constant fraction of the optimal worst-case revenue using item pricing; this pricing equates revenue across all possible correlations and can be computed efficiently.
△ Less
Submitted 25 August, 2020; v1 submitted 12 March, 2020;
originally announced March 2020.
-
The Complexity of Interactively Learning a Stable Matching by Trial and Error
Authors:
Ehsan Emamjomeh-Zadeh,
Yannai A. Gonczarowski,
David Kempe
Abstract:
In a stable matching setting, we consider a query model that allows for an interactive learning algorithm to make precisely one type of query: proposing a matching, the response to which is either that the proposed matching is stable, or a blocking pair (chosen adversarially) indicating that this matching is unstable. For one-to-one matching markets, our main result is an essentially tight upper b…
▽ More
In a stable matching setting, we consider a query model that allows for an interactive learning algorithm to make precisely one type of query: proposing a matching, the response to which is either that the proposed matching is stable, or a blocking pair (chosen adversarially) indicating that this matching is unstable. For one-to-one matching markets, our main result is an essentially tight upper bound of $O(n^2\log n)$ on the deterministic query complexity of interactively learning a stable matching in this coarse query model, along with an efficient randomized algorithm that achieves this query complexity with high probability. For many-to-many matching markets in which participants have responsive preferences, we first give an interactive learning algorithm whose query complexity and running time are polynomial in the size of the market if the maximum quota of each agent is bounded; our main result for many-to-many markets is that the deterministic query complexity can be made polynomial (more specifically, $O(n^3 \log n)$) in the size of the market even for arbitrary (e.g., linear in the market size) quotas.
△ Less
Submitted 19 September, 2020; v1 submitted 17 February, 2020;
originally announced February 2020.
-
To Infinity and Beyond: A General Framework for Scaling Economic Theories
Authors:
Yannai A. Gonczarowski,
Scott Duke Kominers,
Ran I. Shorrer
Abstract:
Many economic theory models incorporate finiteness assumptions that, while introduced for simplicity, play a real role in the analysis. We provide a principled framework for scaling results from such models by removing these finiteness assumptions. Our sufficient conditions are on the theorem statement only, and not on its proof. This results in short proofs, and even allows to use the same argume…
▽ More
Many economic theory models incorporate finiteness assumptions that, while introduced for simplicity, play a real role in the analysis. We provide a principled framework for scaling results from such models by removing these finiteness assumptions. Our sufficient conditions are on the theorem statement only, and not on its proof. This results in short proofs, and even allows to use the same argument to scale similar theorems that were proven using distinctly different tools. We demonstrate the versatility of our approach via examples from both revealed-preference theory and matching theory.
△ Less
Submitted 9 April, 2023; v1 submitted 25 June, 2019;
originally announced June 2019.
-
Matching for the Israeli "Mechinot" Gap-Year Programs: Handling Rich Diversity Requirements
Authors:
Yannai A. Gonczarowski,
Lior Kovalio,
Noam Nisan,
Assaf Romm
Abstract:
We describe our experience with designing and running a matching market for the Israeli "Mechinot" gap-year programs. The main conceptual challenge in the design of this market was the rich set of diversity considerations, which necessitated the development of an appropriate preference-specification language along with corresponding choice-function semantics, which we also theoretically analyze. O…
▽ More
We describe our experience with designing and running a matching market for the Israeli "Mechinot" gap-year programs. The main conceptual challenge in the design of this market was the rich set of diversity considerations, which necessitated the development of an appropriate preference-specification language along with corresponding choice-function semantics, which we also theoretically analyze. Our contribution extends the existing toolbox for two-sided matching with soft constraints. This market was run for the first time in January 2018 and matched 1,607 candidates (out of a total of 3,120 candidates) to 35 different programs, has been run twice more since, and has been adopted by the Joint Council of the "Mechinot" gap-year programs for the foreseeable future.
△ Less
Submitted 25 August, 2020; v1 submitted 1 May, 2019;
originally announced May 2019.
-
Bulow-Klemperer-Style Results for Welfare Maximization in Two-Sided Markets
Authors:
Moshe Babaioff,
Kira Goldner,
Yannai A. Gonczarowski
Abstract:
We consider the problem of welfare maximization in two-sided markets using simple mechanisms that are prior-independent. The Myerson-Satterthwaite impossibility theorem shows that even for bilateral trade, there is no feasible (IR, truthful, budget balanced) mechanism that has welfare as high as the optimal-yet-infeasible VCG mechanism, which attains maximal welfare but runs a deficit. On the othe…
▽ More
We consider the problem of welfare maximization in two-sided markets using simple mechanisms that are prior-independent. The Myerson-Satterthwaite impossibility theorem shows that even for bilateral trade, there is no feasible (IR, truthful, budget balanced) mechanism that has welfare as high as the optimal-yet-infeasible VCG mechanism, which attains maximal welfare but runs a deficit. On the other hand, the optimal feasible mechanism needs to be carefully tailored to the Bayesian prior, and is extremely complex, eluding a precise description.
We present Bulow-Klemperer-style results to circumvent these hurdles in double-auction markets. We suggest using the Buyer Trade Reduction (BTR) mechanism, a variant of McAfee's mechanism, which is feasible and simple (in particular, deterministic, truthful, prior-independent, anonymous). First, in the setting where buyers' and sellers' values are sampled i.i.d. from the same distribution, we show that for any such market of any size, BTR with one additional buyer whose value is sampled from the same distribution has expected welfare at least as high as the optimal in the original market.
We then move to a more general setting where buyers' values are sampled from one distribution and sellers' from another, focusing on the case where the buyers' distribution first-order stochastically dominates the sellers'. We present bounds on the number of buyers that, when added, guarantees that BTR in the augmented market have welfare at least as high as the optimal in the original market. Our lower bounds extend to a large class of mechanisms, and all of our results extend to adding sellers instead of buyers. In addition, we present positive results about the usefulness of pricing at a sample for welfare maximization in two-sided markets under the above two settings, which to the best of our knowledge are the first sampling results in this context.
△ Less
Submitted 23 December, 2019; v1 submitted 15 March, 2019;
originally announced March 2019.
-
Playing on a Level Field: Sincere and Sophisticated Players in the Boston Mechanism with a Coarse Priority Structure
Authors:
Moshe Babaioff,
Yannai A. Gonczarowski,
Assaf Romm
Abstract:
Who gains and who loses from a manipulable school-choice mechanism? Studying the outcomes of sincere and sophisticated students under the manipulable Boston Mechanism as compared with the strategy-proof Deferred Acceptance, we provide robust "anything-goes" theorems for large random markets with coarse priority structures. I.e., there are many sincere and sophisticated students who prefer the Bost…
▽ More
Who gains and who loses from a manipulable school-choice mechanism? Studying the outcomes of sincere and sophisticated students under the manipulable Boston Mechanism as compared with the strategy-proof Deferred Acceptance, we provide robust "anything-goes" theorems for large random markets with coarse priority structures. I.e., there are many sincere and sophisticated students who prefer the Boston Mechanism to Deferred Acceptance, and vice versa. Some populations may even benefit from being sincere (if also perceived as such). Our findings reconcile qualitative differences between previous theory and known empirical results. We conclude by studying market forces that can influence the choice between these mechanisms.
△ Less
Submitted 9 June, 2020; v1 submitted 15 October, 2018;
originally announced October 2018.
-
The Sample Complexity of Up-to-$\varepsilon$ Multi-Dimensional Revenue Maximization
Authors:
Yannai A. Gonczarowski,
S. Matthew Weinberg
Abstract:
We consider the sample complexity of revenue maximization for multiple bidders in unrestricted multi-dimensional settings. Specifically, we study the standard model of $n$ additive bidders whose values for $m$ heterogeneous items are drawn independently. For any such instance and any $\varepsilon>0$, we show that it is possible to learn an $\varepsilon$-Bayesian Incentive Compatible auction whose…
▽ More
We consider the sample complexity of revenue maximization for multiple bidders in unrestricted multi-dimensional settings. Specifically, we study the standard model of $n$ additive bidders whose values for $m$ heterogeneous items are drawn independently. For any such instance and any $\varepsilon>0$, we show that it is possible to learn an $\varepsilon$-Bayesian Incentive Compatible auction whose expected revenue is within $\varepsilon$ of the optimal $\varepsilon$-BIC auction from only polynomially many samples.
Our fully nonparametric approach is based on ideas that hold quite generally, and completely sidestep the difficulty of characterizing optimal (or near-optimal) auctions for these settings. Therefore, our results easily extend to general multi-dimensional settings, including valuations that are not necessarily even subadditive, and arbitrary allocation constraints. For the cases of a single bidder and many goods, or a single parameter (good) and many bidders, our analysis yields exact incentive compatibility (and for the latter also computational efficiency). Although the single-parameter case is already well-understood, our corollary for this case extends slightly the state-of-the-art.
△ Less
Submitted 9 April, 2021; v1 submitted 7 August, 2018;
originally announced August 2018.
-
Are Two (Samples) Really Better Than One? On the Non-Asymptotic Performance of Empirical Revenue Maximization
Authors:
Moshe Babaioff,
Yannai A. Gonczarowski,
Yishay Mansour,
Shay Moran
Abstract:
The literature on "mechanism design from samples," which has flourished in recent years at the interface of economics and computer science, offers a bridge between the classic computer-science approach of worst-case analysis (corresponding to "no samples") and the classic economic approach of average-case analysis for a given Bayesian prior (conceptually corresponding to the number of samples tend…
▽ More
The literature on "mechanism design from samples," which has flourished in recent years at the interface of economics and computer science, offers a bridge between the classic computer-science approach of worst-case analysis (corresponding to "no samples") and the classic economic approach of average-case analysis for a given Bayesian prior (conceptually corresponding to the number of samples tending to infinity). Nonetheless, the two directions studied so far are two extreme and almost diametrically opposed directions: that of asymptotic results where the number of samples grows large, and that where only a single sample is available. In this paper, we take a first step toward understanding the middle ground that bridges these two approaches: that of a fixed number of samples greater than one. In a variety of contexts, we ask what is possibly the most fundamental question in this direction: "are two samples really better than one sample?". We present a few surprising negative results, and complement them with our main result: showing that the worst-case, over all regular distributions, expected-revenue guarantee of the Empirical Revenue Maximization algorithm given two samples is greater than that of this algorithm given one sample. The proof is technically challenging, and provides the first result that shows that some deterministic mechanism constructed using two samples can guarantee more than one half of the optimal revenue.
△ Less
Submitted 2 July, 2018; v1 submitted 22 February, 2018;
originally announced February 2018.
-
The Best of Both Worlds: Asymptotically Efficient Mechanisms with a Guarantee on the Expected Gains-From-Trade
Authors:
Moshe Babaioff,
Yang Cai,
Yannai A. Gonczarowski,
Mingfei Zhao
Abstract:
The seminal impossibility result of Myerson and Satterthwaite (1983) states that for bilateral trade, there is no mechanism that is individually rational (IR), incentive compatible (IC), weakly budget balanced, and efficient. This has led follow-up work on two-sided trade settings to weaken the efficiency requirement and consider approximately efficient simple mechanisms, while still demanding the…
▽ More
The seminal impossibility result of Myerson and Satterthwaite (1983) states that for bilateral trade, there is no mechanism that is individually rational (IR), incentive compatible (IC), weakly budget balanced, and efficient. This has led follow-up work on two-sided trade settings to weaken the efficiency requirement and consider approximately efficient simple mechanisms, while still demanding the other properties. The current state-of-the-art of such mechanisms for two-sided markets can be categorized as giving one (but not both) of the following two types of approximation guarantees on the gains from trade: a constant ex-ante guarantee, measured with respect to the second-best efficiency benchmark, or an asymptotically optimal ex-post guarantee, measured with respect to the first-best efficiency benchmark. Here the second-best efficiency benchmark refers to the highest gains from trade attainable by any IR, IC and weakly budget balanced mechanism, while the first-best efficiency benchmark refers to the maximum gains from trade (attainable by the VCG mechanism, which is not weakly budget balanced).
In this paper, we construct simple mechanisms for double-auction and matching markets that simultaneously achieve both types of guarantees: these are ex-post IR, Bayesian IC, and ex-post weakly budget balanced mechanisms that 1) ex-ante guarantee a constant fraction of the gains from trade of the second-best, and 2) ex-post guarantee a realization-dependent fraction of the gains from trade of the first-best, such that this realization-dependent fraction converges to 1 (full efficiency) as the market grows large.
△ Less
Submitted 22 February, 2018;
originally announced February 2018.
-
Bounding the Menu-Size of Approximately Optimal Auctions via Optimal-Transport Duality
Authors:
Yannai A. Gonczarowski
Abstract:
The question of the minimum menu-size for approximate (i.e., up-to-$\varepsilon$) Bayesian revenue maximization when selling two goods to an additive risk-neutral quasilinear buyer was introduced by Hart and Nisan (2013), who give an upper bound of $O(\frac{1}{\varepsilon^4})$ for this problem. Using the optimal-transport duality framework of Daskalakis et al. (2013, 2015), we derive the first low…
▽ More
The question of the minimum menu-size for approximate (i.e., up-to-$\varepsilon$) Bayesian revenue maximization when selling two goods to an additive risk-neutral quasilinear buyer was introduced by Hart and Nisan (2013), who give an upper bound of $O(\frac{1}{\varepsilon^4})$ for this problem. Using the optimal-transport duality framework of Daskalakis et al. (2013, 2015), we derive the first lower bound for this problem - of $Ω(\frac{1}{\sqrt[4]{\varepsilon}})$, even when the values for the two goods are drawn i.i.d. from "nice" distributions, establishing how to reason about approximately optimal mechanisms via this duality framework. This bound implies, for any fixed number of goods, a tight bound of $Θ(\log\frac{1}{\varepsilon})$ on the minimum deterministic communication complexity guaranteed to suffice for running some approximately revenue-maximizing mechanism, thereby completely resolving this problem. As a secondary result, we show that under standard economic assumptions on distributions, the above upper bound of Hart and Nisan (2013) can be strengthened to $O(\frac{1}{\varepsilon^2})$.
△ Less
Submitted 11 July, 2018; v1 submitted 29 August, 2017;
originally announced August 2017.
-
Submultiplicative Glivenko-Cantelli and Uniform Convergence of Revenues
Authors:
Noga Alon,
Moshe Babaioff,
Yannai A. Gonczarowski,
Yishay Mansour,
Shay Moran,
Amir Yehudayoff
Abstract:
In this work we derive a variant of the classic Glivenko-Cantelli Theorem, which asserts uniform convergence of the empirical Cumulative Distribution Function (CDF) to the CDF of the underlying distribution. Our variant allows for tighter convergence bounds for extreme values of the CDF.
We apply our bound in the context of revenue learning, which is a well-studied problem in economics and algor…
▽ More
In this work we derive a variant of the classic Glivenko-Cantelli Theorem, which asserts uniform convergence of the empirical Cumulative Distribution Function (CDF) to the CDF of the underlying distribution. Our variant allows for tighter convergence bounds for extreme values of the CDF.
We apply our bound in the context of revenue learning, which is a well-studied problem in economics and algorithmic game theory. We derive sample-complexity bounds on the uniform convergence rate of the empirical revenues to the true revenues, assuming a bound on the $k$th moment of the valuations, for any (possibly fractional) $k>1$.
For uniform convergence in the limit, we give a complete characterization and a zero-one law: if the first moment of the valuations is finite, then uniform convergence almost surely occurs; conversely, if the first moment is infinite, then uniform convergence almost never occurs.
△ Less
Submitted 6 November, 2017; v1 submitted 23 May, 2017;
originally announced May 2017.
-
Efficient Empirical Revenue Maximization in Single-Parameter Auction Environments
Authors:
Yannai A. Gonczarowski,
Noam Nisan
Abstract:
We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (…
▽ More
We present a polynomial-time algorithm that, given samples from the unknown valuation distribution of each bidder, learns an auction that approximately maximizes the auctioneer's revenue in a variety of single-parameter auction environments including matroid environments, position environments, and the public project environment. The valuation distributions may be arbitrary bounded distributions (in particular, they may be irregular, and may differ for the various bidders), thus resolving a problem left open by previous papers. The analysis uses basic tools, is performed in its entirety in value-space, and simplifies the analysis of previously known results for special cases. Furthermore, the analysis extends to certain single-parameter auction environments where precise revenue maximization is known to be intractable, such as knapsack environments.
△ Less
Submitted 9 April, 2017; v1 submitted 31 October, 2016;
originally announced October 2016.
-
Gibbard-Satterthwaite Success Stories and Obvious Strategyproofness
Authors:
Sophie Bade,
Yannai A. Gonczarowski
Abstract:
The Gibbard-Satterthwaite Impossibility Theorem holds that dictatorship is the only Pareto optimal and strategyproof social choice function on the full domain of preferences. Much of the work in mechanism design aims at getting around this impossibility theorem. Three grand success stories stand out. On the domains of single peaked preferences, of house matching, and of quasilinear preferences, th…
▽ More
The Gibbard-Satterthwaite Impossibility Theorem holds that dictatorship is the only Pareto optimal and strategyproof social choice function on the full domain of preferences. Much of the work in mechanism design aims at getting around this impossibility theorem. Three grand success stories stand out. On the domains of single peaked preferences, of house matching, and of quasilinear preferences, there are appealing Pareto optimal and strategyproof social choice functions. We investigate whether these success stories are robust to strengthening strategyproofness to obvious strategyproofness (OSP), recently introduced by Li (2015).
For single peaked preferences, we characterize the class of OSP-implementable and unanimous social choice functions as dictatorships with safeguards against extremism - mechanisms (which turn out to also be Pareto optimal) in which the dictator can choose the outcome, but other agents may prevent the dictator from choosing an outcome that is too extreme. Median voting is consequently not OSP-implementable. Indeed, the only OSP-implementable quantile rules choose either the minimal or the maximal ideal point. For house matching, we characterize the class of OSP-implementable and Pareto optimal matching rules as sequential barter with lurkers - a significant generalization over bossy variants of bipolar serially dictatorial rules. While Li (2015) shows that second-price auctions are OSP-implementable when only one good is sold, we show that this positive result does not extend to the case of multiple goods. Even when all agents' preferences over goods are quasilinear and additive, no welfare-maximizing auction where losers pay nothing is OSP-implementable when more than one good is sold. Our analysis makes use of a gradual revelation principle, an analog of the (direct) revelation principle for OSP mechanisms that we present and prove.
△ Less
Submitted 18 March, 2017; v1 submitted 16 October, 2016;
originally announced October 2016.
-
Unbeatable Set Consensus via Topological and Combinatorial Reasoning
Authors:
Armando Castañeda,
Yannai A. Gonczarowski,
Yoram Moses
Abstract:
The set consensus problem has played an important role in the study of distributed systems for over two decades. Indeed, the search for lower bounds and impossibility results for this problem spawned the topological approach to distributed computing, which has given rise to new techniques in the design and analysis of protocols. The design of efficient solutions to set consensus has also proven to…
▽ More
The set consensus problem has played an important role in the study of distributed systems for over two decades. Indeed, the search for lower bounds and impossibility results for this problem spawned the topological approach to distributed computing, which has given rise to new techniques in the design and analysis of protocols. The design of efficient solutions to set consensus has also proven to be challenging. In the synchronous crash failure model, the literature contains a sequence of solutions to set consensus, each improving upon the previous ones.
This paper presents an unbeatable protocol for nonuniform k-set consensus in the synchronous crash failure model. This is an efficient protocol whose decision times cannot be improved upon. Moreover, the description of our protocol is extremely succinct. Proving unbeatability of this protocol is a nontrivial challenge. We provide two proofs for its unbeatability: one is a subtle constructive combinatorial proof, and the other is a topological proof of a new style. These two proofs provide new insight into the connection between topological reasoning and combinatorial reasoning about protocols, which has long been a subject of interest. In particular, our topological proof reasons in a novel way about subcomplexes of the protocol complex, and sheds light on an open question posed by Guerraoui and Pochon (2009). Finally, using the machinery developed in the design of this unbeatable protocol, we propose a protocol for uniform k-set consensus that beats all known solutions by a large margin.
△ Less
Submitted 24 May, 2016;
originally announced May 2016.
-
The Menu-Size Complexity of Revenue Approximation
Authors:
Moshe Babaioff,
Yannai A. Gonczarowski,
Noam Nisan
Abstract:
Consider a monopolist selling $n$ items to an additive buyer whose item values are drawn from independent distributions $F_1,F_2,\ldots,F_n$ possibly having unbounded support. Unlike in the single-item case, it is well known that the revenue-optimal selling mechanism (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. Also known is that simple mechanisms with a boun…
▽ More
Consider a monopolist selling $n$ items to an additive buyer whose item values are drawn from independent distributions $F_1,F_2,\ldots,F_n$ possibly having unbounded support. Unlike in the single-item case, it is well known that the revenue-optimal selling mechanism (a pricing scheme) may be complex, sometimes requiring a continuum of menu entries. Also known is that simple mechanisms with a bounded number of menu entries can extract a constant fraction of the optimal revenue. Nonetheless, whether an arbitrarily high fraction of the optimal revenue can be extracted via a bounded menu size remained open.
We give an affirmative answer: for every $n$ and $\varepsilon>0$, there exists $C=C(n,\varepsilon)$ s.t. mechanisms of menu size at most $C$ suffice for obtaining $(1-\varepsilon)$ of the optimal revenue from any $F_1,\ldots,F_n$. We prove upper and lower bounds on the revenue-approximation complexity $C(n,\varepsilon)$ and on the deterministic communication complexity required to run a mechanism achieving such an approximation.
△ Less
Submitted 9 April, 2021; v1 submitted 22 April, 2016;
originally announced April 2016.
-
Stable Matching Mechanisms are Not Obviously Strategy-Proof
Authors:
Itai Ashlagi,
Yannai A. Gonczarowski
Abstract:
Many two-sided matching markets, from labor markets to school choice programs, use a clearinghouse based on the applicant-proposing deferred acceptance algorithm, which is well known to be strategy-proof for the applicants. Nonetheless, a growing amount of empirical evidence reveals that applicants misrepresent their preferences when this mechanism is used. This paper shows that no mechanism that…
▽ More
Many two-sided matching markets, from labor markets to school choice programs, use a clearinghouse based on the applicant-proposing deferred acceptance algorithm, which is well known to be strategy-proof for the applicants. Nonetheless, a growing amount of empirical evidence reveals that applicants misrepresent their preferences when this mechanism is used. This paper shows that no mechanism that implements a stable matching is "obviously strategy-proof" for any side of the market, a stronger incentive property than strategy-proofness that was introduced by Li (2017). A stable mechanism that is obviously strategy-proof for applicants is introduced for the case in which agents on the other side have acyclical preferences.
△ Less
Submitted 18 July, 2018; v1 submitted 2 November, 2015;
originally announced November 2015.
-
Unbeatable Consensus
Authors:
Armando Castañeda,
Yannai A. Gonczarowski,
Yoram Moses
Abstract:
The unbeatability of a consensus protocol, introduced by Halpern, Moses and Waarts in 2001, is a stronger notion of optimality than the accepted notion of early stop** protocols. Using a novel knowledge-based analysis, this paper derives the first practical unbeatable consensus protocols in the literature, for the standard synchronous message-passing model with crash failures. These protocols st…
▽ More
The unbeatability of a consensus protocol, introduced by Halpern, Moses and Waarts in 2001, is a stronger notion of optimality than the accepted notion of early stop** protocols. Using a novel knowledge-based analysis, this paper derives the first practical unbeatable consensus protocols in the literature, for the standard synchronous message-passing model with crash failures. These protocols strictly dominate the best known protocols for uniform and for non-uniform consensus, in some case beating them by a large margin. The analysis provides a new understanding of the logical structure of consensus, and of the distinction between uniform and nonuniform consensus. Finally, the first (early stop** and) unbeatable protocol that treats decision values "fairly" is presented. All of these protocols have very concise descriptions, and are shown to be efficiently implementable.
△ Less
Submitted 9 October, 2014;
originally announced October 2014.
-
A Stable Marriage Requires Communication
Authors:
Yannai A. Gonczarowski,
Noam Nisan,
Rafail Ostrovsky,
Will Rosenbaum
Abstract:
The Gale-Shapley algorithm for the Stable Marriage Problem is known to take $Θ(n^2)$ steps to find a stable marriage in the worst case, but only $Θ(n \log n)$ steps in the average case (with $n$ women and $n$ men). In 1976, Knuth asked whether the worst-case running time can be improved in a model of computation that does not require sequential access to the whole input. A partial negative answer…
▽ More
The Gale-Shapley algorithm for the Stable Marriage Problem is known to take $Θ(n^2)$ steps to find a stable marriage in the worst case, but only $Θ(n \log n)$ steps in the average case (with $n$ women and $n$ men). In 1976, Knuth asked whether the worst-case running time can be improved in a model of computation that does not require sequential access to the whole input. A partial negative answer was given by Ng and Hirschberg, who showed that $Θ(n^2)$ queries are required in a model that allows certain natural random-access queries to the participants' preferences. A significantly more general - albeit slightly weaker - lower bound follows from Segal's general analysis of communication complexity, namely that $Ω(n^2)$ Boolean queries are required in order to find a stable marriage, regardless of the set of allowed Boolean queries.
Using a reduction to the communication complexity of the disjointness problem, we give a far simpler, yet significantly more powerful argument showing that $Ω(n^2)$ Boolean queries of any type are indeed required for finding a stable - or even an approximately stable - marriage. Notably, unlike Segal's lower bound, our lower bound generalizes also to (A) randomized algorithms, (B) allowing arbitrary separate preprocessing of the women's preferences profile and of the men's preferences profile, (C) several variants of the basic problem, such as whether a given pair is married in every/some stable marriage, and (D) determining whether a proposed marriage is stable or far from stable. In order to analyze "approximately stable" marriages, we introduce the notion of "distance to stability" and provide an efficient algorithm for its computation.
△ Less
Submitted 25 July, 2018; v1 submitted 29 May, 2014;
originally announced May 2014.
-
A Hydraulic Approach to Equilibria of Resource Selection Games
Authors:
Yannai A. Gonczarowski,
Moshe Tennenholtz
Abstract:
Drawing intuition from a (physical) hydraulic system, we present a novel framework, constructively showing the existence of a strong Nash equilibrium in resource selection games (i.e., asymmetric singleton congestion games) with nonatomic players, the coincidence of strong equilibria and Nash equilibria in such games, and the uniqueness of the cost of each given resource across all Nash equilibria…
▽ More
Drawing intuition from a (physical) hydraulic system, we present a novel framework, constructively showing the existence of a strong Nash equilibrium in resource selection games (i.e., asymmetric singleton congestion games) with nonatomic players, the coincidence of strong equilibria and Nash equilibria in such games, and the uniqueness of the cost of each given resource across all Nash equilibria. Our proofs allow for explicit calculation of Nash equilibrium and for explicit and direct calculation of the resulting (unique) costs of resources, and do not hinge on any fixed-point theorem, on the Minimax theorem or any equivalent result, on linear programming, or on the existence of a potential (though our analysis does provide powerful insights into the potential, via a natural concrete physical interpretation). A generalization of resource selection games, called resource selection games with I.D.-dependent weighting, is defined, and the results are extended to this family, showing the existence of strong equilibria, and showing that while resource costs are no longer unique across Nash equilibria in games of this family, they are nonetheless unique across all strong Nash equilibria, drawing a novel fundamental connection between group deviation and I.D.-congestion. A natural application of the resulting machinery to a large class of constraint-satisfaction problems is also described.
△ Less
Submitted 5 June, 2016; v1 submitted 29 March, 2014;
originally announced March 2014.
-
A Mirage of Market Allocation
Authors:
Yannai A. Gonczarowski,
Moshe Tennenholtz
Abstract:
Can noncooperative behaviour of merchants lead to a market split that prima facie seems anticompetitive? We introduce a model in which service providers, with ISPs being the main example, aim at optimizing the number of customers using their services, while customers aim at choosing service providers with low customer load (high bandwidth per subscriber, for ISPs). Each service provider chooses be…
▽ More
Can noncooperative behaviour of merchants lead to a market split that prima facie seems anticompetitive? We introduce a model in which service providers, with ISPs being the main example, aim at optimizing the number of customers using their services, while customers aim at choosing service providers with low customer load (high bandwidth per subscriber, for ISPs). Each service provider chooses between a variety of levels of service (latencies, for ISPs), and as long as it does not lose customers, aims at minimizing its level of service; the minimum level of service required to satisfy a customer varies across customers. We consider a two-stage competition: in the first stage, service providers select their levels of service; in the second stage, customers choose between service providers. In the two-stage game, we show that the competition among service providers possesses a unique Nash equilibrium, which is moreover super-strong; we also show that sequential better-response dynamics of service providers reach this equilibrium, with best-response dynamics doing so surprisingly fast. If service providers choose their levels of service according to this equilibrium, then the unique Nash equilibrium among customers in the second phase is a split of the market between the service providers, based on the customers' minimum acceptable quality of service; moreover, each service provider's chosen level of service is the lowest acceptable by the entirety of its market slice, seemingly making no attempt to attract other customers. Our results show that this prima facie market allocation (collusive split of the market) arises as the unique and highly robust outcome of noncooperative, even myopic, service-provider behaviour. These results are applicable to a wide variety of scenarios, from explaining phenomena observable in food markets, to shedding a surprising light on aspects of location theory.
△ Less
Submitted 12 February, 2015; v1 submitted 28 March, 2014;
originally announced March 2014.
-
Good, Better, Best! - Unbeatable Protocols for Consensus and Set Consensus
Authors:
Armando Castañeda,
Yannai A. Gonczarowski,
Yoram Moses
Abstract:
While the very first consensus protocols for the synchronous model were designed to match the worst-case lower bound, deciding in exactly t+1 rounds in all runs, it was soon realized that they could be strictly improved upon by early stop** protocols. These dominate the first ones, by always deciding in at most t+1 rounds, but often much faster. A protocol is unbeatable if it can't be strictly d…
▽ More
While the very first consensus protocols for the synchronous model were designed to match the worst-case lower bound, deciding in exactly t+1 rounds in all runs, it was soon realized that they could be strictly improved upon by early stop** protocols. These dominate the first ones, by always deciding in at most t+1 rounds, but often much faster. A protocol is unbeatable if it can't be strictly dominated. Unbeatability is often a much more suitable notion of optimality for distributed protocols than worst-case performance. Using a knowledge-based analysis, this paper studies unbeatability for both consensus and k-set consensus. We present unbeatable solutions to non-uniform consensus and k-set consensus, and uniform consensus in synchronous message-passing contexts with crash failures.
The k-set consensus problem is much more technically challenging than consensus, and its analysis has triggered the development of the topological approach to distributed computing. Worst-case lower bounds for this problem have required either techniques based on algebraic topology, or reduction-based proofs. Our proof of unbeatability is purely combinatorial, and is a direct, albeit nontrivial, generalization of the one for consensus. We also present an alternative topological unbeatability proof that allows to understand the connection between the connectivity of protocol complexes and the decision time of processes.
For the synchronous model, only solutions to the uniform variant of k-set consensus have been offered. Based on our unbeatable protocols for uniform consensus and for non-uniform k-set consensus, we present a uniform k-set consensus protocol that strictly dominates all known solutions to this problem in the synchronous model.
△ Less
Submitted 27 November, 2013;
originally announced November 2013.
-
Timely Common Knowledge
Authors:
Yannai A. Gonczarowski,
Yoram Moses
Abstract:
Coordinating activities at different sites of a multi-agent system typically imposes epistemic constraints on the participants. Specifying explicit bounds on the relative times at which actions are performed induces combined temporal and epistemic constraints on when agents can perform their actions. This paper characterises the interactive epistemic state that arises when actions must meet partic…
▽ More
Coordinating activities at different sites of a multi-agent system typically imposes epistemic constraints on the participants. Specifying explicit bounds on the relative times at which actions are performed induces combined temporal and epistemic constraints on when agents can perform their actions. This paper characterises the interactive epistemic state that arises when actions must meet particular temporal constraints. The new state, called timely common knowledge, generalizes common knowledge, as well as other variants of common knowledge. While known variants of common knowledge are defined in terms of a fixed point of an epistemic formula, timely common knowledge is defined in terms of a vectorial fixed point of temporal-epistemic formulae. A general class of coordination tasks with timing constraints is defined, and timely common knowledge is used to characterise both solvability and optimal solutions of such tasks. Moreover, it is shown that under natural conditions, timely common knowledge is equivalent to an infinite conjunction of temporal-epistemic formulae, in analogy to the popular definition of common knowledge.
△ Less
Submitted 23 October, 2013;
originally announced October 2013.
-
Manipulation of Stable Matchings using Minimal Blacklists
Authors:
Yannai A. Gonczarowski
Abstract:
Gale and Sotomayor (1985) have shown that in the Gale-Shapley matching algorithm (1962), the proposed-to side W (referred to as women there) can strategically force the W-optimal stable matching as the M-optimal one by truncating their preference lists, each woman possibly blacklisting all but one man. As Gusfield and Irving have already noted in 1989, no results are known regarding achieving this…
▽ More
Gale and Sotomayor (1985) have shown that in the Gale-Shapley matching algorithm (1962), the proposed-to side W (referred to as women there) can strategically force the W-optimal stable matching as the M-optimal one by truncating their preference lists, each woman possibly blacklisting all but one man. As Gusfield and Irving have already noted in 1989, no results are known regarding achieving this feat by means other than such preference-list truncation, i.e. by also permuting preference lists.
We answer Gusfield and Irving's open question by providing tight upper bounds on the amount of blacklists and their combined size, that are required by the women to force a given matching as the M-optimal stable matching, or, more generally, as the unique stable matching. Our results show that the coalition of all women can strategically force any matching as the unique stable matching, using preference lists in which at most half of the women have nonempty blacklists, and in which the average blacklist size is less than 1. This allows the women to manipulate the market in a manner that is far more inconspicuous, in a sense, than previously realized. When there are less women than men, we show that in the absence of blacklists for men, the women can force any matching as the unique stable matching without blacklisting anyone, while when there are more women than men, each to-be-unmatched woman may have to blacklist as many as all men. Together, these results shed light on the question of how much, if at all, do given preferences for one side a priori impose limitations on the set of stable matchings under various conditions. All of the results in this paper are constructive, providing efficient algorithms for calculating the desired strategies.
△ Less
Submitted 10 March, 2014; v1 submitted 29 July, 2013;
originally announced July 2013.
-
"Secret Santa" and the Combined Length of Spanned Cycles in a Random Permutation
Authors:
Yannai A. Gonczarowski
Abstract:
In many schools throughout the United States, it is customary to hold a yearly "Secret Santa" event. With the approach of Christmas, all the students place their names in a hat; each student, in turn, draws a name out of the hat, thus becoming Secret Santa to the student whose name is drawn. On the day before Christmas break, each student places a gift in front of the locker of the student to whom…
▽ More
In many schools throughout the United States, it is customary to hold a yearly "Secret Santa" event. With the approach of Christmas, all the students place their names in a hat; each student, in turn, draws a name out of the hat, thus becoming Secret Santa to the student whose name is drawn. On the day before Christmas break, each student places a gift in front of the locker of the student to whom she or he is Secret Santa.
Unfortunately, children being children, some students might forget to bring gifts on this day. Students who do not find gifts next to their lockers, feeling cheated, angrily take their gifts back from their recipients, who in turn reclaim their gifts from their recipients, and so forth.
We analyze the distribution of the number $L$ of students whose Christmas is ruined, as a function of the number of students who do not bring gifts. We give a simple, explicit formula for the probability of every possible value for $L$ (backed by three proofs of distinct flavors), as well as closed-form formulae for its expectation and variance. Notably, we show that if $m$ kids forget to bring gifts, then the expected fraction of kids whose Christmas is not ruined is less than $\frac{1}{m+1}$ (regardless of the total number of students), with low probability for a large deviation from this fraction.
The underlying theoretical results are applicable to the study of manipulation in matching markets within game theory.
△ Less
Submitted 25 December, 2014; v1 submitted 16 July, 2013;
originally announced July 2013.
-
Satisfiability and Canonisation of Timely Constraints
Authors:
Yannai A. Gonczarowski
Abstract:
We abstractly formulate an analytic problem that arises naturally in the study of coordination in multi-agent systems. Let I be a set of arbitrary cardinality (the set of actions) and assume that for each pair of distinct actions (i,j), we are given a number δ(i,j). We say that a function t, specifying a time for each action, satisfies the timely constraint δ if for every pair of distinct actions…
▽ More
We abstractly formulate an analytic problem that arises naturally in the study of coordination in multi-agent systems. Let I be a set of arbitrary cardinality (the set of actions) and assume that for each pair of distinct actions (i,j), we are given a number δ(i,j). We say that a function t, specifying a time for each action, satisfies the timely constraint δ if for every pair of distinct actions (i,j), we have t(j)-t(i) <= δ(i,j) (and thus also t(j)-t(i) >= -δ(j,i)). While the approach that first comes to mind for analysing these definitions is an analytic/geometric one, it turns out that graph-theoretic tools yield powerful results when applied to these definitions. Using such tools, we characterise the set of satisfiable timely constraints, and reduce the problem of satisfiability of a timely constraint to the all-pairs shortest-path problem, and for finite I, furthermore to the negative-cycle detection problem. Moreover, we constructively show that every satisfiable timely constraint has a minimal satisfying function - a key milestone on the way to optimally solving a large class of coordination problems - and reduce the problem of finding this minimal satisfying function, as well as the problems of classifying and comparing timely constraints, to the all-pairs shortest-path problem. At the heart of our analysis lies the constructive definition of a "nicely-behaved" representative for each class of timely constraints sharing the same set of satisfying functions. We show that this canonical representative, as well as the map from such canonical representatives to the the sets of functions satisfying the classes of timely constraints they represent, has many desired properties, which provide deep insights into the structure underlying the above definitions.
△ Less
Submitted 20 April, 2013;
originally announced April 2013.
-
Timely Coordination in a Multi-Agent System
Authors:
Yannai A. Gonczarowski
Abstract:
In a distributed algorithm, multiple processes, or agents, work toward a common goal. More often than not, the actions of some agents are dependent on the previous execution (if not also on the outcome) of the actions of other agents. The resulting interdependencies between the timings of the actions of the various agents give rise to the study of methods for timely coordination of these actions.…
▽ More
In a distributed algorithm, multiple processes, or agents, work toward a common goal. More often than not, the actions of some agents are dependent on the previous execution (if not also on the outcome) of the actions of other agents. The resulting interdependencies between the timings of the actions of the various agents give rise to the study of methods for timely coordination of these actions.
In this work, we formulate and mathematically analyze "Timely-Coordinated Response" - a novel multi-agent coordination problem in which the time difference between each pair of actions may be constrained by upper and/or lower bounds. This problem generalizes coordination problems previously studied by Halpern and Moses and by Ben-Zvi and Moses.
We optimally solve timely-coordinated response in two ways: using a generalization of the fixed-point approach of Halpern and Moses, and using a generalization of the "syncausality" approach of Ben-Zvi and Moses. We constructively show the equivalence of the solutions yielded by both approaches, and by combining them, derive strengthened versions of known results for some previously-defined special cases of this problem.
Our analysis is conducted under minimal assumptions: we work in a continuous-time model with possibly infinitely many agents. The general results we obtain for this model reduce to stronger ones for discrete-time models with only finitely many agents. In order to distill the properties of such models that are significant to this reduction, we define several classes of naturally-occurring models, which in a sense separate the different results. We present both a more practical optimal solution, as well as a surprisingly simple condition for solvability, for timely coordinated response under these models.
Finally, we show how our results generalize the results known for previously-studied special cases of this problem.
△ Less
Submitted 10 June, 2012;
originally announced June 2012.
-
On Sisterhood in the Gale-Shapley Matching Algorithm
Authors:
Yannai A. Gonczarowski,
Ehud Friedgut
Abstract:
Lying in order to manipulate the Gale-Shapley matching algorithm has been studied by Dubins and Friedman and by Gale and Sotomayor and was shown to be generally more appealing to the proposed-to side (denoted as the women in Gale and Shapley's original paper) than to the proposing side (denoted as men there). It can also be shown that in the case of lying women, for every woman who is better-off d…
▽ More
Lying in order to manipulate the Gale-Shapley matching algorithm has been studied by Dubins and Friedman and by Gale and Sotomayor and was shown to be generally more appealing to the proposed-to side (denoted as the women in Gale and Shapley's original paper) than to the proposing side (denoted as men there). It can also be shown that in the case of lying women, for every woman who is better-off due to lying, there exists a man who is worse-off.
In this paper, we show that an even stronger dichotomy between the goals of the sexes holds, namely, if no woman is worse-off then no man is better-off, while a form of sisterhood between the lying and the "innocent" women also holds, namely, if none of the former are worse-off, then neither is any of the latter.
This paper is based upon an undergraduate ("Amirim") thesis of the first author.
△ Less
Submitted 19 December, 2011; v1 submitted 12 April, 2011;
originally announced April 2011.