arxiv: v2 [cs.gt] 14 Apr 2017
|
|
- Milton Blake
- 5 years ago
- Views:
Transcription
1 Best-Response Dynamcs n Combnatoral Auctons wth Item Bddng Paul Düttng Thomas Kesselhem arxv: v2 [cs.gt] 14 Apr 2017 November 8, 2018 Abstract In a combnatoral aucton wth tem bddng, agents partcpate n multple sngle-tem second-prce auctons at once. As some tems mght be substtutes, agents need to strategze n order to mze ther utltes. A number of results ndcate that hgh welfare can be acheved ths way, gvng bounds on the welfare at equlbrum. Recently, however, crtcsm has been rased that equlbra are hard to compute and therefore unlkely to be attaned. In ths paper, we take a dfferent perspectve. We study smple best-response dynamcs. That s, agents are actvated one after the other and each actvated agent updates hs strategy myopcally to a best response aganst the other agents current strateges. Often these dynamcs may take exponentally long before they converge or they may not converge at all. However, as we show, convergence s not even necessary for good welfare guarantees. Gven that agents bd updates are aggressve enough but not too aggressve, the game wll reman n states of good welfare after each agent has updated hs bd at least once. In more detal, we show that f agents have fractonally subaddtve valuatons, natural dynamcs reach and reman n a state that provdes a 1/3 approxmaton to the optmal welfare after each agent has updated hs bd at least once. For subaddtve valuatons, we can guarantee an Ω1/logm) approxmaton n case of m tems that apples after each agent has updated hs bd at least once and at any pont after that. The latter bound s complemented by a negatve result, showng that no knd of best-response dynamcs can guarantee more than an ologlogm/logm) fracton of the optmal socal welfare. 1 Introducton In a combnatoral aucton, n players compete for the assgnment of m tems. The players have prvate preferences over bundles of tems as expressed by a valuaton functon v : 2 [m] R 0. Our goal n ths work s to fnd a partton of the tems nto sets S 1,...,S n that mzes socal welfare v S ), based on reported valuatons bds) b : 2 [m] R 0 wth the freedom to mpose payments p 1,...,p n on the players. Even f valuatons are known, fndng an allocaton that mzes socal welfare s typcally NP-hard. Furthermore, snce valuatons are assumed to be prvate nformaton, some mechancs An extended abstract appeared n Proceedngs of the 28th ACM-SIAM Symposum on Dscrete Algorthms, SODA 2017, Barcelona, Span. Department of Mathematcs, London School of Economcs, Houghton Street, London WC2A 2AE, UK p.d.duettng@lse.ac.uk). Part of ths work was done whle the author was Senor Researcher n the Department of Computer Scence at ETH Zürch. Department of Computer Scence, TU Dortmund, Otto-Hahn-Str. 14, Dortmund, Germany thomas.kesselhem@cs.tu-dortmund.de). Ths work was done whle the author was at Max Planck Insttute for Informatcs and Saarland Unversty, supported n part by the DFG through Cluster of Excellence MMCI. 1
2 are needed to extract ths nformaton. The tradtonal approach s to ncentvze players to bd truthfully. Insstng on truthfulness has the advantage that for the ndvdual players t s easy to partcpate as t s not necessary to act strategcally. However, truthfulness requres central coordnaton of the entre allocaton and payments. An alternatve approach to ths problem that s arguably seen more often n practce s to let players partcpate n a smpler, non-truthful mechansm and to accept strategc behavor. To derve theoretcal performance guarantees, one then seeks to prove bounds on the so-called Prce of Anarchy, the worst-case rato between the optmal socal welfare and the welfare at equlbrum. The most promnent example n the context of combnatoral auctons s tem bddng, where the tems are sold through separate sngle-tem auctons. One can show that for pretty general classes of valuatons, such as submodular or the even more general classes fractonally subaddtve and subaddtve, all equlbra from a broad range of equlbrum concepts obtan a decent fracton of the optmal socal welfare. More recently, however, these results have been crtczed for gnorng the computatonal complexty of fndng an equlbrum. In fact, by now, there s qute a selecton of mpossblty results showng that fndng exact equlbra s often computatonally ntractable. Our approach n ths paper s dfferent. We consder smple, best-response dynamcs, n whch players are actvated n a round-robn fashon and players when actvated buy ther favorte set of tems at the current prces, n a myopc way. Chrstodoulou et al. [7] showed that one nstance of such dynamcs converges f players valuaton functons are fractonally subaddtve. However, they also showed that t takes exponental tme. For subaddtve valuatons, even convergence cannot be guaranteed because any fxed pont would be a pure Nash equlbrum, and pure Nash equlbra may not exst see Appendx A). We show that despte possbly long convergence tme or no convergence at all, the socal welfare reaches a good level very fast. 1.1 The Settng We study combnatoral auctons wth n bdders N and m tems M. Each bdder N has a valuaton functon v : 2 M R 0. Our objectve s to fnd a feasble allocaton,.e., a partton of the tems, S 1,...,S n, that mzes socal welfare N v S ). We assume that an allocaton of tems to bdders s found by dstrbuted strategc behavor of the bdders usng tem bddng. That s, each bdder N places a bd b,j on each tem j M. Each tem j M s assgned to the bdder N wth the hghest bd b,j at a prce of p j = b,j. Tes are broken n an arbtrary, but fxed manner. We assume that bdders choose ther bds strategcally so as to mze ther quas-lnear utltes. Bdder s utlty u as a functon of the bds b = b ) N s u b) = v S) j S p j, where S s the set of tems won by bdder. We say that a bd b s a best response to the bds b f bdder s utlty s mzed by b. That s, u b,b ) u b,b ) for all b. Note that any best response must gve bdder a set of tems S that mzes u b) = v S) j S p j. We call these sets of tems demand sets. A pure) Nash equlbrum n ths settng s a profle of bds b = b ) N such that for each bdder N hs bd b s a best response aganst bds b. We study smple game-playng dynamcs n whch bdders get actvated n turn and myopcally choose to play a best response. More formally, startng from an ntal bd vector b 0, n each tme step t 1, some bdder N s actvated and updates hs bd b t 1 from the prevous round to a best response to the other players bds b t = bt 1 whch do not change from the prevous to the current round. The fxed ponts of such best-response dynamcs are Nash equlbra. However, Nash equlbra do not necessarly exst and even f they do best-response dynamcs may not converge. 2
3 We wll evaluate best-response dynamcs by the socal welfare that they acheve. For bd profle b and correspondng allocaton S 1,...,S n we wrte SWb) = v S ) for the socal welfare at bd profle b. We seek to compare ths to the optmal socal welfare OPTv). 1.2 Varants of Best-Response Dynamcs Snce payments n combnatoral auctons wth tem bddng are second prce, there are typcally many ways to choose a best response. Clearly, not all best responses wll ensure that good states n terms of socal welfare) wll be reached quckly. Example 1.1 Gross Underbddng). Consder a sngle-tem aucton wth n bdders. Suppose v 1 = C and v = 1 for 2, where C 1. Suppose we start at b = 0,...,0) and the tem assgned to bdder 1. A possble best response sequence has bdders update ther bds n roundrobn fashon, each tme ncreasng the wnnng bd by ǫ. Example 1.2 Gross Overbddng). Consder the same settng as n the prevous example. If n the frst round of updates the last bdder bds C +ǫ ths wll termnate the dynamcs. Note that n both these examples the socal welfare after each round of best responses and on average) s 1, whch can be arbtrarly smaller than the optmal socal welfare C. The ssue n each of these examples s as follows. Through the bds b,j, the bdders effectvely j S b,j, declare addtve valuatons. The allocaton mzes the declared welfare DWb) = whch usually dffers from the actual welfare SWb). In both examples, there exst update steps n whch the declared utlty of the bdder,.e., u D b) = j S b,j j S k b k,j, s very dfferent from hs actual utlty. We wll prove bounds on the welfare acheved by best-response dynamcs that are quantfed by the extent to whch declared utltes can dffer from the actual utltes as captured by the followng defntons. Defnton 1.3. Let α 0. We call a bd b by bdder aganst bds b α-aggressve f u D b) α b u b,b ). Defnton 1.4. Let β 1. A bddng dynamc s β-safe f t ensures that u D b) β u b) for all players and reachable bd profles b. We wll usually apply Defnton 1.3 when b s a best response to b. However, t also leaves the freedom to consder approxmate best responses. We wll see that one way to acheve Defnton 1.4 s to requre strong no overbddng, but we wll also see an example of safe dynamcs that allow overbddng. Note that n both cases players wll have non-negatve actual utltes at all tmes because u b t ) 1 β ud bt ) 0 for every bdder and tme step t. 1.3 Our Results Our frst man result s that round-robn best-response dynamcs are capable of reachng states wth near-optmal socal welfare strkngly fast, despte the fact that convergence to equlbrum may take exponentally long or they may not converge at all. In fact, our result apples to any round-robn bddng dynamcs, provded that players choose bds that are aggressve enough but not too aggressve. Ths, n partcular, ncludes dynamcs n whch players choose to play only approxmate best responses. Also, ther way of makng choces does not need to be consstent n any way. 3
4 Man Result 1. In a β-safe round-robn bddng dynamc wth α-aggressve bd updates the socal welfare at any tme step t n satsfes SWb t ) α 1+α+β)β OPTv). In other words, once every player had the chance to update hs bd, the socal welfare, at any tme step after that, wll be wthn α/1+α+β)β of optmal. For fractonally subaddtve valuatons and subaddtve valuatons there exst round-robn bestresponse dynamcs wth α,β) = 1,1) and α,β) = 1/lnm,1) respectvely. The result for XOS requres access to demand and XOS oracles [11], the result for subaddtve valuatons requres access to demand oracles and that the greedy algorthm for set cover problems can be executed [16, 2]. Our guarantee on the socal welfare acheved by best-response dynamcs shows that these dynamcs provde a 1/3 resp. Ω1/ log m)) approxmaton to the optmal socal welfare that apples after a sngle round of bd updates, and at any tme step after that. We also prove a bound on the average socal welfare of 1/22 + α)β, whch mproves upon the above bound for large β. In partcular, for subaddtve valuatons t s also possble to acheve α,β) = 1,lnm). Whle the pont-wse guarantee of ths dynamcs s only Ω1/log 2 m), ts average socal welfare s wthn Ω1/logm) of optmal. We show that the pont-wse welfare guarantee of 1/3 for fractonally subaddtve valuatons s tght for the respectve mechansm. Our second man result s that the Ω1/logm) bounds are almost best possble n a more general sense. Man Result 2. For players wth subaddtve valuatons no best-response dynamcs n whch players do not overbd on the grand bundle can guarantee a better than ologlogm/logm) fracton of the optmal socal welfare at any tme step. For round-robn bddng dynamcs, ths pont-wse mpossblty result extends to an mpossblty for the average socal welfare that can be acheved. Theassumpton that players donot overbd on thegrand bundles qute natural, ands satsfed by all dynamcs that have been proposed n the lterature. It obvously apples to strong nooverbddng dynamcs, but t also apples to dynamcs n whch players use weak no-overbddng strateges on the tems that they wn and bd zero on all other tems. Our proof of the lower bound s based on a non-trval constructon explotng the algebrac propertes of lnearly ndependent vector spaces. It presents an nterestng separaton from the Prce of Anarchy lterature, where no such lower bound can be proved. Fnally, we explore to whch extent our postve results depend on round-robn actvaton. We show that our postve results extend to the case where at each step a player s chosen unformly at random, whle the socal welfare can be as low as O1/n) of optmal when the order of actvaton s chosen adversarally. 1.4 Related Work Best-response dynamcs are a central topc n Algorthmc Game Theory. Probably, the best-studed applcaton are congeston games, where best-response dynamcs always converge but, except n specal cases, take worst-case exponental tme before they do so [23, 21, 1]. On the other hand, a number of results show that certan types of best-response dynamcs reach states of low socal cost quckly [19, 6, 3, 15, 25]. Some of these results extend to weghted congeston games, where equlbra may not exst and best-response sequences may not converge for ths reason. 4
5 The study of the Prce of Anarchy n combnatoral auctons wth tem bddng was ntated by Chrstodoulou et al. [7], and subsequently refned and mproved upon n [2, 20, 26, 14, 18]. Some of these bounds are based on mechansm smoothness, others are not. They provde welfare guarantees for a broad range of equlbrum concepts rangng from pure Nash equlbra, over coarse) correlated equlbra, to Bayes-Nash equlbra. For fractonally subaddtve valuatons there s a smoothnessbased proof that shows that the Prce of Anarchy wth respect to pure Nash equlbra s at most 2 [7, 26]. For subaddtve valuatons the Prce of Anarchy wth respect to pure Nash equlbra s also at most 2 [2], but the best smoothness-based proof gves a bound of Ologm) [2, 26]. In fact, as shown by Roughgarden [24], combnatoral auctons wth tem bddng acheve near-)optmal Prce of Anarchy among a broad class of smple mechansms. Also relevant to our analyss n ths context s that Chrstodoulou et al. [7] gave a smple, bestresponse dynamcs for fractonally subaddtve valuatons, that they called Potental Procedure. They showed that ths procedure always converges to a pure Nash equlbrum, but also that t may take exponentally many steps before t converges. Lately, attempts at provng Prce of Anarchy bounds for combnatoral auctons wth tem bddng have been crtczed for not beng constructve, n the sense that the computatonal complexty of fndng an equlbrum remaned open. Dobznsk et al. [13], for example, showed that for subaddtve valuatons computng a pure Nash equlbrum requres exponental communcaton. Regardng fractonally subaddtve valuatons they concluded that f there exsts an effcent algorthm that fnds an equlbrum, t must use technques that are very dfferent from our current ones. Further negatve fndngs were reported by Ca and Papadmtrou [5], who showed that computng a Bayes-Nash equlbrum s PP-hard. Most recently, Daskalaks and Syrgkans[8] consdered coarse correlated equlbra. They showed that even for unt-demand players a strct subclass of submodular) there are no polynomal-tme no-regret learnng algorthms for fndng such equlbra, unless RP NP, closng the last gap n the equlbrum landscape. However, they also proposed a novel soluton concept to escape the hardness trap, no-envy learnng, and gave a polynomal-tme no-envy learnng algorthm for XOS valuatons and complemented ths wth a proof showng that for ths class of valuatons every no-envy outcome recovers at least 1/2 of the optmal socal welfare. Further relevant work comes from Devanur et al. [9], who proposed an alternatve to smultaneous second-prce auctons, the so-called sngle-bd aucton. Ths mechansm also admts a polynomal-tme no-regret learnng algorthm and by a result of [4] acheves optmal Prce of Anarchy bounds wthn a broader class of mechansms. A fnal pont of reference are truthful mechansms for combnatoral auctons. Whle no mechansm can acheve a better than 1/m 1/2 ǫ approxmaton for submodular valuatons wth valuaton queres alone [12], Dobznsk [10] recently managed to mprove a long-standng approxmaton guarantee of Ω1/logm) for submodular valuatons to Ω1/ logm) for fractonally subaddtve valuatons, requrng access to both value and demand oracles. 2 Achevng Aggressve and Safe Bds As already dscussed, best responses are generally not unque n our settngs. Our postve results requre that updates are aggressve and safe. In ths secton we brefly descrbe how to guarantee these propertes for fractonally subaddtve a.k.a. XOS) valuatons and subaddtve valuatons. The mssng proofs are provded n Appendx B. A valuaton functon s fractonally subaddtve, or XOS, f there are values v,j l 0 such that v S) = l j S vl,j. It s subaddtve f for all S,T M, v S T) v S)+v T). 5
6 The dynamcs that we consder approach players n round-robn fashon. When player s actvated he pcks a demand set D at the current prces and updates hs bd as descrbed below. Note that here we assume eager updatng. Ths assumpton leads to cleaner proofs, but s not necessary as we demonstrate n Appendx G. 2.1 Bd Updates for XOS Valuatons For XOS valuatons we can update bds as descrbed by [7]. If D s the demand set chosen by player, let v,j l ) j M be the supportng valuaton on ths demand set for whch j D vl,j = v D), and set b t,j = vl,j for j D and bt,j = 0 otherwse. Note that these update steps can be performed n polynomal tme usng demand and XOS oracles. Proposton 2.1. Startng from an ntal bd vector b 0 satsfyng strong no-overbddng, the bd updates descrbed above lead to a sequence of bds b 0,b 1,b 2,... that s 1-safe and n whch each update s a 1-aggressve best response. 2.2 Bd Updates for Subaddtve Valuatons For subaddtve functons, t s generally not possble to guarantee α = 1 and β = 1 at the same tme. We descrbe two dfferent, reasonable ways of bd updates. No-Overbddng Updates Gven a bd vector b, defne ũ S,b ) = v S) j S k b k,j. That s, ũ S,b ) s the utlty bdder can derve from buyng the set S. Observe that ũ,b ) s subaddtve for every b. Let D be an ncluson-wse mnmal demand set of bdder gven b. We can show that ũ S,b t ) > 0 for all S D unless D =. Therefore, by [2] there exsts an addtve approxmaton a such that a) j D a,j 1/lnm ũ D,b t ) and b) j S a,j ũ S,b t ) for all S D wth the property that a,j > 0 for all j D. We set bds b t,j = a,j + k b t k,j for j D and bt,j = 0 otherwse. These update steps can be performed n polynomal tme wth a demand oracle f t s possble to compute the addtve approxmaton, whch corresponds to executng the greedy set-cover algorthm on ũ,b t ). Proposton 2.2. Startng from an ntal bd vector b 0 that satsfes strong no-overbddng, the bd updates descrbed above lead to a sequence of bds b 0,b 1,b 2,... that s 1-safe and n whch each update s a 1/ ln m)-aggressve best response. Aggressve Updates The basc constructon s the same as above except that nstead of consderng a we consder ã such that ã,j = γ a,j for all tems j D, where 0 < γ lnm s such that j D a,j = 1/γ ũ D,b t ). Note that these bds satsfy: a) j Dã,j = ũ D,b t ) and b) j Sã,j γ ũ S,b t ) for all S D. Proposton 2.3. Startng from an ntal bd vector b 0 that satsfes strong no-overbddng, the bd updates descrbed above lead to a sequence of bds that s lnm-safe and n whch each update s a 1-aggressve best response. 3 Welfare Guarantees In ths secton we prove our frst man result Theorem 3.1). The theorem provdes a pont-wse socal welfare guarantee, parametrzed n α and β, for round-robn bddng dynamcs. It shows that 6
7 the socal welfare s hgh already after a sngle round of updates, and remans hgh at every sngle step after that. Theorem 3.1. In a β-safe round-robn bddng dynamc wth α-aggressve bd updates the socal welfare at any tme step t n satsfes SWb t ) α 1+α+β)β OPTv). As we have argued n Proposton 2.1 and Proposton 2.2 there exst round-robn best-response dynamcs wth α,β) = 1,1) for fractonally subaddtve valuatons and α,β) = 1/lnm,1) for subaddtve valuatons. So two corollares of our theorem are pont-wse welfare guarantees of 1/3 and Ω1/ log m) for the respectve mechansms. We also show a welfare guarantee for the average socal welfare, Theorem 3.2 below, that mproves upon the pontwse guarantee for large β. Note that the term 1 n T ) s 1 o1) for T ωn) and at least 1/2 for T 2n. Theorem 3.2. In a β-safe round-robn bddng dynamc wth α-aggressve bd updates the average socal welfare n the frst T steps satsfes 1 T T t=1 SWbt ) α 2α+1)β 1 n T) OPTv). Ths theorem shows that the best-response dynamcs descrbed n Proposton 2.3 wth α, β) = 1,lnm), whose pont-wse welfare guarantee s only Ω1/log 2 m) by Theorem 3.1, guarantees an average socal welfare of Ω1/ log m). In Appendx C we show that the pont-wse welfare guarantee of 1/3 for fractonally subaddtve valuatons s tght for the respectve mechansm. In Secton 4 we show that the Ω1/logm) bounds are essentally best possble n a more general sense. 3.1 Proof of Theorem 3.1 The core of our proof of the pontwse welfare guarantee are two lemmata. The frst Lemma 3.4) shows that the declared socal welfare after a sngle round of updates s hgh when the ntal declared welfare s low and the second Lemma 3.5) shows that the declared welfare after a sngle round of updates s hgh when the ntal declared welfare s hgh. To prove these lemmata we need the followng auxlary lemma. Lemma 3.3. Consder a sequence b 0,...,b n n whch bdder updates hs bd n step. Denote bdder s declared utlty n step by u D b ). Then, n =1 ud b ) DWb n ). Proof. Consder an arbtrary bdder. Bdder updates hs bd n step. Suppose bdder s update buys hm the set of tems S. Then u D b ) = ) b,j j S k b k,j. For > 0, let zj = k b k,j for all j. That s, z j s the mum bd on tem j that s placed by one of the bdders 1,...,, zj 0 = 0 for all j. The crucal observaton s that j S b,j k b k,j ) j M z j z 1 j ). The reason s as follows. For j S, we have zj z 1 j by defnton. For j S, b,j = z j and k b k,j k< b k,j = k<b 1 k,j = z 1 j. Summng over all players we obtan Nu D b ) zj zj 1 ). N j M 7
8 The double sum s telescopng and zj n = kb n k,j and z0 j = 0 by defnton. So, whch proves the clam. N u D b ) j Mz n j z 0 j) = j M b n k,j = k DWbn ), Wth the help of ths lemma we can now prove our key lemmata. Lemma 3.4. Let S 1,...,S n be any feasble allocaton, n whch player receves tems S. Consder a sequence b 0,...,b n n whch bdder updates hs bd n step usng an α-aggressve bd. We have α+1) DWb n )+α DWb 0 ) α N v S ). Proof. Consder player s acton n tme step. Instead of choosng bd b, he could have bought the set of tems S. As b s α-aggressve, we get u D b ) α v S) ) k b k,j. j S Defne p t j = b t,j for all tems j. That s, pt j s the mum bd that s placed on tem j n bd profle b t. We clam that for every j S, k b k,j pn j +p0 j. Ths s correct because f b k,j attans ts mum for k < then k b k,j pn j as k s bd on tem j wll not change anymore. In the other case, f k >, then k b k,j p0 j because k has not yet changed the bd on tem j. Usng that both p 0 j and pn j are never negatve, the bound follows. We thus have u D b )+α p n j +p0 j ) α v S ). j S Summng ths nequalty over all bdders N yelds n u D b )+α =1 n p n j +p 0 j) α =1 j S n v S). We can upper bound the frst sum by DWb n ) usng Lemma 3.3. The double sum adds up every j M exactly once and we have j M pn j = DWbn ) and j M p0 j = DWb0 ). We obtan as clamed. α+1) DWb n )+α DWb 0 ) α =1 n v S), Lemma 3.5. Consder a β-safe bd sequence b 0,...,b n n whch player changes hs bd from b 1 to b usng an α-aggressve bd. Then, DWb n ) α β DWb0 ). Proof. Consder an arbtrary bdder and hs update from b 1 to b. Denote the set of tems that bdder won under bds b 1 by S 1, and the set of tems that he wns under bds b by S. So u D b 1 ) = b 1,j k b 1 k,j and, u D b ) = b,j k b k,j. j S j S j S 1 j S 1 =1 8
9 Usng that for all k and all j we have b 1 k,j = b k,j we obtan that the dfference n declared welfare over all bdders between steps 1 and s equal to the dfference n bdder s declared utlty at these tme steps. Formally, DWb ) = k b 1 k,j + b,j j S j M\S = j M k b 1 k,j + j S = j M k b 1 k,j +ud b ) = j M\S 1 = j M\S 1 b,j j S k b 1 k,j + j S 1 k b 1 k,j + j S 1 = DWb 1 )+u D b ) u D b 1 ). k b k,j k b 1 k,j +ud b ) b 1,j +u D b ) j S 1 b 1,j + j S 1 k b 1 k,j We now extend ths dentty to a lower bound on DWb ). Snce b s α-aggressve, we have u D b ) α u b 1 ). Snce the bddng sequence s β-safe, u D bt ) β u b t ) for all t. So, DWb ) = DWb 1 )+u D b ) u D b 1 ) DWb 1 )+u D b ) β u b 1 ) DWb 1 )+u D b ) β α ud b ) ) β = DWb 1 ) α 1 u D b ). Summng ths nequalty over all bdders N and usng the telescopng sum N DWb ) DWb 1 ) = DWb n ) DWb 0 ) we obtan ) β DWb n ) DWb 0 ) α 1 u D b ). N Snce α 1 and β 1 the factor β/α 1) 0. We can therefore use Lemma 3.3 to conclude that ) β DWb n ) DWb 0 ) α 1 DWb n ), whch concludes the proof. We wll use our key lemmata to show a lower bound on the declared welfare. To relate the declared welfare to the socal welfare we wll use the followng lemma. Lemma 3.6. In a β-safe sequence of bd profles b 0,b 1,b 2,... for every t 0, DWb t ) β SWb t ). Proof. Consder an arbtrary tme step t. Snce the bd profle b t s β-safe we know that for the allocaton T 1,...,T n that corresponds to b t, u D b t ) = ) b t,j k bt k,j j T β u b) = β v T ) ) k bt k,j. j T 9
10 Rearrangng ths and usng that β 1 we obtan DWb t ) = b t,j β SWbt ) β 1) k bt k,j β SWbt ), j T j T and the clam follows. We are now ready to prove the theorem. Proof of Theorem 3.1. To prove the guarantee for tme step t n consder the bd sequence of length n + 1 from b t n to b t. At tme steps t n + 1 to t each bdder updates hs bd exactly once. By the vrtue of beng a subsequence of a β-safe bddng sequence the sequence b t n,...,b t s β-safe. Moreover each bd update s α-aggressve. Applyng frst Lemma 3.5 and then Lemma 3.4 wth b t takng the role of b n, b t n takng the role of b 0, and settng S 1,...,S n to the allocaton that mzes welfare we obtan 1+α+β) DWb t ) = α+1) DWb t )+α β α DWbt ) α+1) DWb t )+α DWb t n ) α OPTv). Now, by Lemma 3.6, DWb t ) β SWb t ). Combnng ths wth the prevous nequalty yelds as clamed. 3.2 Proof of Theorem α+β) β SWb t ) α OPTv), Wth the proof of the pontwse welfare guarantee at hand we have already done the bulk of the work for provng our guarantee regardng the average welfare. The basc dea s to sum the lower bound on the declared welfare at any gven tme step as provded by Lemma 3.4 over all tme steps to obtan a lower bound on the average declare welfare, and to turn ths nto a lower bound on the actual socal welfare usng Lemma 3.6. Proof of Theorem 3.2. We frst use Lemma 3.4 to relate the declared welfare at tme steps t and t n to the optmal socal welfare. Namely, for all t n, α+1) DWb t )+α DWb t n ) α OPTv). Next we take the sum over all tme steps t and use that DWb t ) 0 to obtan the followng lower bound on the average declared welfare 1 T T DWb t ) 1 T t=1 T t=n+1 α α+1 1 T DWb t ) T t=n+1 ) OPTv) DWb t n ) α α+1 T n OPTv) α T α+1 1 T T DWb t ). t=1 10
11 Solvng ths nequalty for 1 T T t=1 DWbt ) and usng Lemma 3.6 to lower bound SWb t ) by 1/β DWb t ) we obtan 1 T T t=1 whch proves the clam. SWb t ) 1 β 1 T T DWb t ) t=1 4 Lower Bound for Subaddtve CAs α 2α+1)β T n OPTv), T Next we show our second man result Theorem 4.1), whch shows that no best-response dynamcs n whch bdders do not overbd on the grand bundle can acheve a pont-wse welfare guarantee that s sgnfcantly better than 1/logm. The assumpton that bdders do not overbd on the grand bundle seems qute natural, and does allow overbddng on subsets of tems. It s satsfed by all dynamcs that we have descrbed n Secton 2 and more generally by all dynamcs that have been proposed n the lterature. Theorem 4.1. For every postve nteger k N >0 there exsts an nstance wth n = 2 players, m = 2 k 1 tems, and subaddtve valuatons v = v 1,v 2 ) such that n every best-response dynamcs n whch players do not overbd on the grand bundle there exst nfntely many tme steps t at whch SWb t ) Ω 1 logm loglogm ) OPTv). To prove ths theorem we show that whenever the second player has updated s bd socal welfare wll be low. Ths does not mply that the average welfare wll be low as well. However, f we restrct attenton to round-robn dynamcs, then we can extend the constructon by addng addtonal players after the second player that play a low-stakes game on separate tems forcng the average welfare to be low as well. 4.1 Proof of Theorem 4.1 Our proof of the lower bound s bult around the followng famly of hard nstances, wth n = 2 players and m = 2 k 1 tems. The valuatons of the frst player are based on an example that demonstrates the worst-case ntegralty gap for set cover lnear programs see, e.g, [27, Example 13.4]), and has been used n the context of combnatoral auctons wth tem bddng before [2]. The crux of our constructon s n the desgn of the second player s valuaton functon, and ts nterplay wth the valuaton functon of the frst player. Defnton 4.2. For every postve nteger k N >0 the hard nstance I k conssts of n = 2 bdders and m = 2 k 1 tems and the followng subaddtve valuatons: 1. Frst bdder: Number the tems from 1 to m and let be a k-bt bnary vector representng the nteger. Interpret as a k-dmensonal vector over F 2. Wrte j as the dot product of the two vectors. Let S = {j j = 1}. Note that each such set contans m+1)/2 tems, and each tem s contaned n m+1)/2 such sets. For each set of tems T M let v 1 T) be the mnmum number of sets S requred to cover the tems n T. 11
12 2. Second bdder: Set ρ = 4 k m and d = k log 2k. Let D denote the set of all d-dmensonal subspaces of F k 2 excludng the zero vector. Then for any set of tems T let v 2 T) = ρ w DT), where D D 0 for T = 0 D w D T) = 2 for 0 < T D < D D else. Note that, n the nstances just descrbed, the frst player has a valuaton of v 1 M) k = log 2 m+1)forthegrandbundle, whlethesecondplayer hasamumvaluaton of T v 2 T) = ρ D = ρ 2 d 1) ρ 2 d = 4 for any set of tems. To prove the theorem we frst use lnear algebra to derve a symmetry property of D, whch together wth weak no-overbddng of the frst player on the grand bundle mples the exstence of a subset of tems D D wth low prces Lemma 4.3). Intutvely, ths s because the sets of tems that the second player s nterested n are rather small of sze about m/log 2 m), and there are suffcently many of these sets. We then show that every demand set of the second player under these prces ncludes some set of tems D D Lemma 4.4). In the fnal step, we show that f the second player buys any such set D, then the frst player s valuaton for the remanng tems M \D and hence the overall socal welfare s at most Ologlogm) Lemma 4.5). Lemma 4.3. Let k N >0. Consder the hard nstance I k. For every vector of bds b such that the frst player does not overbd on the grand bundle there s a d-dmensonal subspace D D such that j D b 1,j < ρ D 2. Proof. Snce the frst player does not overbd on the grand bundlewe have j M b 1,j v 1 M) = k, so the average bds are bounded by 1 m j M b 1,j k m. Observe that the number of d-dmensonal subspaces of F k 2 that contan a vector 0 x Fk 2 s gven as k 1 ) d 1, where )2 refers to the q-bnomal coeffcent see, e.g., [22]). So, n partcular, q ths number s ndependent of x. Therefore, nstead of takng the average over all tems M, we can 1 take the average over all sets D D and take the average wthn such a set,.e., j M b 1,j = 1 D D D 1 D j D b 1,j. 1 In combnaton, there has to be a D such that D the clam follows. k m < ρ 2 = 2 k m j D b 1,j 1 m j M b 1,j k m. Snce Lemma 4.4. Let k N >0. Consder the hard nstance I k. If the prces p as seen by the second player are such that j D p j < ρ D /2 for some D D, then each demand set of the second player under these prces ncludes some D D. Proof. By our assumpton on the sum of the prces of the tems n D, ud) = v 2 D) j D p j = ρ w D D) j D p j > ρ D 2. Now, let S M be a demand set under v 2. If S D < D for all D D, then we have us) = v 2 S) j S p j v 2 S) = ρ D Dw D S) ρ D D D 2 < ud). Ths means, S can only be a demand set f S D = D for some D D. Lemma 4.5. Let k N >0. Consder the hard nstance I k. Then for D D we have v 1 M \D ) k d. m 12
13 Proof. Toshowtheboundonv 1, weusethatd {0}sasubspaceofF k 2 ofdmensond. Thats, any bass x 1,...,x d of D {0} can be extended by x d+1,...,x k to a bass of F k 2. Let X = x 1,...,x k ). Ths way, X 1 s the matrx that expresses j F k 2 as a lnear combnaton of x 1,...,x k. As x 1,...,x d s a bass of D {0}, we know that for every j D {0} the vector X 1 j cannot be zero n all components d+1,...,k. Ths mples that the set M \D can be covered by sets S for beng the rows d+1,...,k of X 1. Therefore v 1 M \D ) k d. Proof of Theorem 4.1. Any best-response dynamcs has to ask every bdder nfntely often. We clam that the socal welfare s Ologlogm) rght after each update of the second player. Snce the optmal socal welfare s Ωlog m) ths shows the clam. Let b t be a bd vector after the second player has made a move. Usng Lemma 4.3, we know that there s a set D D wth j D bt 1 1,j < ρ D 2. By Lemma 4.4, the second player then buys a superset of some D D. Therefore, rght after the second player has updated hs bd the frst player s allocated a subset of the tems M \D. Lemma 4.5 mples that the socal welfare for ths allocaton s no hgher than k d+ρ2 d = Ologlogm). 5 Beyond Round-Robn Actvaton Our postve results make use of the fact that bdders are actvated to update ther bd n roundrobn fashon. That s, between two actvatons of a bdder, each other bdder s actvated exactly once. In ths secton, we nvestgate alternatve actvaton protocols. 5.1 Randomzed Actvaton We frst show that our postve results extend to the case where at each step a random player gets to update hs bd. Theorem 5.1. Consder a β-safe sequence of bds that s generated by choosng at each tme step a player unformly at random and lettng ths player update hs bd to an α-aggressve bd. Then for any tme step T n, E [ SWb T ) ] α 21+4α)β OPTv). The key dfference to the prevous postve results s as follows. In the case of round-robn actvaton, we could bound the prce that a bdder has to pay for an tem j at any tme by the sum of the mum bd before the frst and after the n-th step. As now, n the case of random actvaton, a bdder can potentally be actvated multple tmes durng the frst n steps, ths s not true anymore. Instead, we can show the followng lemma. Lemma 5.2. Consder a sequence of bds that s generated by choosng at each tme step a player unformly at random and lettng ths player update hs bd. Then, for all tems j M and all lengths of the sequence T 0, we have [ E b t,j t T ] 1 n) 1 T [ E b T,j The proof can be found n Appendx D. The overall dea s to bound the probablty that a bdder who causes a hgh bd s actvated agan. Usng ths lemma, we can follow a smlar pattern as when provng Theorem 3.1. Proof of Theorem 5.1. Snce all of our arguments apply startng from any vector of bds, we can wthoutlossofgeneralty assumethatt sthefnalofasequenceofnbdupdates,andsot = n. Let ]. 13
14 N be the set of players that are selected to bd at least once durng ths sequence of bd updates. Denote by S1,...,S n the allocaton that mzes socal welfare. By a varant of Lemma 3.4, whch does not make use of round-robn actvaton and s gven as Lemma D.1 n Appendx D, we have DWb T )+α j M b t,j α v S). t T N Note that DWb T ), t T b t,j, and N are now random varables. Takng expectatons of both sdes, we get [ E DWb T )+α j M ] [ b t,j E α ] v S ). t T N By lnearty of expectaton, ths mples E [ DWb T ) ] +α j ME [ b t,j t T ] α Pr [ N ] v S). N The probablty of each player to be selected at least once s Pr[ N ] = 1 1 n) 1 T. Lemma 5.2 ] shows that E[ j M t T b t,j 1 n) 1 T [ E DWb T ) ]. We obtan 1+α 1 1 ) T ) E [ DWb T ) ] α ) T ) v S n n ), and therefore E [ DWb T ) ] n α 1+α 1 1 ) T v S ). n N Fnally, we use Lemma 3.6 to relate the declared socal welfare to the actual socal welfare and the fact that T = n 2 to lower bound 1 1 1/n) n 1/2 and upper bound 1 1/n) n 4. Ths yelds, E [ SWb T ) ] α 21+4α)β OPTv). 5.2 Adversaral Actvaton We conclude by showng that our postve results that show quck convergence to states of hgh welfare no longer apply f an adversary chooses the order n whch players get to update ther bds. Our result concerns XOS valuatons, and 1-safe bddng sequences n whch each bd update s to a 1-aggressve best response. It apples even f players update ther bds as n the Potental Procedure of [7]. That s, unless the actvated player already plays a best response, he chooses an arbtrary demand set and bds hs supportng addtve valuaton on the respectve set and zero on all other tems. Theorem 5.3. For every ǫ > 0, n, and k, there s an nstance wth n agents wth XOS valuatons and n 1) k+1) tems, an ntal bd vector b 0, and an actvaton sequence such that, even f each actvated agent updates hs bd as n the Potental Procedure, untl each agent has been actvated Ω2 k ) tmes the welfare has never exceeded a 1+ǫ n 1 fracton of the optmum. ) T N 14
15 At the core of our proof n Appendx E) s the followng proposton that apples even f players have unt-demand valuatons,.e., a player s valuaton for a set of tems s the mum value for any tem n the set. It shows the exstence of a cyclc actvaton pattern n whch each player gets to update hs bd, but the dynamc remans n states of low welfare. The constructon assumes that players also update ther bd f ths does not strctly mprove ther utlty, and that tes among multple best responses are broken n our favor. Proposton 5.4. For every ǫ > 0 and n, there s an nstance of n agents wth unt-demand valuatons for n 1 tems, an ntal bd vector b 0, and a cyclc actvaton pattern n whch every agent s actvated at least once and bd updates are as n the Potental Procedure except that updates need not be strct mprovements and tes among multple best responses are broken n our favor, but the socal welfare s always at most a 1+ǫ n 1 fracton of the optmal welfare. Proof. There are n bdders and n 1 tems. Player s valuaton for a set S M s gven as v S) = j S v,j. For bdder 1, we let v 1,1 =...,v 1,n 1 = 1 + ǫ. For bdder > 1, defne v, 1 = 1 and v,j = 0 for j 1. The socal optmum assgns tem j to bdder j +1 and has welfare n 1. In the ntal bd vector b 0 all players bd zero. The actvaton scheme s as follows: In every odd step bdder 1 makes a move, whle n even steps bdders > 1 are actvated n a round-robn way. That s, the actvaton works repeatedly as 1,2,1,3,1,4,...,1,n 1,1,n. Wth ths actvaton order, t s possble that bdder 1 bds 1+ǫ on tem t the t-th tme he s actvated, whle bdders > 1, when actvated, see a bd of 1+ǫ on the tem they are nterested n, and therefore bd 0 on all tems. Ths way the socal welfare at any tme step t 1 s 1+ǫ. Our proof n the appendx combnes ths constructon wth several copes of the exponental lower-bound constructon of Theorem 3.4 n [7], and thus ensures that each update s a strct mprovement and unque. 6 Concludng Remarks and Outlook In our analyss we focused on fractonally subaddtve and subaddtve valuatons, whch do not exhbt complements. A natural queston s whether smlar results can be obtaned for classes of valuatons that exhbt complements. In Appendx F, we dscuss an example wth MPH-k valuatons [17] that hghlghts the dffcultes that arse. Another nterestng follow-up queston s whether there s a general result that translates a Prce of Anarchy guarantee for a gven mechansm that s provable va smoothness nto a result that shows that best-response sequences reach states of good socal welfare quckly. The example wth MPH-k valuatons n Appendx F already lmts the potental scope of such a result. It would stll be nterestng to dentfy natural suffcent condtons. One such condton could be that the mechansm admts some knd of potental functon as the procedure for XOS valuatons), but our results already show that ths condton s certanly not necessary. References [1] H. Ackermann, H. Rögln, and B. Vöckng. On the mpact of combnatoral structure on congeston games. Journal of the ACM, 556),
16 [2] K. Bhawalkar and T. Roughgarden. Welfare guarantees for combnatoral auctons wth tem bddng. In Proceedngs of the 22nd Annual ACM-SIAM Symposum on Dscrete Algorthms, SODA 11, pages , [3] V. Blò, A. Fanell, M. Flammn, and L. Moscardell. Performance of one-round walks n lnear congeston games. Theory of Computng Systems, 491):24 45, [4] M. Braverman, J. Mao, and S. M. Wenberg. Interpolatng between truthful and non-truthful mechansms for combnatoral auctons. In Proceedngs of the 27th Annual ACM-SIAM Symposum on Dscrete Algorthms, SODA 16, pages , [5] Y. Ca and C. H. Papadmtrou. Smultaneous bayesan auctons and computatonal complexty. In Proceedngs of the 15th ACM Conference on Economcs and Computaton, EC 14, pages , [6] G. Chrstodoulou, V. S. Mrrokn, and A. Sdropoulos. Convergence and approxmaton n potental games. Theoretcal Computer Scence, 438:13 27, [7] G. Chrstodoulou, A. Kovács, and M. Schapra. Bayesan combnatoral auctons. Journal of the ACM, 632):11, [8] C. Daskalaks and V. Syrgkans. Learnng n auctons: Regret s hard, envy s easy. In Proceedngs of the 57th IEEE Symposum on Foundatons of Computer Scence, pages , [9] N. R. Devanur, J. Morgenstern, V. Syrgkans, and S. M. Wenberg. Smple auctons wth smple strateges. In Proceedngs of the 16th ACM Conference on Economcs and Computaton, EC 16, pages , [10] S. Dobznsk. Breakng the logarthmc barrer for truthful combnatoral auctons wth submodular bdders. In Proceedngs of the 48th Annual ACM Symposum on Theory of Computng, STOC 16, pages , [11] S. Dobznsk and M. Schapra. An mproved approxmaton algorthm for combnatoral auctons wth submodular bdders. In Proceedngs of the Seventeenth Annual ACM-SIAM Symposum on Dscrete Algorthms, SODA 06, pages , [12] S. Dobznsk and J. Vondrák. Impossblty results for truthful combnatoral auctons wth submodular valuatons. Journal of the ACM, 631):5, [13] S. Dobznsk, H. Fu, and R. D. Klenberg. On the complexty of computng an equlbrum n combnatoral auctons. In Proceedngs of the 26th Annual ACM-SIAM Symposum on Dscrete Algorthms, SODA 15, pages , [14] P. Düttng, M. Henznger, and M. Starnberger. Valuaton compressons n VCG-based combnatoral auctons. In Proceedngs of the 9th Conference on Web and Internet Economcs, WINE 13, pages , [15] B. Farzad, N. Olver, and A. Vetta. A prorty-based model of routng. Chcago Journal of Theoretcal Computer Scence, 2008, [16] U. Fege. On mzng welfare when utlty functons are subaddtve. In Proceedngs of the 38th Annual ACM Symposum on Theory of Computng, STOC 06, pages 41 50,
17 [17] U. Fege, M. Feldman, N. Immorlca, R. Izsak, B. Lucer, and V. Syrgkans. A unfyng herarchy of valuatons wth complements and substtutes. In Proceedngs of the 29th AAAI Conference on Artfcal Intellgence, AAAI 15, pages , [18] M. Feldman, H. Fu, N. Gravn, and B. Lucer. Smultaneous auctons are almost) effcent. In Proceedngs of the 45th ACM Symposum on Theory of Computng Conference, STOC 13, pages , [19] M. X. Goemans, V. S. Mrrokn, and A. Vetta. Snk equlbra and convergence. In Proceedngs of the 46th IEEE Symposum on Foundatons of Computer Scence, FOCS 05, pages , [20] A. Hassdm, H. Kaplan, Y. Mansour, and N. Nsan. Non-prce equlbra n markets of dscrete goods. In Proceedngs of the 12th ACM Conference on Electronc Commerce, EC 11, pages , [21] D. Monderer and L. S. Shapley. Potental games. Games and Economc Behavor, 141): , [22] A. Prasad. Countng subspaces of a fnte vector space 1. Resonance, 1511): , [23] R. W. Rosenthal. A class of games possessng pure-strategy nash equlbra. Internatonal Journal of Game Theory, 21):65 67, [24] T. Roughgarden. Barrers to near-optmal equlbra. In 55th IEEE Annual Symposum on Foundatons of Computer Scence, FOCS 14, pages 71 80, [25] T. Roughgarden. Intrnsc robustness of the prce of anarchy. Journal of the ACM, 625):32, [26] V. Syrgkans and É. Tardos. Composable and effcent mechansms. In Proceedngs of the 45th ACM Symposum on Theory of Computng Conference, STOC 13, pages , [27] V. V. Vazran. Approxmaton Algorthms. Sprnger-Verlag New York, Inc., New York, NY, USA, ISBN A Non-Exstence of Weak No-Overbddng Pure Nash Equlbra for Subaddtve Valuatons We can also leverage our novel nsghts regardng hard nstances Defnton 4.2) for subaddtve valuatons to show that there need not be a pure Nash equlbrum, even f players are only requred to use weakly no-overbddng strateges. Theorem A.1. Let k N >0. Consder the hard nstance I k wth n = 2 players and m = 2 k 1 tems. There s no pure Nash equlbrum n weakly no-overbddng strateges f k 8. Ths remans true f we defne a bd profle to be at equlbrum f no player has a benefcal devaton to a weakly no-overbddng strategy. 17
18 Proof. Assume that b s a weakly no-overbddng pure Nash equlbrum. Suppose the second player wns the set of tems W M n b, then the frst player wns the set of tems M \ W. By weak no-overbddng, we have b 1,j v 1 M \W) and b 2,j v 2 W). j W j M\W The frst player does not wn the tems n W, whch means that b 1,j b 2,j for all tems j W. Consequently, we have b 1,j v 1 M \W)+v 2 W) j M v 1 M)+v 2 M) = k +ρ 2 d = k +4 k m 2k log 2 k = k +4. By the same argument as n Lemma 4.3, each tem j M s ncluded n the same number of sets D D. Therefore, 1 D D D 1 D b 1,j = 1 m j D Ths mples that there s a set D D such that 1 D j D j M b 1,j k+4 m. Snce k 8 by assumpton, m > 2k +8, and therefore j D b 1,j k+4 m D < D 2 b 1,j k +4 m. By Lemma 4.4 and because the second player plays a best response, we have W D for some D D. In the remander, we wll show that ths mples that the frst player has a benefcal weakly no-overbddng devaton b 1. Let b 1,j = b 2,j + 1 m for j W and b 1,j = b 1,j for j M \W. Observe that n b 1,b 2) the frst player wns all tems M. Ths bd fulflls the weak no-overbddng property because b 1,j = j M j W b 2,j + 1 m. ) + j M\W v 2 W)+1+v 1 M \W) v 2 D )+1+v 1 M \D ) ρ2 d +1+k d = 4+1+log 2 k k = v 1 M), b 1,j 18
19 where the frst nequalty uses that b s weakly no-overbddng, the second nequalty explots the defnton of v 2, the thrd nequalty holds by Lemma 4.5, and the fnal nequalty holds because we have assumed k 8. The devaton by the frst player s benefcal because u 1 b 1,b 2 ) = v 1 M) j M = k d j M\W b 2,j u 1 b)+d v 2 W) b 2,j +d j W u 1 b)+d 4 > u 1 b), where the frst nequalty uses Lemma 4.5, the second nequalty uses that v 2 W) v 2 D ) = 4, and the fnal nequalty follows from the defnton of d = k log 2 k and the assumpton that k 8 and so d > 4. B Mssng Proofs from Secton 2 In ths appendx we prove the propostons that establsh the exstence of aggressve and safe bddng dynamcs for XOS and subaddtve valatons. B.1 Suffcency of Strong No-Overbddng We frst show that n order to have a 1-safe dynamc t suffces that ntal bds and the subsequent updates fulfll no-overbddng n the strong sense. A bd vector b satsfes strong no-overbddng f j S b,j v S) for every bdder and every set of tems S. A best response b by bdder aganst bds b satsfes strong no-overbddng f j S b,j v S). Lemma B.1. If the ntal bd vector b 0 satsfes strong no-overbddng and at each tme step t 1 some bdder gets to update hs bd to a best response, whch satsfes strong no-overbddng, then the resultng best-response dynamc s 1-safe. Proof. Snce the ntal bd vector and each update satsfy strong no-overbddng we have j Sbt,j v S) for all bdders, tme steps t 0, and sets of tems S. Subtractng j S k b t k,j from both sdes shows the clam. B.2 Proof of Proposton 2.1 Consder an arbtrary bdder and hs update to bd b t. The bd bt satsfes strong no-overbddng by defnton. Hence Lemma B.1 shows that the bd sequence s 1-safe. It remans to show that b t s a 1-aggressve best response. We frst show that the bd b t s a best response to bt. Let S denote the set of tems that bdder wns wth bd b t aganst bds bt and let D be the demand set on the bass of whch bt s b 2,j 19
20 defned. Then, u b t ) = v S ) j S k bt k,j j S b t,j k bt k,j ) j Db t,j k bt k,j ) = v D) k bt k,j j D v S) S k j S bt k,j ), where the frst nequalty uses that v s XOS, the second uses that k b t k,j = bt,j for j D\S and k b t k,j bt,j for j S \ D, the followng equalty explots the defnton of b t, and the fnal nequalty uses that D s a demand set. To show that b t s 1-aggressve t suffces to show that bdder s declared and actual utlty at tme step t concde. Snce the rght-hand sde n the precedng chan of nequaltes s at least v S ) j S k b t k,j all nequaltes n the chan of nequaltes must be equaltes. Ths mples that u b t ) = v S ) j S k bt k,j = j S b t,j k bt k,j ) = ud b t ). B.3 Proof of Proposton 2.2 Consder an arbtrary bdder and hs update to bd b t. We frst argue that bt s a best response. We clam that ũ S,b t ) > 0 for all S D unless D =. To see ths assume by contradcton that there exst a S D such that ũ T,b t ) 0. Then, by subaddtvty of v, ũ D,b ) v D \T) ũ D \T,b t ), j D\T ) b k,j + v T) ) k k j S b k,j whch contradcts the defnton of D. Because of ths the addtve approxmaton a has a,j > 0 for all j D. It follows that b t,j > k b t k,j for all j D, and so bdder wns all tems j D, and for the tems j D that he wns k b t k,j = 0. To see that b t s 1/lnm-aggressve observe the followng. Let S denote the set of tems that bdder wns wth bd b t. Then, consderng the bd bt defned on the bass of demand set D, we have u D bt ) = ) b t,j k bt k,j j S ) b t,j k bt k,j j D = j D a,j 1 lnm ũ D,b t ), where the frst nequalty uses that b t,j = k b t k,j for j D \ S and b t,j k b t k,j for j S \D, and the second nequalty uses property a) of bd b t. 20
21 That the bd sequence s 1-safe follows from the startng condton and Lemma B.1 by observng that bdder s update satsfes strong no-overbddng. Namely, for every S D, b t,j =,j + k j Sa bt k,j ) ũ S,b t )+ k bt k,j = v S), j S j S where the nequalty follows from property b) of bd b t. B.4 Proof of Proposton 2.3 The argument that the bd b t chosen by bdder s a best response and 1-aggressve s dentcal to the respectve argument n the proof of Proposton 2.2, except that ths tme we collect a factor of 1 nstead of 1/lnm when we apply property a) of bd b t. To see that the bd sequence s lnm-safe, consder a pont n tme t t after bdder s update. In the vector b t, bdder gets a set S M that s possbly dfferent from D. Note that for j S\D, b t,j = 0 by our defnton. Furthermore, for j S D, k b t k,j k b t k,j because bd updates are only non-zero f an tem changes ts owner. Therefore, because bdder wns tem j, all new bds have to be zero. In combnaton, we have u D bt ) = ) ã,j + j S D k bt k,j k bt k,j lnm ũ S D,b t )+ = lnm u b t ), j S D k bt k,j ) ) k bt k,j because the sum of ã,j terms s bounded by lnm ũ S D,b t ) by defnton and the sum of the remanng terms s non-negatve. C Tghtness of the Pont-Wse Welfare Guarantee for XOS Valuatons The followng proposton shows that the pont-wse welfare guarantee of 1/3 for the round-robn best-response dynamcs for fractonally subaddtve valuatons descrbed n Secton 2 s tght, even f the valuatons are unt demand. Proposton C.1. Consder the dynamcs descrbed n Secton 2.1. There s an nput wth n = 3 players, m = 3 tems, and unt-demand valuatons and an ntal bd vector such that when started from ths bd vector the socal welfare obtaned by the dynamcs after a sngle round of bd updates s 1/3 OPTv). Proof. The valuatons of all three bdders are unt demand,.e., for all players and sets of tems S, v S) = j S v,j. The tem valuatons v,j for 1,j 3 are gven by the followng table: tem 1 tem 2 tem 3 player player 2 1+ǫ 1+2ǫ 1+3ǫ player
Vickrey Auction VCG Combinatorial Auctions. Mechanism Design. Algorithms and Data Structures. Winter 2016
Mechansm Desgn Algorthms and Data Structures Wnter 2016 1 / 39 Vckrey Aucton Vckrey-Clarke-Groves Mechansms Sngle-Mnded Combnatoral Auctons 2 / 39 Mechansm Desgn (wth Money) Set A of outcomes to choose
More informationSmooth Games, Price of Anarchy and Composability of Auctions - a Quick Tutorial
Smooth Games, Prce of Anarchy and Composablty of Auctons - a Quck Tutoral Abhshek Snha Laboratory for Informaton and Decson Systems, Massachusetts Insttute of Technology, Cambrdge, MA 02139 Emal: snhaa@mt.edu
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationPerfect Competition and the Nash Bargaining Solution
Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationCS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016
CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationLecture 4. Instructor: Haipeng Luo
Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would
More informationCS294 Topics in Algorithmic Game Theory October 11, Lecture 7
CS294 Topcs n Algorthmc Game Theory October 11, 2011 Lecture 7 Lecturer: Chrstos Papadmtrou Scrbe: Wald Krchene, Vjay Kamble 1 Exchange economy We consder an exchange market wth m agents and n goods. Agent
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationEconomics 101. Lecture 4 - Equilibrium and Efficiency
Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationCOS 521: Advanced Algorithms Game Theory and Linear Programming
COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton
More informationThe Second Anti-Mathima on Game Theory
The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationWelfare Properties of General Equilibrium. What can be said about optimality properties of resource allocation implied by general equilibrium?
APPLIED WELFARE ECONOMICS AND POLICY ANALYSIS Welfare Propertes of General Equlbrum What can be sad about optmalty propertes of resource allocaton mpled by general equlbrum? Any crteron used to compare
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationLecture 4: Constant Time SVD Approximation
Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),
More informationGame Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India February 2008
Game Theory Lecture Notes By Y. Narahar Department of Computer Scence and Automaton Indan Insttute of Scence Bangalore, Inda February 2008 Chapter 10: Two Person Zero Sum Games Note: Ths s a only a draft
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationFast Convergence to Nearly Optimal Solutions in Potential Games
Fast Convergence to Nearly Optmal Solutons n Potental Games Baruch Awerbuch Yoss Azar Amr Epsten Vahab S. Mrrokn Alexander Skopalk Abstract We study the speed of convergence of decentralzed dynamcs to
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationOnline Appendix. t=1 (p t w)q t. Then the first order condition shows that
Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate
More informationLecture Randomized Load Balancing strategies and their analysis. Probability concepts include, counting, the union bound, and Chernoff bounds.
U.C. Berkeley CS273: Parallel and Dstrbuted Theory Lecture 1 Professor Satsh Rao August 26, 2010 Lecturer: Satsh Rao Last revsed September 2, 2010 Lecture 1 1 Course Outlne We wll cover a samplng of the
More informationModule 17: Mechanism Design & Optimal Auctions
Module 7: Mechansm Desgn & Optmal Auctons Informaton Economcs (Ec 55) George Georgads Examples: Auctons Blateral trade Producton and dstrbuton n socety General Setup N agents Each agent has prvate nformaton
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationCS286r Assign One. Answer Key
CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,
More informationLecture 2: Gram-Schmidt Vectors and the LLL Algorithm
NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationCase A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.
THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationLecture 14: Bandits with Budget Constraints
IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed
More informationEndogenous timing in a mixed oligopoly consisting of a single public firm and foreign competitors. Abstract
Endogenous tmng n a mxed olgopoly consstng o a sngle publc rm and oregn compettors Yuanzhu Lu Chna Economcs and Management Academy, Central Unversty o Fnance and Economcs Abstract We nvestgate endogenous
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationStanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7
Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every
More informationprinceton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora
prnceton unv. F 13 cos 521: Advanced Algorthm Desgn Lecture 3: Large devatons bounds and applcatons Lecturer: Sanjeev Arora Scrbe: Today s topc s devaton bounds: what s the probablty that a random varable
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationEigenvalues of Random Graphs
Spectral Graph Theory Lecture 2 Egenvalues of Random Graphs Danel A. Spelman November 4, 202 2. Introducton In ths lecture, we consder a random graph on n vertces n whch each edge s chosen to be n the
More informationa b a In case b 0, a being divisible by b is the same as to say that
Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationarxiv: v1 [cs.gt] 18 Nov 2015
The Invsble Hand of Dynamc Market Prcng arxv:1511.05646v1 [cs.gt] 18 Nov 2015 Vncent Cohen-Addad vcohen@d.ens.fr Alon Eden alonarden@gmal.com Amos Fat fat@tau.ac.l November 19, 2015 Abstract Mchal Feldman
More informationCommunication Complexity 16:198: February Lecture 4. x ij y ij
Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc
More information(1 ) (1 ) 0 (1 ) (1 ) 0
Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationn ). This is tight for all admissible values of t, k and n. k t + + n t
MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what
More informationCSCE 790S Background Results
CSCE 790S Background Results Stephen A. Fenner September 8, 011 Abstract These results are background to the course CSCE 790S/CSCE 790B, Quantum Computaton and Informaton (Sprng 007 and Fall 011). Each
More informationPricing and Resource Allocation Game Theoretic Models
Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009
More informationLecture 3: Probability Distributions
Lecture 3: Probablty Dstrbutons Random Varables Let us begn by defnng a sample space as a set of outcomes from an experment. We denote ths by S. A random varable s a functon whch maps outcomes nto the
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationExercise Solutions to Real Analysis
xercse Solutons to Real Analyss Note: References refer to H. L. Royden, Real Analyss xersze 1. Gven any set A any ɛ > 0, there s an open set O such that A O m O m A + ɛ. Soluton 1. If m A =, then there
More informationA Equilibria of Greedy Combinatorial Auctions
A Equlbra of Greedy Combnatoral Auctons BRENDAN LUCIER, Mcrosoft Research ALLAN BORODIN, Unversty of Toronto We consder auctons n whch greedy algorthms, pared wth frst-prce or crtcal-prce payment rules,
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationFeature Selection: Part 1
CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationLecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.
prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More informationU.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8
U.C. Berkeley CS278: Computatonal Complexty Handout N8 Professor Luca Trevsan 2/21/2008 Notes for Lecture 8 1 Undrected Connectvty In the undrected s t connectvty problem (abbrevated ST-UCONN) we are gven
More informationPricing Network Services by Jun Shu, Pravin Varaiya
Prcng Network Servces by Jun Shu, Pravn Varaya Presented by Hayden So September 25, 2003 Introducton: Two Network Problems Engneerng: A game theoretcal sound congeston control mechansm that s ncentve compatble
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationRandomness and Computation
Randomness and Computaton or, Randomzed Algorthms Mary Cryan School of Informatcs Unversty of Ednburgh RC 208/9) Lecture 0 slde Balls n Bns m balls, n bns, and balls thrown unformly at random nto bns usually
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationA New Refinement of Jacobi Method for Solution of Linear System Equations AX=b
Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013
COS 511: heoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 15 Scrbe: Jemng Mao Aprl 1, 013 1 Bref revew 1.1 Learnng wth expert advce Last tme, we started to talk about learnng wth expert advce.
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.
More informationExpected Value and Variance
MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationGeometry of Müntz Spaces
WDS'12 Proceedngs of Contrbuted Papers, Part I, 31 35, 212. ISBN 978-8-7378-224-5 MATFYZPRESS Geometry of Müntz Spaces P. Petráček Charles Unversty, Faculty of Mathematcs and Physcs, Prague, Czech Republc.
More informationFINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN
FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There
More informationANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)
Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of
More information4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA
4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected
More informationThe Price of Anarchy in Large Games
The Prce of Anarchy n Large Games Mchal Feldman Tel-Avv Unversty, Israel and Mcrosoft Research, USA mfeldman@post.tau.ac.l Tm Roughgarden Stanford Unversty, USA tm@cs.stanford.edu Ncole Immorlca Mcrosoft
More informationReal-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling
Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for
More informationHila Etzion. Min-Seok Pang
RESERCH RTICLE COPLEENTRY ONLINE SERVICES IN COPETITIVE RKETS: INTINING PROFITILITY IN THE PRESENCE OF NETWORK EFFECTS Hla Etzon Department of Technology and Operatons, Stephen. Ross School of usness,
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationBezier curves. Michael S. Floater. August 25, These notes provide an introduction to Bezier curves. i=0
Bezer curves Mchael S. Floater August 25, 211 These notes provde an ntroducton to Bezer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of the
More informationLecture 11. minimize. c j x j. j=1. 1 x j 0 j. +, b R m + and c R n +
Topcs n Theoretcal Computer Scence May 4, 2015 Lecturer: Ola Svensson Lecture 11 Scrbes: Vncent Eggerlng, Smon Rodrguez 1 Introducton In the last lecture we covered the ellpsod method and ts applcaton
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More informationMarket structure and Innovation
Market structure and Innovaton Ths presentaton s based on the paper Market structure and Innovaton authored by Glenn C. Loury, publshed n The Quarterly Journal of Economcs, Vol. 93, No.3 ( Aug 1979) I.
More informationAnnexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances
ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton
More informationGraph Reconstruction by Permutations
Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer
More informationAppendix B. Criterion of Riemann-Stieltjes Integrability
Appendx B. Crteron of Remann-Steltes Integrablty Ths note s complementary to [R, Ch. 6] and [T, Sec. 3.5]. The man result of ths note s Theorem B.3, whch provdes the necessary and suffcent condtons for
More informationRemarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence
Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More information