Implementation in undominated strategies by bounded mechanisms: The Pareto Correspondence
|
|
- Isabella Hubbard
- 5 years ago
- Views:
Transcription
1 Implementation in undominated strategies by bounded mechanisms: The Pareto Correspondence Saptarshi Mukherjee Eve Ramaekers Arunava Sen September 5, 2016 Preliminary and Incomplete Abstract We show that the Pareto correspondence can be implemented in weakly undominated strategies by bounded mechanisms provided there are at least three agents. 1 Introduction In this paper, we show that the Pareto correspondence can be implemented in weakly undominated strategies by bounded mechanisms provided that there are at least three agents. This addresses an issue raised in Börgers (1991). 2 Implementation There is a finite set of agents N and a finite set of alternatives A. To avoid triviality, we assume A 2. Each agent i N has preferences over A, represented by a complete, transitive, and anti-symmetric binary relation P 1 For each a, b A, if a P i b or a = b, we write a R i b. For each a, b A, if a P i b, we say that a is better than b and if a R i b, we Indian Institute of Technology, New Delhi, India. Université catholique de Louvain, CORE, Voie du Roman Pays, 34, B-1348 Louvain-la-Neuve, Belgium. Indian Statistical Institute, 7 SJS Sansanwal Marg, New Delhi , India. 1 Binary relation P i is complete if for each a, b A, either a P i b, b P i a, or both, transitive if for each a, b, c A, if a P i b and b P i c, then a P i c, and anti-symmetric if for each a, b A with a b, either a P i b or b P i a. 1
2 say that a is at least as good as b. Let P be the set of all strict orderings on A. We let P N and P i, i N denote the N -fold and N 1 -fold Cartesian product of P respectively. A preference profile P (P i ) i N is an element of P N. A social choice correspondence SCC F associates a non-empty subset of alternatives with every preference profile P, i.e. F : P N 2 A \. A mechanism consists of a message space M i N M i and an outcome function g : M A. Let P D N and i N. Message m i M i weakly dominates message m i M i at P i in mechanism (M, g) if for each m i M i, we have g(m i, m i ) R i g(m i, m i ) and for at least some m i M i, we have g(m i, m i ) P i g(m i, m i ). 2 Further, m i is undominated at P i in (M, g) if no m i M i weakly dominates m i at P i in (M, g). Let U(P i ) be the set of all undominated messages at P i in (M, g). Let m (m i ) i N M be a typical message profile. Let U(P ) i N U(P i ) and by abuse of notation, g(u(p )) {a A there is m U(P ) such that g(m) = a}. Definition 1 A SCC F is implementable in undominated strategies if there is a mechanism (M, g) such that for each P P N, we have F (P ) = g(u(p )). Remark: Jackson (1992) proved the following surprising result - it is possible to implement any SCC in undominated strategies. However the canonical mechanism used to prove this result involves infinite strings of messages, each of which dominates the earlier without an undominated message at the end. Thus, in such a mechanism, an agent s best-response according to the criteria specified, does not exist. This is unsatisfactory. To avoid such situations (following Jackson (1992)), we require that for each agent s dominated message, there is an undominated message that weakly dominates it. Definition 2 A mechanism (M, g) is bounded if for each i N, each P i P and each m i / U(P i ), there exists m i U(P i ) that weakly dominates m i at P i in (M, g). If a SCC is implementable in undominated strategies by a bounded mechanism we say that it is USBM implementable. Some necessity conditions for USBM implementability exist. Jackson (1992) shows that strategy-resistance is a necessary condition and Yamashita (2012, 2015) generalises this condition to chain dominance. Börgers (1991) shows that there is no selection of the Paretocorrespondence that satisfies a compromise property which is USBM implementable if there are either two agents or three alternatives. Certain SCCs are known to be USBM implementable. For instance, strategy-proof social choice functions (SCFs) such as dictatorial SCFs are trivially implementable. The union 2 Let M i l N\{i} M l be the message sets of all the agents but i and m i (m l ) l N\{i} be the messages of all the agents but i. 2
3 of best-ranked alternatives at every profile (a strict subset of the Pareto Correspondence) is USBM implementable (Börgers (1991)). However, no general sufficiency result exists. Mukherjee, Muto and Ramaekers (2016) provide a general solution to the problem where an additional behavioural assumption (partial honesty) is imposed on agents. We show below that the entire Pareto correspondence can be USBM implemented. 3 Main Result The Pareto Correspondence selects all alternatives a at profile P with the property that there does not exist another alternative b such that bp i a for all i N. Theorem 1 The Pareto correspondence is USBM implementable for N 3. Proof : We describe a mechanism that implements the Pareto correspondence. In order to do so, some preliminaries are required. 1. Let > be an ordering on N. 2. For each i N, let i be an ordering on all distinct pairs of admissible orderings of i. 3. For each i N and each P i, P i P, let x i (P i, P i ), y i (P i, P i ) A be such that x i (P i, P i ) P i y i (P i, P i ) and y i (P i, P i ) P i x i (P i, P i ). We now describe the mechanism. Each agent i N announces two orderings P i, P i P with P i P i, a color C i {G, B, R} together with a shade s i {1, 2,...}, and an integer λ i {1, 2,..., max P i F (P i, P i ) }. For each i N, let m i = (P i, P i, C i, s i, λ i ) M i be a typical announcement. The outcome is determined as follows. For each l N and each m l = (P l,., C l, s l,.) M l, we say that m = (m l ) constitutes a trigger message profile for i N if: (i) there are x, y A and Pi, Pi P such that: P i is unanimous on (y, x), i.e. for each j N\{i}, we have y = τ 1 (P j ) and x = τ 2 (P j ), (x, y) is associated with (Pi, Pi ), i.e. x = x i (Pi, Pi ) and y = y i (Pi, Pi ), (ii) for each j, k N\{i}, we have C j = C k = R and there is t {1, 2,...} such that t = s j = s k. 3
4 Case I There is only one i N for whom announced m = (m l ) l N constitutes a trigger message profile. Thus, there are x, y A and Pi, Pi P such that Condition (i) holds. Break ties as follows. If (x, y) is associated with (P i, P i ), assume P i = Pi and P i = Pi. If (x, y) is associated with (P i, P i ), assume P i = Pi and P i = Pi. Otherwise, break ties by means of ordering Also, there is t {1, 2,...} such that for each l N\{i}, we have t = s l. The outcome is x, y or τ 1 (P i ), depending on C i, on how announced (P i, P i ) relates to (Pi, Pi ), and if C i = B, on how s i relates to t. Distinguish five cases. I.a P i = P i = P If i announces G, R, or B with s i < t, then the outcome is x. If i announces B with s i = t, then the outcome is y. If i announces B with s i > t, then the outcome is τ 1 (P i ). I.b P i = P i = P If i announces G, R, or B with s i t, then the outcome is y. If i announces B with s i > t, then the outcome is τ 1 (P i ). I.c P i = P i P If i announces G, R, or B with s i t, then the outcome is x. If i announces B with s i > t, then the outcome is τ 1 (P i ). I.d P i = P i P If i announces G, R, or B with s i t, then the outcome is y. If i announces B with s i > t, then the outcome is τ 1 (P i ). I.e P i P i and P i P If i announces G, R, or B with s i t, then the outcome is τ 1 (P i, {x, y}). If i announces B with s i > t, then the outcome is τ 1 (P i ). Case II There are i, j N with i j for whom announced m = (m l ) l N constitutes a trigger message profile. Since N 3, there is y A such that for each l N, we have y = τ 1 (P l ), and the outcome is y. Case III There is j N announcing B, and Case I does not hold. Then, the outcome is τ 1 (P h ), where h announces B and is the winner, among all announcing B, of the integer game for announced shades (s l ) l N, i.e. s h = max {l N Cl =B} s l. Break ties by means of ordering >. Case IV Case I, II nor III holds. Arbitrarily order F (P ). W.l.o.g. let a 1 F (P ) be the alternative ranked first, a 2 F (P ) be the alternative ranked second, and so on. Then, 4
5 the outcome is a k, where k is the winner of the modulo game for announced (λ l ) l N, i.e. k l N λ l mod F (P ) + 1. We show that the mechanism described above implements the Pareto correspondence. We proceed in several steps. [Step 1:] True ordering, any secondary ordering, blue, any shade, and any integer announcement weakly dominates this secondary ordering, any other ordering as secondary ordering, any color, any smaller shade, and any integer announcement at true ordering. Let i N, P i P, m 1 i = (P i, P i, B, s i, λ i ) M i, and m 2 i = (P i, P i, C i, s i, λ i) M i such that s i < s In what follows, we prove that for each m i M i, we have g(m 1 i, m i ) R i g(m 2 i, m i ). In Step 2, we prove that there is m i M i such that g(m 1 i, m i ) P i g(m 2 i, m i ). Thus, m 1 i weakly dominates m 2 i at P For each l N\{i}, let m l = (P l, P l, C l, s l, λ l ) M l. Note that (m 1 i, m i ) constitutes a trigger message profile for i if and only if (m 2 i, m i ) constitutes a trigger message profile for i. Also, (m 1 i, m i ) constitutes a trigger message profile for no j N\{i}. Thus, distinguish the following six cases. Case A: Assume that (m 1 i, m i ) and (m 2 i, m i ) constitute trigger message profiles for i only (Case I, Case I). Let x, y A, Pi, Pi P, and t {1, 2,...} be such that Conditions (i) and (ii) hold (cf. page 3). Assume s i > t. Then g(m 1 i, m i ) = τ 1 (P i ). Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). Otherwise, assume s i t. Then, g(m 1 i, m i ) {x, y, τ 1 (P i )}, depending on how announced (P i, P i ) relates to (Pi, Pi ), and on how s i relates to t. Also, g(m 2 i, m i ) {x, y, τ 1 (P i )}, depending on C i, on how announced (P i, P i ) relates to (Pi, Pi ), and if C i = B, on how s i relates to t. Distinguish five cases. A.1 P i = P i = P = Pi, Case i ). As s i t, hence s i < t, we have g(m 2 i, m i ) = y. By If s i < t, then g(m 1 i, m i ) = x. If s i = t, then g(m 1 i, m i ) = y. As P i I.b or I.d holds for (P i, P assumption, (x, y) is associated with (Pi, Pi ) and P i = P g(m 1 i, m i ) R i g(m 2 i, m i ). A.2 P i = P i = P i, hence x P i y. Thus, As s i t, we have g(m 1 i, m i ) = y. As P i = Pi, Case I.a or I.c holds for (P i, P i ). As s i t, hence s i < t, we have g(m 2 i, m i ) = x. By assumption, (x, y) is associated with (Pi, Pi ) and P i = Pi, hence y P i x. Thus, g(m 1 i, m i ) P i g(m 2 i, m i ). A.3 P i = P i P As s i t, we have g(m 1 i, m i ) = x. As P i = Pi, hence P i Pi, and P i Pi, Case I.e holds for (P i, P i ). As s i t, hence s i < t, we have g(m 2 i, m i ) = τ 1 (P i, {x, y}). 5
6 By assumption, (x, y) is associated with (Pi, Pi ) and P i = Pi, hence x P i y. Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). A.4 P i = P i P As s i t, we have g(m 1 i, m i ) = y. As P i = Pi, hence P i Pi, and P i Pi, Case I.e holds for (P i, P i ). As s i t, hence s i < t, we have g(m 2 i, m i ) = τ 1 (P i, {x, y}). By assumption, (x, y) is associated with (Pi, Pi ) and P i = Pi, hence y P i x. Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). A.5 P i P i, P As s i t, we have g(m 1 i, m i ) = τ 1 (P i, {x, y}). Either case holds for (P i, P i ). As s i t, hence s i < t, in Case I.a or I.c, g(m 2 i, m i ) = x, in Case I.b or I.d, g(m 2 i, m i ) = y, and in Case I.e, g(m 2 i, m i ) = τ 1 (P i, {x, y}). Altogether, g(m 2 i, m i ) {x, y}. Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). Case B: Assume that (m 1 i, m i ) constitutes a trigger message profile for i only and (m 2 i, m i ) constitutes a trigger message profile for i and some j N\{i} (Case I, Case II). Let x, y A, Pi, Pi P, and t {1, 2,...} be such that Conditions (i) and (ii) hold (cf. page 3). In Case I.a, g(m 1 i, m i ) {x, y, τ 1 (P i )}. In Case b or d, g(m 1 i, m i ) {y, τ 1 (P i )}. In Case I.c, g(m 1 i, m i ) {x, τ 1 (P i )}. In Case I.e, g(m 1 i, m i ) {τ 1 (P i, {x, y}), τ 1 (P i )}. Altogether, g(m 1 i, m i ) {x, y, τ 1 (P i )}. Note that g(m 1 i, m i ) = x only if x P i y. Also, τ 1 (P i ) = y and for each l N\{i}, we have τ 1 (P l ) = y, hence g(m 2 i, m i ) = y. Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). Case C: Assume that (m 1 i, m i ) constitutes a trigger message profile for no j N, and (m 2 i, m i ) constitutes a trigger message profile for some j N\{i} (Case III, Case I). Let h N announce B and be the winner, among all announcing B in (m 1 i, m i ), of the integer game for announced shades (s l ) l N, i.e. s h = max {l N Cl =B} s l. Break ties by means of ordering >. Then, g(m 1 i, m i ) = τ 1 (P h ). Note that h {i, j}, and h = j only if C j = B. Let x, y A, Pi, Pi P, and t {1, 2,...} be such that Conditions (i) and (ii) hold. Then, g(m 2 i, m i ) {x, y, τ 1 (P j )}, 3 depending on C j, on how announced (P j, P j) relates to (Pj, Pj ), and if C j = B, on how s j relates to t. Distinguish two cases. If C j {G, R}, or C j = B and s j < s i or s j = s i and i > j, then g(m 1 i, m i ) = τ 1 (P i ). If C j = B and s j > s i or s j = s i and j > i, hence s j > s i = t, then g(m 1 i, m i ) = g(m 2 i, m i ) = τ 1 (P j ). Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). 3 In Case I.a, g(m 2 i, m i) {x, y, τ 1 (P j )}. In Case b or d, g(m 2 i, m i) {y, τ 1 (P j )}. In Case I.c, g(m 2 i, m i) {x, τ 1 (P j )}. In Case I.e, g(m 2 i, m i) {τ 1 (P j, {x, y}), τ 1 (P j )}. 6
7 Case D: Assume that (m 1 i, m i ) constitutes a trigger message profile for no j N, and (m 2 i, m i ) constitutes a trigger message profile for some j, k N\{i} with j k (Case III, Case II). For each l N\{i}, we have C l = R, hence g(m 1 i, m i ) = τ 1 (P i ). Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). Case E: Assume that neither (m 1 i, m i ) nor (m 2 i, m i ) constitutes a trigger message profile for some j N, and there is some j N announcing B in (m 2 i, m i ) (Case III, Case III). Let h, k N announce B and be the winner, among all announcing B in (m 1 i, m i ) and (m 2 i, m i ) resp., of the integer game for announced shades (s l ) l N and (s i, s i ) resp., i.e. s h = max {l N Cl =B} s l, and s k s i and s k = max {l N\{i} Cl =B} s l. Break ties by means of ordering >. Then, g(m 1 i, m i ) = τ 1 (P h ) and g(m 2 i, m i ) = τ 1 (P k ). Distinguish two cases. If h = i, then g(m 1 i, m i ) = τ 1 (P i ). If h i, then h = k, hence g(m 1 i, m i ) = g(m 2 i, m i ) = τ 1 (P h ). Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). Case F: Assume that (m 1 i, m i ) nor (m 2 i, m i ) constitutes a trigger message profile for some j N, and no j N announcing B in (m 2 i, m i ) (Case III, Case IV). For each l N\{i}, we have C l {G, R}, hence g(m 1 i, m i ) = τ 1 (P i ). Thus, g(m 1 i, m i ) R i g(m 2 i, m i ). [Step 2:] True ordering, any secondary ordering, any color, any shade, and any integer announcement is undominated at the true ordering. Let i N, P i P, and m 1 i = (P i, P i, C i, s i, λ i ) M i and m 2 i = (P i, P i, C i, s i, λ i) M i be such that m 1 i m 2 In what follows, we prove that either there is m i M i such that g(m 1 i, m i ) P i g(m 2 i, m i ) or for each m i M i, we have g(m 1 i, m i ) = g(m 2 i, m i ). Thus, m 2 i does not weakly dominate m 1 i at P We distinguish four cases. Case A: C i {G, R} and C i = B. Let x, y A and m i = (P l, P l, R, t, λ l) l N\{i} M i be such that P i is unanimous on (y, x) and (x, y) is associated with (P i, P i ). Then, (m 1 i, m i ) and (m 2 i, m i ) constitute trigger messages profile for i. If y P i x, assume t > s i. As y P i x, hence P i P i, Case I.b, I.d, or I.e holds for (P i, P i ), or Case II holds. In Case I.b or d, g(m 1 i, m i ) = y. In Case I.e, g(m 1 i, m i ) = τ 1 (P i, {x, y}), hence g(m 1 i, m i ) = y. In Case II, g(m 1 i, m i ) = y. Altogether, g(m 1 i, m i ) = y. Case I.a holds for (P i, P i ) and t > s i, hence g(m 2 i, m i ) = x. Thus, g(m 1 i, m i ) P i g(m 2 i, m i ). If x P i y, assume t = s i. As x P i y, hence P i P i, Case I.a, I.c, or I.e holds for (P i, P i ). In Case I.a or I.c, g(m 1 i, m i ) = x. In Case I.e, g(m 1 i, m i ) = τ 1 (P i, {x, y}), hence g(m 1 i, m i ) = x. Altogether, g(m 1 i, m i ) = x. Case I.a holds for (P i, P i ) and s i = t, hence g(m 2 i, m i ) = y. Thus, g(m 1 i, m i ) P i g(m 2 i, m i ). Case B: C i = B and C i = B. 7
8 First, assume P i = P i and P i = P i, and s i = s i. Then, for each m i M i, we have g(m 1 i, m i ) = g(m 2 i, m i ). Second, assume P i P i and P i P i, and s i = s i. Assume that for each P i D i, each x, y X, and each Pi, Pi D i such that P i is unanimous on (y, x) and (x, y) is associated with (Pi, Pi ), we have x P i y if and only if x P i y. Also, assume τ 1 (P i ) = τ 1 (P i ). Then, for each m i M i, we have g(m 1 i, m i ) = g(m 2 i, m i ). Otherwise, either w.l.o.g. x P i y and y P i x or τ 1 (P i ) τ 1 (P i ) (or both). If the former holds, let m i = (P l, P l, R, t, λ l) l N\{i} M i, x, y X, and Pi, Pi D i be such that P i is unanimous on (y, x) and (x, y) is associated with (Pi, Pi ). Then, (m 1 i, m i ) and (m 2 i, m i ) constitute trigger messages profile for i only. Also, assume t > s i and t > s i. As x P i y, hence P i Pi, Case I.a, I.c, or I.e holds for (P i, P i ). As t > s i, in Case I.a or c, g(m 1 i, m i ) = x, and in Case I.e, g(m 1 i, m i ) = τ 1 (P i, {x, y}), hence g(m 1 i, m i ) = x. As y P i x, hence P i Pi, Case I.b, I.d, or I.e holds for (P i, P i ). As t > s i, in Case I.b or d, g(m 2 i, m i ) = y, and in Case I.e, g(m 2 i, m i ) = τ 1 (P i, {x, y}), hence g(m 2 i, m i ) = y. Thus, g(m 1 i, m i ) = x and g(m 2 i, m i ) = y, hence g(m 1 i, m i ) P i g(m 2 i, m i ). If the latter holds, let m i = (P l, P l, G, s l, λ l ) l N\{i} M Case III holds for (m 1 i, m i ) and (m 2 i, m i ), hence g(m 1 i, m i ) = τ 1 (P i ) and g(m 2 i, m i ) = τ 1 (P i ). Thus, g(m 1 i, m i ) P i g(m 2 i, m i ). Case C: C i {G, R} and C i {G, R}. Let m i = (P l, P l, G, s l, λ l ) l N\{i} M i, x, y A, and P i P be such that x P i y and y P i x, P i is unanimous on (x, y), and for each l N\{i}, if τ 1 (P i ) x, then τ 3 (P l ) = τ 1 (P i ). Note that F (P i, P i ) = {x, τ 1 (P i )} and {x, y} F (P i, P i ). Then, further assume that if l N λ l mod F (P i, P i ) + 1 = k, then a k = τ 1 (P i ), and if λ i + l N\{i} λ l mod F (P i, P i ) + 1 = k, then a k τ 1 (P i ). Case IV holds for (m 1 i, m i ) and (m 2 i, m i ), hence g(m 1 i, m i ) = τ 1 (P i ) and g(m 2 i, m i ) τ 1 (P i ). Thus, g(m 1 i, m i ) P i g(m 2 i, m i ). Case D: C i = B and C i {G, R}. Let m i = (P l, P l, G, s l, λ l ) l N\{i} M i, x, y A, and P i P i be such that x P i y and y F (P i, P i ), 4 and if λ i + l N\{i} λ l mod F (P i, P i ) + 1 = k, then a k = y. Case III holds for (m 1 i, m i ), hence g(m 1 i, m i ) = τ 1 (P i ). Case IV holds for (m 2 i, m i ), hence g(m 2 i, m i ) = y. As x P i y, hence τ 1 (P i ) y, we have g(m 1 i, m i ) P i g(m 2 i, m i ). [Step 3:] Any alternative is the outcome of an undominated message profile at any ordering profile if and only if it belongs to the Pareto correspondence for this profile. Let P P N and P ar(p ) be the set of alternatives selected by the Pareto correspondence for P. In what follows, we prove g(u(p )) = P ar(p ). Let x P ar(p ). Let m = (P l, P l, G, s l, λ l ) l N M be such that if l N λ l mod F (P ) + 1 = k, then a k = x. By Step 2, for each l N, we have m l U(P l ). 4 E.g. let P i be unanimous on (y, x). 8
9 For each l N, let m l = (P l, P l, C l, s l, λ l ) U(P l ). By Steps 1 and 2, P l = P l. If there is i N for whom m = (m l ) l N constitutes a trigger case, then there are x, y A such that P i is unanimous on (y, x) and g(m) {x, y, τ 1 (P i )}. 5 As P i is unanimous on (y, x), and g(m 1 i, m i ) = x only if x P i y, if g(m 1 i, m i ) = x, then x P ar(p ). Also, y, τ 1 (P i ) P ar(p ). If there is no i N for whom m = (m l ) l N constitutes a trigger case and for each l N, we have C l {G, R}, then there is a k P ar(p ) such that k is the winner of the modulo game for announced (λ l ) l N, i.e. k l N λ l mod F (P ) + 1, and g(m) = a k. Otherwise, there is i N such that C i = B and g(m) = τ 1 (P i ). Thus, τ 1 (P i ) P ar(p ). Altogether, g(m) P ar(p ). [Step 4:] The mechanism is bounded. Let i N, P i P, and m i = (P i, P i, C i, s i, λ i ) U(P i ). By Step 2, P i P Let m i = (P i, P i, C i, s i, λ i) M i be such that C i = B and s i > s By Step 2, m i U(P i ). By Step 1, m i weakly dominates m i at P 4 Discussion A useful starting point for a discussion of the mechanism is the pseudo-random dictatorship mechanism constructed in Börgers (1991). Agents play the well-known modulo game and the winner gets to choose an alternative; equivalently they announce an ordering and the winner gets the best outcome according to the announced ordering. Announcing a false preference ordering and an arbitrary integer is weakly dominated by announcing her true ordering and the same integer. Moreover announcing her true ordering and an arbitrary integer is an undominated strategy. This mechanism implements a sub-correspondence of the Pareto correspondence, the correspondence consisting of the best elements of all agents at every profile. The drawback of the mechanism as pointed out in Börgers (1991) is that always excludes compromises. Our result shows that we can successfully implement correspondences that include all compromises. The mechanism is a suitable generalisation of the pseudo-random dictatorship mechanism. Consider the following first attempt to include compromises by modifying the pseudorandom dictatorship mechanism. Agents again play the modulo game and the winner gets to choose and alternative from the Pareto set at that profile. This attempt clearly fails because the strategy proposing a compromise will be weakly dominated by the strategy proposing the agent s best alternative at her true preference ordering. The basic idea behind our mechanism is ensure that this does not happen, i.e. the strategy proposing a compromise and the strategy 5 In Case I.a, g(m) {x, y, τ 1 (P i )}. In Case b or d, g(m) {y, τ 1 (P i )}. In Case I.c, g(m) {x, τ 1 (P i )}. In Case I.e, g(m) {τ 1 (P i, {x, y}), τ 1 (P i )}. 9
10 proposing the best alternative at a preference ordering are both undominated. Our mechanism works as follows. All agents announce two orderings, one primary and one secondary, one of three colours, Green (G), Blue (B) and Red (R) and two positive integers (one called a shade ). If all agents announce G, the outcome is an element of the Pareto set at the announced profile using the primary preference announcements. The actual alternative chosen is determined by one of the announced integers in a modulo-game manner and all alternatives can be chosen by varying announcements. If some agents announce B, the outcome is the maximal alternative according to the primary preference ordering announced by the agent announcing the highest shade. 6 It is important to ensure that announcing B and the true ordering does not weakly dominate announcing G and the true ordering. this is achieved by the R messages. If all agents other than some i announce a primary ordering where alternative y is first-ranked and x is second ranked, the colour R and the same shade t, the message profile is referred to as a trigger profile for i for a pair of orderings (Pi, Pi ) where xpi y and ypi x. The outcome at such a profile depends on the primary and secondary orderings of i, the colour and the shade i announces. For example, suppose i announces (Pi, Pi ). If her colour announcement is either G or R, the outcome is x. If she announces B, the outcome is x if her shade is less than t, y if her shade is equal to t and the maximal element according to Pi if her shade is greater than t. A key feature of this construction is that if Pi is i s true ordering, by announcing G and an arbitrary shade, i gets x while by announcing B and the same shade she gets y at the trigger profile for i where all the others are announcing this shade. Since xpi y, announcing G and the true ordering is not dominated by announcing B and the true ordering. Suppose i s true ordering is Pi. Consider an arbitrary message by i where her primary announcement is P i Pi. Then this message is weakly dominated by another message where i s primary announcement is Pi, her secondary announcement is P i, her colour is B and her shade announcement is higher. Also announcing her true ordering as her primary ordering, an arbitrary secondary ordering, colour, shade and integer is undominated. This suffices to show that the mechanism USBM implements the Pareto correspondence. The mechanism exploits several key properties of the Pareto correspondence. The first is tops inclusivity, i.e. τ 1 (P i ) F (P i, P i ) for all (P i, P i ). The second is the following. Let P be a profile, i be an agent and P i be an ordering. Suppose (i) xp i y and yp i x, y = τ 1 (P i ) P i i, P i ) for all and (ii) x = τ 2 (P i ). Then x, y F (P ), y F (P i, P i ) and max P i {x, y} F (P P. In other words, if all agents other than i have y and x as their first and secondranked alternatives respectively, then both x and y belong to the Pareto correspondence when i ranks x above y. Also y belongs to the Pareto correspondence when y is above x. In general the better alternative between x and y in any ordering of i belongs to the Pareto correspondence. Finally, the correspondence satisfies the strict form of unanimity: if all 6 Ties are broken according to a fixed ordering over agents. 10
11 agents rank y first, then the only y is picked by the correspondence. In fact, the mechanism can be used to implement any SCC defined over an arbitrary domain that satisfies these properties. References [1] Börgers, T. (1991): Undominated strategies and coordination in normal-form games, Social Choice and Welfare, 8, [2] Carroll, G. (2014): A complexity result for undominated-strategy implementation, working paper, Stanford University. [3] Jackson, M. O. (1992): Implementation in undominated strategies: A look at bounded mechanisms, Review of Economic Studies, 59, [4] Mukherjee, S, Muto, N and E. Ramaekers (2016): Implementation in undominated strategies with partially honest agents, mimeo. [5] Ohseto, S. (1994): Implementation of the plurality correspondence in undominated strategies by a bounded mechanism, The Economic Studies Quarterly, 54, [6] Yamashita, T. (2012): A necessary condition for implementation in undominated strategies, with applications to robustly optimal trading mechanisms, Mimeo, Toulouse School of Economics. [7] Yamashita, T. (2015): Implementation in weakly undominated strategies: Optimality of second-price auction and posted-price mechanism, Review of Economic Studies, 82,
Worst-case mechanism design with undominated strategies
Worst-case mechanism design with undominated strategies Takuro Yamashita April 26, 2009 Abstract We consider a way to evaluate mechanisms without assuming mutual knowledge of rationality among the agents.
More informationNASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA
NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA MARIA GOLTSMAN Abstract. This note shows that, in separable environments, any monotonic social choice function
More informationDICTATORIAL DOMAINS. Navin Aswal University of Minnesota, Minneapolis, USA Shurojit Chatterji Indian Statistical Institute, New Delhi, India and
DICTATORIAL DOMAINS Navin Aswal University of Minnesota, Minneapolis, USA Shurojit Chatterji Indian Statistical Institute, New Delhi, India and Arunava Sen Indian Statistical Institute, New Delhi, India
More informationÇağatay Kayı, Eve Ramaekers. An Impossibility in Sequencing Problems RM/08/040. JEL code: D63, C72
Çağatay Kayı, Eve Ramaekers An Impossibility in Sequencing Problems RM/08/040 JEL code: D63, C72 Maastricht research school of Economics of TEchnology and ORganizations Universiteit Maastricht Faculty
More informationNotes on Social Choice Theory
Notes on Social Choice Theory Arunava Sen February 21, 2017 1 Binary Relations and Orderings Let A = {a, b, c,..., x, y, z,...} be a finite set of alternatives. Let N = {1,..., n} be a finite set of agents.
More informationHans Peters, Souvik Roy, Soumyarup Sadhukhan, Ton Storcken
Hans Peters, Souvik Roy, Soumyarup Sadhukhan, Ton Storcken An Extreme Point Characterization of Strategyproof and Unanimous Probabilistic Rules over Binary Restricted Domains RM/16/012 An Extreme Point
More informationRecap Social Choice Functions Fun Game Mechanism Design. Mechanism Design. Lecture 13. Mechanism Design Lecture 13, Slide 1
Mechanism Design Lecture 13 Mechanism Design Lecture 13, Slide 1 Lecture Overview 1 Recap 2 Social Choice Functions 3 Fun Game 4 Mechanism Design Mechanism Design Lecture 13, Slide 2 Notation N is the
More informationA General Impossibility Result on Strategy-Proof Social Choice Hyperfunctions
A General Impossibility Result on Strategy-Proof Social Choice Hyperfunctions Selçuk Özyurt and M. Remzi Sanver May 22, 2008 Abstract A social choice hyperfunction picks a non-empty set of alternatives
More informationMultiple Equilibria in the Citizen-Candidate Model of Representative Democracy.
Multiple Equilibria in the Citizen-Candidate Model of Representative Democracy. Amrita Dhillon and Ben Lockwood This version: March 2001 Abstract De Sinopoli and Turrini (1999) present an example to show
More informationThe Gibbard random dictatorship theorem: a generalization and a new proof
SERIEs (2011) 2:515 527 DOI 101007/s13209-011-0041-z ORIGINAL ARTICLE The Gibbard random dictatorship theorem: a generalization and a new proof Arunava Sen Received: 24 November 2010 / Accepted: 10 January
More informationEpsilon Ex Post Implementation
Epsilon Ex Post Implementation Mehmet Barlo Nuh Aygun Dalkiran February 10, 2014 Abstract We provide necessary and sufficient conditions for epsilon ex post implementation. Our analysis extends Bergemann
More information13 Social choice B = 2 X X. is the collection of all binary relations on X. R = { X X : is complete and transitive}
13 Social choice So far, all of our models involved a single decision maker. An important, perhaps the important, question for economics is whether the desires and wants of various agents can be rationally
More informationOn Domains That Admit Well-behaved Strategy-proof Social Choice Functions
On Domains That Admit Well-behaved Strategy-proof Social Choice Functions Shurojit Chatterji, Remzi Sanver and Arunava Sen May 2010 Paper No. 07-2010 ANY OPINIONS EXPRESSED ARE THOSE OF THE AUTHOR(S) AND
More informationConstitutional Rights and Pareto Efficiency
Journal of Economic and Social Research, 1 (1) 1999, 109-117 Constitutional Rights and Pareto Efficiency Ahmet Kara 1 Abstract. This paper presents a sufficient condition under which constitutional rights
More informationMAXIMAL POSSIBILITY AND MINIMAL DICTATORIAL COVERS OF DOMAINS
MAXIMAL POSSIBILITY AND MINIMAL DICTATORIAL COVERS OF DOMAINS Gopakumar Achuthankutty 1 and Souvik Roy 1 1 Economic Research Unit, Indian Statistical Institute, Kolkata Abstract In line with the works
More informationNASH IMPLEMENTING SOCIAL CHOICE RULES WITH RESTRICTED RANGES
NASH IMPLEMENTING SOCIAL CHOICE RULES WITH RESTRICTED RANGES by M.Remzi Sanver * 06.06.2004 ABSTRACT 1 We consider Nash implementation of social choice rules with restricted ranges and show that the appropriate
More informationStrategic Manipulability without Resoluteness or Shared Beliefs: Gibbard-Satterthwaite Generalized
Strategic Manipulability without Resoluteness or Shared Beliefs: Gibbard-Satterthwaite Generalized Christian Geist Project: Modern Classics in Social Choice Theory Institute for Logic, Language and Computation
More informationWARWICK ECONOMIC RESEARCH PAPERS
Implementation in Mixed Nash Equilibrium Claudio Mezzetti & Ludovic Renou No 902 WARWICK ECONOMIC RESEARCH PAPERS DEPARTMENT OF ECONOMICS Implementation in Mixed Nash Equilibrium Claudio Mezzetti & Ludovic
More informationA Characterization of Single-Peaked Preferences via Random Social Choice Functions
A Characterization of Single-Peaked Preferences via Random Social Choice Functions Shurojit Chatterji, Arunava Sen and Huaxia Zeng September 2014 Paper No. 13-2014 ANY OPINIONS EXPRESSED ARE THOSE OF THE
More informationSocial Choice and Welfare Epsilon-Ex Post Implementation
Social Choice and Welfare Epsilon-Ex Post Implementation --Manuscript Draft-- Manuscript Number: Full Title: Article Type: Corresponding Author: Epsilon-Ex Post Implementation Original Paper Nuh Aygun
More informationSufficient Conditions for Weak Group-Strategy-Proofness
Sufficient Conditions for Weak Group-Strategy-Proofness T.C.A. Madhav Raghavan 31 July, 2014 Abstract In this note we study group-strategy-proofness, which is the extension of strategy-proofness to groups
More informationSocial Choice Theory. Felix Munoz-Garcia School of Economic Sciences Washington State University. EconS Advanced Microeconomics II
Social Choice Theory Felix Munoz-Garcia School of Economic Sciences Washington State University EconS 503 - Advanced Microeconomics II Social choice theory MWG, Chapter 21. JR, Chapter 6.2-6.5. Additional
More informationStrategic Manipulation and Regular Decomposition of Fuzzy Preference Relations
Strategic Manipulation and Regular Decomposition of Fuzzy Preference Relations Olfa Meddeb, Fouad Ben Abdelaziz, José Rui Figueira September 27, 2007 LARODEC, Institut Supérieur de Gestion, 41, Rue de
More informationFinite Dictatorships and Infinite Democracies
Finite Dictatorships and Infinite Democracies Iian B. Smythe October 20, 2015 Abstract Does there exist a reasonable method of voting that when presented with three or more alternatives avoids the undue
More informationMechanism Design: Basic Concepts
Advanced Microeconomic Theory: Economics 521b Spring 2011 Juuso Välimäki Mechanism Design: Basic Concepts The setup is similar to that of a Bayesian game. The ingredients are: 1. Set of players, i {1,
More informationEpsilon Ex Post Implementation
Epsilon Ex Post Implementation Mehmet Barlo Nuh Aygün Dalkıran January 30, 2015 Abstract We provide necessary and sufficient conditions for epsilon ex post implementation. Our analysis extends Bergemann
More informationarxiv: v1 [cs.gt] 10 Apr 2018
Individual and Group Stability in Neutral Restrictions of Hedonic Games Warut Suksompong Department of Computer Science, Stanford University 353 Serra Mall, Stanford, CA 94305, USA warut@cs.stanford.edu
More informationArrow s Paradox. Prerna Nadathur. January 1, 2010
Arrow s Paradox Prerna Nadathur January 1, 2010 Abstract In this paper, we examine the problem of a ranked voting system and introduce Kenneth Arrow s impossibility theorem (1951). We provide a proof sketch
More informationFollow links for Class Use and other Permissions. For more information send to:
COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part
More informationIncentive-Compatible Voting Rules with Positively Correlated Beliefs
Incentive-Compatible Voting Rules with Positively Correlated Beliefs Mohit Bhargava, Dipjyoti Majumdar and Arunava Sen August 13, 2014 Abstract We study the consequences of positive correlation of beliefs
More informationThe Relation Between Implementability and the Core
The Relation Between Implementability and the Core Eiichi Miyagawa Department of Economics, Columbia University 420 West 118th Street, New York, NY 10027, U.S.A. em437@columbia.edu June 11, 2002 Abstract
More informationApproximation Algorithms and Mechanism Design for Minimax Approval Voting 1
Approximation Algorithms and Mechanism Design for Minimax Approval Voting 1 Ioannis Caragiannis, Dimitris Kalaitzis, and Evangelos Markakis Abstract We consider approval voting elections in which each
More informationHans Peters, Souvik Roy, Ton Storcken. Manipulation under k-approval scoring rules RM/08/056. JEL code: D71, D72
Hans Peters, Souvik Roy, Ton Storcken Manipulation under k-approval scoring rules RM/08/056 JEL code: D71, D72 Maastricht research school of Economics of TEchnology and ORganizations Universiteit Maastricht
More informationDynamics of Stable Sets of Constitutions
Dynamics of Stable Sets of Constitutions HOUY Nicolas February 26, 2007 Abstract A Self-Designating social choice correspondence designates itself when it is implemented as a constitution and when the
More information6.207/14.15: Networks Lecture 24: Decisions in Groups
6.207/14.15: Networks Lecture 24: Decisions in Groups Daron Acemoglu and Asu Ozdaglar MIT December 9, 2009 1 Introduction Outline Group and collective choices Arrow s Impossibility Theorem Gibbard-Satterthwaite
More informationD I S C U S S I O N P A P E R 2009/62. Exchange of indivisible goods and indifferences: the Top Trading Absorbing Sets mechanisms
2009/62 Exchange of indivisible goods and indifferences: the Top Trading Absorbing Sets mechanisms Jorge Alcalde-Unzu and Elena Molis D I S C U S S I O N P A P E R Center for Operations Research and Econometrics
More informationTwo-Sided Matching. Terence Johnson. December 1, University of Notre Dame. Terence Johnson (ND) Two-Sided Matching December 1, / 47
Two-Sided Matching Terence Johnson University of Notre Dame December 1, 2017 Terence Johnson (ND) Two-Sided Matching December 1, 2017 1 / 47 Markets without money What do you do when you can t use money
More informationDEPARTMENT OF ECONOMICS
DEPARTMENT OF ECONOMICS Working Paper Natural implementation with partially-honest agents in economic environments with freedisposal by Lombardi, Michele Yoshihara, Naoki UNIVERSITY OF MASSACHUSETTS AMHERST
More informationApproximation Algorithms and Mechanism Design for Minimax Approval Voting
Approximation Algorithms and Mechanism Design for Minimax Approval Voting Ioannis Caragiannis RACTI & Department of Computer Engineering and Informatics University of Patras, Greece caragian@ceid.upatras.gr
More informationGame Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012
Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 Properties of Social Choice Functions Note: This is a only
More informationContinuity and Incentive Compatibility in Cardinal Voting Mechanisms
Continuity and Incentive Compatibility in Cardinal Voting Mechanisms Lars Ehlers Dipjyoti Majumdar Debasis Mishra and Arunava Sen November 11, 2016 Abstract We show that every cardinal incentive compatible
More informationThe Revenue Equivalence Theorem 1
John Nachbar Washington University May 2, 2017 The Revenue Equivalence Theorem 1 1 Introduction. The Revenue Equivalence Theorem gives conditions under which some very different auctions generate the same
More informationWeak Robust (Virtual) Implementation
Weak Robust (Virtual) Implementation Chih-Chun Yang Institute of Economics, Academia Sinica, Taipei 115, Taiwan April 2016 Abstract We provide a characterization of (virtual) implementation in iterated
More informationMonotonicity and Nash Implementation in Matching Markets with Contracts
Monotonicity and Nash Implementation in Matching Markets with Contracts Claus-Jochen Haake Bettina Klaus March 2006 Abstract We consider general two-sided matching markets, so-called matching with contracts
More informationRobust Mechanism Design and Robust Implementation
Robust Mechanism Design and Robust Implementation joint work with Stephen Morris August 2009 Barcelona Introduction mechanism design and implementation literatures are theoretical successes mechanisms
More informationEconomic Core, Fair Allocations, and Social Choice Theory
Chapter 9 Nathan Smooha Economic Core, Fair Allocations, and Social Choice Theory 9.1 Introduction In this chapter, we briefly discuss some topics in the framework of general equilibrium theory, namely
More informationGame Theory: Spring 2017
Game Theory: Spring 2017 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today In this second lecture on mechanism design we are going to generalise
More informationCoalitionally strategyproof functions depend only on the most-preferred alternatives.
Coalitionally strategyproof functions depend only on the most-preferred alternatives. H. Reiju Mihara reiju@ec.kagawa-u.ac.jp Economics, Kagawa University, Takamatsu, 760-8523, Japan April, 1999 [Social
More informationSocial Choice. Jan-Michael van Linthoudt
Social Choice Jan-Michael van Linthoudt Summer term 2017 Version: March 15, 2018 CONTENTS Remarks 1 0 Introduction 2 1 The Case of 2 Alternatives 3 1.1 Examples for social choice rules............................
More informationNash Implementation and Tie-Breaking Rules
Nash Implementation and Tie-Breaking Rules Mert Kimya Brown University, Department of Economics, 64 Waterman St, Providence RI 02912 USA. June 5, 2015 Abstract I study Nash implementation when agents might
More informationAlgorithmic Game Theory Introduction to Mechanism Design
Algorithmic Game Theory Introduction to Mechanism Design Makis Arsenis National Technical University of Athens April 216 Makis Arsenis (NTUA) AGT April 216 1 / 41 Outline 1 Social Choice Social Choice
More informationVickrey Auction VCG Characterization. Mechanism Design. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Mechanism Design
Algorithmic Game Theory Vickrey Auction Vickrey-Clarke-Groves Mechanisms Characterization of IC Mechanisms Mechanisms with Money Player preferences are quantifiable. Common currency enables utility transfer
More informationOnline Appendix to Strategy-proof tie-breaking in matching with priorities
Online Appendix to Strategy-proof tie-breaking in matching with priorities Lars Ehlers Alexander Westkamp December 12, 2017 Section 1 contains the omitted proofs of Lemma 5, Lemma 6 and Lemma 7 Subsection
More informationVickrey Auction. Mechanism Design. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Mechanism Design
Algorithmic Game Theory Vickrey Auction Vickrey-Clarke-Groves Mechanisms Mechanisms with Money Player preferences are quantifiable. Common currency enables utility transfer between players. Preference
More informationAlgorithmic Game Theory and Applications
Algorithmic Game Theory and Applications Lecture 18: Auctions and Mechanism Design II: a little social choice theory, the VCG Mechanism, and Market Equilibria Kousha Etessami Reminder: Food for Thought:
More informationDEPARTMENT OF ECONOMICS IMPLEMENTATION IN MIXED NASH EQUILIBRIUM
DEPARTMENT OF ECONOMICS IMPLEMENTATION IN MIXED NASH EQUILIBRIUM Claudio Mezzetti, University of Warwick, UK Ludovic Renou, University of Leicester, UK Working Paper No. 09/10 April 2009 Updated January
More informationNon-Manipulable Domains for the Borda Count
Non-Manipulable Domains for the Borda Count Martin Barbie, Clemens Puppe * Department of Economics, University of Karlsruhe D 76128 Karlsruhe, Germany and Attila Tasnádi ** Department of Mathematics, Budapest
More informationRoberts Theorem with Neutrality. A Social Welfare Ordering Approach
: A Social Welfare Ordering Approach Indian Statistical Institute joint work with Arunava Sen, ISI Outline Objectives of this research Characterize (dominant strategy) implementable social choice functions
More informationIntroduction to Formal Epistemology Lecture 5
Introduction to Formal Epistemology Lecture 5 Eric Pacuit and Rohit Parikh August 17, 2007 Eric Pacuit and Rohit Parikh: Introduction to Formal Epistemology, Lecture 5 1 Plan for the Course Introduction,
More information"Arrow s Theorem and the Gibbard-Satterthwaite Theorem: A Unified Approach", by Phillip Reny. Economic Letters (70) (2001),
February 25, 2015 "Arrow s Theorem and the Gibbard-Satterthwaite Theorem: A Unified Approach", by Phillip Reny. Economic Letters (70) (2001), 99-105. Also recommended: M. A. Satterthwaite, "Strategy-Proof
More informationMathematics 220 Homework 4 - Solutions. Solution: We must prove the two statements: (1) if A = B, then A B = A B, and (2) if A B = A B, then A = B.
1. (4.46) Let A and B be sets. Prove that A B = A B if and only if A = B. Solution: We must prove the two statements: (1) if A = B, then A B = A B, and (2) if A B = A B, then A = B. Proof of (1): Suppose
More informationNon-deteriorating Choice Without Full Transitivity
Analyse & Kritik 29/2007 ( c Lucius & Lucius, Stuttgart) p. 163 187 Walter Bossert/Kotaro Suzumura Non-deteriorating Choice Without Full Transitivity Abstract: Although the theory of greatest-element rationalizability
More informationPositively responsive collective choice rules and majority rule: a generalization of May s theorem to many alternatives
Positively responsive collective choice rules and majority rule: a generalization of May s theorem to many alternatives Sean Horan, Martin J. Osborne, and M. Remzi Sanver December 24, 2018 Abstract May
More informationWe set up the basic model of two-sided, one-to-one matching
Econ 805 Advanced Micro Theory I Dan Quint Fall 2009 Lecture 18 To recap Tuesday: We set up the basic model of two-sided, one-to-one matching Two finite populations, call them Men and Women, who want to
More informationMaskin Meets Abreu and Matsushima
Maskin Meets Abreu and Matsushima August 2, 2017 Yi-Chun Chen (National University of Singapore) Takashi Kunimoto (Singapore Management University) Yifei Sun (UIBE, Beijing) Siyang Xiong (Bristol) What
More informationApproval Voting: Three Examples
Approval Voting: Three Examples Francesco De Sinopoli, Bhaskar Dutta and Jean-François Laslier August, 2005 Abstract In this paper we discuss three examples of approval voting games. The first one illustrates
More informationMaskin Meets Abreu and Matsushima
Maskin Meets Abreu and Matsushima Yi-Chun Chen Takashi Kunimoto Yifei Sun Siyang Xiong May 17, 2018 Abstract We study the classical Nash implementation problem due to Maskin 1999), but allow for the use
More informationTheory of Mechanism Design
Theory of Mechanism Design Debasis Mishra 1 October 28, 2015 1 Economics and Planning Unit, Indian Statistical Institute, 7 Shahid Jit Singh Marg, New Delhi 110016, India, E-mail: dmishra@isid.ac.in 2
More informationBIPARTITE GRAPHS AND THE SHAPLEY VALUE
BIPARTITE GRAPHS AND THE SHAPLEY VALUE DIPJYOTI MAJUMDAR AND MANIPUSHPAK MITRA ABSTRACT. We provide a cooperative game-theoretic structure to analyze bipartite graphs where we have a set of employers and
More information1. (B) The union of sets A and B is the set whose elements belong to at least one of A
1. (B) The union of sets A and B is the set whose elements belong to at least one of A or B. Thus, A B = { 2, 1, 0, 1, 2, 5}. 2. (A) The intersection of sets A and B is the set whose elements belong to
More informationA Systematic Approach to the Construction of Non-empty Choice Sets
A Systematic Approach to the Construction of Non-empty Choice Sets John Duggan Department of Political Science and Department of Economics University of Rochester May 17, 2004 Abstract Suppose a strict
More informationOn the Chacteristic Numbers of Voting Games
On the Chacteristic Numbers of Voting Games MATHIEU MARTIN THEMA, Departments of Economics Université de Cergy Pontoise, 33 Boulevard du Port, 95011 Cergy Pontoise cedex, France. e-mail: mathieu.martin@eco.u-cergy.fr
More informationThe Axiomatic Method in Social Choice Theory:
The Axiomatic Method in Social Choice Theory: Preference Aggregation, Judgment Aggregation, Graph Aggregation Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss
More informationAn axiomatic characterization of the prudent order preference function
An axiomatic characterization of the prudent order preference function Claude Lamboray Abstract In this paper, we are interested in a preference function that associates to a profile of linear orders the
More informationVirtual Robust Implementation and Strategic Revealed Preference
and Strategic Revealed Preference Workshop of Mathematical Economics Celebrating the 60th birthday of Aloisio Araujo IMPA Rio de Janeiro December 2006 Denitions "implementation": requires ALL equilibria
More informationIntro to Economic analysis
Intro to Economic analysis Alberto Bisin - NYU 1 Rational Choice The central gure of economics theory is the individual decision-maker (DM). The typical example of a DM is the consumer. We shall assume
More informationTHE UNIVERSITY OF KANSAS WORKING PAPERS SERIES IN THEORETICAL AND APPLIED ECONOMICS
THE UNIVERSITY OF KANSAS WORKING PAPERS SERIES IN THEORETICAL AND APPLIED ECONOMICS AN EFFICIENCY CHARACTERIZATION OF PLURALITY SOCIAL CHOICE ON SIMPLE PREFERENCE DOMAINS Biung-Ghi Ju University of Kansas
More informationMixed Refinements of Shapley s Saddles and Weak Tournaments
Mixed Refinements of Shapley s Saddles and Weak Tournaments John Duggan Department of Political Science and Department of Economics University of Rochester Rochester, NY 14627 U.S.A. Michel Le Breton CORE
More informationRepeated Implementation with Finite Mechanisms and Complexity
Repeated Implementation with Finite Mechanisms and Complexity Jihong Lee Seoul National University Hamid Sabourian University of Cambridge September 2012 Abstract This paper examines the problem of repeatedly
More informationCoherence with Proper Scoring Rules
Coherence with Proper Scoring Rules Mark Schervish, Teddy Seidenfeld, and Joseph (Jay) Kadane Mark Schervish Joseph ( Jay ) Kadane Coherence with Proper Scoring Rules ILC, Sun Yat-Sen University June 2010
More informationRobust mechanism design and dominant strategy voting rules
Theoretical Economics 9 (2014), 339 360 1555-7561/20140339 Robust mechanism design and dominant strategy voting rules Tilman Börgers Department of Economics, University of Michigan Doug Smith Federal Trade
More informationMATH 215 Sets (S) Definition 1 A set is a collection of objects. The objects in a set X are called elements of X.
MATH 215 Sets (S) Definition 1 A set is a collection of objects. The objects in a set X are called elements of X. Notation 2 A set can be described using set-builder notation. That is, a set can be described
More informationarxiv: v2 [math.co] 14 Apr 2011
Complete Characterization of Functions Satisfying the Conditions of Arrow s Theorem Elchanan Mossel and Omer Tamuz arxiv:0910.2465v2 [math.co] 14 Apr 2011 April 15, 2011 Abstract Arrow s theorem implies
More informationRecap Social Choice Fun Game Voting Paradoxes Properties. Social Choice. Lecture 11. Social Choice Lecture 11, Slide 1
Social Choice Lecture 11 Social Choice Lecture 11, Slide 1 Lecture Overview 1 Recap 2 Social Choice 3 Fun Game 4 Voting Paradoxes 5 Properties Social Choice Lecture 11, Slide 2 Formal Definition Definition
More informationSeparability and decomposition in mechanism design with transfers
Separability and decomposition in mechanism design with transfers Debasis Mishra, Swaprava Nath, and Souvik Roy August 9, 2017 Abstract In private values quasi-linear environment, we consider problems
More informationHousing Markets with Indifferences: a Tale of Two Mechanisms
Housing Markets with Indifferences: a Tale of Two Mechanisms Haris Aziz, Bart de Keijzer Institut für Informatik, Technische Universität München, 80538 München, Germany CWI Amsterdam, 1098 XG Amsterdam,
More informationRandom Serial Dictatorship: The One and Only.
Random Serial Dictatorship: The One and Only. Sophie Bade October 31, 2014 Abstract Fix a Pareto optimal, strategy proof and non-bossy deterministic matching mechanism and define a random matching mechanism
More informationOrdered Value Restriction
Ordered Value Restriction Salvador Barberà Bernardo Moreno Univ. Autònoma de Barcelona and Univ. de Málaga and centra March 1, 2006 Abstract In this paper, we restrict the pro les of preferences to be
More informationA Rothschild-Stiglitz approach to Bayesian persuasion
A Rothschild-Stiglitz approach to Bayesian persuasion Matthew Gentzkow and Emir Kamenica Stanford University and University of Chicago December 2015 Abstract Rothschild and Stiglitz (1970) represent random
More informationRationality and solutions to nonconvex bargaining problems: rationalizability and Nash solutions 1
Rationality and solutions to nonconvex bargaining problems: rationalizability and Nash solutions 1 Yongsheng Xu Department of Economics Andrew Young School of Policy Studies Georgia State University, Atlanta,
More informationSome Finitely Additive (Statistical) Decision Theory or How Bruno de Finetti might have channeled Abraham Wald
Some Finitely Additive (Statistical) Decision Theory or How Bruno de Finetti might have channeled Abraham Wald T.Seidenfeld ------------ Based on our T.R.: What Finite Additivity Can Add to Decision Theory
More informationA Note on Object Allocation under Lexicographic Preferences
A Note on Object Allocation under Lexicographic Preferences Daniela Saban and Jay Sethuraman March 7, 2014 Abstract We consider the problem of allocating m objects to n agents. Each agent has unit demand,
More informationA Rothschild-Stiglitz approach to Bayesian persuasion
A Rothschild-Stiglitz approach to Bayesian persuasion Matthew Gentzkow and Emir Kamenica Stanford University and University of Chicago September 2015 Abstract Rothschild and Stiglitz (1970) introduce a
More informationProblem 2: (Section 2.1 Exercise 10) (a.) How many elements are in the power set of the power set of the empty set?
Assignment 4 Solutions Problem1: (Section 2.1 Exercise 9) (a.) List all the subsets of the set {a, b, c, d} which contain: (i.) four elements (ii.) three elements (iii.) two elements (iv.) one element
More informationA Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations
A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations Swaprava Nath a, Onno Zoeter b a Indian Institute of Science, Bangalore b Xerox Research Centre Europe, Meylan, France Abstract
More informationRoberts Theorem with Neutrality. A Social Welfare Ordering Approach
: A Approach Indian Statistical Institute (ISI) joint work with Arunava Sen, ISI Introduction The Problem Reformulating the Problem Main Result Objectives of this research Characterize (dominant strategy)
More informationEfficient Repeated Implementation
Efficient Repeated Implementation Jihong Lee Yonsei University and Birkbeck College, London Hamid Sabourian University of Cambridge September 2009 Abstract This paper examines repeated implementation of
More informationManipulability and tie-breaking in constrained school choice
Manipulability and tie-breaking in constrained school choice Benoit Decerf CORE, Université Catholique de Louvain benoit.decerf(at)uclouvain.be Martin Van der Linden Department of Economics, Vanderbilt
More informationDeceptive Advertising with Rational Buyers
Deceptive Advertising with Rational Buyers September 6, 016 ONLINE APPENDIX In this Appendix we present in full additional results and extensions which are only mentioned in the paper. In the exposition
More informationProduct differences and prices
Product differences and prices Claude d Aspremont, Jean Jaskold Gabszewicz and Jacques-François Thisse Abstract Under assumptions following Hotelling s 1929 paper Stability in Competition, the possibility
More information