SlideShare a Scribd company logo
1 of 18
Collusion-Resistant
Mechanisms with Verification
Yielding Optimal Solutions
    Carmine Ventre (University of Liverpool)

    Joint work with:
    Paolo Penna (University of Salerno)
Routing in Networks
                            s
                                    Change over time    No Input
                                    (link load)         Knowledge
                   3
                       10
       1                        1
               2
                                      Selfishness      Private Cost
                                2
           1
                            3
               7

                       7
       4
                            1




Internet
Mechanisms: Dealing w/ Selfishness
                        s
                                    Augment an algorithm
                                
               3
                                    with a payment function
                   10
   1                        1
                                    The payment function
                                
           2
                                    should incentive in
                            2
                                    telling the truth
       1
                        3
           7
                                    Design a truthful
                                
                                    mechanism
                   7
   4
                        1
Truthful Mechanisms
                 s




                                                M = (A, P)



                                                – cost =          – true
                            Utility = Payment

M truthful if:
                     , .... ,   ) ≥ Utility (bid,
Utility (true,                                         , .... ,     )
for all true, bid,      and       , ...,
Optimization & Truthful Mechanisms
    Objectives in contrast

        Many lower bounds (even for two players and
    
        exponential running time mechanisms)
            Variants of the SPT [Gualà&Proietti, 06]
        

            Minimizing weighted sum scheduling [Archer&Tardos,
        
            01]
            Scheduling Unrelated Machines [Nisan&Ronen, 99],
        
            [Christodoulou & Koutsoupias & Vidali 07], …
            Workload minimization in interdomain routing [Mu’alem
        
            & Schapira, 07], [Gamzu, 07]
        & a brand new computational lower bound
    

            CPPP [Papadimitriou &Schapira & Singer, 08]
        

    Study of optimal truthful mechanisms

Collusion-Resistant Mechanisms
                                                       CRMs are
                                                   
                                                       “impossible” to
                                                       achieve
       Coalition C
                                                           Posted price
                                                       

                                                           [Goldberg &
                                                           Hartline, 05]
                                                           Fixed output
                                                       

                                                           [Schummer, 02]
                                                               Unbounded apx
                                                           
                                                               ratios
∑ Utility (true, true,     , .... ,     ) ≥ ∑ Utility (bid, bid,       , .... ,   )
 +
in C                                        in C


for all true, bid, C and       , ...,
 –
Describing Real World: Collusions




    “Accused of bribery”

        1,030,000 results on Google
    

        1,635 results on Google news
    

    Can we design CRMs using real-world information?

Describing Real World: Verification
                                             TCP datagram starts at time
                                         
                                             t
                                                 Expected delivery is time t +
                                             

                                                 1…
                                                 … but true delivery time is t
                                             
     TCP
                     1
                     3                           +3
                                             It is possible to partially
                                         
                                             verify declarations by
                                             observing delivery time
                                             Other examples:
                                         

                                                 Distance
                                             

                                                 Amount of traffic
                                             

                                                 Routes availability
                                             


IDEA ([Nisan & Ronen, 99]): No payment for agents caught by verification
Verification Setting

     Give the payment if the results are given “in

     time”
         Agent      is selected when reporting bid
    

         true bid       just wait and get the payment
    1.

         true > bid     no payment (punish agent )
    2.
CRMs w/verification for single-
parameter bounded domains
    Agents aka as “binary” (in/out outcomes)

        e.g.,       controls edges
    

    Sufficient Properties

        Pay all agents(!!!)
    
                      s
        Algorithm 32-resistant
                    true
Truthfulness          Pe’ = 0
                      10
                                                   true
                                           e
                1         1
• e’ has no way to enter the                   11+Pe
                                                 2
                    2
solution by unilaterally lying
                          2
                                                   true
                  1
• In coalition they 7can make the              10+Pe
                                                10
                        3

                                                          e’
cut really expensive  7
                4
                     true 1
                    Pe – 2
UtilityC(true)=
UtilityC(bid)=Pbid – 10 ≥ 10 + Pe – 10 > UtilityC(true)
                                true
               e’
Truthful Mechanisms w/ Verification:
the threshold
                             (A,P) truthful with verification
 A(bid,        )

                                 bid <                  in
                             
                                           ths

          in                     bid >                  out
                             
                                           ths




          out
                                     bid
                      ths

[Auletta&De Prisco&Penna&Persiano,04]
2-resistant Algorithms
b=(bid, bid, , .... , )
t=(true, true, , .... , )
bid ≥ true(Verification doesn’t work)
                            b’ = b- =(bid ,          , .... ,    )
                            t’ = t- =(true ,          , .... ,       )


     b’        t’
           ≥
     ths       ths       in



                         out
                                     t’        b’
                                     ths       ths
Exploiting Verification: CRMs
 w/verification
                                b’
                        h-            if     out
                                ths
   Payment (b) =
                        h             if     in

                                       (A,Payment) is a CRM
Thm. Algorithm A 2-resistant
                                       w/ verification

Proof Idea.
  At least one agent is caught by verification
            Usage of the constant h for bounded domains
                        any number between bidmin & bidmax
b’

Proof (continued)                                         h-          if   out
                                                                ths
                                         Payment (b) =
                                                          h           if   in

                                                Each      is not worse
No agent is caught by verification
                                                by truthtelling
      t           b
      in          in
     out          in
                                          in
     out          out
      in          out
                                          out
                                                         t’                 b’
                                                true           true
                                                         ths                ths


  Utility (t) = h - true = Utility (b)

  Utility (t) = h - true ≥ h --trueb’ = Utility (b)
                       t’
                       t’         b’
                           ≥h     thsths
                       ths
                       ths
Simplifying Resistance Condition
b=(bid, bid, , .... , )          b=(bid ,   , .... , )
t=(true, true, , .... , )
                                 t=(true ,  , .... , )
bid ≥ true(Verification doesn’t work)≥ true
                                 bid
b’ = b-                   b’ = b- =(bid , , .... , )
t’ = t-                   t’ = t- =(true ,   , .... , )
                    in

                                          Optimal
     b’        t’
                                          CRMs
           ≥   thsout
     ths                 in
                          t’      b’
                            ths   ths



Thm. Optimal threshold-monotone algorithms with
                          out
fixed tie breaking are n-resistant t’  b’
                                   ths ths
Applications

    Optimal CRMs for:

        MST
    

        k-items auctions
    

        Cheaper payments wrt [Penna&V,08]
    

    Optimal truthful mechanisms for

    multidimensional agents bidding from
    bounded domains and non-decreasing cost
    functions of the form
                 Cost(bid , ..., bid )
Multidimensional Agents
Outcomes = {X1, ..., Xm}
                                       View bid as a virtual coalition C
bid =(bid(X1), .... ,bid(Xm))
                                       of m single-parameter agents
b=(bid , ..., bid )

  B(b) optimal algorithm with              A(bid ) m single-player
  fixed tie breaking rule                  functions

                       P (b) = ∑ payment (bid )
                                in C


   Lemma. If every A is m-resistant then (B,P) is truthful

   Thm. For non-decreasing cost
                                            Every A is           (B,P) is
   function of the form
                                            m-resistant          truthful
          Cost(bid , ..., bid )
   every A is threshold-monotone
Conclusions

    Optimal CRMs with verification for single-

    parameter bounded domains
    Optimal truthful mechanisms for

    multidimensional bounded domains
        Construction tight (removing any of the hypothesis we
    
        get an impossibility result)
    Overcome many impossibility results by using a

    real-world hypothesis (verification)
    For finite domains: Mechanisms polytime if

    algorithm is
    Can we deal with unbounded domains?


More Related Content

More from guest27165

Junior Senior Ppt Good To Know General2009
Junior Senior Ppt Good To Know General2009Junior Senior Ppt Good To Know General2009
Junior Senior Ppt Good To Know General2009guest27165
 
Xaml Guidelines Draft0
Xaml Guidelines Draft0Xaml Guidelines Draft0
Xaml Guidelines Draft0guest27165
 
Pharmacy 090228205532 Phpapp01
Pharmacy 090228205532 Phpapp01Pharmacy 090228205532 Phpapp01
Pharmacy 090228205532 Phpapp01guest27165
 
Industrialage 1234869680124198 3
Industrialage 1234869680124198 3Industrialage 1234869680124198 3
Industrialage 1234869680124198 3guest27165
 
Events Profile Page 1234869680124198 3
Events Profile Page 1234869680124198 3Events Profile Page 1234869680124198 3
Events Profile Page 1234869680124198 3guest27165
 
Copia De Causas Y Consecuencias De Los Incendios Forestales
Copia De Causas Y Consecuencias De Los Incendios ForestalesCopia De Causas Y Consecuencias De Los Incendios Forestales
Copia De Causas Y Consecuencias De Los Incendios Forestalesguest27165
 
7 Adv Host Integration 1234869680124198 3
7 Adv Host Integration 1234869680124198 37 Adv Host Integration 1234869680124198 3
7 Adv Host Integration 1234869680124198 3guest27165
 

More from guest27165 (8)

Junior Senior Ppt Good To Know General2009
Junior Senior Ppt Good To Know General2009Junior Senior Ppt Good To Know General2009
Junior Senior Ppt Good To Know General2009
 
No Impact Man
No Impact ManNo Impact Man
No Impact Man
 
Xaml Guidelines Draft0
Xaml Guidelines Draft0Xaml Guidelines Draft0
Xaml Guidelines Draft0
 
Pharmacy 090228205532 Phpapp01
Pharmacy 090228205532 Phpapp01Pharmacy 090228205532 Phpapp01
Pharmacy 090228205532 Phpapp01
 
Industrialage 1234869680124198 3
Industrialage 1234869680124198 3Industrialage 1234869680124198 3
Industrialage 1234869680124198 3
 
Events Profile Page 1234869680124198 3
Events Profile Page 1234869680124198 3Events Profile Page 1234869680124198 3
Events Profile Page 1234869680124198 3
 
Copia De Causas Y Consecuencias De Los Incendios Forestales
Copia De Causas Y Consecuencias De Los Incendios ForestalesCopia De Causas Y Consecuencias De Los Incendios Forestales
Copia De Causas Y Consecuencias De Los Incendios Forestales
 
7 Adv Host Integration 1234869680124198 3
7 Adv Host Integration 1234869680124198 37 Adv Host Integration 1234869680124198 3
7 Adv Host Integration 1234869680124198 3
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Crm Esa08 1234869680124198 3

  • 1. Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Carmine Ventre (University of Liverpool) Joint work with: Paolo Penna (University of Salerno)
  • 2. Routing in Networks s Change over time No Input (link load) Knowledge 3 10 1 1 2 Selfishness Private Cost 2 1 3 7 7 4 1 Internet
  • 3. Mechanisms: Dealing w/ Selfishness s Augment an algorithm  3 with a payment function 10 1 1 The payment function  2 should incentive in 2 telling the truth 1 3 7 Design a truthful  mechanism 7 4 1
  • 4. Truthful Mechanisms s M = (A, P) – cost = – true Utility = Payment M truthful if: , .... , ) ≥ Utility (bid, Utility (true, , .... , ) for all true, bid, and , ...,
  • 5. Optimization & Truthful Mechanisms Objectives in contrast  Many lower bounds (even for two players and  exponential running time mechanisms) Variants of the SPT [Gualà&Proietti, 06]  Minimizing weighted sum scheduling [Archer&Tardos,  01] Scheduling Unrelated Machines [Nisan&Ronen, 99],  [Christodoulou & Koutsoupias & Vidali 07], … Workload minimization in interdomain routing [Mu’alem  & Schapira, 07], [Gamzu, 07] & a brand new computational lower bound  CPPP [Papadimitriou &Schapira & Singer, 08]  Study of optimal truthful mechanisms 
  • 6. Collusion-Resistant Mechanisms CRMs are  “impossible” to achieve Coalition C Posted price  [Goldberg & Hartline, 05] Fixed output  [Schummer, 02] Unbounded apx  ratios ∑ Utility (true, true, , .... , ) ≥ ∑ Utility (bid, bid, , .... , ) + in C in C for all true, bid, C and , ..., –
  • 7. Describing Real World: Collusions “Accused of bribery”  1,030,000 results on Google  1,635 results on Google news  Can we design CRMs using real-world information? 
  • 8. Describing Real World: Verification TCP datagram starts at time  t Expected delivery is time t +  1… … but true delivery time is t  TCP 1 3 +3 It is possible to partially  verify declarations by observing delivery time Other examples:  Distance  Amount of traffic  Routes availability  IDEA ([Nisan & Ronen, 99]): No payment for agents caught by verification
  • 9. Verification Setting Give the payment if the results are given “in  time” Agent is selected when reporting bid  true bid just wait and get the payment 1. true > bid no payment (punish agent ) 2.
  • 10. CRMs w/verification for single- parameter bounded domains Agents aka as “binary” (in/out outcomes)  e.g., controls edges  Sufficient Properties  Pay all agents(!!!)  s Algorithm 32-resistant  true Truthfulness Pe’ = 0 10 true e 1 1 • e’ has no way to enter the 11+Pe 2 2 solution by unilaterally lying 2 true 1 • In coalition they 7can make the 10+Pe 10 3 e’ cut really expensive 7 4 true 1 Pe – 2 UtilityC(true)= UtilityC(bid)=Pbid – 10 ≥ 10 + Pe – 10 > UtilityC(true) true e’
  • 11. Truthful Mechanisms w/ Verification: the threshold (A,P) truthful with verification A(bid, ) bid < in  ths in bid > out  ths out bid ths [Auletta&De Prisco&Penna&Persiano,04]
  • 12. 2-resistant Algorithms b=(bid, bid, , .... , ) t=(true, true, , .... , ) bid ≥ true(Verification doesn’t work) b’ = b- =(bid , , .... , ) t’ = t- =(true , , .... , ) b’ t’ ≥ ths ths in out t’ b’ ths ths
  • 13. Exploiting Verification: CRMs w/verification b’ h- if out ths Payment (b) = h if in (A,Payment) is a CRM Thm. Algorithm A 2-resistant w/ verification Proof Idea. At least one agent is caught by verification Usage of the constant h for bounded domains any number between bidmin & bidmax
  • 14. b’ Proof (continued) h- if out ths Payment (b) = h if in Each is not worse No agent is caught by verification by truthtelling t b in in out in in out out in out out t’ b’ true true ths ths Utility (t) = h - true = Utility (b) Utility (t) = h - true ≥ h --trueb’ = Utility (b) t’ t’ b’ ≥h thsths ths ths
  • 15. Simplifying Resistance Condition b=(bid, bid, , .... , ) b=(bid , , .... , ) t=(true, true, , .... , ) t=(true , , .... , ) bid ≥ true(Verification doesn’t work)≥ true bid b’ = b- b’ = b- =(bid , , .... , ) t’ = t- t’ = t- =(true , , .... , ) in Optimal b’ t’ CRMs ≥ thsout ths in t’ b’ ths ths Thm. Optimal threshold-monotone algorithms with out fixed tie breaking are n-resistant t’ b’ ths ths
  • 16. Applications Optimal CRMs for:  MST  k-items auctions  Cheaper payments wrt [Penna&V,08]  Optimal truthful mechanisms for  multidimensional agents bidding from bounded domains and non-decreasing cost functions of the form Cost(bid , ..., bid )
  • 17. Multidimensional Agents Outcomes = {X1, ..., Xm} View bid as a virtual coalition C bid =(bid(X1), .... ,bid(Xm)) of m single-parameter agents b=(bid , ..., bid ) B(b) optimal algorithm with A(bid ) m single-player fixed tie breaking rule functions P (b) = ∑ payment (bid ) in C Lemma. If every A is m-resistant then (B,P) is truthful Thm. For non-decreasing cost Every A is (B,P) is function of the form m-resistant truthful Cost(bid , ..., bid ) every A is threshold-monotone
  • 18. Conclusions Optimal CRMs with verification for single-  parameter bounded domains Optimal truthful mechanisms for  multidimensional bounded domains Construction tight (removing any of the hypothesis we  get an impossibility result) Overcome many impossibility results by using a  real-world hypothesis (verification) For finite domains: Mechanisms polytime if  algorithm is Can we deal with unbounded domains? 