Skip to main content

Advertisement

Log in

Mechanism Design for Perturbation Stable Combinatorial Auctions

  • Published:
Theory of Computing Systems Aims and scope Submit manuscript

Abstract

Motivated by recent research on combinatorial markets with endowed valuations by (Babaioff et al., EC 2018) and (Ezra et al., EC 2020), we introduce a notion of perturbation stability in Combinatorial Auctions (CAs) and study the extent to which stability helps in social welfare maximization and mechanism design. A CA is γ-stable if the optimal solution is resilient to inflation, by a factor of γ ≥ 1, of any bidder’s valuation for any single item. On the positive side, we show how to compute efficiently an optimal allocation for 2-stable subadditive valuations and that a Walrasian equilibrium exists for 2-stable submodular valuations. Moreover, we show that a Parallel 2nd Price Auction (P2A) followed by a demand query for each bidder is truthful for general subadditive valuations and results in the optimal allocation for 2-stable submodular valuations. To highlight the challenges behind optimization and mechanism design for stable CAs, we show that a Walrasian equilibrium may not exist for γ-stable XOS valuations for any γ, that a polynomial-time approximation scheme does not exist for (2 − ε)-stable submodular valuations, and that any DSIC mechanism that computes the optimal allocation for stable CAs and does not use demand queries must use exponentially many value queries. We conclude with analyzing the Price of Anarchy of P2A and Parallel 1st Price Auctions (P1A) for CAs with stable submodular and XOS valuations. Our results indicate that the quality of equilibria of simple non-truthful auctions improves only for γ-stable instances with γ ≥ 3.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. For a better understanding of the two conditions at a technical level, we note that a (technically very useful) necessary condition for a valuations profile v to be γ-stable is that for the optimal allocation (O1,…,On), any bidders ik and any item jOi,

    $$ v_{i}(O_{i}) - v_{i}(O_{i} \setminus \{ j \}) > v_{k}(O_{k} \cup \{ j \}) - v_{k}(O_{k}) + (\gamma - 1) v_{k}(\{ j \}) \geq (\gamma - 1) v_{k}(\{ j \}) . $$

    For this condition, we use (local) optimality of (O1,…,On) for both v and its γ-perturbation on bidder k and item j (see also Lemma 1).

    A similar (technically useful) condition satisfied by any valuations profile v that has resulted from the α-endowment of an optimal (or locally optimal) solution (O1,…,On) to an initial valuations profile x is that for any bidders ik and any item jOi,

    $$ v_{i}(O_{i}) - v_{i}(O_{i} \setminus \{ j \}) \geq \alpha \left( v_{k}(O_{k} \cup \{ j \}) - v_{k}(O_{k}) \right) . $$

    For this condition, we use local optimality of (O1,…,On) for x, multiply the resulting inequality by α, and observe that \(v_{i}(O_{i}) - v_{i}(O_{i} \setminus \{ j \}) = \alpha \left (x_{i}(O_{i}) - x_{i}(O_{i} \setminus \{ j \})\right )\) and that vk(Ok ∪{j}) − vk(Ok) = xk(Ok ∪{j}) − xk(Ok).

References

  1. Angelidakis, H., Makarychev, K., Makarychev, Y.: Algorithms for stable and perturbation-resilient problems. In: Proceedings of the 49th ACM Symposium on Theory of Computing (STOC 2017), pp 438–451 (2017)

  2. Assadi, S., Singla, S.: Improved truthful mechanisms for combinatorial auctions with submodular bidders. In: Proceedings of the 60th IEEE Symposium on Foundations of Computer Science (FOCS 2019), pp 233–248 (2019)

  3. Awasthi, P, Blum, A., Sheffet, O.: Center-based clustering under perturbation stability. Inf. Process. Lett. 112(1–2), 49–54 (2012)

    Article  MathSciNet  Google Scholar 

  4. Babaioff, M., Dobzinski, S., Oren, S.: Combinatorial auctions with endowment effect. In: Proceedings of the 2018 ACM Conference on Economics and Computation (EC 2018), pp 73–90 (2018)

  5. Balcan, M. -F., Haghtalab, N., White, C.: k-Center clustering under perturbation resilience. In: Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP 2016), volume 55 of LIPIcs, pp 68:1–68:14 (2016)

  6. Bilu, Y., Linial, N.: Are stable instances easy?. In: Proceedings of the 1st Symposium on Innovations in Computer Science (ICS 2010), pp 332–341. Tsinghua University Press (2010)

  7. Blumrosen, L., Nisan, N.: On the computational power of demand queries. SIAM J. Comput. 39(4), 1372–1391 (2009)

    Article  MathSciNet  Google Scholar 

  8. Christodoulou, G., Kovács, A., Schapira, M.: Bayesian combinatorial auctions. In: Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP 2008), Track A: Algorithms, Automata, Complexity and Games, volume 5125 of Lecture Notes in Computer Science, pp 820–832 (2008)

  9. Cramton, Y., Shoham, P.C., Steinberg, R.: Combinatorial Auctions. MIT press (2006)

  10. Dobzinski, S.: Two randomized mechanisms for combinatorial auctions. In: Proceedings of the 10th Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2007) and of the 11th International Workshop on Randomization and Computation (RANDOM 2007), volume 4627 of Lecture Notes in Computer Science, pp 89–103 (2007)

  11. Dobzinski, S.: An impossibility result for truthful combinatorial auctions with submodular valuations. In: Proceedings of the 43rd ACM Symposium on Theory of Computing (STOC 2011), pp 139–148 (2011)

  12. Dobzinski, S.: Breaking the logarithmic barrier for truthful combinatorial auctions with submodular bidders. In: Proceedings of the 48th ACM Symposium on Theory of Computing (STOC 2016), pp 940–948 (2016)

  13. Dobzinski, S., Nisan, N., Schapira M.: Truthful randomized mechanisms for combinatorial auctions. J. Comput. Syst. Sci. 78(1), 15–25 (2012)

    Article  MathSciNet  Google Scholar 

  14. Dobzinski, S., Feldman, M., Talgam-Cohen, I., Weinstein, O.: Welfare and revenue guarantees for competitive bundling equilibrium. In: Proceedings of the 11th Conference on Web and Internet Economics (WINE 2015), volume 9470 of Lecture Notes in Computer Science, pp 300–313 (2015)

  15. Düetting, P., Feldman, M., Kesselheim, T., Lucier, B.: Prophet inequalities made easy: stochastic optimization by pricing non-stochastic inputs. In: Proceedings of the 58th Symposium on Foundations of Computer Science (FOCS 2017), pp 540–551 (2017)

  16. Englert, M., Röglin, H., Vöcking, B.: Smoothed analysis of the 2-opt algorithm for the general TSP. ACM Trans. Algorithm. 13(1), 10:1–10:15 (2016)

    Article  MathSciNet  Google Scholar 

  17. Ezra, T., Feldman, M., Friedler, O.: A general framework for endowment effects in combinatorial markets. In: Proceedings of the 2020 ACM Conference on Economics and Computation (EC 2020) (2020)

  18. Feige, U.: On maximizing welfare when utility functions are subadditive. SIAM J. Comput. 39(1), 122–142 (2009)

    Article  MathSciNet  Google Scholar 

  19. Feige, U., Vondrák, J.: The submodular welfare problem with demand queries. Theory Comput. 6(1), 247–290 (2010)

    Article  MathSciNet  Google Scholar 

  20. Feldman, M., Gravin, N., Lucier, B.: Combinatorial auctions via posted prices. In: Proceedings of the 26th ACM-SIAM Symposium on Discrete Algorithms, pp 123–135 (2014)

  21. Fu, H., Kleinberg, R., Lavi, R.: Conditional equilibrium outcomes via ascending price processes with applications to combinatorial auctions with item bidding. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC 2012), p 586 (2012)

  22. Hershberger, J., Suri, S.: Vickrey prices and shortest paths: what is an edge worth?. In: Proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS, 2001), pp 252–259 (2001)

  23. Khot, S., Lipton, R. J., Markakis, E., Mehta, A.: Inapproximability results for combinatorial auctions with submodular utility functions. In: Proceedings of the 1st Workshop on Internet and Network Economics (WINE 2005), volume 3828 of Lecture Notes in Computer Science, pp 92–101 (2005)

  24. Krysta, P., Vöcking, B.: Online mechanism design (randomized rounding on the fly). In: Proceedings of the 39th Colloquium on Automata, Languages and Programming (ICALP 2012), Part II, volume 7392 of Lecture Notes in Computer Science, pp 636–647 (2012)

  25. Lehmann, B., Lehmann, D., Nisan, N: Combinatorial auctions with decreasing marginal utilities. Games Econ. Behav. 55(2), 270–296 (2006)

    Article  MathSciNet  Google Scholar 

  26. Milgrom, P.: Putting Auction Theory to Work. Churchill Lectures in Economics. Cambridge University Press, Cambridge (2004)

    Book  Google Scholar 

  27. Mirrokni, V. S., Schapira, M., Vondrák, J.: Tight information-theoretic lower bounds for welfare maximization in combinatorial auctions. In: Proceedings 9th ACM Conference on Electronic Commerce (EC 2008), pp 70–77 (2008)

  28. Rassenti, S. J., Smith, V. L., Bulfin, R. L.: A combinatorial auction mechanism for airport time slot allocation. Bell J. Econ. 402–417 (1982)

  29. Roughgarden, T.: Barriers to near-optimal equilibria. In: Proceedings of the 55th IEEE Symposium on Foundations of Computer Science (FOCS 2014), pp 71–80 (2014)

  30. Roughgarden, T.: Beyond worst-case analysis. Commun. ACM 62(3), 88–96 (2019)

    Article  Google Scholar 

  31. Roughgarden, T.: Beyond the Worst-Case Analysis of Algorithms. Cambridge University Press, Cambridge (2020)

    Book  Google Scholar 

  32. Roughgarden, T., Talgam-Cohen, I.: Approximately Optimal Mechanism Design. coRR (2018)

  33. Roughgarden, T., Syrgkanis, V., Tardos, É.: The price of anarchy in auctions. J. Artif. Intell. Res. 59, 59–101 (2017)

    Article  MathSciNet  Google Scholar 

  34. Spielman, D. A., Teng, S.-H.: Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time. J. ACM 51(3), 385–463 (2004)

    Article  MathSciNet  Google Scholar 

  35. Spielman, D. A., Teng, S.-H.: Smoothed analysis: an attempt to explain the behavior of algorithms in practice. Commun. ACM 52(10), 76–84 (2009)

    Article  Google Scholar 

  36. Syrgkanis, V., Tardos, É.: Composable and efficient mechanisms. In: Proceedings of the 45th Symposium on Theory of Computing (STOC 2013), pp 211–220 (2013)

  37. Thaler, R.: Toward a positive theory of consumer choice. J. Econ. Behav. Org. 1(1), 39–60 (1980)

    Article  Google Scholar 

  38. Vondrák, J.: Optimal approximation for the submodular welfare problem in the value oracle model. In: Proceedings of the 40th ACM Symposium on Theory of Computing (STOC 2008), pp 67–74 (2008)

Download references

Acknowledgements

We wish to thank Kyriakos Lotidis and Grigoris Velegkas for many helpful discussions on combinatorial markets with endowed valuations and on the possibility of exploiting endowed valuations in mechanism design.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giannis Fikioris.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

An extended abstract of this work appeared in the proceedings of the 13th International Symposium on Algorithmic Game Theory (2020), pages 47–63, LNCS volume 12283.

This work was supported by the Hellenic Foundation for Research and Innovation (H.F.R.I.) under the “First Call for H.F.R.I. Research Projects to support Faculty members and Researchers and the procurement of high-cost research equipment grant”, project BALSAM, HFRI-FM17-1424.

This research was conducted while Giannis Fikioris was a student at the National Technical University of Athens.

Appendix: A

Appendix: A

1.1 A.1 Technical Details Missing from the Proof of Theorem 6

In this section, we complete the proof of Theorem 6, working along the lines of the proof of [11, Lemma 3.10]. We have already showed that there exists a structured submenu of exponential size with the following properties:

  1. 1.

    For all \(S\in \mathcal {S}\), bidder 2 can bid in such a way such that he is allocated S.

  2. 2.

    For each \(S,T\in \mathcal {S}\): \(|p_{S} - p_{T}| \leq \frac {1}{m^{5}}\).

  3. 3.

    For all \(S,T \subseteq M\) such that \(S\in \mathcal {S}\), ST: \(p_{T} - p_{S} \geq \frac {1}{m^{3}}\).

  4. 4.

    For all \(S\in \mathcal {S}\): pSm.

  5. 5.

    For each \(S,T\in \mathcal {S}\): |S| = |T|.

With this submenu, we are ready to create a valuation where it is hard to find the demand bundle. Given a set \(O\in \mathcal {S}\), we use, as in the proof of [11, Lemma 3.10], the following valuation function:

$$ v^{O}(S) = \left\{\begin{array}{ll} t\cdot|S|, &\textit{if } |S| < k \\ t\cdot k - 1/m^{4}, &\textit{if } S\in \mathcal{S} \textit{and } S\neq O\\ t\cdot k, &\textit{if } S=O \textit{or } \exists T\in \mathcal{S} \textit{s.t. } T\subset S\\ t\cdot(k-\frac{1}{2^{m-|S|}}), &\textit{otherwise} \end{array}\right. $$
(19)

where t is a large number whose value we will set later. To establish the submodularity of vO, we show that for any ST and jT, we have that 0 ≤ v(Sj) − v(S) ≥ v(Tj) − v(T). Since each marginal is at most t, any case where v(Sj) − v(S) = t is trivial. Now we notice:

  • If \(S\cup j \in \mathcal {S}\), then v(Sj) − v(S) ≥ t − 1/m4. However the value of the marginal v(Tj) − v(T) is one of the following:

    • 1/m4, if \(T\in \mathcal {S}-\{O\}\).

    • 0, if T = O.

    • \(\frac {t}{2^{m-|T|}}\), if both v(T) and v(Tj) are calculated by the 4th case of the valuation.

    • \(\frac {t}{2^{m-|T|}}\), if v(T) is calculated by the 4th case of the valuation and v(Tj) is calculated by the 3rd case of the valuation.

    Because |T| < m, in all cases t − 1/m4 is greater for a large enough t, e.g. t > 2m.

  • If \(\exists S^{\prime }\in \mathcal {S} \textit {s.t. } S^{\prime }\subset S\), then v(Sj) − v(S) = v(Tj) − v(T) = 0.

  • If \(v(S) = t\cdot (k-\frac {1}{2^{m-|S|}})\), then \(v(S\cup j) - v(S) = \frac {t}{2^{m-|S|}}\). Because \(S\subseteq T\), the value of v(Tj) − v(T) is either going to be 0 or \(\frac {t}{2^{m-|T|}}\). In any case the marginal of S is greater.

Thus we see that in any case the marginal of S is both positive and greater than the marginal of T. This proves the submodularity and monotonicity.

Now we notice that finding bundle O by doing value queries in vO(⋅) is hard: it requires \(|\mathcal {S}|-1\) queries. This is because for any \(O^{\prime }\in \mathcal {S}\) distinguishing between vO(⋅) and \(v^{O^{\prime }}(\cdot )\) requires querying either O or \(O^{\prime }\), which in the worst case requires querying almost every bundle in \(\mathcal {S}\). Since \(\mathcal {A}\) does polynomially many value queries, bidder 2 will not be allocated bundle O, since the size of \(\mathcal {S}\) is exponential.

Now all that is left to do is to prove is that if bidder 2, who can pick any set S at price pS, has valuation vO(⋅), then he strictly demands O. To this end, we need to prove the following inequality (see also [11, Claim 3.13]):

$$ v^{O}(O) - p_{O} > v^{O}(S) - p_{S} $$
(20)

for any SO. We examine the following cases:

  • If |S| < k then v(S) = t ⋅|S|. Manipulating inequality (20) leads to proving t ⋅ (k −|S|) > pOpS. The lhs is at least t (since |S|≤ k − 1) and the rhs is at most m (because of submenu property 4 and pS ≥ 0). Since t is as large as we want it to be, it holds that t > m.

  • If \(S\in \mathcal {S}\) then inequality (20) becomes 1/m4 > pOpS. This indeed holds because of submenu property 2.

  • If OS, then v(S) = v(O). However because of submenu property 3, the price of S is greater than O’s. This makes it have strictly less utility.

  • If \(\exists T\in \mathcal {S}\) s.t. TS (TO), then v(S) = v(T) + 1/m4 and also pSpT + 1/m3 (submenu property 3). This makes S at less favorable than T. However T already has less utility than O because of the second bullet.

  • If \(v(S) = t\cdot (k-\frac {1}{2^{m-|S|}})\), then inequality (20) becomes \(\frac {t}{2^{m-|S|}} > p_{O} - p_{S}\). This holds because we can take t as large as we want, making the LHS as large as we want, while at the same time the RHS is at most m (because of submenu property 4 and pS ≥ 0).

Thus we have proven (20), for every SO. This makes bidder 2 strictly demand the bundle O. However the mechanism cannot allocate that bundle with polynomially many queries. This entails that the best strategy for bidder 2 is to bid untruthfully, e.g. bidding according to v(S) = |SO|. This makes \(\mathcal {A}\) not DSIC which leads to a contradiction and completes the proof.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fikioris, G., Fotakis, D. Mechanism Design for Perturbation Stable Combinatorial Auctions. Theory Comput Syst 66, 778–801 (2022). https://doi.org/10.1007/s00224-022-10078-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00224-022-10078-9

Keywords

Navigation