Information Elicitation Sans Verification

نویسندگان

  • Bo Waggoner
  • Yiling Chen
چکیده

The recent advent of human computation — employing groups of non-experts to solve problems — has motivated study of a question in mechanism design: How do we elicit useful information when we are unable to verify reports? Existing methods, such as peer prediction and Bayesian truth serum, require assumptions either on the mechanism’s knowledge about the participants or on the information structure of participants for eliciting private information from the participants. Meanwhile, however, there are simple mechanisms in practice such as the ESP Game that seem to require no such assumptions, yet have achieved great empirical success. We attack this paradox from two directions. First, we provide a broad formalization of the problem of information elicitation without verification and show that, without assumptions on designer knowledge or participants’ information, there do not exist mechanisms that can truthfully elicit the private information of the participants for this setting. Second, we define and analyze the output agreement class of mechanisms, an extremely broad but simple mechanism in which players are rewarded based on the metric distance between their reports. Output agreement makes no assumptions on designer knowledge or participants’ information and thus cannot be “truthful”. We resolve the paradox by showing that it is useful: It elicits the correct answer according to the common knowledge among the players. We conclude with an analysis of the assumptions and results of various popular mechanisms for information elicitation without verification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elicitability and knowledge-free elicitation with peer prediction

The elicitation of private information from individuals is crucially important to many real-world tasks. But elicitation is most challenging when it is most useful: when objective (verifiable) truth is inaccessible or unavailable, and there is no “answer key” available to verify reports. Prior work has designed mechanisms that truthfully elicit private information without verification for some ...

متن کامل

Surrogate Scoring Rules and a Dominant Truth Serum for Information Elicitation

We study information elicitation without verification (IEWV) and ask the following question: Can we achieve truthfulness in dominant strategy in IEWV? Œis paper considers two elicitation seŠings. Œe first seŠing is when the mechanism designer has access to a random variable that is a noisy or proxy version of the ground truth, with known biases. Œe second seŠing is the standard peer prediction ...

متن کامل

Sequential-Simultaneous Information Elicitation in Multi-Agent Systems

We introduce a general setting for information elicitation in multi-agent systems, where agents may be approached both sequentially and simultaneously in order to compute a function that depends on their private secrets. We consider oblivious mechanisms for sequential-simultaneous information elicitation. In such mechanisms the ordering of agents to be approached is fixed in advance. Surprising...

متن کامل

A Modeling Tool for a New Definition of Stochastic Activity Networks

Stochastic activity networks (SANs) are a powerful and flexible extension of Petri nets. Modeling and analysis with Petri nets and their extensions need a software tool to help to construct and analyze the models. The original definition of SANs has been used as a modeling formalism in several tools. In this paper, we introduce a modeling tool called SharifSAN, which is based on a new definitio...

متن کامل

A service creation environment based on scenarios

Scenarios are often constructed for illustrating example runs through reactive system. Scenarios that describe possible interactions between a system and its environment are widely used in requirement engineering, as a means for users to communicate their functional requirements. Various software development methods use scenarios to define user requirements, but often lack tool support. Existin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013