EE 228 a - Lecture 25 - Spring 2006 Combinatorial Auction
نویسنده
چکیده
This lecture gives a combinatorial market mechanism that is always efficient, budget-balanced, ex post individual rational and ‘almost’ dominant strategy incentive compatible in the complete information case. In the incomplete information case, it is budget-balanced, ex post individual rational and asymptotically efficient and Bayesian incentive compatible. I. THE COMBINATORIAL SELLERS’ BID DOUBLE AUCTION (C-SEBIDA) There are L items l1, . . . , lL, m buyers and n sellers. Buyer i has (true) reservation value v i per unit for a bundle of items Ri ⊆ {l1, . . . , lL}, and submits a buy bid of bi per unit and demands up to δi units of the bundle Ri. Thus, the buyers have quasi-linear utility functions of the form ui(x;ω,Ri) = vi(x) + ω where ω is money and vi(x) = { x · vi, for x ≤ δi, δi · vi, for x > δi. Seller j has (true) per unit cost cj and offers to sell up to σj units of lj at a unit price of aj . Denote Lj = {lj}. The sellers also have quasi-linear utility functions of the form u j(x;ω,Lj) = −cj(x) + ω where ω is money and cj(x) = { x · cj , for x ≤ σj , ∞, for x > σj . The mechanism receives all these bids, and matches some buy and sell bids. The possible matches are described by integers xi, yi : 0 ≤ xi ≤ δi is the number of units of bundle Ri allocated to buyer i and 0 ≤ yj ≤ σj is the number of units of item lj sold by seller j. The mechanism determines the allocation (x∗, y∗) as the solution of the surplus maximization problem MIP: max x,y ∑
منابع مشابه
EE 228 a - Lecture - Spring 2006
We have, by now, seen the various uses of game theory in different aspects of networking like bandwidth trading, MAC Layer access, congestion control, etc. In this lecture, we will see how routing is modeled using game theory.
متن کاملEE 228 a - Lecture 9 - Spring 2006 Complexity and Routing
Two fundamental problems scheduling and routing present themselves in the networking field. Although some ”easy” routing algorithms based upon single constraint optimization exist, we will see that routing with multiple constraints becomes computationally difficult. In order to quantify their intractability, a brief overview of complexity theory will first be presented and then applied to routi...
متن کاملEE 228 a - Lecture 8 - Spring 2006
In this lecture, we investigate several scheduling policies for generalized communication networks. The goal is to maximize the network throughput under certain communication constraints. The network is modeled by a set of interconnected and interdependent queueing processes, and the constraints are specified in a service rate matrix. We show two scheduling policies that are optimal in some tec...
متن کاملEE 228 a - Lecture 21 - Spring 2006 Auctions and VCG Allocation
In this lecture, we study several types of auctions, and we introduce the Envelope Theorem (E.T.) to analyze the payoffs for the auctions. The expected payoff in each case is found to be the expectation of the second highest valuation. The VickreyClarke-Grove (VCG) allocation mechanism is used in a generalized scenario of the auctions, and it produces a dominant strategy with the resulting Nash...
متن کاملEE 228 a - Lecture 3 - Spring 2006 Moving Forward
This lecture surveys several research areas in communication networking research. First, we covered an example of proposals to change the routing topology of the internet away from shortest path routing to reduce congestion bottlenecks. Then, we covered issues when networking under different types of environments and with different types of constraints/requirements: mobile networking, network s...
متن کامل