Sharing Non-anonymous Costs of Multiple Resources Optimally
نویسندگان
چکیده
In cost sharing games, the existence and efficiency of pure Nash equilibria fundamentally depends on the method that is used to share the resources’ costs. We consider a general class of resource allocation problems in which a set of resources is used by a heterogeneous set of selfish users. The cost of a resource is a (non-decreasing) function of the set of its users. Under the assumption that the costs of the resources are shared by uniform cost sharing protocols, i.e., protocols that use only local information of the resource’s cost structure and its users to determine the cost shares, we exactly quantify the inefficiency of the resulting pure Nash equilibria. Specifically, we show tight bounds on prices of stability and anarchy for games with only submodular and only supermodular cost functions, respectively, and an asymptotically tight bound for games with arbitrary set-functions. While all our upper bounds are attained for the well-known Shapley cost sharing protocol, our lower bounds hold for arbitrary uniform cost sharing protocols and are even valid for games with anonymous costs, i.e., games in which the cost of each resource only depends on the cardinality of the set of its users.
منابع مشابه
The Sharing Game: Fairness in resource allocation as a function of incentive, gender, and recipient types
Economic games involving allocation of resources have been a useful tool for the study of decision making for both psychologists and economists. In two experiments involving a repeated-trials game over twenty opportunities, undergraduates made choices to distribute resources between themselves and an unseen, passive other either optimally (for themselves) but non-competitively, equally but non-...
متن کاملShared Hierarchical Aggregation for Monitoring Distributed Streams
Widely dispersed monitoring networks generate huge data volumes that are naturally organized via hierarchical aggregation. In a system that manages such data, applications pose periodic aggregate queries. In this paper we show how to efficiently process multiple periodic aggregate queries in a hierarchy. First, we use a novel query rewrite that optimally executes individual queries. Next, we sh...
متن کاملNetwork-Wide Radio Access Network Sharing in Cellular Networks
Mobile operators are witnessing a dramatic increase in traffic spurred by a combination of popularity of smartphones, innovative applications and diverse services. As mobile traffic transitions from being voice dominated to video and data dominated, the revenue per byte for the mobile operators is declining at an unhealthy rate. To counter the traffic growth and build cost-effective networks, m...
متن کاملBeing Sticker Rich: Numerical Context Influences Children’s Sharing Behavior
Young children spontaneously share resources with anonymous recipients, but little is known about the specific circumstances that promote or hinder these prosocial tendencies. Children (ages 3-11) received a small (12) or large (30) number of stickers, and were then given the opportunity to share their windfall with either one or multiple anonymous recipients (Dictator Game). Whether a child ch...
متن کاملمقایسه نیمرخ شخصیتی معتادان گمنام و غیر گمنام زندانی مرد
Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size wa...
متن کامل