Document 11048944

advertisement
y^^^^'^-^^^^j^
iJimEi
HD28
.M414
IMAR 141991
ALFRED
P.
WORKING PAPER
SLOAN SCHOOL OF MANAGEMENT
Johnny Canon vs. the
Smothers Brothers
Monolog vt. Dialog
in
CotUy
Bilateral
Comnunicatifln
FredKohnan
Massachusetts Institute of Technology
Jim
Ratliff
University of California, Berkeley
WP#
3254.91-EFA
March 1991
MASSACHUSETTS
INSTITUTE OF TECHNOLOGY
50 MEMORIAL DRIVE
CAMBRIDGE, MASSACHUSETTS 02139
Johnny Canon vs. the
Smothers Brothers
Monolog y«. DUlog
in Cottly Bilateral
Communicatlan
FredKofnun
Massachusetts Institute o( Technology
Jim
Ratliff
University of California, Berkeley
WP#
3254-91-EFA
March 1991
w^m
"*-:r!v
MJX
MAR
LIBRARir
}
4 1991
H-U
f
!
Johnny Carson
\rs.
the
Smothers Brothers
!Mono[qg
vs. (DiaCog in
Fred Kofman
Sloan School of Management
Massachusetts Institute of Technology
Jim Ratliff
Department of Economics
University of CaHfomia, Berkeley
February 27, 1991
was supported by National
Science Foundation Grant IRI-8902813
This research
and by
the
Shan
Foundation.
CostCy bilateral Communication
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
of a
common
1
organizations communicate with each other in order to coordinate their actions in pursuit
goal. Bilateral information
monolog would be
typical
Page
Introduction
!•
Members of
February 27. 1991
chooses an inventory
strategist describes a
a published forecast of market conditions in response to
level.
new
exchanges can be broadly classified as monologs or dialogs.
A
A
which a manager
typical dialog could be a question-and-answer session; e.g. the chief
product, the marketing prognosticator announces a sales estimate based on that
description, and then the strategist decides whether to introduce the product.
Our common sense and experience
ubiquitous
mode of communication
tell
us that dialog,
in the real world.
It
some sense dominant,
not in
if
provocative, then, to compare this observed
is
dialog-rich communication with the type of discourse manifested in traditional
most models with asymmetric information an agent
principal. Consideration
is
upon
called
is
certainly a
is
economic
analysis. In
to report her private information to a
usually restricted to mechanisms in which the agent fully and truthfully
reveals the entirety of her private information
models of a monolog world. (There
is
everything she knows, because you
know
no need
that
(i.e.
she declares her "type")-^ In other words these are
to ask a question of
someone who
you
answer
will receive the
is
planning to
to every question
tell
you
which she
could possibly answer.)
Why
do we observe dialog
in the
world but not
Principle in order to claim that no generality
is
in
lost
our models? Theorists invoke the Revelation
when
mechanisms. This exploitation of the Revelation Principle
is
When communication
costless. 2
is
is
they focus upon tell-everything monolog
only valid, however,
costly, full revelation of type
may
when communication
be so expensive as to be
suboptimal, and efficiency in communication becomes a relevant criterion for the mechanism designer.
This raises
new
questions of
who
should say what to
whom
and when and thereby introduces
the
possibility of observing dialog.^
The
costs of
communication
is
a theoretical lacuna
which begs
to be closed.
As
Tirole [1988: 49] has
pointed out: "Neoclassical theory pays only lip service to the issue of communication. Information flows
between members of an organization are limited only because of incentive compatibility
even well-intentioned members of an organization
...
may have
information they possess to their relevant co-members, because
information
profit
is
hard to 'codify' to make
maximizing under
full
some circumstances
understandable to
communication
[1974: 5] advocates that before
In
it
we can
will not be
its
it
is
.
.
.
However,
trouble communicating
all
the
too time consuming or because the
receivers. Thus, decisions that
would be
made under imperfect communication." Arrow
rigorously evaluate the market mechanism's claim to superior
efficiency can be achieved without full revelation. Sec Groves and Ledyard [1977], Drfize and de
la
Valine
Poussin [1971], and Malinvaud [1971].
McAfee and McMillan [1988] extend
the Revelation Principle to a case in
which the principal bears a communication cost but the
agents do not.
Even more
communication has the potential to explain the existence of hierarchical organizational structures. (One
outcome of a decentralized organization can be replicated by a centralized twoder structure; therefore hierarchy can never be strictly preferred.) See Melumad, Mookhetjee, and Reichelstein [1989] for work in this
direction which adopts a message space dimensionality perspective on communication cost.
generally, costly
interpretation of the Revelation Principle holds that the
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
economy we must "add
informational
Communication costs lead
restrictions
to our usual
economic calculations an appropriate measure of the
and transmission."
costs of information gathering
knowledge
February 27, 1991
Page 2
bounded
to
— upon
decisionmakers. Limited communication
sources of bounded rationality, for example limited memory.
a
impose cognitive limitations
rationality because they
Dow
is
similar formally to other
[1991] studies an agent searching for
low price and asks how the agent can make optimal use of her limited memory for observed
Clearly this
— via
prices.
equivalent to a team^ communication problem with two partners. Past and Present, where
is
how
the design decision is
Past should use hmited communication resources to inform Present about the
price Past observed.
When communication
is
free
and truthful revelation
transmitted to a specified decisionmaker.
information exchange, the
the conversation
more qualified
whom
some agents
to
the decision
we
In this paper
initial
make
is
assured, all relevant information can be
However, when communication costs
comprehensive
inhibit a
informational asymmetries are not completely obliterated; by the end of
know some
still
may
be
must determine
to
Some
things which others do not know.
the choice-of-action decision, and therefore the designer
agent
would be optimally delegated and under what circumstances.
posit the existence of
communication costs
in a bilateral
team context. Our task
is
to
determine the exact process by which private information should be shared and decisionmaking
authority should be delegated.
for
one party to engage
in a
We
will see that indeed there exist cases in
monolog with
the other;
i.e.
a dialog
which
would be suboptimal
it
would achieve
a higher performance
standard for a fixed communication cost.
We
are
intrigued by three features of the optimal information sharing
encountered during our research.
efficiency
it
is
First,
they can have an unpredictable hfe of their own.
we merely
not sufficient that
in a particular,
To
guarantee
enrich the designer's toolkit to include a simplistic
A
capability of alternating question and answer.
microphone change hands
mechanisms we have
rigid,
fixed-sequence dialog
— which
dictates that the
predetermined order and prescribes ahead of time a particular
—can
agent as the ultimate decisionmaker
be suboptimal just as a rigid monolog can be. Instead, the
designer must supply a communication algorithm, according to which the identity of the speaker
at
any
stage and the identity of the ultimate decisionmaker are determined endogenously by the particular
realization of the agents* private data. Just as a software engineer carmot predict precisely
will result
cannot
—
from a computer program without
in
first
knowing
ignorance of the agents' private information
its
input data, the
— predict
what output
mechanism designer
the sequence of speakers in the
conversation or the identity of the decisionmaker.
Secondly,
it
can be
strictly better if
occasionally neither party speaks
action in complete ignorance of the other's private information
the right to
A
team
—
letting
one of them choose an
even when they have already paid for
communicate and when the choice of action could be improved by more precise knowledge
in the
sense of Marschak and Radner [1972]
This communication
is
clearly limited to a
is
monolog
a
group whose members have only
in
paranormal fortunetelling rather than bounded rationality!
which Past speaks
to Present.
common
interests.
The reverse
direction
would be
a case of
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
February 27, 1991
Page 3
of that private information.^ The intuition for
dehberate silence
in
increases the informativeness of communication in the remaining circumstances.
some circumstances
loss in
this counterintuitive result is that a
decisionmaking quaUty due to remaining
silent in a
A
circumstance in vhich communication would
be relatively ineffective anyway can be traded-off against a gain generated by the resulting increased
informativeness in cases where communication
A
third interesting feature of these optimal
We
conversation.
the size of the
communication budget.
Although we show
more
that dialog
separability requirement.
information
it
is
—
An
If
crucial.
communication algorithms concerns who dominates
who
you cannot pay
to spend,
it
Mathematically
interpretation of this result
—generated
much
for
one agent
talking, perhaps
is
the
can be optimal to hear instead from the other.
efficient.
is
the
should do the most talking can depend on
sometimes necessary for efficiency, we do establish
is
conditions under which monolog
resuh
more
will see that the identity of the agent
preferred lecttirer. If you have
in the final
is
is
that
sufficient
takes the form of an additive
this
monolog
will be sufficient
when
the error
by a given misestimate by the decisionmaker of her partner's private
independent of the decisionmaker's private information. For monolog efficiency, then,
is
sufficient that the decision
problem have a structure
which the partners' private data do not
in
interact in this well-defined sense.
The problem
on the analytical issues raised by costly communication we will abstract away from
In order to focus
incentive issues and study the following problem:^ Consider a team of
The designer's
task
is
to construct a
mechanism through which
information with one another in order that one of them will
depend on both of
their privately
each agent's private datum will be
Our communication
known
at the
cost measure
is
data.
'
^
are
make
privately informed
team members share
a decision
(The designer does not know
time the mechanism
is
(i.e.
at
members.
their private
which would optimally
the time of design what
implemented.)
communication length and
of binary digits (bits) in the longest possible exchange
Thus we
the
two
over
is
all
worst-case:
we pay
for the
number
possible private data realizations)."*
this is a principal part of its cost.^
emphasizing that communication takes time and that
A
Such an algorithm bean a formal resemblance to "management by exception" in which more communication occurs when private
information take* on "exceptional" values. (Marschak and Radner [1972: 206-207])
- Present
This phenomenon can also occur in Dow's [1991] limited-memory search model. No communication from Past
to buying the good from the first firm visited without bothering to visit the second firm to compare prices.
without observing both firms' prices.
the right to comparison shop.
the correct decision and
between higher prices
decision would be
^
We
*
A
thank
is
By
Ratliff [1991b]
show
that the
shopper would be
strictly better off if
not a very costly mistake even
when
it
is
first
firm's price
is
very low (which
equivalent
she could waive
is
incorrect), she
costly.
Tom Marschak
for posing to us a discrete formulation of this
problem from which the present paper evolved.
similar problem has been studied in the computer science literature concerning distiibuted and parallel processing.
discrete
is
prohibits buying
almost certainly
husbands her memory to more finely discnminate
firm. This improves her decision about which firm to buy from in the situations in which the wrong
purchasing without comparing prices when the
for the first
more
Kofman and
Dow
form of approximating a Boolean-valued function defined on a
grid.
See Yao [79], Abelson
[80],
It
takes the
and Karp and
Ng
[forthcoming].
^
is used by Oniki [1986], who compares the informational efficiency
of an auctioneer-mediated market with that of a centralized system for a particular single-good production economy. This contrasts with
another strand in the literature in which the communication constraint is the dimensionality of the message space (i.e. the number of
This information theoretic approach to measuring communication
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlitf
mechanism
efficient
is
mechanism which pays
if it
results in a worst-case decision
for the
same number of
algorithm in order to establish the
n
we
February 27, 1991
Page 4
minimum
bits.i
error no greater than that of any other
For a given n
we
search for an efficient n-bit
worst-case decision error associated with n
bits.
By
then can construct the efficient error-communication length frontier.
We now
develop
present two scenarios as exemplar problems which can be analyzed using the tools
Two
we
in this paper.
"ETiiampCe 1:
Team- spying the
spies, Boris
tTqpCosivts factory
and Natasha, will be placed behind enemy lines to determine the amount of
explosives being produced by a factory. The explosives are manufactured from two inputs
according to a well-known production function. These inputs are produced
arrive at the factory along different roads.
From
well known.
in separate
The maximum capacity of each road
of X. (See Figure
amount of
F; similarly
X
and Y
regions and hence
to handle truck traffic
his vantage point Boris can observe with complete precision the flow of
factory but cannot observe at all the
that
varying
X
is
into the
Natasha can observe the flow of Y but not
1.)
Delivery route
for input
X
dl
Ttxt^MAor
Explosives
factory
N
Delivery route
for input
Figure
Each spy
is
is
The map
for the nnission.
equipped with a short-range radio which can send on/off pulses to the other. The enemy
not yet aware that the factory
greater
1:
Y
is
is
being surveilled, and the more numerous are the inter-spy pulses, the
the risk that the espionage mission will be discovered. Consequently the spies want to
minimize their communication with each other subject to a constraint on the accuracy of their production
estimate.
The
radios' range
is
too short to reach their
home
territory, so
one of the spies must physically
message "pipelines") with no constraint on how much a pipeline can be used. For example see Hurwicz [1960], Mount and Reiter
[1974], Walker [1977], Osana [1978], Jordan [1982], and Green and L^font [1987].
Minimizing the worst-case error
is
a reasonable optimality criterion in circumstances of "complete ignorance"
[1977]) or in an infinite risk aversion limit.
to
guide research under other
criteria.
Its tiactability
aids in breaking
new ground, and
(Arrow and Hurwicz
results achieved here generate conjectures
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
return
home
— by
February 27. 1991
Page 5
navigating the only available single-person kayak
down
a wild river
—
in
order to
commanders.
deliver an intelligence assessment to their
Prior to being deployed in hostile territory Boris and Natasha meet at a local bistro to have a beer and
communication algorithm. Upon what
to design a
communication and decision delegation
rules of
should they coordinate? For some fixed number n of pulses
who
should send the
first
pulse? Should
Who
followed by a second pulse from the same spy or perhaps by a premier pulse from the other?
be the Whitewater courier delivering the final guestimate of explosives production?
How
sequence of pulses and the identity of the kayaker depend on the spies' private information
quantities
X
will
will this
upon
the
and Y they each observe)?
Once they have decided upon
determined
(i.e.
be
it
its
communication algorithm
worst-case error, there
result in a greater
intelligence report.
the inter-spy
a
chance that
What
is
their
is still
for every fixed
what number n
the question of
number n of
to pick.
More
pulses and
pulses would
cover will be blown but would also increase the accuracy of their
the tradeoff?
I.e.
how much would
accuracy be improved by an increase
in
communication?
'Lj^ampU 2: Production decisions in an informationaCCy decentraCized firm
Consider a ski equipment manufacturer where the personnel director must be told
w
to hire for the
upcoming production season. The relevant information
distributed throughout the organization:
per- worker ar€[0, a].
(See Figure
The production manager
The marketing chief
for the optimal decision
The
will learn the precise value of a
Boundary
Production
Supervisor
—
Knows
of
demand parameter /?e[0,y3].
Economic Expertise-
Director
Knows demand
productivity
parameter
Marketing
-a-
a
parameter
/?
-v—
X y
Personnel
Department
Hires
Figure 2:
An
is
will learn precisely the productivity-
2.)
r
how many workers
L* workers
informationally decentralized firm.
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
When communication
is
February 27, 1991
Page 6
costly, the design
problem
is
to construct an efficient procedure by
which the
production manager and marketing chief will share their private information in order to estimate w*.'
employment
After this exchange the appropriate party can inform the personnel director of the optimal
The goal
level w*.2
to
is
minimize the worst-case departure from optimal employment over
The same design questions
dialog?
arise here as in the
manager or
the production
first,
Or should
spy example. For a fixed communication cost,
the production manager, say, use the entire
calculate an approximation to the optimal
communication allotment
employment
level
that the
w*? After
What
what point does
On
it
is
the tradeoff between
no longer pay
for the
to
inform her
marketing chief can then
design problem has been
this
solved for an arbitrary fixed communication cost, the decision remains about
perform.
who
the marketing chief? Should they discuss the matter in a
panner as precisely as possible about productivity-per-worker so
to
possible
demand combinations.
productivity and
should speak
all
how much communication
communication cost and worst-case employment error? At
two informed
parties to continue to talk to
one another?
interpretation
The phenomena with which we
delegation.
Of
course
we
are concerned are
realize that people
communication, coordination, and decision
do not communicate by exchanging
each other one-dimensionally on an interval, that the problem of an organization
bits in
order to locate
not to announce a
is
value which minimizes the worst-case error of approximation to a function, and that incentive
compatibility
a crucial constraint.
is
metaphor
tractable,
more complex
for
We
it
is
will bring
not.
become
them
satisfaction
The focus of our research
a
in
mind
the action
if
is
model
as a usefully interesting, yet
situations.
The more general scenario we have
which
do, however, see our
is
is
appropriate to their
the process by
more nearly commonly known
two people seeking
situation.
consensus action
to arrive at a
common
situation
and some pain
if
which two individual and privately known situations
That
is
to say:
how do two
come
to share an
to another the full
meaning of
agents
understanding of the state of the world?
We
beheve
her situation.
perceives,
that there is
We
no way
in
which a human being can express
claim that a person has no method of letting someone else
believes, remembers, guesses, understands, fears, hopes,
environment and herself
conversation, so
we must
in a finite
amount of
time.
know
everything that she
and doubts about both the
However, action must be taken
after
only a
finite
be concemed with efficient communication.
For example, the production manager does not only know the normal productivity of different inputs
for a given technology.
The personnel
She also knows the
and morale of the workers, the probabiUty
that the
economics classes and would not know how to compute the optimal employment level even if
thus he is outside the boundary of economic expertise. Consequently we need not consider
which the production manager and the marketing chief both communicate approximations of their private information
director rarely attended his
he were perfectly informed about
algorithms in
reUability
a
and
fi\
directly to the personnel director.
This communication with the personnel director is also costly. However, we assume that it is equally costly regardless of whether
done by the production manager or the marketing chief Therefore it is a fixed cost in the design problem.
it
is
'
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
February 27, 1991
Page
7
machines will break down, the necessary maintenance schedule, the gossip about new technical
developments,
We
etc.
(Moreover, she has a
assen that she cannot transmit
lot
all
of background beliefs of which she
this,
may
not even be aware!)
so she must use her language providently
when
she
coordinates her actions with others.
our model
In
consider points
we do
not attempt to replicate a complicated, multidimensional
in a rectangle.
On
the other hand,
we need
not
endow
dependent natural language; we have zeros and ones. In our opinion
we impose when we
We
manageable space.
(the
project what-to-communicate and
situation;"
tractability justifies the simplicity
how-to-communicate onto
conceptually
a
meaning of the messages) within an elegant mathematical formalism.
team has two
partners:
X
and
The Model
They have
Y.
a joint address
6 = idx,dY) = (x,y) on
a rectangle
E = ExxEy,
(A.l)
where Ex and Ey are the closed
A
we
the agents with a rich context-
can then address issues of syntax (the rules of communication) and semantics
3.
A
"common
intervals
Ex = [a,bl
(A.2a)
Ey^icd].
(A.2b)
real-valued optimal action function
known
defined and bounded on the rectangle E, viz.
However, each partner knows only
the precise value of y. Initially
knows only
that
E—>
R, and
is
X knows
the precise value of x and
Y
ysEy.
Y
is
that
Similarly,
xeEx-
partners
the choice of action
is
dictated by a
The algorithm R must specify
binary digits {bits) to one another.
the desired action (p(6).
the instigator
—
—
the
parmer who
as well as
the ultimate action and when.^ Because
bits sent
R
of the players then
understood by both players.
process by either immediately
sends what
knowledge of x and y
respectively, partner Ts activities under the algorithm
on the history of
is
initiates the
who
One
The communication process and
communication algorithm R, which
selecting an action or by sending the first bit
who chooses
a projection of 6;
X's only information about K's location
may communicate by sending
chooses an action y/eE which approximates
The
q>:
to both players. Ideally the team would take the optimal action (p(6) corresponding to their joint
address.
knows
is
bits to
is
whom
and when and
privately held by
can depend only on her
own
X
and Y,
coordinate ^, and
and received; they carmot depend explicitly on her partner's coordinate
Without loss of generality we assume
that the
dj.
two parmers never send simultaneous messages.
Our
strategy of radical simplification seems to be vindicated by our work-in-progress using a multidimensional information structure for
each partner. We have found interesting multidimensional problems which decompose into separate one-dimensional problems and
which therefore directly require the techniques we develop in this paper.
Because of the information partition the identity of the instigator must be a property of the algorithm which
(Otherwise there would be cases in which both players tried to instigate or neither instigated.)
is
independent of 9.
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
February 27, 1991
Page 8
R
For a given 6 the communication algoritlim
some
of bits and results in
action y/id).
the longest possible exchange,
n
Note
that
prescribes a particular exchange of
The communication
length, n,of
R
the
is
some number
number of
bits sent in
i.e.
= maxr](,d).
we
(A. 3)
are adopting a worst-case definition of the
error of the algorithm
R
is
communication length of the algorithm R. The
also a worst-case formulation:
£=sup\y/(e)-(p(e)\.
(^4)
Without loss of generality we assume that
function of
^
bounded and therefore
is
T](d)
The designer's problem
is
y/ is
bounded on the
that the error of
to specify
—
in
R
is
unit square to ensure that the error as a
defined.
ignorance of which 6 will be realized
—communication
algorithms which are efficient with respect to communication length and error of approximation.
algorithm
a
R
is
efficient if there exists
no other algorithm which achieves either a
weakly lower communication length or a
We
error.
(error,
all
communication length)
For a given joint location
actor for 6.
We
information
set: the
the actor
pairs,
i.e.
we need
lower error with
lower communication length with a weakly lower
wish to characterize for a given function
of the efficient algorithms;
0€5,
strictly
strictly
^
the
efficient
frontier
those which result from efficient algorithms.
of achievable
We
6, the algorithm
R
will ultimately call
upon one of the partners
y/(S)
minimal subset S czE within which she knows 6 to
that the optimal action <p(d) belongs to the
lie.
Given her knowledge
image of 5 under
(i.e.
in the
that
(p:
(a.s)
worst-case error minimizing) approximation action given S
is
the midpoint of (p(S),
= ^Onf (PCS) + sup (fKS)),
which results
to be the
characterize the actor's knowledge about 9 at that time by specifying the actor's
knows
actor's best
need not find
locate only a subset sufficient to demarcate the frontier.
(piS)={(pidy.eeS].
The
An
(A.6)
worst-case error given S,
where we denote the function's oscillation over 5 by
A(p{S)
We
= supqKS)-\ni<p{S).
(A.S)
observe that adding points to S would weakly increase the supremum and weakly decrease the
infimum and thereby weakly increase the
set is
oscillation of
weakly greater than the error over the subset.
g>
over S; therefore the error over a
strictly larger
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
In
we
section 3
performed by the
Page 9
monolog algorithms
discuss
We
instigator.
February 27. 1991
— those
restrict attention to
which
dictate
that
all
communication
is
optimal action functions which satisfy appropriate
monotonicity and continuity assumptions. For a given communication length
we compute
in
"almost
closed form" the error and structure of algorithms which are efficient within the class of monologs.
We
begin section 4 by presenting two examples which demonstrate that monolog need not be sufficient for
efficiency
—
a dialog, in
We
which both partners speak, can outperform a best monolog.
sufficient condition for
monolog
show
is
that this condition
then establish a
efficiency: additive separability of the optimal action function.
not necessary by exhibiting a rectangle on which a multiplicatively separable
optimal action function can be efficiently approximated through the use of a monolog. In section 5
show
that all
We
we
of our results are valid even when the monotonicity requirements are dropped as long as
the optimal action function is appropriately separable. Section 6
summarizes the paper and gathers our
final thoughts.
3.
We
will find
it
useful to study a simple subset of the set of communication algorithms: the set of
monolog communication
is
Monolog algorithms
performed only by the
algorithms. Such an algorithm stipulates that for
instigator. If
action y/(di) or chooses from
uninterrupted string.)
which depends on
For defmiteness
If
we
monologs we would
would be
is
is
message k, then her
X
is
is
the instigator.
is
A
parallel analysis applies to
efficient within the class of
efficient within the class of X-instigator
efficient within the class of K-instigator
class of X'-instigator
chooses an action y/Oj^K)
partner,;',
and the message he received.
monolog which
we
bits
the instigator, she either immediately chooses an
algorithms. In order to find an algorithm which
find a
6 any transmission of
2" messages. (In a monolog any bits sent are transmitted as an
efficient within the broader class of
first
say,
consider here monologs in which
of X-instigator monologs
We
/,
the instigator chooses
his coordinate
y -instigator monolog
monolog which
among
parmer
all
monologs.
An
monolog algorithms. For
monologs and a
algorithm with the lower error
the remainder of our discussion
will use the term "efficient" as a shorthand to
mean
"efficient within the
monolog algorithms."
describe a monolog as a partition of
conditions under which
we can
Ex and
discuss the role of immediate action.
restrict attention to partitions
whose
cells are
efficiency and existence of partitions which, loosely speaking, yield a
then solve the efficient monolog problem
—computing both
large class of optimal action functions
common
convex.
We
We
give
discuss the
error in every cell.
—
the error and the algorithm itself
We
for a
and discuss the comparative statics of increasing the
communication budget.
Monolog algorithms
We
as partitions
can fully define a monolog by a (2" +
1
)-cell partition
under which the instigator should immediately
action rules
act or
of
Ex
— which
specifies the circumstances
send a particular message
which specify how each partner would choose an action
if
called
upon
— and
to
do
by choice-of-
so.
We
define
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
February 27, 1991
Page 10
2/1
(B.l)
,
M={\
m).
(B.2)
(B.3)
The (w +
1
)-cell partition
Ex
where each <T,c£x. ^i&M^
The
is
denoted
a„},
cr={cro,cTi
i.e.
of
(B.4)
= Ex, and air\Cj = (d when
<^i
immediate action
cell (To is the
She knows only that
de{x]xEY
cell.
When x^aQ,X
3.)
The
is
called
upon
and therefore that the optimal action
takes the action \i/{[x)xEy) specified in (A. 6),
Figure
i^j.
which
error £o for the immediate action cell
immediately take an action.
to
lies in the
results in the error £({.r}
image (pi{x]y.EY). She
xfy) from
(A. 7). (See
is
eo=
(B.5)
0,
Adding points
o'o
= 0-
supremum
to cTq could only increase the
would be weakly greater
for a strictly larger
in (B.5); therefore the error of
immediate action
immediate action
cell.
<p{{x}y.EY)
\
sup(p{{x]y.EY)
x)xEy
U{a:}x£k)
y/{[x}><.EY)-
*
)e{{x}xEY')
\r\\(pi{x)
(b)
Figure 3:
The remaining
xEy)
(c)
(a) The set of 6, (b) the image under cp, and (c) the best-approximation
and the worst-case error when X immediately announces at x.
m
cells are the
message
cells.
When x € <7,, ieM,X
sends the message
in order to
/
inform Y that xea,. Y then knows that ^€cr,x (y} and therefore takes the action y/(aiX {y}), which
results in the error e(cT,x {y}). (See Figure 4.)
e,= sup£(cT,x{y}).
y&Er
The worst-case
error
e,
when
X
sends message
/
is
(B.6)
1
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
we were
supremum of
add points
to
If
February 27. 1991
Page
to a,, then for
each y the error
error
is
achieved,
the
say that y*
eccr,
x
at
which the worst-case
(B.7)
{y}),
a worst-case y value for
is
y*
cell. If there exists a
such that
i.e.
y*€arg max
we
x (y}) would weakly increase, causing
£:(cr,
these errors to weakly increase as well; therefore the error of a strictly larger message cell
weakly greater than the Tror of a smaller message
is
1
<t,.
<pix,y)
A
x{y}
O-/
x{y})
9(<^i
\
e(C7,
y/iCTi
x{y})
X{y})
iSUp(p(c7,-
x(y})£((^i
X {y})
x{y})
inf^((T,-
i-^" X
0-,
(0
(b)
(a) The set of 9, (b) the image under cp, and (c) the best-approximation
and the worst-case error when X sends message for a given y.
Figure 4:
/
The
error of the algorithm
a
is
the largest individual cell error,
i.e.
£=max(£Q,£i,...,eJ.
The designer's
task
is
to
(B.8)
choose the partition
a
of Ex which minimizes
e.
Immediate action and efficiency
If the
immediate action
cell
ao of an algorithm
<yo*0. we say that O" is
immediate action cell? To answer this
partition; if
immediate action
single point,
not only his
its
cell
associated error £,
own
ceU from another
if
cell: If a
partition.
we now
message
When
than the error of the
X has
a
—>m
Cq
is
1
—> m
turn to a significant difference between an
cell a,,
ieM,
is
a singleton,
if
i,
i.e.
consists of a
Y would know
some message
cell is
to transfer a single point to the
precisely
empty,
it
empty message
On
a singleton, say <To= {x}, the associated error e({x}
the
xEy)
uncertainty about Y's coordinate.
partition cr
1
we were
is
Therefore efficiency can never require that some message ceU be empty.
cell.
—> m
if
a
does efficiency require an empty
zero because, after receiving message
the immediate action cell
1
question
the error of the algorithm
can be positive because
Consider a
is
O^m
empty, we say that
coordinate y but X's coordinate x as well. Therefore
would not increase
other hand
and a message
a
partition <T is
whose
partition,
error
i.e. if
is e. If
£({jc}
for
some i€£x
x£y)<e,
then
it
the error of immediate action
would weakly decrease
is
less
the algorithm's
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
we removed i from
error if
We
would say the
-^
1
m
its
February 27, 1991
Page
message
partition
is
vefx
say that the
1
—> m
Convex algorithm
We now
(€M^
cr,,
a
convex
1
its
opportunity to weakly reduce
its
partition, then
it
would
empty immediate action
eschewing immediate action
is
cell. In this
efficient.
—those of
a=
form
the
(T„} such that each
(cTo.cti
an interval). Convex partitions are especially tractable compared to more
representing the cells, e.g. (7o=[a,xo],ai
function
if
I.e.
will in
which guarantee
cp
that
=
Theorem
later, are
loss of generality restrict attention to
we can
not convex,
is
exhibit a
numbers
convex
convex
partitions;
whose
partition
error
is
(These monotonicity assumptions, as well as additional
We
not as restrictive as they might seem.
of our results can be easily extended to a
m
In order to take advantage of their
impose monotonicity conditions upon the optimal action
less than that of the original partition.
assumptions imposed
i€M,x„ = b.^
iXi.{,Xi],
1
we can without
presented with a partition which
weakly
case
partitions
set (i.e.
we
all
strictly increase
general partitions of [a.b] because they can be almost completely specified by a set of
structural simplicity
action cell.
action cell. If on the other hand for
-»m
even a single point into
consider convex algorithm partitions
is
,
squanders
it
nonempty immediate
partition is provident;
empty immediate
to the previously
immediate action error exceeds the error of the
the
the algorithm's error to incorporate
we
it
improvident because
error through the incorporation of a
its
and added
cell
1
much wider
wiU see
Theorem
in
8 that all
class of optimal action functions.)
Conditions under whicft convene partitions are sufficient
Theorem
For each >'e£y,
1
on Ex, and
is £.
Then
that
there exists a
The
error of
cr is
convex
let cr
partition
no greater,
i.e.
will be at the left (respectively right)
decreasing),
Proof
i.e.
&oBa
(respectively
let
=
{
(p{x,y)
cTq, (Ti
(T=
,
and e(\x}
.
.
(p(,-,y)
£<e; and (D
if
in the
Ex whose ertor [from (B .8)]
&„} of Ex, whose error we denote by e, such
}
be a partition of
the immediate action interval
all
(p
and e(
{
•
yeEy-^ For
}
These
m
is
nonempty,
it
some
x<xo would
xq, the
are continuous and that the
assume
that both of the
we demonstrate claim ©. If
monotonicity of £({j:} xEy) implies that the
First
be weakly lower; therefore the error of the algorithm
cell all values in the interval [a,xo].
replace (Tq by [a, SupcTo] without increasing the error of immediate action.
Now we show ©.
continuity)
x Ey)
definiteness
would not be increased by incorporating within the immediate action
we can
do
weakly increasing (respectively weakly
is
weakly increasing sense.
an algorithm specifies an immediate action for
Therefore
functions of x
dosb).
has the same sense for
immediate action for any
(T;„
end of Ex if£({x} xEy)
monotonicity assumptions are satisfied
error of
.
{(to, d"i
For simplicity of exposition assume that
monotonicity of
.
xEy) be weakly monotonic
Consider the
i-th
message
cell.
Thanks
to monotonicity (and temporarily
assumed
we have
numbers do not themselves specify the particular closedness decisions for each
assumption, the significance of the closedness decisions
More general and more
cell.
When we make
is nil.
detailed versions of the proofs offered here appear in
Kofman and
Ratliff [1991a].
an additional continuity
3
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
inf
^<T/ X
=
} )
I}-
^Kinf <T„
}
)
=
i((p(sup
cT,-,
Page
when Y
>)
acts after receiving
message
through
Because
£(cr,
x {y}) would be unchanged
error
its
from (B.6) would be unchanged
£,
CO
(cotTo.cocTi
cTn,}
in
is
supremum and infimum, which would be unchanged
cr, is
set.
/
- (p(inf cT,-, >-)),
whose only dependence upon
convexified this
1
><).
Therefore for any yeEy, the error
e«7,x {y
February 27. 1991
such a
way
that
each
We
well.
as
(t, is
for every y by convexification of
construct
convex and
(7,
a
if
we
the
O",,
by refining the covering
Q
c COCT,.
The importance of monotonicity is exemplified in Figure 5 in which two optimal action functions
^mono ^j (^°", horizontally monotonic and nonmonotonic, respectively,
are plotted as functions of x
for an arbitrarily chosen y.
half of the figure
the oscillation of
—
The nonconvex subset
the horizontally monotonic case
<p"^°"°
the union of
<T, is
—
it is
two
disjoint intervals. In the lower
obvious that convexifying
and therefore does not increase the
error,
i.e.
(T,-
is
x (y}) and
nonmonotonic ^"°"
cr,
a single point and hence the oscillation and error are zero. After convexification the image
the indicated
new
does not increase
A^(cr,x {y}) = A(p(co
therefore e((T,x {>'})=e(co<T,x [y}). In the upper half of Figure 5 the image of the
over
(7i
segment of values, and therefore the oscillation and error are positive;
points through
convexification results
in
increased error over the
an
i.e.
is
the inclusion of
new domain,
i.e.
e(cocT,x(y})>£(a,x(y}).
(p(CO(JiX{y})
(p(OiX{y})
<p(o-/x{y})
COCT,
Figure 5:
The worst-case
convexification; this need not be true
Sufficient conditions for tfu monotonicity
The requirement
e{{x}
xEy)
that
(p
unaffected by
the absence of monotonicity.
error for a horizontally nnonotonic function
in
of the, immediate action
be weakly horizontally monotonia
be a weaikly monotonic function of
jc
is
(which
is
is
error
easily interpreted; the requirement that
indirectly a restriction
upon
<p)
does not have
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
Febnjary 27, 1991
Page
The next theorem
as obvious an interpretation.
when
states sufficient conditions
(p
1
appropriately
is
differentiable which guarantee the monotonicity of the immediate action error.
Let
Theorem 2
(p(-
y) be either
,
weakly increasing function for
a
weakly decreasing function for
increasing for
all
xeEx or©
Then
be continuous over E.
©
@
weakly decreasing for
the following
when
{
I
mixed
the
}
as
increasing decreasing
We
show
will first
demonstrated
show
that
Because £{{x} xay)
is
is
vertically
(^ is
{
E
or nonpositive over E).
functions of x and y. respectively,
nonnegative nonpositive }
|
weakly
(
,
X's error e({x} xcTy)
increasing decreasing
|
}
is
weakly
and K's error e((TxX {j})
is
horizontally weakly {increasing [decreasing}.
© implies the
inf(Tj'
claim
first
=
weakly increasing
(Pxy is
© ^> ©
partial is
Let
similarly.
> 0. (The continuity of
We now
that
nonnegative over
Cx'^Ex and OyClEy-
as
}
|
= ^((p(x.d)-<p(x,c)). This
(Pxy
cp is
(i.e.
© weakly
are equivalent:
^e weakly monotonic
errors e<{x} xcTy) and £((7x>^ (v))
I
are
two statements
be either
let (p{x, •)
a
Let dcp/dx, d(p/dy, and d^^/dxdy exist and
The
increasing decreasing
Proof
xsEx-
E
Specifically,
weakly
y^Ey. Further
d'(p/dxdy has weakly constant sign over
for every choice of subsets
(
all
all
yeEy oxQ)
all
SWQ ay = d
(Pxy'^Q and (py>Q.
and
in
x because <Px(.x,d)><Px(x,c) for
which
weakly increasing, we know
(py
(p^y
>
.
The other cases
Because q>y>Q, ei{x\y.aY)
c
used to guarantee that
for the case in
of© when
all
xeEx
thanks to
- (Pyx-)
and
in
which e({x} x Cy)
that (Px(x,d)>g>x(x,c) for
is
weakly increasing.
a]lx€Ex and
all
ayczEy.
Therefore
<P.ix,y^h)-cpxU.y)
<Pxyix,y).\\m
for all
x€ £x and y € int Ey. The
result extends to all of
£ due
to the continuity of
©
q)xy.
Equal-error convex partitions
For the remainder of our analysis of monolog algorithms we
functions
(p
which
satisfy the hypotheses of
Theorem
1.
restrict attention to
Therefore
we can
optimal action
without loss of generality
confine our consideration to convex partitions.
We now
direct our analysis
worst-case error in every
cell.
toward those convex partitions which
Theorem
given "equal-error" convex panition
3 establishes conditions
is efficient.
Theorem 4
result, loosely speaking, in the
under which
we can
same
be certain that any
establishes conditions under
which we can
be certain that such an equal-error convex partition exists.
'
The implications of these sufficient conditions are obviously stronger than we need to apply Theoretn 1 to X-instigator algorithms: they
are applicable when Y instigates as well. In addition, these conditions will be sufficient for the satisfaction of stronger hypotheses of
later
theorems.
m5
>
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlifl
We
say that
cr is
We
say that
=
ei
We
1
=£„
a
say that
—> m
If a
partition
l^>m
(B.9)
partition if
(To
= 0.
an equal-error partition
We
if
(B.IO)
it
is
have previously defined the terms provident and improvident with respect
—> m
defme any equal-error
same communication length could possibly have
partition with the
[xi,b], which
we assume
o={ai,&n}y with
lower
error. If
choose X\<x\
it
error
Now
cell).
^= max
—»
= £^. Assume
provident
(i.e.
must be
efficient;
a lower error.
(Ji
As an
= [a,x\) and
further that, for
all
xeEx,
efficiency does not require a
Let
its
intercell
boundary be
£i<£ and eq<e.
both
in order to shrink cTl relative to <Tl.
jl\.
In order to
new
This
partition cannot have
make £i<£, we would have
However, thus shrinking
<Tl
makes
to
(Tr a larger set than
and therefore £R>e.
Theorem
For each
3
yeEy,
on Ex- Let
-> m or
exist a panition (whether
Sketch
of
Proof
The proof of Theorem
which
some
some
a
1
consider any other convex partition with two message cells,
{Si, in).
we would have
did
is
it
c7= {cTl.<7r}, where
cells,
to be equal-error with £ = £i
sufficiently large that this partition
is
nonempty immediate action
(Tr
to
partition to be provident.
3 will tell us that if a convex, provident, equal-error partition exists then
£({x} xEy)
a
partition or an equal-error
conve?(j provident, ecjuaC-error partition ep(ists, it is efficient
no other
=
^m
either an equal-error
example, consider a convex partition with two message
a'R
1
if
cro^0.
and
We now
Theorem
i.e.
is
partition.
partitions.
and
an equal-error
cr is
Page
0—>m
an equal-error
£o=£\ = --=£m
February 27, 1991
cell
states that if <j
cell d,
a^ of
1
3,
and
(T
—> m)
which has a lower
given in
&
are
1
-»m
is
full in
two
of the second partition
to be a
qKx,y) and £({x}
xEy) be weakly monotonic
is
error.
Kofman and
Ratliff [1991a], relies
distinct partitions with the
a strictly larger set
a provident
1
—>m
partition because otherwise
—and has
partition, then
£>£o
lemma
cells,
weakly larger error
then
—than
any potentially lower-error
common
x Ey)>£.) Therefore
error of the equal-error
shown: that either the left-hand cell of (J is strictly larger than the left-hand cell of cr, the right-hand cell of
CT, or one of the interior cells of (> is strictly larger than one of the interior cells of cr. This
we are not comparing errors based on a subset relationship between a message cell and an immediate action cell.
Actually, a stronger claim
strictly larger
assures us that
a
a
Q
partition.
is
upon
same number of
inf;c6[a,t]e((x}
the error of this different partition will be at least as large as the
d
functions of x
be a provident, equal-error, convex partition. Then there does not
the first partition.' (If <t
would also have
let
is
than the right-hand cell of
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
February 27, 1991
Page 16
Continuity impCies e?(istence of an equaC-error partition
By
we
requiring continuity of the optimal action function
are guaranteed that an equal-error partition
exists.
Let
Theorem 4
(p
be continuous and for every
monotonic functions of
equal-error
error
0—>m
—
> /7T
—> m
1
-^
1
partition. (Therefore there
partition is
Sketch
partition. If this
weakly
m
x.
Then
in
always exists a provident equal-error
less than the error of the
Kofman and
Ratliff [1991a], has
—» m
1
— m
>
= [0,x\) such
x\ of 0\
Continue
in this
case
that £i
is
its
=e
is
Now
[see (B.6)].
x„=l
is
©,
that the
some
-^
\
m
tr,,
partition
(^Xm<l
is
1
-^m
is
guarantee that x^(e)
is
a continuous function of
is
is
given
determined, or
partition has
® and ©.
achieve cases
provident (the
that £2
an existence
= £•
© the right-hand
yet to receive their £
been found. In cases
©
By choosing
e
The continuity hypotheses
e and therefore that a value for e can be found which will
3
©.
result in the desired case
Theorem 4
which
and find the endpoint
e must be increased or decreased, respectively, and then the process repeated.
we can
error of this
aj = [x\,x2) such
i<m, remaining which have
the desired unique equal-error
sufficiently small or large, respectively,
unique equal-
The
full proof,
sufficiently small £
find the endpoint X2 of
determined,
reached and there are ceUs
error allotment. In case
exists a unique
conceptual substrate in the following iterative
straightforward): Fix
fashion until either Q)
boundary of [a,b]
the
partition.)
strictly
partition.
we assume
procedure, where for definiteness
modification for the
m, there
partition is improvident, then there also exists a
Proof
©,
and s{{x} xEy) be
(p(x,y)
let
This theorem probably seems intuitively plausible to the reader. The
of
and
y^Ey,
for all positive integers
However,
result.
it
easy to see
is
above sketch of the proof provides an algorithm
to actually
how
the iterative procedure described in
compute an
efficient
monolog algorithm
given an optimal action function satisfying the assumptions of the theorem.
The theorem suggests
1
->
m
partition
minimum
the following strategy to find an efficient algorithm: First find an equal-error
and determine
error i.
To determine whether
error of immediate action. If this error
Otherwise, find an equal-error
Monolog
The
its
error
—» m
panition;
it
is
this partition is
weakly larger than
e, the
partition
is
efficient.
under horizontal additivity
task of finding an efficient
monolog
signed mixed-partial requirement of
i€M,
—> m
will be efficient.
is
greatly eased
when
the optimal action function satisfies an
additional vertical monotonicity assumption. (Satisfaction of this assumption
ffi,
1
provident find the
Theorem
2.)
We
is
implied by the constant-
can then determine the error over any message
simply by evaluating the optimal action function
(p
cell
along a single, worst-case horizontal
segment. This simplification yields "almost closed form" expressions for the error and the cell
boundaries of an efficient partition.
7
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlitt
Theorem
Let
5
(p
February 27, 1991
Page
be continuous and
weakly decreasing for
X
when
sends message
decreasing in
O
/,
Define
^
y&Ey.
all
viz. e(<T,x (y }), is either
be either weakly increasing for
Further,
let cp
© weakly increasing
-^ m partition
1
a
of
[a. b]
whose
ertor
y&Ey
all
in
y for
©
all
ffjCzEx or
and y* = c
in
© weakly
©.
case
is
J<p{b.y^)-(p(ay)\
^5 j^
2m
^x) = (p{x,y*). The
cell
boundaries of
c
are determined (uniquely if the horizontal monotonicity
by
is strict)
supcTie<p~V<^(nnincri)±2H),
keM,
or
be such that the error, given y,
<T,c£x- Define the worst-case y-value y* = d\n case
There exists an equal-error
^
of
y for all
let (p{-,y)
1
and by min G\ =
a,
(5.2)
where the sense of the "±" corresponds
to (p{- ,y*) increasing
and decreasing,
respectively.^
©
Let e({a:}
point
ibesi
=a
x£y)
be a weakly monotonic function of
(respectively
ib8si
= 6)
if f((jc}
x£y)
is
j:.
Define the best immediate announcement
weakly increasing (respectively weakly decreasing).
Define the immediate action ertor function to be
If £^o(^bGsi)
^
£. then
Defme x„ = b
a
is
efficient.
(respectively i;„
Otherwise, there exists an equal-error
= a) when
ibesi
=^
0->m
partition
(respectively ib«st = ^) ^nd define the
6
message
oi[a,b].
cell ertor
function to be
^^^^_
\<p(i.,y*)-(p(xo,y*)\
(5 4)
2/n
There exists
xoeEx
action interval
(5.2)
—where
such that eo(^o) = £(^o). and the error of
d
is
£ = £o(xo) = £(xo)<e. The immediate
is
d"o= CO {ib«»i.-^}- The cell boundaries of an efficient partition are again determined by
i
is
replaced by i
— and by
min
<Ti
= io
(respectively
min a\ = a) when e({x} xEy)
is
weakly increasing (respectively weakly decreasing).
Proot
I
From
that the ertor
the definition of y* and the monotonicity of <p{-,y) and £(CT,
over message
cell
i
is
e,= sup£(cT,x{y})=£(<T,x{y*}) = i-|^sup(T,-,y*)-^infcr„y*)|.
2
ysEr
The
'
partition is equal-ertor, so the
We
common
use ^"' to denote the inverse image of ^, viz.
message-cell error
^'(z)= \x^Ex-
^•'^)
= z}
is
x
{
•
}),
we
see from (B.6)
February 27, 1991
Page 18
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
e = ;^
y
e,-=
The
(5.4).
<p(^r\\a\,y*^
I
where the message
and
-L| ^sup a^. y*)
-^ S ^sup Gi, >*) - ^(inf (T„ >*)| =
cells are labeled
such
that, for all
iJeM,
/<;'<=>inf ct,s inf
error over the immediate action cell from (B.5)
cTy.
given by
is
|.
This establishes (5.1)
The equal-error
(5.3).
requirement then determines io- The boundaries defined by (5.2) are easily verified to result in equal-
©
error cells.
A
'E?(ampCe 3:
muCtipCicativeCy separaSCe aptirnaC action function
As an example we
= b-a and ^y = d-c.
^jc
the hypotheses of the
therefore y*
Theorem
will apply
—and
=d
We
5 to the case where (p{x,y)
= xy on E = [a,b]y.[c,d]c'R^.' Let
.
observe fiom Theorem 2 (because d^<p/dxdy=
Theorem
including that e(a,x {}'})
5,
1) that this
= ^(Sup(T,-inf cT/)^
function satisfies
increases in y
that
£{{x]y.EY) = hx^y,
increases in x.
^
The
(B.ll)
error for an efficient
J(p(b,y*)-qKa,y*^\
,
^
—>m
partition is
found from (5.1)
to
be
(B.12)
2m
we
the cell boundaries
Supo-i =
1
d^x
^
2m
To compute
— and
-,
ad + lk
dAx
note that
=a+
,--1/
(z)
(p
= z/d and from
we have
(5.2)
kAx
2m.
m
(B.13)
,
indicating that each cell has the constant width Ax/m.
It
will be efficient to
have a nonempty immediate action interval
possible immediate action error
i.e.
a
0—>m
is less
partition is required
(TQ
= [a,xo) only
than the error without such an interval, viz. £{{a}
if
the smallest
x£y)=
iaA.v<£;
when
(B.14)
^-^>aAy.
m
When
(B.14)
message
is satisfied,
cell error e(A))
we
find io
= dib-Jio)/2m,
by equating the immediate action error
^^l__bdAy_
2
mAy + d
and the
yielding
jeo=—^^—
mAy + d
Substituting (B.15) into eo(io).
eo(W = i^oAy
(B-15)
we
find that the error for the algorithm
is
(Bjg)
9
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
A
February 27, 1991
Page
calculation similar to that yielding (B.13)
^^<-ii- =
may + a
mAy + a
which we note
is
weakly
that the
message
cells
have the constant width
(B.n)
:«,
width of the immediate action ceU.
less than the
Summarizing both cases we
(respectively i)
shows
when (B.14)
is
1
problem
find the error of any efficient partition for this
(respectively
is
not) satisfied.
We
Theorem
will see later in
generalize this result to apply to any muUiplicatively separable optimal action function,
form q){x,y)=f(x)g(y), providing neither f (Ex) nor giEy) contain zero
to
8 that
i.e.
be i
we can
one of the
as an interior point.
Comparative statics on the communication Budget
It is
upon the
effect
a
interesting to vary the
number of
bits
n
at
our disposal
—our communication budget —
structure of and choice of instigator for efficient monologs. First
nonempty immediate action
xEy)
increases in
note that the size of
must shrink with an increase
interval for an efficient algorithm
see this assume for defmiteness that s{{x]
we
to see the
x. If to
the contrary
m
in m.
To
and xo both increased,
then eo(^o) from (5.3) would increase but e(io) from (5.4) would decrease, destroying the required
identity £o(io('"))sf(io(m)).
The
from
error e of a
(5.4) falls
1
^m
from
must distinguish.)
We
results
X
[0, 1].
The
interval over
see this in Figure 6, which shows the X-instigator
—
^m
error e of a
partition
communication budget because the numerator
in the
from the increased length of the
without an immediate action interval
[0.1, 1.1]
(5.1) varies inversely with 2".
more slowly with increases
m. (This
increases with
partition
as a function of the
which
the transmitted bits
monolog
communication budget
(The error for a nonempty immediate action interval
is
error
— with
for (p(x,y)
and
= xy on
bounded below by
e({0.1}x£y) = 0.05.)
We
we
have so
far studied algorithms
which are
efficient within the class of X-instigator
ask the question: given a restriction to monolog,
of Figure
6.
The reader can
easily
make
who
result in
an immediate action interval of
best X-instigator
monolog would have an
K-instigator algorithm
instigator
is
[0,
efficient within the class of
1/32= 171/5472. So we see
communication budget.
With one
bit
error of 11/60. Therefore
monolog has an immediate action
the size of the
should instigate? Return to the above example
an efficient K-instigator algorithm
11/31] with an error of bdAx/2(2Ax + b) = 11/62. The
monologs.
interval
11/342 = 176/5472. However, with an empty immediate
in a smaller error of
Now
the parameter interchanges in (B.12), (B.14), (B.15), and (B.16)
required to find the solution for a F-instigator monolog.
would
monologs.
of
Y
is
Now
the preferred instigator and the
consider four
[0,11/171],
bits.
yielding
action interval, an X-instigator
The
an error of
monolog
that the identity of the optimal instigator
best Y-
results
can depend on
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliti
February 27, 1991
Page 20
-- no immediate action
-O nonempty immediate
action interval
0.05
--
12
3
4
Number
Figure 6: For low n
were transmitted by the
dialog
least
is
we
one
monologs.
bit.
We
interval.
monolog algorithms
Monologs do not exhaust
is
not a monolog: for
some 6
—those
in
which any
bits sent
the algorithmic |)ossibilities, of course.
A
the algorithm requires each partner to send at
presented results concerning monologs which are efficient within the class of
We now
concern ourselves more generally with the problem of finding algorithms which are
efficient within the larger class of all algorithms.
the class of
have an immediate action
efficient to
restricted attention to
instigator.
an algorithm which
is
of bits
Dialog algorithms
4.
In the previous section
it
6
5
monologs need not be
We
will see that an algorithm
efficient within this larger class. (For the
which
is
efficient within
remainder of the paper we
use "efficient" in this stronger sense.)
Dialog can outperform monolog
Our
first
example of dialog superiority
superior to the best
second example
is
An
monolog and because
more reasonable;
modest improvement
is
its
in error relative to
extreme
its
— both because
it
shows
optimal action function
optimal action funaion
is
is
a dialog
somewhat
which
is
infinitely
pathological.
The
well-behaved and dialog shows only a
monolog.
e7(treme CT^ampCe
We
display an example in which a dialog outperforms every
monolog which has
communication length. For any communication length greater than unity the dialog error
action function will be zero and the
monolog
Consider the optimal action function
error will be positive.
the
same
for this optimal
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliti
February 27, 1991
Page
21
x = 0,
(CD
y=l.
Otherwise,
graphed in Figure 7. Now consider the following X-instigator dialog algorithm: X sends the
message "0" if .t = and sends "1" otherwise. If "0" was sent, Y can immediately choose y/ = y with zero
error because he knows X's location precisely. If "1" was sent and >-< 1, then Y can immediately choose
which
y/
is
= 0, again with zero
all,
after
pin
down
(p
y<l
worst case "1" was sent and >>=
chooses y/=\ -x, again with zero
error.
1.
So we see
that with
claim that there
is
no
many
y=l
bits
X
because for
Thanks
only two
communication length monolog which
finite
with zero error in the worst-case. Consider any X-instigator monolog. If
OT
Y sends any message
In this case
bits a dialog
at
can
the value of q>(x, y) with zero error even in the worst case.
Now we
of
X
which
error. In the
will yield positive error. If
we can choose
sends to Y
y=\
to the
X
sends a message, choose as a
test
will determine the value
X
immediately
case
y=l. No
acts, either
matter
how
an a:>0 such that Y's estimate of ^(x,y) will have positive error,
the precise determination of (p(x,y) requires that the value of
symmetry of the optimal action function we know
x be known precisely.
that this conclusion
would hold
if
Y
instigated instead.
Figure 7: Dialog can be infinitely better than monolog.
SI
more reasonaSCe e?(ampCe
We
return to the optimal action function <p(x,y)=xy of
unit square [0,
l]x[0,
1].
We
efficient, two-bit, X-instigator
(B.15-> B.17),
that this
exhibit a two-bit
(i.e.
Example
3
and choose the domain
m = 4), X-instigator
E
to be the
dialog which outperforms an
monolog. As the monolog performance benchmark, we calculate, using
monolog
error
is
Vio with an immediate action region over
[0,
Vs) and four
equally spaced message cells.
immediately acts when a:€<To^ = [0,0.18468). (See Figure 8.) Otherwise X
transmitting "0" when x€CTi'^ = [0.18468,0.63054) and transmitting "1" when
In the superior dialog,
sends the
first
bit,
X
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
A-
€(72^ = [0.63054,
next
bit.
1].
February 27, 1991
Page 22
Y's response depends on X's message.
Otherwise, he listens for a second
bit to
If
receives "0", he takes control of the
Y
come from X.
a\
(Tn
IB
CT^
Figure 8:
oi
erf
A
dialog which outperforms a best monolog.
>'ecTo^= [0,0.41421). Otherwise he sends "0" as the
second bit when >'SC7/ = [0.41421.0.7071 1) and "1" when >'€cr2*' = [0.7071 1, 1]. This then turns the
action decision back over to X. Note that when Y receives "0" from X, Y faces a one-bit, y-instigator,
When Y
takes control, he immediately acts
monolog problem on
instigator,
and
K's
(T2B^
after
X
1].
Y
the
same way we solved
the
X-
n-b'\i,
she then faces a one-bit, X-instigator
first bit,
monolog problem
solution to this problem dictates that she use the second bit to further
knowledge about x
= [0.81527,
it
arbitrary rectangle in the previous section.
has sent the
ai^xEy. The
over the rectangle
refine
the rectangle cti^X(T2^ and solves
monolog problem over an
When x€<j2^
if
into
of the intervals
either
cr2/i'^
= [0.63054, 0.8
1
527
)
or
then takes an action.
The described two-way, two-bit algorithm
results in equal-error cells.'
(The double-headed arrows
in
Figure 8 indicate the relevant actor's worst-case information set corresponding to each rectangle.) This
common
error
is
easily verified to be 0.09234
with "1", X's information set
is
<
Vio- For example,
the line segment
X = sup ai^ = 0.63054, and X's best guess, from (A.6),
results,
We
from (A.7),
in the error
i(0.63054)(l -0.7071
are not at this point asserting that the exhibited dialog
efficient
monolog.
is
1)
when
[x]y.(j2^, where
is v^
X
sends "0" and Y responds
xea\^.
= i(0.63054)(0.70711 +
worst-case,
In the
1)
= 0.53820. which
= 0.09234.
efficient; that is not necessary for
our claim that
it
is
superior to any
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlitf
Monolog
We
February 27. 1991
Page 23
efficient with additive separability
is
have seen above
monolog need not be
that
the optimal action function
monolog
additively separable,
is
We now
sufficient for efficiency.
is
efficient
show
whenever
that
— no dialog can do
better.
By
we mean that the optimal action function is of the form (p(x,y)=f(x) + g(y), where
Ey—* R are continuous. In order to prove this result we can use the upcoming Theorem
additively separable
f:
Ex-^^
and
g:
8 to justify restricting attention to optimal action functions of the simpler
<p(x,y)
= x + y,
(C.2)
on the closed rectangular region
we make
First
<Jy<^Ey- For
form
E = ExxEy<:zU^.
an observation about this additively separable optimal action function. Let
this (p
and for
all
ax c Ex and
generalized rectangles (T^xcT}' the error of an immediate action by
independent of x and the error of an immediate action by K
is
independent of
y.
To
see this
we
X
is
note that
qK{x}xaY)=[((Kx,y):y€(jY} = {x + y:ye(TY],
(C.3)
and therefore
£({x} xcrj')
and similarly
worst-case
for
it
immediate action by
is
says that
it
is
As
+ >':>'€<Tj'}) = J(supcT)'-'nfo'r)-
a consequence, every
it
is
a:
is
(C.4)
a worst-case
x and every y
never efficient to have a nonempty immediate action region.
never efficient to turn control of any remaining
will use those bits in a
that
Y.
{x
is
a
y.
Lemma 6A
says that
= ^(sup{x + y:>'€(Ti'}-inf
bits
over to the other partner,
if
Lemma 6B
that
parmer
monolog. The proof of Theorem 6 then uses an induction argument to establish
never efficient for one partner to ever turn control of any remaining
bits
over to the other
parmer, whether or not that partner will engage in a monolog from that point forward. Therefore in any
efficient algorithm all the bits are sent
by the instigator
additively separable optimal action function,
Let <p{x,y)=x-^y and
Lemma 6A
dialog
—on
a
Proof
cToU
tXi
monolog whose immediate
Consider an X-instigator,
u (T2 = <7x
algorithm
where Gq * 0;
is at least
let
n>
initial
action region
/i-bit
i.e.
c^^.^,
1.
i.e.
^^^
Any
is
only a monolog can be efficient for an
f^-^'-'
'^'-'
"^^^^
n-bit, X-instigator
generalized rectangle
immediate acticm region for the instigator's
instigator
j^
—
^°
"
'-'^
algorithm
crxX(Tyc£ which
— monolog
has a nonempty
some
action will be outperformed by
«-bit, Y-
empty.
algorithm where X's control of the
first bit
generates a partition
which does have an immediate action region. The error £^ of
as large as the error of
or
immediate action eo^ =
Ksup cty
dominated by an equal-error K-instigator one-way algorithm which
-
'^f cty).
this
This algorithm
results in an error
is
no larger than'
(su pcy- infer j')/2m<eo^^e''^- (In Figure 9a the two-headed arrow corresponds to the oscillation of
We
do not assume
that ffy
i*
convex; at worst the one-way error
is
that
which would be achieved over the convex
hull of (ry
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlitt
February 27, 1991
Page 24
immediate action of the original algorithm. In Figure 9b the shorter two-headed arrows correspond to the
oscillation of the optimal action function over X's information set
when Y sends
©
a message.)
Something
happens with
n
bits
CT2'
CTo
(a)
(b)
(a) An X-instigator n-bit algorithm with a nonempty immediate
action region can be replaced by (b), a lower error y-instigator, n-bit
monolog algorithm which has no immediate action region.
Figure 9:
Let (pix,y)
Lemma 6B
= x + y on E and
on (TxxcTy
who
czf'
let
n>2. Consider any
which for some x€<Tx turns control of the second
then implements an (Ai-l)-bit. monolog algorithm.
dominated by an
the first bit generates a partition cXi
(cT,y^}y=i
k,
over to Y
algorithm
this /x-bit, X-instigator
that without loss of generality
u <T2 = fTx-
X, Y does take control of the second
partition
Then
bit
algorithm
is
monolog algorithm.
n-bit, ^-instigator,
From Lemma 6A we know
Proof
«-bit. X-instigator
bit
Assume
that, in
we can assume
response to some message
and implements an (n-l )-bit monolog on
of ay, where k = 2''~K
[Lemma 6A
that
assures us that this
algorithm will not have an immediate action region and therefore
c7,o
cr,
{n-
x
X's control of
z
{
1
,
2
}
cry specified
l)-bit,
=0.] For ye
€
{
from
by
a
K-instigator
1. ...,^}. this
Y-
instigator algorithm results in the cell errors
£y =
Ksup(T/-inf cr/),
(6B.1)
and therefore the error of the original
Now
ye
(«-
define an
n-bit, X-instigator dialog is
l)-bit, K-instigator
monolog
a
by a
(6B.1), ey
= e,y
fory'e {1, ...,k\ so that
£^= maxy {fy} = maxy
{£,y}
<e^.
k\.
(1
This {n -
1
From
)-bit
monolog which
monolog weakly outperforms
strictly
outperforms the dialog.
bounded below by maxy(e,y}.
partition {dy
}y=i
*,
where
cry
=cr,y
for
(6B.2)
the original n-bit dialog; therefore there exists an n-bit
©
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlitt
February 27. 1991
Page 25
The minimum achievable
Theorem 6
error for «-bits for
^x,y)=f{x)-^ giy) on
£,
where /
and g are continuous, can be achieved by a monolog.
Proof
I
Theorem
We
8.
first
prove the proposition for the special case of (p{x,y} = x + y and then generahze via
Lemma 6B
tells
us for the case n
=2
two-bit algorithm on any generalized rectangle
dialog, then, for
some
not be efficient because
let
X
Y would send
x,
it is
is
partition
bit.
However, we know
from our
two-bit algorithm spun-off by each
cr,,
/e
From Lemma 6A, X's
just previous conclusion for
1,2},
{
that
that such an algorithm
dominated by some two-bit, K-instigator monolog.)
We know
we can assume
any
a monolog. (If a two-bit, X-instigator algorithm were a
the second
be the instigator of an efficient algorithm.
a\ u<T2 = 0"x-
that without loss of generality
is
Now
control of the
n=l
consider
first bit
tells
=
3
and
generates a
we can assume
that
Lemma 6B
a monolog. But then
a;
would
that the
us that these
two two-bit algorithms must also be X-instigator algorithms; otherwise our algorithm would not be
efficient.
Therefore
we can
any generahzed rectangle
without loss of generality assume that any efficient three-bit algorithm on
a monolog.
is
By
induction on n
we prove our
desired result.
From theorem
8
we know that the communication problem for (pix, y) =f(x) + g(y) on E is equivalent to the problem
<p(x,y) = x + y on £ =f(Ex)^ giEy). Therefore the efficient algorithm for the general additively separable
optimal action function
Monolog can be
We
Theorem 6
without additive separability
efficient
have seen an example,
efficiency.
Q
a monolog.
is
viz. <p(x,y)
= xy on
us that monolog
tells
is
[0, 1]
x
[0, 1], in
which monolog was
always sufficient for efficiency for additively separable
optimal action functions. This raises the question of whether additive separability
monolog
but actually necessary for
a best
monolog
is efficient
efficiency.
for <p(x,y)=xy
insufficient for
We
answer
when we move
is
not only sufficient
this question in the negative
the
domain
to [1
,
2]
x
[1
,
by asserting
that
2].
This demonstration requires more development than required for the earlier example of monolog
insufficiency. In that case
it
was
sufficient to exhibit a dialog
did not need to claim that the exhibited dialog
exists a
monolog which
dialog and therefore
is
efficient
we must
optimal acticm function
is
on
this
was
efficient.
which outperformed
Now, however,
new domain we must prove
find a best dialog.
Theorem 7
multiplicatively separable,
we can
tells
in
a best
order to
monolog; we
show
that there
the nonexistence of a better
us that, for two bits and
when
the
greatly restrict our consideration to an
extremely small subset of the great variety of conceivable algorithms. This makes the construction of an
algorithm to find a best dialog practical. Running this algorithm for <p(x,y)=xy on [1,2] x[ 1,2] resulted
in the finding that
every candidate for an efficient dialog was dominated by a monolog.
Before stating the theorem
algorithms. X's control of the
we
will develop
first bit
some
notation for discussing two-bit, X-instigator
generates a partition ctq
u cxi u cT2 = £'x = [a,
ft].
If the
algorithm
when xe<Ti,i€(l,2),X maintains control of the second bit as well, then the panition
<'"i0*^O",iU<T/2 = cr, is generated; i.e. message / leads to a one-bit, X-instigator algorithm on cTixEy. If
specifies that
instead the algorithm specifies that
when xea,, /€ 1,2}, K
{
takes control of the second
bit,
then the
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlifl
V
V
u<T/2
ucT,i
partition <T,o
K
February 27, 1991
Page 26
=EY = [c,d]
is
generated;
message
i.e.
/
leads to a one-bit, K-instigator
algorithm on (JiXEy.
minimum
'ine
Theorem 7
error achievable by an X-instigator algorithm for the optimal
action function (p(x,y)=xy on
£clR + ^
can be achieved by an algorithm of the
following form:
The
©
If
i.e. cr,o
cells cTq. O"!.
^d <^2 ^e
convex;
aosa; and
/€{ 1,2}, leads to a one-bit, X-instigator algorithm, then
cr,,
its
immediate action region
empty,
is
= 0.
If the one-bit instigator for cti is different
(3)
infcTj <info"2-
than for
(72,
Y
then
instigates for
(Ti
and
X
instigates for
CT2.
Proot
I
The convexity of Oq and
£i{x} y-Ey).
Consider j€
(If j:€ct,o,
{
1
.
2}
.
then
we
the emptiness of cT/o
both follow from the monotonicity of
could without loss of generality incorporate the interval [a,x] into ctq)
If cr, leads to
Y
instigating with the remaining bit, then the error over ai
is
e,^=max{e,o^e./.•e^7^},
where
e/o^=iAa,sup<T,o^
e,/=iAa,/ super,.
forye {1,2}, where
Aa^supa- inf cr.
This error would be unchanged by the convexification of
This error would be decreased by shifting a, to the
left,
because^this would leave
cr,-.
Ac, -unchanged and
would decrease super,.
If (J, leads to
;6
{
cell
1,
2}.
<T,y.
X
instigating again, the error over ai
Each e,/ would be unchanged
necessary
If
we can convexify
adjacent and translating a^-i to the
establishes
<?,
we convexify
by translating
max
{e,i^,e,2^}.
where e,/ = \dAaij,
and/or translate, either to the right or
cr,i
and
(T,2 to
the right in order to
which weakly decreases the error of
this cell.
left,
the
make them
This process also
©
®.
5.
We
left,
if
ise,^=
Separability and Monotonicity
have thus far imposed monotonicity requirements upon the optimal action function
and the
q>
errors e({x}
XfTy) and £(tTxX {y}) on the domain E. Theorem 8 allows us to relax these assumptions
in
many
cases.
Denote the n-bit
over
E
by
E).
{(p,
U
q>
efficient
communication problem
for the optimal action function
does not satisfy the monotonicity assumptions on E, then
we
seek to transform
(p
(<p,
E)
into
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliti
an equivalent problem i^,^) where
<p
February 27, 1991
Page 27
satisfies the
then be amenable to analysis using the methods
Consider an optimal action function
(p,
assumptions on E. The transformed problem would
we have developed
thus
far.
represented as separable in/(jc) and g(y),
i.e.
such that for
all
(.v,y)€£,
(fKx,y)
= g)(f(x),g(y)\
(D.l)
Defme ^x=f(Ex), £Y = g(EY), and £ = ExX^y- Then/: Ex-^'^,
0:E—*U. The separation in (D.l) can be performed trivially for any <p (e.g. let <p =
for
some function
(p.
giy)=y); the challenge
to find a nontrivial decomposition
communication problem.
the original
intervals
is
and thus
£
the optimal
X
communication problem facing
x^Ex
(D
to
and
ysEy
in the
and Y
is
communication problem
are equivalent.
{<p,E)
of any efficient algorithm
is
Theorem
two ways:
R
to
far
for the
performs the operation
a,
/?
of the
their private
(p(x,
y) or
then to approximate <p(u,v). Because the optimal
under/ and
g,
respectively, these
two
8 justifies this intuitive argument that the error of the
R
for the
<p
as in (D.l).
communication problem
at
each time
t
(cp,
Then
the error of any
E)
equal to the error
is
Y such
= ai(h„x) and Y performs
in the following
be
null,
an action, or the
as a function of that partner's coordinate and
until that time. Specifically,
[fit(h„y)},=o,...^ for
may
that at
it
defines a sequence of functions
any time
and given the history h,,X
/,
the operation b,=P,(h„y).
construct the sequence {di(,h„x)}t=o....jn of operation functions for
original sequence for
are
communication problem i0,E).
communication up
m forX and
communicate
and then to approximate
algorithm defines for each partner an operation (which
{a,(.h„x)},=o
Ex and Ey
equal to the error of the problem i<p,£).
transmission of a message) to be performed
We
in either of
= g(j/)€EY and
v
efficient algorithm
the history h, of
f(x)=x, and
we can conceive
k la (D.l)
function
Consider a separable representation of
Theorem 8
An
action
sensitive only to the images of x and y
communication problems
Proof
be continuous so that
manner we have studied thus
communicate u=f(x)e£x and
action function
and
which allows the desired transformation of
/ and g
require that
<p,
Ey^^,
a rectangle.
is
When we have decomposed
information
We
g-
way. For each ue^x>
X
arbitrarily
for the algorithm
R from
choose some element of
the
its
inverse image,'
M") = typrV«)For each
t,
each u e £x> and each
d,{h„u) = a,{h„n{uy).
The
h,, set
(8.3)
name typ might be inteqneted as "typical" or '1[ake] y(oiirl p[ick]." We use it because other techniques, e.g. taking
minimum, can fail. (The infunum may not belong to the set; the minimum may not exist.) It is, of course, crucial
be a function, i.e. uniquely defined. The only other important property of typ 5, for S*0, is that typ5€5.
function
infunum or
typ truly
(8.2)
the
the
that
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlitt
Similarly, for each
t,
Page 28
let
= typ^''(v).
7(v)
For each
ve^y,
February 27, 1991
(8.4)
each vG^y, and each
h,, set
0,(h„v)=P,(h„r(v)).
(8.5)
R
v)e^
Denote the action resulting from
action resulting from
errors under
R and R,
A
for («,
for
{x,y)eE by Y(x,y), which
by y/(u,v), which results
results in
an enoT£(x,y). Denote the
in the error e(w,v).
The
sets of
achieved
respectively, are
^ = {e(x,y):{x,y)€E},
(8.6)
!={£(«. v):(a.v)e^}.
(8.7)
From
(8.3)
would have
and (8.5) we see that
at (//(«),
\l^(u,v)
X
and Y will behave
y(v))e£ under algorithm R.
at
iu,v)€£ under algorithm R
exactly as they
In particular,
= y/(M(u\y(v)),
(8.8)
and therefore
£(«,v)=£(//(M),y(v)).
(8.9)
Because iu(u)eEx and yivyeEy, we see
supl <
R
of R because R
supi^. Therefore the error
strictly less
than that
is
v)e^,e(M,v)€i^, therefore i <z^. and therefore
than the error of R. However, the error of R cannot be
that for all (a,
weakly
less
is efficient.
(Otherwise the algorithm
a(h„x) = d,(h,J(x)),
(8.10)
0(h„y)=0,(ih„g(y)),
(8.11)
would then have an error i=i<e.) Therefore the error of ^
In Figure 10
we graph
= u + v, we can then
of <^«,v)
symmetrical
9)
in
x and
y;
and that
we
boundaries to be u* = 2k/m
The proof of Theorem
from the
write
in the separable
= u + v on^=/([0,l])x^([0,
sufficient for efficiency
partition of
£
is
the optimal action function <p{x,y)
obviously violates our monotonicity assumptions.
(p(u,v)
R onE defmed by
1])
=
we should have
= s'\n
4;rx
Letting f(,x)
+ sin
4;r>'
= s\n
on
1].
We know
[0, 1]
4;:x, g(y)
form (D.l). Therefore we need
[-1, l]x[-l,
©
equal to the error of ^.
=
x
[0. 1],
s\r\ 4;iy,
to solve the
from Theorem 6
which
that
and
problem
monolog
an empty immediate action interval. The problem
use (5.1) to calculate the efficient error to be
(b-a)/2m= l/m and
is
is
the cell
-\,k€M.
8 [see (8.3)] tells us that
we
find the partition of
by finding the inverse image of each ceU
d,,
E
for the original
problem
i.e.
(T,=rkdi) = -l-sin-i(d,),
4^
(D.2)
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratliff
ieM, where by
for
we mean
sin"'
the one-bit case for simplicity.
^.
The two
two
The
cells of the partition
disjoint intervals,
a
Febmatv
Page 29
the inverse image and not just the principal value. Figure
vertical u axis
for the
on
the right-hand side
nonmonotonic optimal action
Figure 10:
we can
separable problems
this
(p
does not
—
A nonmonotonic
i.e.
y)
= sin 4;rx+ sin
we have
where the optimal action function
requirements on any rectangle
the
convex
shows
partition
a
of
each consists of the union of
£
4;ry
still
be studied.
many
already developed
is
of the form
<p(x, y)
multiplicatively
—even when
=f(x)g(y)
^x nor Ey contain zero as an interior point. (Note that
e({«} x&Y) = \u\AaY> which is not monotonic in u over any Ex
as long as neither
is
in its interior.)
Concluding Remarks
6.
have presented a model of bounded rationality resulting from costly communication
member team
1
monotonicity assumptions, because 0(u, v) = av does satisfy those
the error of immediate action at u
We
<p
but separable function can
study with the techniques
itself satisfy the
which contains zero
shows
1
each of which has the same image under /.
(p(,x.
Similarly,
27, 1991
in a
two-
context in which the mechanism designer confronted the tradeoff between increased
expenditure of resources for communication and increased accuracy of the solution. Our measure of
communication emphasized
We
which
that
communication
is
costly because
it is
time consuming.
completely solved the efficient monolog problem for a large class of optimal action functions
satisfied
determination
—
either
for
monotonicity or separability assumptions.
any given length of communication
—of
communication.
We
we have
have shown
solution
included
the
the optimal instigator, the cell boundaries of
the partition, the action decision rules, and the resulting error.
of communication length,
This
Having computed the
error as a function
thus characterized the tradeoff between the accuracy and cost of
that there exist optimal action functions
such that for some realizations
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlift
February 27, 1991
Page 30
of the private infonnation there will be no communication, even though the right to communicate has
already been paid for.
The explanation
is
that
remaining sUent
sufficiently increases the informativeness of
communication
compensates for the error of the no-communication actions.
instigator could
depend on the
size of the
optimally chosen, predefined situations
in
We
in the
also
other cases that this
saw
more than
that the identity of the optimal
communication budget.
1/>S.
(T2=r(<T2)
Figure
We
The cell boundaries for the original problem are found
from the boundaries of the transformed problem.
1 1
:
have paid particular attention to the question of whether efficiency requires
speak to each other in a dialog rather than that one
We
member engage
in a
monolog directed
exhibited examples showing that the answer to this question could in general
optimal action function
monologs without
is
additively separable, however,
we showed
that both
that
go
one can
members
to the other.
either way. If the
restrict attention to
loss of generality. Additive separability corresponds to an independence of the
parmers' private data.
Admittedly, the information structure in our model
member
— might
seem too
—a
number known by each team
austere to realistically pose a significant communication challenge.
current work-in-progress includes enriching the present
private
single real
knowledge of a point
in a
framework by endowing each member with
multidimensional space. Our research in this direction has already been
informed by both the intuitions and the concrete results of the present work.
interesting multidimensional
of the type
this paper.
we have
Our
We
have found
that
problems decompose into separate instances of one-dimensional problems
treated here and thus directly require application of techniques
we have developed
in
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlitt
We
February 27, 1991
Page
31
see the present paper as one step in a research program dedicated to explaining features of
organizational structure which are insufficiently understood
when
the details of the
communication
process are ignored.
References
Abelson, Harold [1980] "Lower Bounds on Information Transfer in Distributed Computations," Journal
of the Association for Computing Machinery 27 2 (April): 384-392.
Arrow, Kenneth J. [1974] "Limited Knowledge and Economic Analysis," American Economic Review
64 1 (March): 1-10.
J. and Leonid Hurwicz [1977] "An Optimality Criterion for Decision-making Under
Ignorance," in Studies in Resource Allocation Processes, eds. Kenneth J. Arrow and Leonid
Hurwicz, Cambridge University Press, pp. 463-471.
Arrow, Kenneth
Dow, James [1991] "Search Decisions with Limited Memory," Review of Economic
Studies 5S
1
(January): 1-14.
Dr^ze, Jacques H. and D. de la Valine Poussin [1971]
Review of Economic Studies 38: 133-150.
"A Tatonnement
Process for Public Goods,"
and Jean-Jacques M. Laffont [1987] "Limited Communication and Incentive
Compatibility," in Information, Incentives, and Economic Mechanisms: Essays in Honor of
Leonid Hurwicz, eds. Theodore Groves, Roy Radner and Stanley Reiter, University of Minnesota
Green, Jerry R.
Press, pp.
308-329.
Groves, Theodore and John 0. Ledyard [1977] "Optimal Allocation of Public Goods:
Free Rider Problem," Econometrica 45: 783-809.
A
Solution to the
Hurwicz, Leonid [1960] "Optimality and Informational Efficiency in Resource Allocation Processes," in
Mathematical Methods in the Social Sciences, 1959: Proceedings of the First Stanford
Symposium, eds. Kenneth J. Arrow, Samuel Karlin and Patrick Suppes, Stanford University Press,
pp. 27^6 (Chapter 3).
Jordan, James S. [1982] 'The Competitive
Economic Theory 1%
Karp, Richard and Antony
Mechanism
is
Dimensionally Efficient Uniquely," Journal of
(October): 1-18.
1
Ng
[forthcoming] Concrete Complexity.
Kofman, Fred and James D. Ratliff [1991a] "Monolog vs. Dialog in Costly Bilateral Communication,"
Interdisciplinary Group on Coordination Theory Working Paper Series, University of California at
Berkeley.
Kofman, Fred and James D. Ratliff [1991b] "A Comment on 'Search Decisions with Limited Memory':
Waiving the Right to Comparison Shop," mimeo.
Malinvaud,
Edmond
Economics
[1971]
"A
Planning Approach to the Public Goods Problem," Swedish Journal of
ly. 96-112.
Marschak, Jacob and Roy Radner [1972] Economic Theory of Teams, Yale University Press.
Johnny Carson vs. the Smothers Brothers
Fred Kofman and Jim Ratlifl
February 27. 1991
Page 32
McAfee, R. Preston and John McMillan [1988] "Search Mechanisms," Journal of Economic Theory
99-123.
44:
Melumad, Nahum, Dilip Mookherjee and Stefan Reichelstein [1989] "Hierarchical Decentralization of
Incentive Contracts," Graduate School of Business, Stanford University, mimeo.
Mount, Kenneth R. and Stanley Reiter [1974] 'The Informational Size of Message Spaces," Journal of
Economic Theory %: 161-192.
Oniki,
Hajime [1986] "The Cost of Communication in Economic Organization: II," in Uncertainty,
Information, and Communication, eds. Walter P. Heller, Ross M. Starr and David A. Starrett,
Cambridge University Press, pp. 191-212.
Osana, Hiroaki [1978] "On the Informational Size of Message Spaces for Resource Allocation
Processes," Journal of Economic Theory 17: 66-78.
Tirole, Jean [1988]
Walker,
Mark
The Theory of Industrial Organization, The
[1977]
"On
the Informational Size of
MIT
Press.
Message Spaces," Journal of Economic Theory
15:
366-375.
Yao, Andrew Chi-Chih [1979] "Some Complexity Questions Related to Distributive Computing,"
Proceedings of the Eleventh Annual Association of Computing Machinery Symposium on Theory
of Computing: 209-213.
H b 6 2
1-5 7
^'(^
Date Due
0€C 1« wyi
NOV.
8
1995
Lib-26-67
Mil
3
TQflO
LIBRARIES
DDbbSObb
M
Download