Miscomputing Ratio: The Social Cost of ... Computing Kate Larson and Tuomas Sandholm

From: AAAI Technical Report WS-02-06. Compilation copyright © 2002, AAAI (www.aaai.org). All rights reserved.
Miscomputing Ratio: The Social Cost of Selfish
Computing
Kate Larson and TuomasSandholm
Computer Science Department
Carnegie Mellon University
5000 Forbes Ave
Pittsburgh, PA15213
{klarson,sandholm} @cs.cmu.edu
Abstract
requires computingthe subcontractor’s manufacturing plan.
A normative deliberation control model of how
additional work (e.g., computing) refines valuations was recently introduced (Larson &Sandholm
2001c; 2001b). The authors analyzed auctions
strategically, whereeach agent’s strategy included
both computingand bidding. They found that for
certain auctions, properties such as incentive compatibility cease to holdif agents explicitly deliberate to determinevaluations. Instead agents strategize and counterspeculate, sometimesusing computing to (partially) determine opponents’ valuations. It was conjectured that such strategic computing maylead to inefficient outcomes.
In this paper we introduce a way of measuring the negative impact of agents choosing computing strategies selfishly. Our miscomputingratio isolates the effect of selfish computingfrom
that of selfish bidding. Weshowthat under both
limited computingaffd costly computing,the outcomecan be arbitrarily far worse than in the case
where computations are coordinated. However,under reasonable assumptions on howlimited computing changes valuations, boundscan be obtained.
Finally, we showthat by carefully designing computing cost functions, it is possible to provide appropriate incentives for bidders to choosecomputing policies that result in the optimalsocial welfare.
The paper is organized as follows. The next section describes the auction modeland deliberation
model. The following section discusses whyPareto
efficiency is not necessarily a goodwayof measuring the impact of restricted computingon the outcomeof the auction. This is followed by the introduction of our miscomputingratio, and the results
we derive for it. Weconclude with related work
and a summaryof the paper.
Auctionsare useful mechanism
for allocating items
(goods,tasks, resources,etc.) in multiagentsystems. Thebulk of auction theory assumesthat the
bidders’valuationsfor itemsare givena priori. In
manyapplications, however,the bidders need to
expendsignificant effort to determinetheir valuations. In this paperweanalyzecomputational
bidder agentsthat canrefine their valuations(ownand
others’) using computation.Weintroducea wayof
measuringthe negativeimpactof agents choosing
computingstrategies selfishly. Ourmiscomputin
8
ratio isolates the effect of selfish computing
from
that of selfish bidding. Weshowthat underboth
limited computingand costly computing,the outcomecan be arbitrarily far worsethan in the case
wherecomputationsare coordinated.However,
under reasonable assumptionson howlimited computingchangesvaluations,boundscanbe obtained.
Finally, weshowthat by carefully designingcomputingcost functions,it is possibleto provideappropriateincentivesfor biddersto choosecomputingpoliciesthat result in the optimalsocialwelfare.
Introduction
Auctions are useful mechanismsfor allocating
items (goods, tasks, resources, etc.) in multiagent
systems. The bulk of auction theory assumes that
the bidders’ valuations for items are given a prior/. In manyapplications, however, the bidders
need to expendsignificant effort to determinetheir
valuations. This is the case, for example,whenthe
bidders can gather information (Perisco 2000)
whenthe bidders have the pertinent information in
hand, but evaluating it is complex.Thereare a host
of applicationsof the latter that are closely related
to computerscience and AI questions. For example, whena carrier companybids for a transportation task, evaluating the task requires solving the
carrier’s intractable vehicle routing problem(Sandholm 1993). As another example, when a subcontractor bids for a manufacturingjob, evaluating it
The Model
In this section we specify our model. Wefirst review game-theoretic solution concepts, then auctions, and finally present the modelof deliberation
control.
Copyright~) 2002,American
Associationfor Artificial
Intelligence (wwwmaai,org). All rights reserved.
44
Concepts from Game Theory
A gamehas a set of agents and a set of outcomes
O. Each agent has a set of strategies from which
it choosesa strategy to use. Astrategy is a contingency plan that determines what action the agent
will take at any given point in the game.A strategy profile, s = (sl,..., Sn), is a vector specifying one strategy for each player i in the game.
Weuse the notation 8 = (si, s-i) to denote
strategy profile whereagent/’s strategy is si and
s-i = (sl,..., si-x, Si+l,. ¯ ¯, Sn). Thestrategies
in the profile determinehowthe gameis played out,
and thus determine the outcome o(s) E O. Each
agent i tries to chooseits strategy, si, to as to maximizeits utility, whichis givenby a utility function
ui:O~
Noncooperative game theory is interested in
finding stable points in the space of strategy profiles. Thesestable points are the equilibria of the
game. There are manytypes of equilibria but in
this paper we focus on the two most common
ones:
dominantstrategy equilibria and Nashequilibria.
A strategy is said to be dominantif it is a player’s
strictly best strategy against any strategies that the
other agents mightplay.
) > ~i(O(8~,S--i)).
The strategy is weaklydominantif the inequality is
notstrict.
If each agent’s strategy in a strategy profile is the
agent’s dominantstrategy, then the strategy profile
is a dominantstrategy equilibrium.
Agents maynot always have dominantstrategies
and so dominantstrategy equilibria do not always
exist. Instead a different notion of equilibrium is
often used, that of the Nashequilibrium.
Definition 2 A strategy profile s* is a Nashequilibrium if no agent has incentive to deviate fromhis
strategy given that the other players do not deviate.
Formally,
vi u Co(sL
Another measure that is commonlyused is social welfare. It often allows prioritizing one Pareto
efficient outcomeover another, but it does require
cardinal utility comparisonacross agents.
Definition 4 The social welfare of outcomeo E 0
is SW(o)= Y’~i ui(o)Equilibrium play does not always optimize social welfare. A classic exampleof this is the Prisoner’s Dilemmagame.
The definitions given above were for general
utility functions. However,
in this paper, as is standard whendiscussing auctions, we assumethat the
agents’ utility functions are quasi-linear. That is,
the utility of agent i, ui, is of the formui =vi - Pi
where vi is the amountthat the agent values the
item up for auction and Pi is the amountthat it pays
for the item. If agent i does not win the auction,
then ui = O.
Auctions
In this paper we consider auctions where one good
is being sold. There are numerousauction mechanisms, but in this paper we focus on the Vickrey
auction. In a Vickrey auction (aka. second-price
sealed-bid auction), one good is being sold, each
bidder can submit one sealed bid, the highest bidder wins, but only pays the price of the secondhighest bid. The desirable feature of this mechanism is that if a bidder knowsits private valuation
for the good, the bidder’s (weakly) dominantstrategy is to bid that valuation(rather than strategically
under- or over-bidding). Wechose to study the
Vickreyauction because it has this desirable property in the classic literature, but ceases to havethis
property whenthe bidder agents do not knowtheir
ownvaluations, but rather havethe option of investing computation to determine them. In our model,
the agent’s valuations are independentof each other
as in most of the literature, but wedeviate in that
our agents do not knowtheir ownvaluation a pr/ori.
Definition 1 Agent i’s strategy s~ is a dominant
strategy if
VS-- i V8~ ~ 8~ ~li(O(8*,S--i)
agent has higherutility in o’ than in o, andno agent
has lower utility. Formally,~b’ s.t. ~/i,ui(o’)
ui(o) and 3i ui(o’) > ui(o)].
>
The Nashequilibrium is strict if the inequality is
strict for eachagent.
Normative Model of Deliberation
In this paper, whenever we measure outcomes,
we measurethem from the perspective of the bidders in the auction, not caring about the auctioneer (who is not a strategic agent in our model).
One commonmeasure for comparing outcomes is
Pareto efficiency. It is a desirable measurein the
sense that it does not require cardinal utility comparisons across agents.
Definition 3 An outcomeo is Pareto efficient if
there exists no other outcomeo’ such that some
In order to participate in an auction, agents need
to be able to have a valuation for the items being sold. The question is: Howare these valuations obtained? In this paper we focus on settings
where agents do not simply knowtheir ownvaluations. Rather they have to allocate computational
resources to computethe valuations.
If agents knowtheir ownvaluations (or are able
to determine them with ease) they can execute the
equilibrium bidding strategies for rational agents.
45
movethe agent from parent to child in the tree.
The performanceprofile trees provide information
about howthe solution is likely to improve with
future computation. In particular, if an agent has
reached a solution corresponding to a node in the
tree, then the agent need only consider solutions
in the subtree rooted at the node. The probability of obtaining a solution v’, given that the agent
has reached a node with solution v, is equal to the
product of the probabilities of the edges connecting
nodewith solution v to v’.
There are two different types of performance
profiles: stochastic and deterministic. A stochastic
performanceprofile modelsuncertainty as to what
results future computingwill bring. At least one
node in the tree has multiple children. The uncertainty can come from variation in performance on
different probleminstances or from the use of randomizedalgorithms. A deterministic performance
profile is the special case wherethe algorithm’sperformancecan be projected with certainty (i.e., the
tree is a branch). Witha deterministic performance
profile, an agent can determine what the solution
will be after any numberof computingsteps devoted to the problem---before the agent conducts
any computation. Even though the agent knows
what solution it can obtain, it must still compute
in order to obtain it. Figure 1 is an exampleof a
stochastic performanceprofile tree.
However,agents often haverestrictions on their capabilities for determiningthe valuations. In this paper we are interested in settings whereagents have
to computeto determinevaluations. Settings where
the value of an item dependson howit is used often has this property. For example,valuation determination mayinvolve solving optimization problems that provide a solution as to howthe items in
the auction can be used once obtained. However,
manyoptimization problems, such as scheduling,
are NP-complete.It maynot be feasible to optimally solve the valuation problems. Instead, some
form of approximation must be used. In this paper we assumethat agents have anytime algorithms
(Boddy& Dean1994). The defining property of
anytimealgorithm is that it can be stopped at any
point in time to provide a solution to the problem,
and the quality of the solution improves as more
time is allocated to the problem. This allows a
tradeoff to be madebetween solution quality and
time spent on computing. Since the amountof time
an agent can use to computevaluations is limited
by deadlines or cost, the agents must maketradeoffs in howto determine their valuations. Alone,
anytimealgorithms do not provide a completesolution. Instead, they are paired with a meta-levelcontrol procedure that determines howlong to run an
anytime algorithm, and whento stop and act with
the solution obtained. In this paper we assumethat
agents have a meta-level control procedure in the
form of performance profile trees, based on work
in (Larson &Sandholm200 la).
There is a performanceprofile tree for each valuation problem(one valuation problemper agent).
Figure 1 presents one such tree. The trees are obtained from statistics collected from previous runs
of an algorithm on the valuation problem.The tree
describes howdeliberation (computation) changes
the solution to the valuation problem. Each agent
uses this informationto decide howto allocate its
computingresources at each step in the process,
basedon results of its computingso far.
The trees capture uncertainty that stems from
both randomizedalgorithms and variation of performance on different problem instances. There
are two different types of nodes in the performance
profile tree, solution nodes and randomnodes.
Eachsolution node stores the solution that the algorithm has computedgiven a certain amount of
computation so far. Randomnodes occur whenever
a randomnumberis used to chart the path of the algorithm run. The edges in the tree are labeled with
the probability that after one morestep of computation, the solution returned will be the node found
by following the edge.
Agentsuse the performanceprofile trees to help
in makingdecisions about howto use their computational resources. As agents allocate computational time to an algorithm, the solutions returned
O0
7.O
Figure 1: An agent’s stochastic performanceprofile
tree for a valuation problera~ The diamondshaped
nodes are randomnodes and the round nodes are
solution nodes. At randomnode A, the probability that the randomnumberwill be 0 is P(O), and
the probability that the randomnumberwill be I is
P(1). AT solution node 17,, the edges are labeled
with the probability of reaching each child, given
that node E was reached.
The performanceprofile tree is a fully normative
modelfor deliberation control whichis required for
gametheoretic analysis. It also allows optimal conditioning on manyparameters, including results of
executionso far and on the actual probleminstance.
In the rest of the paper we makethe assumption
that all performance profiles are commonknowledge. This means, that all agents knowwhat all
performanceprofiles look like, and they knowthat
all the agents know.Agentsare allowed to compute
on each others’ problems. Wedo not assume that
agents knowhow their opponents are computing.
46
Strategic
Computing and Bidding
Weconsider two models of computing. In one of
them, computingis free, but there is a deadline for
each agent whenthat agent has to stop computing.
In the other model, the computations do not have
deadlines, but each agent has to pay for the cycles
it consumes. Let T be the time whenthe auction
closes. After that the agent cannot bid or compute valuations. In the modelof limited computing,
each agent has T free computingcycles to use. In
the modelof costly computing,each agent can consumeas manycycles per real-time unit as it wants,
but has to pay a computingcost ca(.).
At every step of the game, each agent can take
a computingaction (the agent can also skip taking a computingaction). Taking a computingaction means allocating one step of computing on
one’s ownvaluation problemor on one of the other
agents’ valuations problems(so as to obtain information about their valuations, which the agent can
use to bid morestrategically to benefit itself). We
say that an agent uses strong strategic computingif
it allocates someof its computingcycles on others’
valuation problems.
At the deadline T, each agent submits one sealed
bid to the Vickreyauction. This bid is the agent’s
bidding strategy. The amount an agent bids dependson the solutions it has obtained for its (and
others’) valuation problemsthrough computing.
It has been shownin earlier workthat the model
of computing(costly or limited) has a significant
impact on what strategies agents mayuse:
Theorem1 Assumethat agents have free but limited computing. Then, in a Vickrey auction, the
bidders have (weakly) dominantstrategies where
they only computeon their own valuation problems
( Larson &Sandholm2001b).
Cost of Selfish
Definition 5 Let o* be the outcomethat is reached
if the global controller dictates computingpolicies
to all agents, andagents are free to bid in the Vickrey auction.
Onthe other extreme, we are interested in what
happens whenagents are free to choose to follow
any computing and bidding strategy. Let NashEq
be the set of Nash equilibria in that game.Wenow
define what is meantby the worst-case Nashequilibrium.
Definition 6 The worst case Nash equilibrium is
NE=
Theorem2 Assumethat agents have unlimited but
costly computing. Then, in a Vickrey auction,
strong strategic computation can occur in strict
Nash equilibrium (Larson & Sandholm2001c).
The Social
right measureto use in the context of computationally boundedagents. Is there an alternative measure?
Instead of looking at efficiency, we propose to
use social welfare as the measure. Wewant to know
howletting agents freely choose their owncomputing strategies impacts the social welfare of the set
of all bidders. In particular, we comparethe highest achievable social welfare to the lowest social
welfare achievable in any Nashequilibrium.
Whenwe determine the highest achievable social welfare we optimistically assumethat there is
a global controller whoimposeseach agent’s computing strategy (so as to maximizesocial welfare).
Thecontroller has full informationabout all performanceprofiles, deadlines, cost functions, and intermediate results of computing,and given this information, specifies exactly howeach agent must use
its computational resources. In the bidding stage
agents are free to bid as they wish, but their goal is
still to maximizetheir ownutility, and so they bid
truthfully in the Vickreyauction, given the valuations they have obtained under the enforced computing policy.
ars~la~hEqill
SW(o(8)).
Weuse the following ratio to see howmuchletting agents choose their owncomputingstrategies
reduces the social welfare.
Definition 7 The miscomputingratio is
Computing
R - SW(o*)
SW(o(NE))
Now,a natural question to ask is whetherthe cost
or limit on computingresources results in a loss
of efficiency. However,efficiency is hard to compare in such settings. The Vickreyauction is efficient in the sense that it alwaysallocates the item to
the bidder with the highest valuation. However,an
agent whomight have been able to obtain the highest valuation via computing,mayhaveused its limited computingon a different problem,thus causing
a different agent to have the highest valuation and
win the auction. This comeis still efficient given
how agents computed, but it overlooks the computational issues in an unsatisfying way. This suggests that Pareto efficiency maynot always be the
This ratio isolates the impact of selfish computing from the traditional strategic bidding behavior
in auctions. This is becausein both the coordinated
and uncoordinated scenario, the agents bid based
on self-interest.
Results
In this next section we present our results in terms
of the miscomputingratio. The first subsection
discusses the general case with limited computing.
The next subsection studies howthe ratio can be
improved when the analyzer has more knowledge.
47
The following subsection studies the general case
with costly computing.The final subsection shows
howthe costs can be adjusted to increase social
welfare.
then the ratio will not be unbounded. Let k be
the difference between the highest possible computed valuation and the second highest possible
computedvaluation. That is
1 max vj (T)]
k = min[max max vi(T) - max
i vi(T)
j~i v~ (T)
General Case with Limited Computing
It turns out that with limited computing,the miscomputingratio can be arbitrarily bad.
Proposition 1 Assume there are n bidders in a
lrtckrey auction, each bidder has free but limited
computing,and the auction closes at time T. Then,
the miscomputing
ratio R can be infinity.
Proof: Assumethat all agents have deterministic
performance profiles. Each agent has a dominant
strategy whichis to deliberate only on its ownvaluation problemuntil the deadline and to submit a
bid equal to the valuation that it has obtained. That
is, agent i submits a bid of vi(T). Withoutloss of
generality, assumethat vt (T) > v2 (T) > vj (T)
for all j ~ 1, 2. In equilibrium, agent 1 will win
the auction and pay an amountof v2 (T). Therefore, agent l’s utility is Ul = Vl (T) - v2 (T).
Ul = e. The utility for all other agents is ui = 0
for i ~ 1. Therefore,
under the constraint that vi(T) > vj(T).
amountk is equal to the lowest possible social welfare obtainable if agents computein a selfish manner. If guarantees on the size of k can be madeby
the restriction of performanceprofile trees then the
miscomputingratio can be madefinite.
Proposition 2 Let
k = min[maxmaxvi(T)
i vi(T)
- max max v~(T)]
j¢i vj(T)
for all i,j and all possible values of vi(T) and
vj(T) under the constraint that vi(T) vj(T).
Thenthe miscomputingratio is
R< maxi max
k vi (T)
General Case with Costly Computing
B
If agents have costly unlimited computing, then
they no longer necessarily have dominantstrategies in the Vickrey auction (see Theorem2). Instead, what they do dependson what strategies the
other agents choose. Whenplacing bids, agents
no longer directly bid the valuation that they have
computed.Instead, they shave the bids downwards.
By constructing appropriate cost functions, it
turns out to be possible to emulate the situation
where agents have free computingbut are limited
by deadlines. Thereforeit is not surprising that under certain circumstances the ratio of the maximum
social welfare to the social welfare obtained from
the worst Nash equilibrium can be unbounded.
SW(o(NE)) = ~ uj
j----1
In order to maximizesocial welfare, the global
controller would prohibit all agents expect for
agent 1 to deliberate. Agent 1 would compute
on its valuation problemuntil time T and submit
a bid of Vl (T) while all other agents wouldsubmit a bid of 0. Agent 1 would win the item and
pay an amountof 0. The utility for agent 1 is
Ux = vl(T) - 0 = Vl(T), while ui = 0 for all
i ¢ 1. Therefore
B
SW(o’)= v, .
Proposition 3 Consider a Vickrey auction with n
bidders. Assumethat each bidder i has costly, unlimited computing. Then, the miscomputing ratio
R can be infinity.
j=l
Theratio, R, is
R= SW(o*) = vl(T)
SW(o(NE))
As e -+ 0 (that is, as the difference betweenthe
highest and second highest valuations decreases),
R-r eo.
[7
This is a negative result. Allowingagents to
choosetheir computingstrategies leads to an outcomethat can be arbitrarily far fromoptimal.
Proof: Assumethat each agent i has the following
cost function,ca (t);
ca(t)
l" 0 ift
oo ift
/
< T;
>T.
Eachagent has a dominantstrategy which is to deliberate only on is ownvaluation problemuntil time
T and then submit a bid of vi(T). That is, each
agent behaves as though they have free but limited computingresources with a deadline at time
T. Like in the proof for the free but limited agents,
Bounding the Miscomputing Ratio Under
Limited Computing
However,in manysituations the miscomputingratio will not be unbounded.Even if the performance
profiles are stochastic, as long as the difference betweenthe highest computedvaluation and the second highest computedvaluation is "large enough",
tlf the performance
profiles are stochasticthere may
be multiple valuations that couldbe computed
for each
agent.
48
compute
assumethat the difference betweenthe highest and
secondhighest bids is e and, without loss of generality, assumethat the highest valuation is vl (T).
Then
compute
no
[]
Adjusting the Computing Cost to Increase
Social Welfare
Prior literature has shownthat in Vickreyauctions,
computationally limited agents have no incentive
to use strong strategic computing(i.e., they do
not counterspeculate each other) while agents with
costly computing do (Larson & Sandholm2001c).
This suggests that if there is a systemdesigner who
can control howthe agents’ computationalcapabilities are restricted, the designer should rather impose limits than costs.
However,it turns out that computingcosts can
be adjusted so that the optimal miscomputingratio
(R = 1) is reached. This wouldmeanthat charging
for computingis at least as desirable as imposing
limits.
0, v2(T)-
vl (T)- c,
0,0
vl (T) -
In this examplethe constant c can be madearbitrarily close to zero. Therefore, the maximum
social welfare generated by the global controller in
the costly computingsetting and be madearbitrarily close to the maximum
social welfare obtainable
if computingresources are free.
[]
Related Research
In auctions, computational limitations have been
discussed both as they pertain to bidding agents
and as they pertain to running the auction (the
mechanism).For bounded-rational bidding agents,
Sandholmnoted that under a modelof costly computing, the dominantstrategy property of Vickrey
auctions fails to hold (Sandholm2000). Instead,
an agent’s best computing action can depend on
the other agents. In recent work, auction settings
where agents have hard valuation problems have
been studied (Larson & Sandholm2001c; 2001b;
Parkes 1999). Parkes presented auction design as
a wayto simplify the meta-deliberation problems
of the agent, with the goal of providing incentives for the "right" agents to deliberate for the
"right" amount of time (Parkes 1999). Recently
Larson and Sandholm have been working on incorporating computingactions into agents’ bidding
strategies using a normativemodelof deliberation
control and have focused on equilibrium analysis of different auction settings underdifferent deliberation limitations (Larson &Sandholm2001b;
2001c). While we borrow the deliberation model
from Larson and Sandholm,this paper addresses a
different question from previous work. They investigate the impact of restricted computingcapabilities on agents’ strategies, we look, instead, at what
the impactis at a system-widelevel, present a measure for comparingoverhead in different settings,
and ask if it is possible to place certain bounds
on the overhead added by having resource-bounded
agents.
Proof: Consider the following example. Let there
be 2 agents, agent 1 and agent 2, each with a deterministic performanceprofile. Assumethat both
agents have free but limited computingresources.
Eachagent has a dominantstrategy, whichis to deliberate on their ownproblemand submit a bid of
vi (T). Assumethat vl (T) > v2 (T). The equilibrium outcomeis to award the item to agent 1 and
have agent 1 pay an amountv2 (T). Agentl’s utility is then ul = vl(T) - v2(T) while agent 2’s
utility is u2 = 0. To maximizesocial welfare the
global controller wouldforbid agent 2 to deliberate,
and thus agent 1 could get the item and need not
pay anything. The maximum
social welfare would
be ul = Vl (T). Therefore
vl(T)
vl (T) - v2(T)
Next, consider the case wherea simple cost function is introduced. Define
ca(t) =
no
-c
R-vx(T)-c-1.
Proposition 4 Computing cost functions can be
used to motivate bidders to choosestrategies that
maximizesocial welfare.
R ----
v2(T),
Table 1: Normal form game. Agent 1 is the row
player and agent 2 is the column player. Each
agent wouldsubmit a bid that is equal to its computed valuation minusthe cost spent to obtain the
valuation.
or not to computeat all. The gamecan be represented in normalform in Table 1.
The sole Nashequilibrium is for agent 1 to compute and submit a bid ofvl (T)-c and for agent 2
not compute. The global controller trying to maximize the social welfare wouldforce each agent to
also follow those strategies. Therefore
R- vl(T)
and as e -~ O, R -~ oo.
’V1 (T)
cift<T;
co if t > T;
for some constant c, 0 < c < v2(T) < vl(T).
Anystrategy that involves deliberating on the other
agent’s valuation problemis dominatedas the computing action incur a cost without improving the
agent’s overall utility. Thus, the remainingstrategies are for the agents to computeonly on their own
valuation problemuntil the cost becomestoo high,
49
There has also been recent workon computationally limited mechanisms.
In particular, research has
focused on the generalized Vickreyauction and has
investigated ways of introducing approximatealgorithms or using heuristics to computeoutcomes
without loosing incentive compatibility (Nisan
Ronen 2000; Kfir-Dahav, Monderer, & Tennenholtz 2000). Our workis different in that it is focused on settings where the agents are computationally limited.
Koutsoupias and Papadimitriou (Koutsoupias
Papadimitriou 1999) first proposed the concept of
worst-case Nash equilibrium. This has been called
the price of anarchy (Papadimitriou 2001). They
focused on a network setting where agents must
decide howmuch traffic to send along paths in
the network. The agents did not have computational limitations. Roughgardenand Tardos studied a different modelof networkrouting using the
same measure as Koutsoupias and Papadimitriou
and obtained tight bounds as to howfar from the
optimal outcomethe agents wouldbe, if allowed to
send traffic as they wished (Roughgarden&Tardos
2000).
Conclusions
Auctionsare useful mechanism
for allocating items
(goods, tasks, resources, etc.) in multiagent systems. The bulk of auction theory assumesthat the
bidders’ valuations for items are given a priori. In
manyapplications, however, the bidders need to
expendsignificant effort to determinetheir valuations. In this paper we studied computationalbidder agents that can refine their valuations (ownand
others’) using computation. Weborroweda normative modelof deliberation control for this purpose.
Wefocused on the Vickrey auction where bidding truthfully is a dominantstrategy in the classical model.It wasrecently shownthat this is not the
case for computationallyrestricted agents. In this
paper we introduced a way of measuring the negative impact of agents choosing computingstrategies selfishly. Our miscomputingratio compares
the social welfare obtainable if a global controller
enforces computingpolicies designed to maximize
social welfare (but does not imposebidding strategies), to the social welfare that is obtained in the
worst Nashequilibrium. This measureisolates the
effect of selfish computingfromthat of selfish bidding.
Weshowed that under both limited computing
and costly computing,the outcomecan be arbitrarily far worse than in the case wherecomputations
are coordinated. However, under reasonable assumptions on howlimited computingchanges valuations, boundscan be obtained. Finally, we showed
that by carefully designing computingcost functions, it is possible to provide appropriate incentives for bidders to choosecomputingpolicies that
result in the optimal social welfare. This suggests
(unlike earlier results) that, if there is a systemdesigner that can choosehowto restrict the agents’
computing, imposing costs instead of limits may
be the fight approach.
Ackowledgments
This material is based upon work supported by
the National Science Foundation under CAREER
Award1RI-9703122, Grant IIS-9800994, and ITR
IIS-0081246.
References
Boddy, M., and Dean, T. 1994. Deliberation scheduling for problem solving in timeconstrained environments.Artificial Intelligence
67:245-285.
Kfir-Dahav, N.; Monderer, D.; and Tennenholtz,
M. 2000. Mechanism design for resource
bounded agents. In Proceedings ICMAS-2000.
Koutsoupias, E., and Papadimitriou, C. 1999.
Worst-case equilibria. In Symposiumon Theoretical Aspects in ComputerScience.
Larson, K., and Sandholm, T. 2001a. Bargaining with limited computation: Deliberation equilibrium. Artificial Intelligence 132(2):183-217.
Larson, K., and Sandholm, T. 200lb. Computationally limited agents in auctions. In AGENTS-01
Workshopof Agents for B2B, 27-34.
Larson, K., and Sandholm,T. 2001c. Costly valuation computationin auctions. In TARKVIII, 169182.
Nisan, N., and Ronen, A. 2000. Computationally
feasible VCGmechanisms.In Proceedings of the
ACMConference on Electronic Commerce,242252.
Papadimitriou, C. 2001. Algorithms, games and
the Internet. In Proceedings of the 33rd Annual
ACMSymposium on the Theory of Computing,
749-253.
Parkes, D.C. 1999. Optimal auction design
for agents with hard valuation problems. In
Agent-Mediated Electronic CommerceWorkshop,
IJCAI-99.
Perisco, N. 2000. Informationacquisition in auctions. Econometrica68(1):135-148.
Roughgarden,T., and Tardos, 1~. 2000. Howbad
is selfish routing? In Proceedingsof the 41st Annual IEEE Symposium on Foundations of Computer Science.
Sandholm, T. 1993. An implementation of the
contract net protocol based on marginal cost calculations. In AAAI-1993,256-262.
Sandholm,T. 2000. Issues in computationalVickrey auctions. International Journal of Electronic
Commerce4(3): 107-129.
50