Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

37
Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University

Transcript of Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Page 1: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auctioning one item

Tuomas SandholmComputer Science Department

Carnegie Mellon University

Page 2: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auctions• Methods for allocating goods, tasks, resources...• Participants: auctioneer, bidders• Enforced agreement between auctioneer & winning bidder(s)• Easily implementable e.g. over the Internet

– Many existing Internet auction sites• Auction (selling item(s)): One seller, multiple buyers

– E.g. selling a bull on eBay

• Reverse auction (buying item(s)): One buyer, multiple sellers– E.g. procurement

• We will discuss the theory in the context of auctions, but same theory applies to reverse auctions – at least in 1-item settings

Page 3: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auction settings

• Private value : value of the good depends only on the agent’s own preferences– E.g. cake which is not resold or showed off

• Common value : agent’s value of an item

determined entirely by others’ values– E.g. treasury bills

• Correlated value : agent’s value of an item

depends partly on its own preferences & partly

on others’ values for it– E.g. auctioning a transportation task when

bidders can handle it or reauction it to others

Page 4: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auction protocols: English (first-price open-cry = ascending)

• Protocol: Each bidder is free to raise his bid. When no bidder is willing to raise, the auction ends, and the highest bidder wins the item at the price of his bid

• Strategy: Series of bids as a function of agent’s private value, his prior estimates of others’ valuations, and past bids

• Best strategy: In private value auctions, bidder’s ex post equilibrium strategy is to always bid a small amount more than current highest bid, and stop when his private value price is reached– No counterspeculation, but long bidding process

• Variations– In correlated value auctions, auctioneer often increases price at

a constant rate or as he thinks is appropriate– Open-exit: Bidder has to openly declare exit without re-entering

possibility => More info to other bidders about the agent’s valuation

Page 5: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auction protocols: First-price sealed-bid

• Protocol: Each bidder submits one bid without knowing others’ bids. The highest bidder wins the item at the price of his bid– Single round of bidding

• Strategy: Bid as a function of agent’s private value and his prior estimates of others’ valuations

• Best strategy: No dominant strategy in general– Strategic underbidding & counterspeculation– Can determine Nash equilibrium strategies via

common knowledge assumptions about the probability distributions from which valuations are drawn

Page 6: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Strategic underbidding in first-price sealed-bid auction

Example 1

N risk-neutral bidders

Common knowledge that their values are drawn independently, uniformly in [0, vmax]

Claim: In symmetric Nash equilibrium, each bidder i bids bi = b(vi) = vi

(N-1) / N

Proof. First divide all bids by vmax so bids were in effect drawn from [0,1]. We show that an arbitrary agent, agent 1, is motivated to bid b1 = b(v1) = v1 (N-1) / N given that others bid b(vi) = vi (N-1) / N

Prob{b1 is highest bid} = Pr{b1 > b2} … Pr{b1 > bN}

= Pr{b1 > v2 (N-1)/N} … Pr{b1 > vN (N-1)/N}

= Pr{b1 > v2 (N-1)/N)}N-1 = Pr{b1 N / (N-1) > v2}N-1 = (b1 N / (N-1))N-1

E[u1|b1] = (v1-b1) Prob{b1 is highest bid} = (v1-b1) (b1 N / (N-1))N-1

dE[u1|b1] / db1 = (N/(N-1))N-1 (-N b1N-1 + v1 (N-1) b1

N-2) = 0

<=> N b1N-1 = v1 (N-1) b1

N-2 | divide both sides by b1N-2 0

N b1 = v1 (N-1)

<=> b1 = v1 (N-1) / N ■

Page 7: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Strategic underbidding in first-price sealed-bid auction…

• Example 2– 2 risk-neutral bidders: A and B– A knows that B’s value is 0 or 100 with

equal probability– A’s value of 400 is common knowledge– In Nash equilibrium, B bids either 0 or

100, and A bids 100 + (winning more important than low price)

Page 8: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auction protocols: Dutch (descending)

• Protocol: Auctioneer continuously lowers the price until a bidder takes the item at the current price

• Strategically equivalent to first-price sealed-bid protocol in all auction settings

• Strategy: Bid as a function of agent’s private value and his prior estimates of others’ valuations

• Best strategy: No dominant strategy in general– Lying (down-biasing bids) & counterspeculation– Possible to determine Nash equilibrium strategies

via common knowledge assumptions regarding the probability distributions of others’ values

– Requires multiple rounds of posting current price• Dutch flower market, Ontario tobacco auction, Filene’s

basement, Waldenbooks

Page 9: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Dutch (Aalsmeer) flower auction

Page 10: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auction protocols: Vickrey (= second-price sealed bid)

• Protocol: Each bidder submits one bid without knowing (!) others’ bids. Highest bidder wins item at 2nd highest price

• Strategy: Bid as a function of agent’s private value & his prior estimates of others’ valuations

• Best strategy: In private value auctions with risk neutral bidders, weakly dominant strategy is to bid one’s true valuation. (Also, in this setting, outcome is the same as in English auction.)– No counterspeculation– Independent of others’ bidding plans, operating

environments, capabilities...– Single round of bidding

• Widely advocated for computational multiagent systems• Old [Vickrey 1961], but not widely used among humans• Revelation principle --- proxy bidder agents on

www.ebay.com, www.webauction.com, www.onsale.com

Page 11: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Vickrey auction is a special case of Clarke tax mechanism

• Who pays?– The bidder who takes the item away from the

others (makes the others worse off)– Others pay nothing

• How much does the winner pay?– The declared value that the good would have

had for the others had the winner stayed home = second highest bid

Page 12: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Results for private value auctions

• Dutch strategically equivalent to first-price sealed-bid

• Risk neutral agents => Vickrey outcome same as English

• All four protocols allocate item efficiently – (assuming no reservation price for the auctioneer)

• English & Vickrey have truthful (ex post or weakly dominant) strategies => no effort wasted in counterspeculation

• Which of the four auction mechanisms gives highest expected revenue to the seller?– Assuming valuations are drawn iid & agents are risk-neutral

• The four mechanisms have equal expected revenue!

Page 13: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

More generally: revenue equivalence [version from Nisan’s review book chapter in the book Algorithmic Game

Theory]

Page 14: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Page 15: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Revenue equivalence holds also for non-private values settings

(settings with signals) as long as the setting is symmetric

[see, e.g., Krishna: “Auction Theory”]

Page 16: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Revenue equivalence ceases to hold if agents are not risk-neutral

• Risk averse bidders: – Dutch, first-price sealed-bid ≥ Vickrey, English– Reason: in the former two auctions, the bidder can “insure” himself

by bidding more than a risk-neutral bidder• Risk averse auctioneer:

– Dutch, first-price sealed-bid ≤ Vickrey, English– Reason: in the latter two, the seller gets the 2nd-highest valuation, while

in the former he only gets the expectation of the 2nd-highest valuation

Page 17: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Revenue equivalence ceases to hold if agents have budget

constraints

• Prop. In Vickrey auction, the dominant strategy is: bidi = min{vi, budgeti}

• Thm. In 1st-price auction, if there is an equilibrium of the form bidi=min{b(vi), budgeti}, then the expected revenue is higher than in the Vickrey auction

Page 18: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Revenue equivalence might not hold between 1st and 2nd-price auctions

if distributions are asymmetric• E.g., where 2nd-price auction yields higher expected revenue:

– Bidder 1’s valuation is 2; Bidder 2’s valuation is 0 or 2 with equal probability– Expected revenue under 2nd-price auction is 2 * ½ = 1– In 1st-price auction,

• Bidder 1 can guarantee expected payoff 1 by bidding ε; bidding above 1 would yield expected payoff <1; so he will not bid more than 1

• If Bidder 2 bids 1+ε he gets expected payoff ½ (2 – (1+ε)) = ½ - ε. So her ex ante expected payoff is at least ½

• Since the sum of the bidders’ payoffs is at least 1.5, the auctioneer’s expected revenue can be at most 1/2

• There are also settings where the 1st-price auction yields more expected revenue than the 2nd-price auction

– For an example, see Chapter 4.3 of the book “Auction Theory”, by Krishna, Academic Press, 2002

• Q: But what about the revenue equivalence theorem?• A: 2nd-price auction still efficient, 1st-price auction may not be

– Thus the allocation probabilities differ, and thus revenue equivalence theorem doesn’t apply

Page 19: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Revenue-maximizing (aka optimal) auction for private values setting

[see Section 13.2 of “Algorithmic Game Theory” for proofs]

• Assume valuations are drawn independently and that they are nonnegative• Def. Virtual valuation ϕi(vi) = vi – (1-Fi(vi)) / fi(vi)

• Def. Virtual surplus ∑i ϕi(vi) xi – c(x)• Thm. The expected revenue of any truthful mechanism equals the expected

virtual surplus• Thm. Virtual surplus maximization is truthful iff for all i, ϕi(vi) is monotone

nondecreasing in vi – Sufficient condition for this is monotone hazard rate f(z) / (1-F(z))

• This leads to the Myerson auction [Myerson 1981]:– Run Vickrey auction on virtual valuations (instead of valuations)– If highest virtual valuation > 0, then

• allocate to that agent (otherwise to noone)• that agent pays the lowest valuation that he could have revealed and still won• others pay nothing

– Otherwise the seller keeps the item and no payments are made

• What does this look like in the symmetric case?

Page 20: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Results for non-private value auctions

• Dutch strategically equivalent to first-price sealed-bid• Vickrey not equivalent to English• Winner’s curse

– Common value auctions:

– Agent should lie (bid low) even in Vickrey & English Revelation to proxy bidders?

• Model:– Signals can be correlated (joint distribution not a product distribution)– Affiliated signals: if a subset of the signals X1…XN is large, then it is more

likely that the rest of them are large – Symmetric model means

• signals Xi drawn from same interval, and • vi(X) = u(Xi,X-i), where u is symmetric in the last n-1 components

• Thrm (revenue non-equivalence ). Consider symmetric model with at least 2 bidders. Let signals be affiliated. Expected revenues: English ≥ Vickrey ≥ Dutch = first-price sealed bid

˜ v 1 E[v | ˆ v 1,b(ˆ v 2 ) b( ˆ v 1 ),...,b( ˆ v N ) b(ˆ v 1)]

Page 21: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Results for non-private value auctions...• Symmetric equilibria may be inefficient

– Bidder with highest signal wins, but might not have highest valuation

• Def. Single-crossing property:

• Thm. [see Krishna, “Auction Theory”] Consider symmetric model with affiliated signals. Suppose single-crossing property holds. Then 2nd-price, English, and 1st-price auction all have efficient symmetric equilibria– In English auction, efficient equilibrium exists also for 2 asymmetric bidders, but not

necessarily for more than 2– Without single crossing property, no efficient mechanism might exist in asymmetric setting– If single-crossing holds, truth-telling is an efficient ex post equilibrium in VCG mechanism

• Winner pays vi(smallest xi that would have won, x-i)

)()( xxi

j

i

i

x

v

x

v

signal vector

Page 22: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Results for non-private value auctions...

• Informally: “The greater the linkage between a bidder’s own information and how he perceives others will bid, the greater the expected price paid upon winning”

• Let W(z,x) denote the expected price paid by bidder 1 if he is the winning bidder when he receives signal x but bids as if his signal were z, i.e., bids ß(z)

• Let W’(z,x) be the partial derivative of W(z,x) wrt x• Thm. Let A and B be two auctions in which the highest bidder wins and only

he pays a positive amount. Suppose each has a symmetric and increasing equilibrium s.t.– for all x, W’A(x,x) ≥ W’B(x,x), and

– WA(0,0) = WB(0,0) = 0.

• then A’s expected revenue is at least as large as B’s

• Can be applied to show that seller is best off revealing all his information

Revenue ranking (aka linkage) principle

Page 23: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Results for non-private value auctions...

• Common knowledge that auctioneer has private info – Q: What info should the auctioneer release ?

• A: in symmetric setting with affiliated signals, in 1st-price and 2nd-price auction, auctioneer is best off releasing all of it– “No news is worst news”– Mitigates the winner’s curse

• A: among asymmetric bidders, information revelation can decrease revenue in 2nd-price auction – [see Krishna “Auction Theory” p. 115 for an example]

Page 24: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Results for non-private value auctions...

• Asymmetric info among bidders– E.g. 1: auctioning pennies in class– E.g. 2: first-price sealed-bid common value

auction with bidders A, B, C, D• A & B have same good info. C has this & extra

signal. D has poor but independent info• A & B should not bid; D should sometimes

• => “Bid less if more bidders or your info is worse”• Most important in sealed-bid auctions & Dutch

Page 25: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Results for non-private value auctions...

• Impossibility of efficiency if at least one agent has a multi-dimensional signal– Reason:

• if bidder A’s valuation only depends on the sum of his signals, it is impossible to elicit his signals, and

• bidder 2’s valuation might depend on one of A’s signals, so for efficiency it might be necessary to elicit A’s signals

• This impossibility holds even if single-crossing is satisfied• See examples in Krishna book p. 244-245

Page 26: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Vulnerability to bidder collusion[even in private-value auctions]

• v1 = 20, vi = 18 for others

• Collusive agreement for English: e.g. 1 bids 6, others bid 5. Self-enforcing

• Collusive agreement for Vickrey: e.g. 1 bids 20, others bid 5. Self-enforcing

• In first-price sealed-bid or Dutch, if 1 bids below 18, others are motivated to break the collusion agreement

• Need to identify coalition parties

Page 27: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Vulnerability to shills

• Only a problem in non-private-value settings• English & all-pay auction protocols are

vulnerable– Classic analyses ignore the possibility of shills

• Vickrey, first-price sealed-bid, and Dutch are not vulnerable

Page 28: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Vulnerability to a lying auctioneer

• Truthful auctioneer classically assumed• In Vickrey auction, auctioneer can overstate 2nd

highest bid to the winning bidder in order to increase revenue

– Bid verification mechanisms, e.g. cryptographic signatures

– Trusted 3rd party auction servers (reveal highest bid to seller after closing)

• In English, first-price sealed-bid, Dutch, and all-pay, auctioneer cannot lie because bids are public

Page 29: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Auctioneer’s other possibilities• Bidding

– Seller may bid more than his reservation price because truth-telling is not

dominant for the seller even in the English or Vickrey protocol (because

his bid may be 2nd highest & determine the price) => seller may

inefficiently get the item

• In symmetric private-value auctions, the revenue maximizing auction is a Vickrey

auction with a reserve price that is set like this

• (This is a special case of the Myerson auction [Myerson 81])

• I.e., optimal auctions are not Pareto efficient (not surprising in light of Myerson-

Satterthwaite theorem)

• Setting a minimum price

• Refusing to sell after the auction has ended

Page 30: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Undesirable private information revelation

• Agents’ strategic marginal cost information revealed because truthful bidding is a dominant strategy in Vickrey (and English)– Observed problems with subcontractors

• First-price sealed-bid & Dutch may not reveal this info as accurately– Lying– No dominant strategy– Bidding decisions depend on beliefs about others

Page 31: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Untruthful bidding with local uncertainty even in Vickrey

• Uncertainty (inherent or from computation limitations)• Many real-world parties are risk averse• Computational agents take on owners’ preferences• Thm [Sandholm ICMAS-96]. It is not the case that in a

private value Vickrey auction with uncertainty about an agent’s own valuation, it is a risk averse agent’s best (dominant or equilibrium) strategy to bid its expected value– Higher expected utility e.g. by bidding low

Page 32: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Wasteful counterspeculationThrm [Sandholm ICMAS-96, IJEC-00]. In a private value Vickrey auction with uncertainty about an agent’s own valuation, a risk neutral agent’s best (deliberation or information gathering) action can depend on others.

E.g. two bidders (1 and 2) bid for a good.v1 uniform between 0 and 1; v2 deterministic, 0 ≤ v2 ≤ 0.5Agent 1 bids 0.5 and gets item at price v2:

Say agent 1 has the choice of paying c to find out v1. Then agent 1 will bid v1 and get the item iff v1 ≥ v2 (no loss possibility, but c invested)

E[1nopay] v1 v2d

0

1

v1 1

2 v2

v1

pdf

v2

loss gain

1

E[1pay] c v1 v2d

v 2

1

v E[1pay] E[1

nopay] v2 2c

Page 33: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Sniping

= bidding very late in the auction in the hopes that other bidders do not

have time to respondEspecially an issue in electronic auctions with

network lag and lossy communication links

Page 34: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

[from Roth & Ockenfels]

Page 35: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Sniping…

[from Roth & Ockenfels]

Page 36: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Page 37: Auctioning one item Tuomas Sandholm Computer Science Department Carnegie Mellon University.

Conclusions on 1-item auctions

• Nontrivial, but often analyzable with reasonable effort– Important to understand merits & limitations– Unintuitive mechanisms may have better

properties• Vickrey auction induces truth-telling & avoids

counterspeculation (in limited settings)• Myerson auction best for revenue

• Choice of a good auction protocol depends on the setting in which the protocol is used, and the objective