<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Obvious strategyproofness needs monitoring for good approximations (extended abstract)?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diodato Ferraioli</string-name>
          <email>dferraioli@unisa.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Carmine Ventre</string-name>
          <email>carmine.ventre@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CSEE, University of Essex</institution>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>DIEM, Universita degli Studi di Salerno</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Obvious strategyproofness (OSP) is an appealing concept as it allows to maintain incentive compatibility even in the presence of agents that are not fully rational, e.g., those who struggle with contingent reasoning [10]. However, it has been shown to impose some limitations, e.g., no OSP mechanism can return a stable matching [3]. We here deepen the study of the limitations of OSP mechanisms by looking at their approximation guarantees for basic optimization problems paradigmatic of the area, i.e., machine scheduling and facility location. We prove a number of bounds on the approximation guarantee of OSP mechanisms, which show that OSP can come at a signi cant cost. However, rather surprisingly, we prove that OSP mechanisms can return optimal solutions when they use monitoring | a mechanism design paradigm that introduces a mild level of scrutiny on agents' declarations [9].</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Algorithmic Mechanism Design (AMD) is by now an established research area in
computer science that aims at conceiving algorithms resistant to sel sh
manipulations. As the number of parties (a.k.a., agents) involved in the computation
increases, there is, in fact, the need to realign their individual interests with the
designer's. Truthfulness is the chief concept to achieve that: in a truthful
mechanism, no sel sh and rational agent has an interest to misguide the mechanism.
A question of recent interest is, however, how easy it is for the sel sh agents to
understand that it is useless to strategize against the truthful mechanism.</p>
      <p>
        Recent research has come up with di erent approaches to deal with this
question. Some authors [
        <xref ref-type="bibr" rid="ref1 ref14 ref4 ref6">14, 4, 6, 1</xref>
        ] suggest to focus on \simple" mechanisms;
an orthogonal approach is that of veri ably truthful mechanisms [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], wherein
agents can run some algorithm to e ectively check that the mechanism is
incentive compatible. Li [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] has recently formalized the aforementioned idea of
simple mechanisms, by introducing the concept of Obviously Strategy-Proof (OSP)
mechanisms. This notion stems from the observation that the very same
mechanism can be more or less truthful in practice depending on the implementation
details. For example, in lab experiments, Vickrey's famous second-price
mechanism results to be \less" truthful when implemented via a sealed-bid auction,
? An extended version appeared at AAAI [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. D. Ferraioli was supported by \GNCS
{ INdAM". C. Ventre was supported by the EPSRC grant EP/M018113/1.
and \more" truthful when run via an ascending auction. The quite technical
de nition of OSP formally captures how implementation details matter by
looking at a mechanism as an extensive-form game; roughly speaking, OSP demands
that strategy-proofness holds among subtrees of the game (see below for a
formal de nition). An important validation for the `obviousness' is further provided
by Li [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] via a characterization of these mechanisms in terms of agents with
limited cognitive abilities (i.e., agents with limited skills in contingent
reasoning). Speci cally, Li shows that a strategy is obviously dominant if and only if
these \limited" agents can recognize it as such. Nevertheless, the notion of OSP
mechanisms might be too restrictive. E.g., Ashlagi and Gonczarowski [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] prove
that no OSP mechanism can return a stable matching { thus implying that the
Gale-Shapley matching algorithm is not OSP despite its apparent simplicity.
Our contribution. We investigate the power of OSP mechanisms in more
detail from a theoretical computer science perspective. In particular, we want to
understand the quality of approximate solutions that can be output by OSP
mechanisms. To answer this question, we focus on two fundamental optimization
problems, machine scheduling [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and facility location [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], arguably (among) the
paradigmatic problems in algorithmic mechanism design.
      </p>
      <p>
        For the former problem, we want to compute a schedule of jobs on
selfish related machines so to minimize the makespan. For this single-dimensional
problem, it is known that a truthful PTAS is possible [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In contrast, we show
that there is no better than 2-approximate OSP mechanism for this problem
independently from the running time of the mechanism.
      </p>
      <p>
        For the facility location problem, we want to determine the location of a
facility on the real line given the preferred locations of n agents. The objective
is to minimize the social cost, de ned as the sum of the individual agents'
distances between their preferred location and the facility's. Moulin [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] proves that
the optimal mechanism, that places the facility on the median of the reported
locations, is truthful. OSP mechanisms turn out to be much weaker than that.
We prove in fact a tight bound of n 1.
      </p>
      <p>
        However, a surprising connection of OSP mechanisms with a novel mechanism
design paradigm { called monitoring { allows us to prove strong positive results.
Building upon the notion of mechanisms with veri cation [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ], Kovacs et al.
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] introduce the idea that a mechanism can check the declarations of the agents
at running time and guarantee that those who overreported their costs end up
paying the exaggerated costs. This can be enforced whenever costs can be easily
measured and certi ed. For example, a mechanism can force a machine that in
her declaration has augmented her running time to work that long by keeping
her idle for the di erence between real and reported running time.
      </p>
      <p>
        We prove that, for machine scheduling, there is an optimal OSP mechanism
with monitoring. The construction of this mechanism can use any algorithm for
the problem as a black box, thus implying that there is PTAS that is OSP. Our
construction is based upon the rst-price (truthful) mechanism (with
monitoring) recently designed in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Our results e ectively show how it is possible to
modify this mechanism to allow OSP implementations.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>Mechanisms and strategy-proofness. In this work we consider a classical
mechanism design setting, in which we have a set of outcomes O and n sel sh agents.
Each agent i has a type ti 2 Di, where Di is de ned as the domain of i. The
type ti is private knowledge of agent i. Moreover, each sel sh agent i has a cost
function ci : Di O ! R. For ti 2 Di and X 2 O, ci(ti; X) is the cost paid by
agent i to implement X when her type is ti.</p>
      <p>A mechanism consists of a protocol whose goal is to determine an outcome
X 2 O. To this aim, the mechanism is allowed to interact with agents. During
this interaction, agent i is observed to take actions; these actions may depend
on her presumed type bi 2 Di that can be di erent from the real type ti. We
say that agent i takes actions according to bi to stress this. For a mechanism M,
we let M(b) denote the outcome returned by the mechanism when agents take
actions according to their presumed types b. Usually, this outcome is given by
a pair (f; p), where f = f (b) (termed social choice function) maps the actions
taken by the agents according to b to a feasible solution for the problem at the
hand, and p = (p1(b); : : : ; pn(b)) 2 Rn maps the actions taken by the agents
according to b to payments from the mechanism to each agent i.</p>
      <p>A mechanism M is strategy-proof if for every i, every b i and every bi 2 Di,
it holds that ci(ti; M(ti; b i)) ci(ti; M(bi; b i)), where ti is the true type of
i. That is, in a strategy-proof mechanism the actions taken according to the true
type are dominant for each agent. Moreover, a mechanism M satis es voluntary
participation if for every i and every b i, it holds that ci(ti; M(ti; b i)) 0.
Obvious strategyproofness. An extensive-form mechanism M is de ned by a
directed tree T = (V; E) such that: (i) every leaf ` of the tree is labeled by a
possible outcome X(`) 2 O of the mechanism; (ii) every internal vertex u 2 V
is labeled by a subset S(u) [n] of agents; (iii) every edge e = (u; v) 2 E is
labeled by a subset T (e) D of type pro les such that:
{ the subsets of pro les that label the edges outgoing from the same vertex u
are disjoint, i.e., for every triple of vertices u; v; v0 such that (u; v) 2 E and
(u; v0) 2 E, we have that T (u; v) \ T (u; v0) = ;;
{ the union of the subsets of pro les that label the edges outgoing from a
nonroot vertex u is equal to the subset of pro les that label the edge going in
u, i.e., Sv : (u;v)2E T (u; v) = T ( (u); u), where (u) is the parent of u in T ;
{ the union of the subsets of pro les that label the edges outgoing from the
root vertex r is equal to the set of all pro les, i.e., Sv : (r;v)2E T (r; v) = D;
{ for every u; v such that (u; v) 2 E and every two pro les b; b0 2 T ( (u); u)
such that (bi)i2S(u) = (b0i)i2S(u), if b belongs to T (u; v), then also b0 must
belong to T (u; v).</p>
      <p>Observe that, according to the de nition above, for every pro le b there is
only one leaf ` = `(b) such that b belongs to T ( (`); `). For this reason we say
that M(b) = X(`). Moreover, for every type pro le b and every node u 2 V ,
we say that b is compatible with u if b 2 T ( (u); u). Finally, two pro les b, b0
are said to diverge at vertex u if there are two vertices v; v0 such that (u; v) 2 E,
(u; v0) 2 E and b 2 T (u; v), whereas b0 2 T (u; v0).</p>
      <p>An extensive-form mechanism M is obviously strategy-proof (OSP) if for
every agent i, for every vertex u such that i 2 S(u), for every b i; b0 i, and for
every bi 2 Di such that (ti; b i) and (bi; b0 i) are compatible with u, but diverge
at u, it holds that ci(ti; M(ti; b i)) ci(ti; M(bi; b0 i)).</p>
      <p>Monitoring. Let M(b) denote the outcome returned by mechanism M = (f; p)
when agents take actions according to b. Commonly, the cost paid by agent i
to implement M(b) is de ned as a quasi-linear combination of agent's true cost
ti(f (b)) and payment pi(b), i.e., ci(ti; M(b)) = ti(f (b)) pi(b). This approach
disregards the agent's declaration for evaluating her cost.</p>
      <p>
        In mechanisms with monitoring the usual quasi-linear de nition is maintained
but costs paid by the agents are more strictly tied to their declarations [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
Specifically, in a mechanism with monitoring M, the bid bi is a lower bound on agent i's
cost for f (bi; b i), so an agent is allowed to have a real cost higher than bi(f (b))
but not lower. Formally, we have ci(ti; M(b)) = maxfti(f (b)); bi(f (b))g pi(b).
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Machine scheduling</title>
      <p>We are given a set of m di erent jobs to execute and the n agents control related
machines. That is, agent i has a job-independent processing time ti per unit of
job (equivalently, an execution speed 1=ti that is independent from the actual
jobs). Therefore, the social choice function f must choose a possible schedule
f (b) = (f1(b); : : : ; fn(b)) of jobs to the machines, where fi(b) denotes the job
load assigned to machine i when agents take actions according to b. The cost
that agent i faces for the schedule f (b) is ti(f (b)) = ti fi(b). Note that our
mechanisms for machine scheduling will always pay the agents.</p>
      <p>For this setting, monitoring means that those agents who have exaggerated
their unitary processing time, i.e., they take actions according to bi &gt; ti, can be
made to process up to time bi instead of the true processing time ti. E.g., we
could not allow any operation in the time interval [ti; bi] or charge bi ti.</p>
      <p>We focus on social choice functions f optimizing the makespan, i.e., f (b) 2
arg minx mc(x; b), where mc(x; b) = maxin=1 bi(x). We have the following results.
Theorem 1. For every " &gt; 0, there is no (2 ")-approximate mechanism for
the machine scheduling problem that is OSP without monitoring and satis es
voluntary participation.</p>
      <p>Theorem 2. For every -approximate algorithm f for the machine scheduling
problem on related machines there is an -approximate mechanism for the same
problem that is OSP with monitoring and satis es voluntary participation.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Facility location</title>
      <p>In the facility location problem, the type ti of each agent consists of her position
on the real line. The social choice function f must choose a position f (b) 2 R for
the facility. The cost that agent i pays for a chosen position f (b) is ti(f (b)) =
d(ti; f (b)) = jti f (b)j. So, ti(f (b)) denotes the distance between ti and the
location of the facility computed by f when agents take actions according to b.</p>
      <p>We can implement monitoring also in this setting whenever evidences of the
distance can be provided (and cannot be counterfeited). In fact, in this context,
monitoring means that ti(f (b)) = maxfd(ti; f (b)); d(bi; f (b))g. Therefore, once
the evidence is provided, the mechanism can check whether ti(f (b)) &lt; bi(f (b))
and charge the agent the di erence for cheating.</p>
      <p>We focus on optimizing the social cost, i.e., f (b) 2 arg minx2R cost(x; b),
where cost(x; b) = Pn</p>
      <p>i=1 bi(x). We have the following results.</p>
      <p>Theorem 3. For every " &gt; 0, there is no (n 1 ")-approximate mechanism
for the facility location problem that is OSP without monitoring.
Theorem 4. There is a (n 1)-approximate mechanism for the facility location
problem that is OSP, even without monitoring.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Adamczyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borodin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferraioli</surname>
          </string-name>
          , D.,
          <string-name>
            <surname>de Keijzer</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leonardi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Sequential posted price mechanisms with correlated valuations</article-title>
          .
          <source>In: WINE '15</source>
          . pp.
          <volume>1</volume>
          {
          <issue>15</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Archer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tardos</surname>
          </string-name>
          , E.:
          <article-title>Truthful mechanisms for one-parameter agents</article-title>
          .
          <source>In: FOCS '01</source>
          . pp.
          <volume>482</volume>
          {
          <issue>491</issue>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Ashlagi</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gonczarowski</surname>
            ,
            <given-names>Y.A.</given-names>
          </string-name>
          :
          <article-title>No stable matching mechanism is obviously strategy-proof</article-title>
          .
          <source>arXiv preprint arXiv:1511.00452</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Babaio</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Immorlica</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lucier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weinberg</surname>
            ,
            <given-names>S.M.:</given-names>
          </string-name>
          <article-title>A simple and approximately optimal mechanism for an additive buyer</article-title>
          .
          <source>In: FOCS '14</source>
          . pp.
          <volume>21</volume>
          {
          <issue>30</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Bra^nzei,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Procaccia</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.D.</surname>
          </string-name>
          :
          <article-title>Veri ably truthful mechanisms</article-title>
          .
          <source>In: ITCS '15</source>
          . pp.
          <volume>297</volume>
          {
          <issue>306</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Chawla</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hartline</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malec</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sivan</surname>
            ,
            <given-names>B.:</given-names>
          </string-name>
          <article-title>Multi-parameter mechanism design and sequential posted pricing</article-title>
          .
          <source>In: STOC '10</source>
          . pp.
          <volume>311</volume>
          {
          <issue>320</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Christodoulou</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovacs</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A deterministic truthful PTAS for scheduling related machines</article-title>
          .
          <source>SIAM J. Comput</source>
          .
          <volume>42</volume>
          (
          <issue>4</issue>
          ),
          <volume>1572</volume>
          {
          <fpage>1595</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ferraioli</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ventre</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Obvious strategyproofness needs monitoring for good approximations</article-title>
          .
          <source>In: AAAI '17</source>
          . pp.
          <volume>516</volume>
          {
          <issue>522</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kovacs</surname>
          </string-name>
          , A., Meyer, U.,
          <string-name>
            <surname>Ventre</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Mechanisms with monitoring for truthful ram allocation</article-title>
          .
          <source>In: WINE '15</source>
          . pp.
          <volume>398</volume>
          {
          <issue>412</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Obviously strategy-proof mechanisms</article-title>
          .
          <source>Available at SSRN</source>
          <volume>2560028</volume>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Moulin</surname>
          </string-name>
          , H.:
          <article-title>On strategy-proofness and single-peakedness</article-title>
          .
          <source>Public Choice</source>
          <volume>35</volume>
          ,
          <issue>437</issue>
          {
          <fpage>455</fpage>
          (
          <year>1980</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Nisan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ronen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Algorithmic Mechanism Design</article-title>
          .
          <source>Games and Economic Behavior</source>
          <volume>35</volume>
          ,
          <issue>166</issue>
          {
          <fpage>196</fpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Penna</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ventre</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Optimal collusion-resistant mechanisms with veri cation</article-title>
          .
          <source>Games and Economic Behavior</source>
          <volume>86</volume>
          ,
          <issue>491</issue>
          {
          <fpage>509</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Sandholm</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gilpin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Sequences of take-it-or-leave-it o ers: Near-optimal auctions without full valuation revelation</article-title>
          . In: International Workshop on AgentMediated Electronic Commerce. pp.
          <volume>73</volume>
          {
          <issue>91</issue>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. Sera no,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Ventre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Vidali</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Towards a characterization of budget-feasible mechanisms with monitoring (</article-title>
          <year>2017</year>
          ), submitted
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>