TY - GEN
T1 - Beyond quasi-linear utility
T2 - 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2008
AU - Sakurai, Yuko
AU - Saito, Yasumasa
AU - Iwasaki, Atsushi
AU - Yokoo, Makoto
N1 - Copyright:
Copyright 2009 Elsevier B.V., All rights reserved.
PY - 2008
Y1 - 2008
N2 - We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder has quasi-linear utility. However, in practice, a bidder might have some kind of financial condition including budget constraints. The Vickrey-Clarke-Groves (VCG) protocol is designed to be truthful under the quasi-linear assumption and will break down if this assumption does not hold. We show with a simple modification, the VCG can handle non-quasi-linear utilities. However, there are possibilities that the modified VCG sacrifices significant efficiency loss, since it only uses the gross utilities for determining tentative allocation and payments. Also, it has been shown that the VCG is vulnerable to a false-name bid which is a new type of cheating on the Internet. To improve efficiency without collecting the entire utility functions and guarantee falsename-proofness, we develop a false-name-proof open ascending auction protocol.
AB - We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder has quasi-linear utility. However, in practice, a bidder might have some kind of financial condition including budget constraints. The Vickrey-Clarke-Groves (VCG) protocol is designed to be truthful under the quasi-linear assumption and will break down if this assumption does not hold. We show with a simple modification, the VCG can handle non-quasi-linear utilities. However, there are possibilities that the modified VCG sacrifices significant efficiency loss, since it only uses the gross utilities for determining tentative allocation and payments. Also, it has been shown that the VCG is vulnerable to a false-name bid which is a new type of cheating on the Internet. To improve efficiency without collecting the entire utility functions and guarantee falsename-proofness, we develop a false-name-proof open ascending auction protocol.
UR - http://www.scopus.com/inward/record.url?scp=62949109516&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=62949109516&partnerID=8YFLogxK
U2 - 10.1109/WIIAT.2008.217
DO - 10.1109/WIIAT.2008.217
M3 - Conference contribution
AN - SCOPUS:62949109516
SN - 9780769534961
T3 - Proceedings - 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2008
SP - 417
EP - 423
BT - Proceedings - 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2008
Y2 - 9 December 2008 through 12 December 2008
ER -