2008
DOI: 10.1613/jair.2500
|View full text |Cite
|
Sign up to set email alerts
|

M-DPOP: Faithful Distributed Implementation of Efficient Social Choice Problems

Abstract: In the efficient social choice problem, the goal is to assign values, subject to side constraints, to a set of variables to maximize the total utility across a population of agents, where each agent has private information about its utility function. In this paper we model the social choice problem as a distributed constraint optimization problem (DCOP), in which each agent can communicate with other agents that share an interest in one or more variables. Whereas existing DCOP algorithms can be easily manipula… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(59 citation statements)
references
References 72 publications
0
59
0
Order By: Relevance
“…While auctions are deemed appropriate for competitive settings where each agent is vying for some resource and is unlikely to reveal its private information to gain an advantage, DCOPs are more appropriate when the agents aim at maximising a system wide objective and might be willing to exchange messages containing some of their private information to do so. Nonetheless, privacy is considered as a crucial issue in DCOP solution techniques and there are approaches that analyse the privacy-eciency tradeo (e.g., [112]) or propose the use of DCOPs for issues related to mechanism design, such as devising a faithful distributed implementation for ecient social choice (e.g., [113]). These approaches lead toward interesting research directions where DCOPs could be used as ecient tools for resource allocation problems that are typically solved by using auctions.…”
Section: Discussionmentioning
confidence: 99%
“…While auctions are deemed appropriate for competitive settings where each agent is vying for some resource and is unlikely to reveal its private information to gain an advantage, DCOPs are more appropriate when the agents aim at maximising a system wide objective and might be willing to exchange messages containing some of their private information to do so. Nonetheless, privacy is considered as a crucial issue in DCOP solution techniques and there are approaches that analyse the privacy-eciency tradeo (e.g., [112]) or propose the use of DCOPs for issues related to mechanism design, such as devising a faithful distributed implementation for ecient social choice (e.g., [113]). These approaches lead toward interesting research directions where DCOPs could be used as ecient tools for resource allocation problems that are typically solved by using auctions.…”
Section: Discussionmentioning
confidence: 99%
“…In this case, the system designer will typically seek to set up the system in such way that it nevertheless guarantees certain desirable properties, but without directly interfering in the negotiation process itself. Similar considerations have led to research areas such as distributed constraint optimisation [14] or distributed mechanism design [25,26]. In this paper, we further analyse a framework for distributed negotiation over indivisible resources recently investigated by a number of authors [4,12,13,29,30].…”
Section: Introductionmentioning
confidence: 87%
“…Note that this honesty assumption does not mean that all agents are assumed to faithfully report their true constraints to the algorithm; they may be tempted to strategize by reporting slightly different constraints, hoping that this would lead the algorithm to select a solution to the problem that they deem preferable to them. This issue of incentive-compatibility has been addressed in related work such as by Petcu, Faltings, and Parkes (2008), and is orthogonal to the issue of privacy addressed in this paper. Furthermore, an agent would take a risk in reporting constraints different from its true constraints: reporting relaxed constraints could yield a solution that violates its true constraints and would therefore not be viable, while reporting tighter constraints could make the overall problem infeasible and the algorithm fail to find any solution at all.…”
Section: Four Types Of Private Informationmentioning
confidence: 96%