SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
Auctions
CS 886
Sept 29, 2004
Auctions
• Methods for allocating goods, tasks, resources...
• Participants: auctioneer, bidders
• Enforced agreement between auctioneer & winning bidder(s)
• Easily implementable e.g. over the Internet
– Many existing Internet auction sites
• Auction (selling item(s)): One seller, multiple buyers
– E.g. selling a bull on eBay
• Reverse auction (buying item(s)): One buyer, multiple sellers
– E.g. procurement
• We will discuss the theory in the context of auctions, but same
theory applies to reverse auctions
– at least in 1-item settings
Auction settings
• Private value : value of the good depends only on
the agent’s own preferences
– E.g. cake which is not resold or showed off
• Common value : agent’s value of an item
determined entirely by others’ values
– E.g. treasury bills
• Correlated value : agent’s value of an item depends
partly on its own preferences & partly on others’
values for it
– E.g. auctioning a transportation task when
bidders can handle it or reauction it to others
Auction protocols: All-pay
• Protocol: Each bidder is free to raise his bid. When no
bidder is willing to raise, the auction ends, and the highest
bidder wins the item. All bidders have to pay their last bid
• Strategy: Series of bids as a function of agent’s private
value, his prior estimates of others’ valuations, and past bids
• Best strategy: ?
• In private value settings it can be computed (low bids)
• Potentially long bidding process
• Variations
– Each agent pays only part of his highest bid
– Each agent’s payment is a function of the highest bid of
all agents
• E.g. CS application: tool reallocation [Lenting&Braspenning ECAI-94]
The 4 common auctions
• English auction
• First price sealed bid
• Dutch auction
• Second price, sealed bid (Vickrey)
Auction protocols: English
(first-price open-cry = ascending)
• Protocol: Each bidder is free to raise his bid. When no bidder is
willing to raise, the auction ends, and the highest bidder wins the
item at the price of his bid
• Strategy: Series of bids as a function of agent’s private value, his
prior estimates of others’ valuations, and past bids
• Best strategy: In private value auctions, bidder’s dominant strategy
is to always bid a small amount more than current highest bid, and
stop when his private value price is reached
– No counterspeculation, but long bidding process
• Variations
– In correlated value auctions, auctioneer often increases price at
a constant rate or as he thinks is appropriate
– Open-exit: Bidder has to openly declare exit without re-entering
possibility => More info to other bidders about the agent’s
valuation
Auction protocols:
First-price sealed-bid
• Protocol: Each bidder submits one bid without knowing
others’ bids. The highest bidder wins the item at the
price of his bid
– Single round of bidding
• Strategy: Bid as a function of agent’s private value and
his prior estimates of others’ valuations
• Best strategy: No dominant strategy in general
– Strategic underbidding & counterspeculation
– Can determine Nash equilibrium strategies via
common knowledge assumptions about the
probability distributions from which valuations are
drawn
Example: 1st
price sealed-bid auction
2 agents (1 and 2) with values v1,v2 drawn uniformly from
[0,1].
Utility of agent i if it bids bi and wins the item is ui=vi-bi.
Assume agent 2’s bidding strategy is b2(v2)=v2/2
How should 1 bid? (i.e. what is b1(v1)=z?)
U1=sz=0
2z
(v1-z)dz = (v1-z)2z=2zv1-2z2
Note: given z=b2(v2)=v2/2, 1 only wins if v2<2z
Therefore, Maxz[2zv1-2z2
] when z=b1(v1)=v1/2
Similar argument for agent 2, assuming b1(v1)=v1/2.
We have an equilibrium
Strategic underbidding in first-price
sealed-bid auction…
• Example 2
– 2 risk-neutral bidders: A and B
– A knows that B’s value is 0 or 100 with
equal probability
– A’s value of 400 is common knowledge
– In Nash equilibrium, B bids either 0 or
100, and A bids 100 + ε (winning more
important than low price)
Auction protocols:
Dutch (descending)
• Protocol: Auctioneer continuously lowers the price until
a bidder takes the item at the current price
• Strategically equivalent to first-price sealed-bid
protocol in all auction settings
• Strategy: Bid as a function of agent’s private value and
his prior estimates of others’ valuations
• Best strategy: No dominant strategy in general
– Lying (down-biasing bids) & counterspeculation
– Possible to determine Nash equilibrium strategies via
common knowledge assumptions regarding the
probability distributions of others’ values
– Requires multiple rounds of posting current price
• Dutch flower market, Ontario tobacco auction, Filene’s
basement, Waldenbooks
Dutch (Aalsmeer) flower auction
Auction protocols: Vickrey
(= second-price sealed bid)
• Protocol: Each bidder submits one bid without knowing (!)
others’ bids. Highest bidder wins item at 2nd highest price
• Strategy: Bid as a function of agent’s private value & his prior
estimates of others’ valuations
• Best strategy: In a private value auction with risk neutral
bidders, Vickrey is strategically equivalent to English. In such
settings, dominant strategy is to bid one’s true valuation
– No counterspeculation
– Independent of others’ bidding plans, operating
environments, capabilities...
– Single round of bidding
• Widely advocated for computational multiagent systems
• Old [Vickrey 1961], but not widely used among humans
• Revelation principle --- proxy bidder agents on www.ebay.com,
www.webauction.com, www.onsale.com
Vickrey auction is a special
case of Clarke tax
mechanism
• Who pays?
– The bidder who takes the item away
from the others (makes the others
worse off)
– Others pay nothing
• How much does the winner pay?
– The declared value that the good would
have had for the others had the winner
stayed home = second highest bid
Results for private value auctions
• Dutch strategically equivalent to first-price sealed-bid
• Risk neutral agents => Vickrey strategically equivalent
to English
• All four protocols allocate item efficiently
– (assuming no reservation price for the auctioneer)
• English & Vickrey have dominant strategies => no
effort wasted in counterspeculation
• Which of the four auction mechanisms gives highest
expected revenue to the seller?
– Assuming valuations are drawn independently & agents
are risk-neutral
• The four mechanisms have equal expected revenue!
Revenue equivalence ceases
to hold if agents are not
risk-neutral
• Risk averse bidders:
– Dutch, first-price sealed-bid ≥ Vickrey,
English
• Risk averse auctioneer:
– Dutch, first-price sealed-bid ≤ Vickrey,
English
Optimal Auctions
(Myerson)
Optimal auctions (risk-neutral,
asymmetric bidders)
• Private-value auction with 2 risk-neutral
bidders
– A’s valuation is uniformly distributed on [0,1]
– B’s valuation is uniformly distributed on [1,4]
• What revenue do the 4 basic auction types
give?
• Can the seller get higher expected revenue?
– Is the allocation Pareto efficient?
– What is the worst-case revenue for the seller?
– For the revenue-maximizing auction, see
Wolfstetter’s survey on class web page
Common Value Auctions
• In a common value auction, the item
has some unknown value, each agent
has partial information about the
value
– Examples: Art auctions and resale,
construction companies effected by
common events (eg weather), oil drilling
Common Value Auctions
• At time of bidding, the common value
is unknown
• Bidders may have imperfect
estimates about the value, but the
true value is only observed after the
auction takes place
Winner’s Curse
• No agent knows for sure the true value of the
item
• The winner is the agent who made the highest
guess
• If bidders all had “reasonable” information about
the value of the item, then the average of all
guesses should be correct
– i.e the winner has overbid! (the curse)
• Agents should shade their bids downward (even
in English and Vickrey auctions)
Results for non-private value
auctions
• Dutch strategically equivalent to first-price
sealed-bid
• Vickrey not strategically equivalent to English
• All four protocols allocate item efficiently
• Thrm (revenue non-equivalence ). With more than
2 bidders, the expected revenues are not the
same: English ≥ Vickrey ≥ Dutch = first-price
sealed bid
Results for non-private value
auctions...
• Common knowledge that auctioneer has
private info
– Q: What info should the auctioneer release
?
• A: auctioneer is best off releasing all of
it
– “No news is worst news”
– Mitigates the winner’s curse
Results for non-private value
auctions...
• Asymmetric info among bidders
– E.g. 1: auctioning pennies in class
– E.g. 2: first-price sealed-bid common value auction
with bidders A, B, C, D
• A & B have same good info. C has this & extra
signal. D has poor but independent info
• A & B should not bid; D should sometimes
• => “Bid less if more bidders or your info is worse”
• Most important in sealed-bid auctions & Dutch
Vulnerabilities in Auctions
Vulnerability to bidder collusion
[even in private-value auctions]
• v1 = 20, vi = 18 for others
• Collusive agreement for English: e.g. 1 bids 6,
others bid 5. Self-enforcing
• Collusive agreement for Vickrey: e.g. 1 bids 20,
others bid 5. Self-enforcing
• In first-price sealed-bid or Dutch, if 1 bids
below 18, others are motivated to break the
collusion agreement
• Need to identify coalition parties
Vulnerability to shills
• Only a problem in non-private-value
settings
• English & all-pay auction protocols are
vulnerable
– Classic analyses ignore the
possibility of shills
• Vickrey, first-price sealed-bid, and
Dutch are not vulnerable
Vulnerability to a lying
auctioneer
• Truthful auctioneer classically assumed
• In Vickrey auction, auctioneer can overstate 2nd
highest bid to the winning bidder in order to increase
revenue
– Bid verification mechanisms, e.g. cryptographic
signatures
– Trusted 3rd party auction servers (reveal highest
bid to seller after closing)
• In English, first-price sealed-bid, Dutch, and all-pay,
auctioneer cannot lie because bids are public
Auctioneer’s other possibilities
• Bidding
– Seller may bid more than his reservation price
because truth-telling is not dominant for the
seller even in the English or Vickrey protocol
(because his bid may be 2nd highest & determine
the price) => seller may inefficiently get the
item
• In an expected revenue maximizing auction, seller
sets a reservation price strategically like this
[Myerson 81]
– Auctions are not Pareto efficient (not surprising in light
of Myerson-Satterthwaite theorem)
• Setting a minimum price
• Refusing to sell after the auction has ended
Undesirable private information
revelation
• Agents strategic marginal cost information revealed
because truthful bidding is a dominant strategy in
Vickrey (and English)
– Observed problems with subcontractors
• First-price sealed-bid & Dutch may not reveal this
info as accurately
– Lying
– No dominant strategy
– Bidding decisions depend on beliefs about others
Sniping
= bidding very late in the auction
in the hopes that other bidders
do not have time to respond
Especially an issue in electronic auctions
with network lag and lossy communication
links
[from Roth & Ockenfels]
Sniping…
Amazon auctions give automatic extensions, eBay does not
Antiques auctions have experts
[from Roth & Ockenfels]
Sniping…
[from Roth & Ockenfels]
Sniping…
• Can make sense to both bid through a
regular insecure channel and to snipe
• Might end up sniping oneself
Conclusions on 1-item auctions
• Nontrivial, but often analyzable with reasonable
effort
– Important to understand merits & limitations
– Unintuitive protocols may have better
properties
• Vickrey auction induces truth-telling &
avoids counterspeculation (in limited
settings)
• Choice of a good auction protocol depends on the
setting in which the protocol is used
Revenue equivalence theorem
• Even more generally: Thrm.
– Assume risk-neutral bidders, valuations drawn independently from potentially different
distributions with no gaps
– Consider two Bayes-Nash equilibria of any two auction mechanisms
– Assume allocation probabilities yi(v1, … v|A|) are same in both equilibria
• Here v1, … v|A| are true types, not revelations
• E.g., if the equilibrium is efficient, then yi = 1 for bidder with highest vi
– Assume that if any agent i draws his lowest possible valuation vi, his expected payoff is same in
both equilibria
• E.g., may want a bidder to lose & pay nothing if bidders’ valuations are drawn from same distribution, and
the bidder draws the lowest possible valuation
– Then, the two equilibria give the same expected payoffs to the bidders (& thus to the seller)
pi = probability of winning (expectation taken over others’ valuations)
ti = expected payment by bidder (expectation taken over others’ valuations)
By choosing his bid bi, bidder chooses a point on this curve
(we do not assume it is the same for different mechanisms)
pi*(vi)
ti(pi*(vi))
dti(pi*(vi)) / dpi*(vi) = vi Integrate both sides from pi*(vi)to pi*(vi): ti(pi*(vi)) - ti(pi*(vi)) = ∫pi*(vi)
pi*(vi)
vi(q) dq =
∫vi
vi
s dpi*(s)
Proof sketch. We show that expected payment by an arbitrary bidder i is the same in both equilibria.
By revelation principle, can restrict to Bayes-Nash incentive-compatible direct revelation mechanisms.
So, others’ bids are identical to others’ valuations.
ui = vi pi - ti <=> ti = vi pi - ui
utility increases
vi
Since the two equilibria have the same allocation probabilities yi(v1, … v|A|) and every bidder reveals
his type truthfully, for any realization vi, pi*(vi) has to be the same in the equilibria. Thus the RHS
is the same. Now, since ti(pi*(vi)) is same by assumption, ti(pi*(vi)) is the same. QED

Más contenido relacionado

La actualidad más candente

Online trading ppt
Online trading ppt Online trading ppt
Online trading ppt petkarshwt
 
Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...
Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...
Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...Eyad Almasri
 
Call and put Options
Call and put OptionsCall and put Options
Call and put OptionsXaveria Desi
 
Clearance and settlement procedure
Clearance and settlement procedureClearance and settlement procedure
Clearance and settlement procedureChennu Vinodh Reddy
 
Commodity Market - Module I
Commodity Market - Module ICommodity Market - Module I
Commodity Market - Module ISwaminath Sam
 
Stock markets presentation
Stock markets presentationStock markets presentation
Stock markets presentationSahil Gupta
 
What are Share, Stock and Equity?
What are Share, Stock and Equity?What are Share, Stock and Equity?
What are Share, Stock and Equity?Dhanashri Academy
 
Indian Derivatives Market
Indian Derivatives MarketIndian Derivatives Market
Indian Derivatives MarketKrishna SN
 
Options trading presentation
Options trading presentationOptions trading presentation
Options trading presentationBrian Hyde
 
Online Auctions, Virtual Communities and Evolving Concepts
Online Auctions, Virtual Communities and Evolving ConceptsOnline Auctions, Virtual Communities and Evolving Concepts
Online Auctions, Virtual Communities and Evolving ConceptsUpekha Vandebona
 
Financial derivatives ppt
Financial derivatives pptFinancial derivatives ppt
Financial derivatives pptVaishnaviSavant
 
International pricing strategies
International pricing strategiesInternational pricing strategies
International pricing strategiesManav Agarwal
 

La actualidad más candente (20)

Online trading ppt
Online trading ppt Online trading ppt
Online trading ppt
 
Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...
Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...
Chapter 2 / E-Commerce: Mechanisms, Infrastructures, and Tools – Technology o...
 
Call and put Options
Call and put OptionsCall and put Options
Call and put Options
 
Clearance and settlement procedure
Clearance and settlement procedureClearance and settlement procedure
Clearance and settlement procedure
 
Commodity Market - Module I
Commodity Market - Module ICommodity Market - Module I
Commodity Market - Module I
 
Forex market ppt
Forex market pptForex market ppt
Forex market ppt
 
Stock markets presentation
Stock markets presentationStock markets presentation
Stock markets presentation
 
Forex market
Forex marketForex market
Forex market
 
What are Share, Stock and Equity?
What are Share, Stock and Equity?What are Share, Stock and Equity?
What are Share, Stock and Equity?
 
Indian Derivatives Market
Indian Derivatives MarketIndian Derivatives Market
Indian Derivatives Market
 
Options trading presentation
Options trading presentationOptions trading presentation
Options trading presentation
 
Capital market ppt
Capital market pptCapital market ppt
Capital market ppt
 
Online Auctions, Virtual Communities and Evolving Concepts
Online Auctions, Virtual Communities and Evolving ConceptsOnline Auctions, Virtual Communities and Evolving Concepts
Online Auctions, Virtual Communities and Evolving Concepts
 
Primary and Secondary Markets
Primary and Secondary MarketsPrimary and Secondary Markets
Primary and Secondary Markets
 
Commodity market
Commodity marketCommodity market
Commodity market
 
IMPORT TRADE
IMPORT TRADEIMPORT TRADE
IMPORT TRADE
 
Forex
ForexForex
Forex
 
Trading ppt
Trading pptTrading ppt
Trading ppt
 
Financial derivatives ppt
Financial derivatives pptFinancial derivatives ppt
Financial derivatives ppt
 
International pricing strategies
International pricing strategiesInternational pricing strategies
International pricing strategies
 

Destacado

Introduction to Auction Theory
Introduction to Auction TheoryIntroduction to Auction Theory
Introduction to Auction TheoryYosuke YASUDA
 
|.doc|
|.doc||.doc|
|.doc|butest
 
Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...
Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...
Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...farshad33
 
Topic 1 lecture 2
Topic 1 lecture 2Topic 1 lecture 2
Topic 1 lecture 2farshad33
 
Topic 1 lecture 3-application imapct of mas&t
Topic 1 lecture 3-application imapct of mas&tTopic 1 lecture 3-application imapct of mas&t
Topic 1 lecture 3-application imapct of mas&tfarshad33
 
Chapter 6 agent communications--agent communications
Chapter 6 agent communications--agent communicationsChapter 6 agent communications--agent communications
Chapter 6 agent communications--agent communicationsfarshad33
 
Chapter 5 design patterns for mas
Chapter 5 design patterns for masChapter 5 design patterns for mas
Chapter 5 design patterns for masfarshad33
 
Topic 1 lecture 1
Topic 1 lecture 1Topic 1 lecture 1
Topic 1 lecture 1farshad33
 
Multiagent systems (and their use in industry)
Multiagent systems (and their use in industry)Multiagent systems (and their use in industry)
Multiagent systems (and their use in industry)Marc-Philippe Huget
 
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...farshad33
 
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...farshad33
 
Multi-agent systems
Multi-agent systemsMulti-agent systems
Multi-agent systemsR A Akerkar
 
Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)Dagmar Monett
 
Introduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsIntroduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsAntonio Moreno
 

Destacado (15)

Introduction to Auction Theory
Introduction to Auction TheoryIntroduction to Auction Theory
Introduction to Auction Theory
 
|.doc|
|.doc||.doc|
|.doc|
 
Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...
Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...
Chapter 8 agent-oriented software engineering ch8-prometheus research methodo...
 
Topic 1 lecture 2
Topic 1 lecture 2Topic 1 lecture 2
Topic 1 lecture 2
 
Topic 1 lecture 3-application imapct of mas&t
Topic 1 lecture 3-application imapct of mas&tTopic 1 lecture 3-application imapct of mas&t
Topic 1 lecture 3-application imapct of mas&t
 
Chapter 6 agent communications--agent communications
Chapter 6 agent communications--agent communicationsChapter 6 agent communications--agent communications
Chapter 6 agent communications--agent communications
 
Chapter 5 design patterns for mas
Chapter 5 design patterns for masChapter 5 design patterns for mas
Chapter 5 design patterns for mas
 
Topic 1 lecture 1
Topic 1 lecture 1Topic 1 lecture 1
Topic 1 lecture 1
 
Multiagent systems (and their use in industry)
Multiagent systems (and their use in industry)Multiagent systems (and their use in industry)
Multiagent systems (and their use in industry)
 
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
 
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
 
Multi-agent systems
Multi-agent systemsMulti-agent systems
Multi-agent systems
 
Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)
 
Agent architectures
Agent architecturesAgent architectures
Agent architectures
 
Introduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsIntroduction to agents and multi-agent systems
Introduction to agents and multi-agent systems
 

Similar a Auctions

Auctions final
Auctions finalAuctions final
Auctions finalHareesh M
 
BidsCreator Auctions Backgrounder
BidsCreator Auctions BackgrounderBidsCreator Auctions Backgrounder
BidsCreator Auctions BackgrounderSuntosh Mankodi
 
First-Price Sealed-Bid Auction
First-Price Sealed-Bid AuctionFirst-Price Sealed-Bid Auction
First-Price Sealed-Bid AuctionTaresa Farfan
 
Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...
Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...
Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...Jian Xu
 
Pricing method
Pricing methodPricing method
Pricing methodapurv1993
 
Distinguishing the Differences Between Auctions
Distinguishing the Differences Between AuctionsDistinguishing the Differences Between Auctions
Distinguishing the Differences Between AuctionsKofl93
 
Brokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshotsBrokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshotsHarsha Varghese
 
Infographic types of e auctions
Infographic types of e auctionsInfographic types of e auctions
Infographic types of e auctionsFreek Van Overbeek
 
Distinguishing the Differences Between Auctions
Distinguishing the Differences Between AuctionsDistinguishing the Differences Between Auctions
Distinguishing the Differences Between Auctionsmarcin8501
 
Bidding system final - 260308
Bidding system   final - 260308Bidding system   final - 260308
Bidding system final - 260308Jaspal Singh
 
Academic Research on Auction Properties
Academic Research on Auction PropertiesAcademic Research on Auction Properties
Academic Research on Auction PropertiesOscar Ponthe
 
Market Makers & Liquidity on a Transit Exchange
Market Makers & Liquidity on a Transit ExchangeMarket Makers & Liquidity on a Transit Exchange
Market Makers & Liquidity on a Transit ExchangeTexxi Global
 
Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...
Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...
Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...Texxi Global
 
About Detail of Auction | Allan Baitcher
About Detail of Auction | Allan BaitcherAbout Detail of Auction | Allan Baitcher
About Detail of Auction | Allan BaitcherAllan Baitcher
 
Spectrum auction Theory and Spectrum Price Model
Spectrum auction Theory and Spectrum Price ModelSpectrum auction Theory and Spectrum Price Model
Spectrum auction Theory and Spectrum Price Modelwww.nbtc.go.th
 

Similar a Auctions (20)

Auctions final
Auctions finalAuctions final
Auctions final
 
Ch17
Ch17Ch17
Ch17
 
Auctions 1
Auctions 1Auctions 1
Auctions 1
 
BidsCreator Auctions Backgrounder
BidsCreator Auctions BackgrounderBidsCreator Auctions Backgrounder
BidsCreator Auctions Backgrounder
 
First-Price Sealed-Bid Auction
First-Price Sealed-Bid AuctionFirst-Price Sealed-Bid Auction
First-Price Sealed-Bid Auction
 
Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...
Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...
Learning, Prediction and Optimization in Real-Time Bidding based Display Adve...
 
Pricing method
Pricing methodPricing method
Pricing method
 
Distinguishing the Differences Between Auctions
Distinguishing the Differences Between AuctionsDistinguishing the Differences Between Auctions
Distinguishing the Differences Between Auctions
 
Brokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshotsBrokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshots
 
Infographic types of e auctions
Infographic types of e auctionsInfographic types of e auctions
Infographic types of e auctions
 
Distinguishing the Differences Between Auctions
Distinguishing the Differences Between AuctionsDistinguishing the Differences Between Auctions
Distinguishing the Differences Between Auctions
 
Bidding system final - 260308
Bidding system   final - 260308Bidding system   final - 260308
Bidding system final - 260308
 
Academic Research on Auction Properties
Academic Research on Auction PropertiesAcademic Research on Auction Properties
Academic Research on Auction Properties
 
Market Makers & Liquidity on a Transit Exchange
Market Makers & Liquidity on a Transit ExchangeMarket Makers & Liquidity on a Transit Exchange
Market Makers & Liquidity on a Transit Exchange
 
Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...
Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...
Solving the Market Formation Problem: Market Makers and Liquidity on Transit ...
 
Broker Presentation
Broker PresentationBroker Presentation
Broker Presentation
 
E-auction.pptx
E-auction.pptxE-auction.pptx
E-auction.pptx
 
About Detail of Auction | Allan Baitcher
About Detail of Auction | Allan BaitcherAbout Detail of Auction | Allan Baitcher
About Detail of Auction | Allan Baitcher
 
Spectrum auction Theory and Spectrum Price Model
Spectrum auction Theory and Spectrum Price ModelSpectrum auction Theory and Spectrum Price Model
Spectrum auction Theory and Spectrum Price Model
 
L5
L5L5
L5
 

Último

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...IJAEMSJORNAL
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...shreenathji26
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliNimot Muili
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studydhruvamdhruvil123
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 

Último (20)

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain study
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 

Auctions

  • 2. Auctions • Methods for allocating goods, tasks, resources... • Participants: auctioneer, bidders • Enforced agreement between auctioneer & winning bidder(s) • Easily implementable e.g. over the Internet – Many existing Internet auction sites • Auction (selling item(s)): One seller, multiple buyers – E.g. selling a bull on eBay • Reverse auction (buying item(s)): One buyer, multiple sellers – E.g. procurement • We will discuss the theory in the context of auctions, but same theory applies to reverse auctions – at least in 1-item settings
  • 3. Auction settings • Private value : value of the good depends only on the agent’s own preferences – E.g. cake which is not resold or showed off • Common value : agent’s value of an item determined entirely by others’ values – E.g. treasury bills • Correlated value : agent’s value of an item depends partly on its own preferences & partly on others’ values for it – E.g. auctioning a transportation task when bidders can handle it or reauction it to others
  • 4. Auction protocols: All-pay • Protocol: Each bidder is free to raise his bid. When no bidder is willing to raise, the auction ends, and the highest bidder wins the item. All bidders have to pay their last bid • Strategy: Series of bids as a function of agent’s private value, his prior estimates of others’ valuations, and past bids • Best strategy: ? • In private value settings it can be computed (low bids) • Potentially long bidding process • Variations – Each agent pays only part of his highest bid – Each agent’s payment is a function of the highest bid of all agents • E.g. CS application: tool reallocation [Lenting&Braspenning ECAI-94]
  • 5. The 4 common auctions • English auction • First price sealed bid • Dutch auction • Second price, sealed bid (Vickrey)
  • 6. Auction protocols: English (first-price open-cry = ascending) • Protocol: Each bidder is free to raise his bid. When no bidder is willing to raise, the auction ends, and the highest bidder wins the item at the price of his bid • Strategy: Series of bids as a function of agent’s private value, his prior estimates of others’ valuations, and past bids • Best strategy: In private value auctions, bidder’s dominant strategy is to always bid a small amount more than current highest bid, and stop when his private value price is reached – No counterspeculation, but long bidding process • Variations – In correlated value auctions, auctioneer often increases price at a constant rate or as he thinks is appropriate – Open-exit: Bidder has to openly declare exit without re-entering possibility => More info to other bidders about the agent’s valuation
  • 7. Auction protocols: First-price sealed-bid • Protocol: Each bidder submits one bid without knowing others’ bids. The highest bidder wins the item at the price of his bid – Single round of bidding • Strategy: Bid as a function of agent’s private value and his prior estimates of others’ valuations • Best strategy: No dominant strategy in general – Strategic underbidding & counterspeculation – Can determine Nash equilibrium strategies via common knowledge assumptions about the probability distributions from which valuations are drawn
  • 8. Example: 1st price sealed-bid auction 2 agents (1 and 2) with values v1,v2 drawn uniformly from [0,1]. Utility of agent i if it bids bi and wins the item is ui=vi-bi. Assume agent 2’s bidding strategy is b2(v2)=v2/2 How should 1 bid? (i.e. what is b1(v1)=z?) U1=sz=0 2z (v1-z)dz = (v1-z)2z=2zv1-2z2 Note: given z=b2(v2)=v2/2, 1 only wins if v2<2z Therefore, Maxz[2zv1-2z2 ] when z=b1(v1)=v1/2 Similar argument for agent 2, assuming b1(v1)=v1/2. We have an equilibrium
  • 9. Strategic underbidding in first-price sealed-bid auction… • Example 2 – 2 risk-neutral bidders: A and B – A knows that B’s value is 0 or 100 with equal probability – A’s value of 400 is common knowledge – In Nash equilibrium, B bids either 0 or 100, and A bids 100 + ε (winning more important than low price)
  • 10. Auction protocols: Dutch (descending) • Protocol: Auctioneer continuously lowers the price until a bidder takes the item at the current price • Strategically equivalent to first-price sealed-bid protocol in all auction settings • Strategy: Bid as a function of agent’s private value and his prior estimates of others’ valuations • Best strategy: No dominant strategy in general – Lying (down-biasing bids) & counterspeculation – Possible to determine Nash equilibrium strategies via common knowledge assumptions regarding the probability distributions of others’ values – Requires multiple rounds of posting current price • Dutch flower market, Ontario tobacco auction, Filene’s basement, Waldenbooks
  • 12. Auction protocols: Vickrey (= second-price sealed bid) • Protocol: Each bidder submits one bid without knowing (!) others’ bids. Highest bidder wins item at 2nd highest price • Strategy: Bid as a function of agent’s private value & his prior estimates of others’ valuations • Best strategy: In a private value auction with risk neutral bidders, Vickrey is strategically equivalent to English. In such settings, dominant strategy is to bid one’s true valuation – No counterspeculation – Independent of others’ bidding plans, operating environments, capabilities... – Single round of bidding • Widely advocated for computational multiagent systems • Old [Vickrey 1961], but not widely used among humans • Revelation principle --- proxy bidder agents on www.ebay.com, www.webauction.com, www.onsale.com
  • 13. Vickrey auction is a special case of Clarke tax mechanism • Who pays? – The bidder who takes the item away from the others (makes the others worse off) – Others pay nothing • How much does the winner pay? – The declared value that the good would have had for the others had the winner stayed home = second highest bid
  • 14. Results for private value auctions • Dutch strategically equivalent to first-price sealed-bid • Risk neutral agents => Vickrey strategically equivalent to English • All four protocols allocate item efficiently – (assuming no reservation price for the auctioneer) • English & Vickrey have dominant strategies => no effort wasted in counterspeculation • Which of the four auction mechanisms gives highest expected revenue to the seller? – Assuming valuations are drawn independently & agents are risk-neutral • The four mechanisms have equal expected revenue!
  • 15. Revenue equivalence ceases to hold if agents are not risk-neutral • Risk averse bidders: – Dutch, first-price sealed-bid ≥ Vickrey, English • Risk averse auctioneer: – Dutch, first-price sealed-bid ≤ Vickrey, English
  • 17. Optimal auctions (risk-neutral, asymmetric bidders) • Private-value auction with 2 risk-neutral bidders – A’s valuation is uniformly distributed on [0,1] – B’s valuation is uniformly distributed on [1,4] • What revenue do the 4 basic auction types give? • Can the seller get higher expected revenue? – Is the allocation Pareto efficient? – What is the worst-case revenue for the seller? – For the revenue-maximizing auction, see Wolfstetter’s survey on class web page
  • 18. Common Value Auctions • In a common value auction, the item has some unknown value, each agent has partial information about the value – Examples: Art auctions and resale, construction companies effected by common events (eg weather), oil drilling
  • 19. Common Value Auctions • At time of bidding, the common value is unknown • Bidders may have imperfect estimates about the value, but the true value is only observed after the auction takes place
  • 20. Winner’s Curse • No agent knows for sure the true value of the item • The winner is the agent who made the highest guess • If bidders all had “reasonable” information about the value of the item, then the average of all guesses should be correct – i.e the winner has overbid! (the curse) • Agents should shade their bids downward (even in English and Vickrey auctions)
  • 21. Results for non-private value auctions • Dutch strategically equivalent to first-price sealed-bid • Vickrey not strategically equivalent to English • All four protocols allocate item efficiently • Thrm (revenue non-equivalence ). With more than 2 bidders, the expected revenues are not the same: English ≥ Vickrey ≥ Dutch = first-price sealed bid
  • 22. Results for non-private value auctions... • Common knowledge that auctioneer has private info – Q: What info should the auctioneer release ? • A: auctioneer is best off releasing all of it – “No news is worst news” – Mitigates the winner’s curse
  • 23. Results for non-private value auctions... • Asymmetric info among bidders – E.g. 1: auctioning pennies in class – E.g. 2: first-price sealed-bid common value auction with bidders A, B, C, D • A & B have same good info. C has this & extra signal. D has poor but independent info • A & B should not bid; D should sometimes • => “Bid less if more bidders or your info is worse” • Most important in sealed-bid auctions & Dutch
  • 25. Vulnerability to bidder collusion [even in private-value auctions] • v1 = 20, vi = 18 for others • Collusive agreement for English: e.g. 1 bids 6, others bid 5. Self-enforcing • Collusive agreement for Vickrey: e.g. 1 bids 20, others bid 5. Self-enforcing • In first-price sealed-bid or Dutch, if 1 bids below 18, others are motivated to break the collusion agreement • Need to identify coalition parties
  • 26. Vulnerability to shills • Only a problem in non-private-value settings • English & all-pay auction protocols are vulnerable – Classic analyses ignore the possibility of shills • Vickrey, first-price sealed-bid, and Dutch are not vulnerable
  • 27. Vulnerability to a lying auctioneer • Truthful auctioneer classically assumed • In Vickrey auction, auctioneer can overstate 2nd highest bid to the winning bidder in order to increase revenue – Bid verification mechanisms, e.g. cryptographic signatures – Trusted 3rd party auction servers (reveal highest bid to seller after closing) • In English, first-price sealed-bid, Dutch, and all-pay, auctioneer cannot lie because bids are public
  • 28. Auctioneer’s other possibilities • Bidding – Seller may bid more than his reservation price because truth-telling is not dominant for the seller even in the English or Vickrey protocol (because his bid may be 2nd highest & determine the price) => seller may inefficiently get the item • In an expected revenue maximizing auction, seller sets a reservation price strategically like this [Myerson 81] – Auctions are not Pareto efficient (not surprising in light of Myerson-Satterthwaite theorem) • Setting a minimum price • Refusing to sell after the auction has ended
  • 29. Undesirable private information revelation • Agents strategic marginal cost information revealed because truthful bidding is a dominant strategy in Vickrey (and English) – Observed problems with subcontractors • First-price sealed-bid & Dutch may not reveal this info as accurately – Lying – No dominant strategy – Bidding decisions depend on beliefs about others
  • 30. Sniping = bidding very late in the auction in the hopes that other bidders do not have time to respond Especially an issue in electronic auctions with network lag and lossy communication links
  • 31. [from Roth & Ockenfels]
  • 32. Sniping… Amazon auctions give automatic extensions, eBay does not Antiques auctions have experts [from Roth & Ockenfels]
  • 34. Sniping… • Can make sense to both bid through a regular insecure channel and to snipe • Might end up sniping oneself
  • 35. Conclusions on 1-item auctions • Nontrivial, but often analyzable with reasonable effort – Important to understand merits & limitations – Unintuitive protocols may have better properties • Vickrey auction induces truth-telling & avoids counterspeculation (in limited settings) • Choice of a good auction protocol depends on the setting in which the protocol is used
  • 36. Revenue equivalence theorem • Even more generally: Thrm. – Assume risk-neutral bidders, valuations drawn independently from potentially different distributions with no gaps – Consider two Bayes-Nash equilibria of any two auction mechanisms – Assume allocation probabilities yi(v1, … v|A|) are same in both equilibria • Here v1, … v|A| are true types, not revelations • E.g., if the equilibrium is efficient, then yi = 1 for bidder with highest vi – Assume that if any agent i draws his lowest possible valuation vi, his expected payoff is same in both equilibria • E.g., may want a bidder to lose & pay nothing if bidders’ valuations are drawn from same distribution, and the bidder draws the lowest possible valuation – Then, the two equilibria give the same expected payoffs to the bidders (& thus to the seller) pi = probability of winning (expectation taken over others’ valuations) ti = expected payment by bidder (expectation taken over others’ valuations) By choosing his bid bi, bidder chooses a point on this curve (we do not assume it is the same for different mechanisms) pi*(vi) ti(pi*(vi)) dti(pi*(vi)) / dpi*(vi) = vi Integrate both sides from pi*(vi)to pi*(vi): ti(pi*(vi)) - ti(pi*(vi)) = ∫pi*(vi) pi*(vi) vi(q) dq = ∫vi vi s dpi*(s) Proof sketch. We show that expected payment by an arbitrary bidder i is the same in both equilibria. By revelation principle, can restrict to Bayes-Nash incentive-compatible direct revelation mechanisms. So, others’ bids are identical to others’ valuations. ui = vi pi - ti <=> ti = vi pi - ui utility increases vi Since the two equilibria have the same allocation probabilities yi(v1, … v|A|) and every bidder reveals his type truthfully, for any realization vi, pi*(vi) has to be the same in the equilibria. Thus the RHS is the same. Now, since ti(pi*(vi)) is same by assumption, ti(pi*(vi)) is the same. QED