Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Learning What’s Going on: Reconstructing Preferences and Priorities from Opaque Transactions

Published: 23 October 2018 Publication History

Abstract

We consider a setting where n buyers, with combinatorial preferences over m items, and a seller, running a priority-based allocation mechanism, repeatedly interact. Our goal, from observing limited information about the results of these interactions, is to reconstruct both the preferences of the buyers and the mechanism of the seller. More specifically, we consider an online setting where at each stage, a subset of the buyers arrive and are allocated items, according to some unknown priority that the seller has among the buyers. Our learning algorithm observes only which buyers arrive and the allocation produced (or some function of the allocation, such as just which buyers received positive utility and which did not), and its goal is to predict the outcome for future subsets of buyers. For this task, the learning algorithm needs to reconstruct both the priority among the buyers and the preferences of each buyer. We derive mistake bound algorithms for additive, unit-demand and single-minded buyers. We also consider the case where buyers’ utilities for a fixed bundle can change between stages due to different (observed) prices. Our algorithms are efficient both in computation time and in the maximum number of mistakes (both polynomial in the number of buyers and items).

References

[1]
Kareem Amin, Rachel Cummings, Lili Dworkin, Michael Kearns, and Aaron Roth. 2014. Online learning and profit maximization from revealed preferences. arXiv (2014).
[2]
Maria-Florina Balcan, Amit Daniely, Ruta Mehta, Ruth Urner, and Vijay V. Vazirani. 2014. Learning economic parameters from revealed preferences. arXiv abs/1407.7937 (2014).
[3]
Eyal Beigman and Rakesh Vohra. 2006. Learning from revealed preference. In Proceedings of the 7th ACM Conference on Electronic Commerce. ACM, 36–42.
[4]
D. Helmbold, R. Sloan, and M. K. Warmuth. 1990. Learning nested differences of intersection closed concept classes. Mach. Learn. 5, 2 (1990), 165–196. Special Issue on Computational Learning Theory; first appeared in 2nd COLT conference (1989).
[5]
Alexander Karzanov and Leonid Khachiyan. 1991. On the conductance of order Markov chains. Order 8, 1 (1991), 7--15.
[6]
Michael Kearns and Leslie Valiant. 1994. Cryptographic limitations on learning Boolean formulae and finite automata. J. ACM (JACM) 41, 1 (1994), 67--95.
[7]
Wolfgang Maass and György Turán. 1990. How Fast Can a Threshold Gate Learn? International Computer Science Institute.
[8]
Subramanian Ramanathan. 1999. A unified framework and algorithm for channel assignment in wireless networks. Wireless Netw. 5, 2 (1999), 81--94.
[9]
Paul A. Samuelson. 1938. A note on the pure theory of consumer’s behaviour. Economica (1938), 61--71.
[10]
Hal R. Varian. 2006. Revealed preference. Samuelsonian Economics and the Twenty-first Century (2006), 99--115.
[11]
Morteza Zadimoghaddam and Aaron Roth. 2012. Efficiently learning from revealed preference. In Internet and Network Economics. Springer, Berlin, 114--127.

Index Terms

  1. Learning What’s Going on: Reconstructing Preferences and Priorities from Opaque Transactions

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Economics and Computation
    ACM Transactions on Economics and Computation  Volume 6, Issue 3-4
    Special Issue on EC'15
    November 2018
    249 pages
    ISSN:2167-8375
    EISSN:2167-8383
    DOI:10.1145/3281297
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 October 2018
    Accepted: 01 May 2018
    Revised: 01 April 2018
    Received: 01 January 2016
    Published in TEAC Volume 6, Issue 3-4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Mechanism design
    2. learning from revealed preferences

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Israeli Ministry of Science (MoS)
    • National Science Foundation
    • Simons Award for Graduate Students in Theoretical Computer Science
    • Israeli Centers of Research Excellence (I-CORE) program
    • Israel Science Foundation (ISF)
    • United States-Israel Binational Science Foundation (BSF)

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 213
      Total Downloads
    • Downloads (Last 12 months)40
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 02 Sep 2024

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media