On Black-Box Transformations in Downward-Closed Environments

被引:2
|
作者
Suksompong, Warut [1 ,2 ]
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
[2] Univ Oxford, Dept Comp Sci, Oxford OX1 3QD, England
基金
欧洲研究理事会;
关键词
Black-box transformation; Downward-closed; Mechanism design; Social welfare;
D O I
10.1007/s00224-018-9898-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Black-box transformations have been extensively studied in algorithmic mechanism design as a generic tool for converting algorithms into truthful mechanisms without degrading the approximation guarantees. While such transformations have been designed for a variety of settings, Chawla et al. showed that no fully general black-box transformation exists for single-parameter environments. In this paper, we investigate the potentials and limits of black-box transformations in the prior-free (i.e., non-Bayesian) setting in downward-closed single-parameter environments, a large and important class of environments in mechanism design. On the positive side, we show that such a transformation can preserve a constant fraction of the welfare at every input if the private valuations of the agents take on a constant number of values that are far apart, while on the negative side, we show that this task is not possible for general private valuations.
引用
收藏
页码:1207 / 1227
页数:21
相关论文
共 50 条
  • [31] BLACK-BOX - OZ,A
    POCHODA, E
    NATION, 1988, 246 (22) : 796 - 798
  • [32] THE REMARKABLE BLACK-BOX
    ZANETTI, R
    CHEMICAL ENGINEERING, 1988, 95 (13) : 5 - 5
  • [33] BLACK-BOX TRAP
    LYMAN, J
    ELECTRONIC PRODUCTS MAGAZINE, 1971, 14 (05): : 6 - +
  • [34] INSULATING THE BLACK-BOX
    HALSEMA, CA
    MECHANICAL ENGINEERING, 1995, 117 (06) : 10 - 10
  • [35] GHOSTS AND THE BLACK-BOX
    ROLAND, CG
    KEY, JD
    MINNESOTA MEDICINE, 1983, 66 (05) : 317 - 318
  • [36] vmBBThrPred: A Black-Box Throughput Predictor for Virtual Machines in Cloud Environments
    Taheri, Javid
    Zomaya, Albert Y.
    Kassler, Andreas
    SERVICE-ORIENTED AND CLOUD COMPUTING, (ESOCC 2016), 2016, 9846 : 18 - 33
  • [37] On the black-box stand-by recognition strategies in smart homes environments
    Caruso, Mario
    Cerocchi, Adriano
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2014), 2014, : 221 - 226
  • [38] Random transformations to improve mitigation of query-based black-box attacks
    Ali, Ziad Tariq Muhammad
    Azad, R. Muhammad Atif
    Azad, Muhammad Ajmal
    Holyhead, James
    Rice, Iain
    Imran, Ali Shariq
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 264
  • [39] On Black-Box Verifiable Outsourcing
    Agarwal, Amit
    Alameti, Navid
    Khurana, Dakshita
    Raghuraman, Srinivasan
    Rindal, Peter
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT I, 2023, 14369 : 158 - 187
  • [40] The Intelligent Missile Black-Box
    Zhang Wengdong Zu Jing Li Yohghong Qin Li Song ShuzhengNorth China Institute of Technology
    测试技术学报, 1994, (S1) : 214 - 214