scholarly journals A dominant strategy double clock auction with estimation‐based tâtonnement

2021 ◽  
Vol 16 (3) ◽  
pp. 943-978
Author(s):  
Simon Loertscher ◽  
Claudio Mezzetti

The price mechanism is fundamental to economics but difficult to reconcile with incentive compatibility and individual rationality. We introduce a double clock auction for a homogeneous good market with multidimensional private information and multiunit traders that is deficit‐free, ex post individually rational, constrained efficient, and makes sincere bidding a dominant strategy equilibrium. Under a weak dependence and an identifiability condition, our double clock auction is also asymptotically efficient. Asymptotic efficiency is achieved by estimating demand and supply using information from the bids of traders that have dropped out and following a tâtonnement process that adjusts the clock prices based on the estimates.

2015 ◽  
Vol 105 (7) ◽  
pp. 2141-2182 ◽  
Author(s):  
Vianney Dequiedt ◽  
David Martimort

We consider vertical contracting arrangements between a manufacturer and a retailing network when retailers have private information and the organization is run through bilateral contracts. We highlight a new form of informational opportunism arising when the manufacturer manipulates information learned separately in each relationship. We characterize the set of allocations robust to such opportunism by means of simple ex post incentive compatibility constraints. Those constraints limit the manufacturer's ability to use yardstick competition among retailers. They simplify contracts and restore a rent/efficiency trade-off even with correlated information. We show that sell-out contracts are optimal under a wide range of circumstances. (JEL D21, D86, L14, L60, L81)


Author(s):  
Boaz Zik

Abstract The current literature on mechanism design in models with social preferences discusses social-preference-robust mechanisms, i.e., mechanisms that are implementable in any environment with social preferences. The literature also discusses payoff-information-robust mechanisms, i.e., mechanisms that are implementable for any belief and higher-order beliefs of the agents about the payoff types of the other agents. In the present paper, I address the question of whether deterministic mechanisms that are robust in both of these dimensions exist. I consider environments where each agent holds private information about his personal payoff and about the existence and extent of his social preferences. In such environments, a mechanism is robust in both dimensions only if it is ex-post implementable, i.e., only if incentive compatibility holds for every realization of payoff signals and for every realization of social preferences. I show that ex-post implementation of deterministic mechanisms is impossible in such environments; i.e., deterministic mechanisms that are both social-preference-robust and payoff-information-robust do not exist.


2007 ◽  
Vol 97 (1) ◽  
pp. 242-259 ◽  
Author(s):  
Benjamin Edelman ◽  
Michael Ostrovsky ◽  
Michael Schwarz

We investigate the “generalized second-price” (GSP) auction, a new mechanism used by search engines to sell online advertising. Although GSP looks similar to the Vickrey-Clarke-Groves (VCG) mechanism, its properties are very different. Unlike the VCG mechanism, GSP generally does not have an equilibrium in dominant strategies, and truth-telling is not an equilibrium of GSP. To analyze the properties of GSP, we describe the generalized English auction that corresponds to GSP and show that it has a unique equilibrium. This is an ex post equilibrium, with the same payoffs to all players as the dominant strategy equilibrium of VCG. (JEL D44, L81, M37)


2016 ◽  
Vol 54 (2) ◽  
pp. 589-591

Dimitrios Diamantaras of Temple University reviews “An Introduction to the Theory of Mechanism Design,” by Tilman Börgers. The Econlit abstract of this book begins: “Presents explanations of classic results in the theory of mechanism design and examines the frontiers of research in mechanism design in a text written for advanced undergraduate and graduate students of economics who have a good understanding of game theory. Discusses screening; examples of Bayesian mechanism design; examples of dominant strategy mechanisms; incentive compatibility; Bayesian mechanism design; dominant strategy mechanisms; nontransferable utility; informational interdependence; robust mechanism design; and dynamic mechanism design. Börgers is Samuel Zell Professor of the Economics of Risk at the University of Michigan.”


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4950
Author(s):  
Gianmarco Romano

The moment-based M2M4 signal-to-noise (SNR) estimator was proposed for a complex sinusoidal signal with a deterministic but unknown phase corrupted by additive Gaussian noise by Sekhar and Sreenivas. The authors studied its performances only through numerical examples and concluded that the proposed estimator is asymptotically efficient and exhibits finite sample super-efficiency for some combinations of signal and noise power. In this paper, we derive the analytical asymptotic performances of the proposed M2M4 SNR estimator, and we show that, contrary to what it has been concluded by Sekhar and Sreenivas, the proposed estimator is neither (asymptotically) efficient nor super-efficient. We also show that when dealing with deterministic signals, the covariance matrix needed to derive asymptotic performances must be explicitly derived as its known general form for random signals cannot be extended to deterministic signals. Numerical examples are provided whose results confirm the analytical findings.


2018 ◽  
Author(s):  
Jens David Ohlin

Although politicians and intelligence analysts have criticized Russian interference in the 2016 and 2018 elections, international lawyers seem to be at a loss for how to understand the particular harm posed by this interference. In addition to the hacking of email accounts and disclosure of private information, the most salient aspect of the interference was the use of social media platforms, including Twitter and Facebook, to sow division and heighten nativist tendencies within the electorate. Strictly speaking, the goal of the 2016 interference was to delegitimize a potential Clinton presidency or to help elect Donald Trump as president. But far more important was the method used to accomplish these goals: the impersonation of American citizens during participation in the political process. This latter development points to the real harm of election interference, which has less to do with sovereignty and more to do with the collective right of self- determination. Foreign interference is a violation of the membership rules for political decision-making, i.e., the idea that only members of a polity should participate in elections—not only with regard to voting but also with regard to financial contributions and other forms of electoral participation. Outsiders are free to express their opinions but covertly representing themselves as insiders constitutes a violation of these political norms, which are constitutive of the notion of self- determination, just as much as covertly funneling foreign money to one candidate. The only solution to this form of election interference is transparency, i.e., to expose such interventions for what they are: attempts by foreigners to make political statements while pretending to be Americans. This article ends by cataloguing the mistakes of the Obama Administration in failing to expose this interference in real time—which is the only way to nullify its insidious impact. Ex post investigations, prosecutions, and counter-measures designed to deter future misbehavior are all insufficient to nullify the impact of electoral interference. However, recent efforts by the Justice Department and the FBI, including a new policy codified in the US Attorneys Manual, and contemporaneous indictments of Russians for interference in the 2018 election, suggest that some government actors finally understand that transparency is the only solution to election interference.


2020 ◽  
Vol 15 (1) ◽  
pp. 361-413 ◽  
Author(s):  
Brian Baisa

I study multiunit auction design when bidders have private values, multiunit demands, and non‐quasilinear preferences. Without quasilinearity, the Vickrey auction loses its desired incentive and efficiency properties. I give conditions under which we can design a mechanism that retains the Vickrey auction's desirable incentive and efficiency properties: (1) individual rationality, (2) dominant strategy incentive compatibility, and (3) Pareto efficiency. I show that there is a mechanism that retains the desired properties of the Vickrey auction if there are two bidders who have single‐dimensional types. I also present an impossibility theorem that shows that there is no mechanism that satisfies Vickrey's desired properties and weak budget balance when bidders have multidimensional types.


2019 ◽  
Vol 36 (03) ◽  
pp. 1950013
Author(s):  
Jie Xiang ◽  
Juliang Zhang ◽  
T. C. E. Cheng ◽  
Jose Maria Sallan ◽  
Guowei Hua

Although supply disruption is ubiquitous because of natural or man-made disasters, many firms still use the price-only reverse auction (only the cost is considered) to make purchase decisions. We first study the suppliers’ equilibrium bidding strategies and the buyer’s expected revenue under the first- and second-price price-only reverse auctions when the suppliers are unreliable and have private information on their costs and disruption probabilities. We show that the two auctions are equivalent and not efficient. Then we propose two easily implementable reverse auctions, namely the first-price and second-price format announced penalty reverse auction (APRA), and show that the “revenue equivalence principle” holds, i.e., the two auctions generate the same ex ante expected profit to the buyer. We further show that the two reverse auctions are efficient and “truth telling” is the suppliers’ dominant strategy in the second-price format APRA. We conduct numerical studies to assess the impacts of some parameters on the bidding strategies, the buyer’s profit and social profit.


Sign in / Sign up

Export Citation Format

Share Document