-
Learning Fair Division from Bandit Feedback
Authors:
Hakuei Yamada,
Junpei Komiyama,
Kenshi Abe,
Atsushi Iwasaki
Abstract:
This work addresses learning online fair division under uncertainty, where a central planner sequentially allocates items without precise knowledge of agents' values or utilities. Departing from conventional online algorithm, the planner here relies on noisy, estimated values obtained after allocating items. We introduce wrapper algorithms utilizing \textit{dual averaging}, enabling gradual learni…
▽ More
This work addresses learning online fair division under uncertainty, where a central planner sequentially allocates items without precise knowledge of agents' values or utilities. Departing from conventional online algorithm, the planner here relies on noisy, estimated values obtained after allocating items. We introduce wrapper algorithms utilizing \textit{dual averaging}, enabling gradual learning of both the type distribution of arriving items and agents' values through bandit feedback. This approach enables the algorithms to asymptotically achieve optimal Nash social welfare in linear Fisher markets with agents having additive utilities. We establish regret bounds in Nash social welfare and empirically validate the superior performance of our proposed algorithms across synthetic and empirical datasets.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Adaptively Perturbed Mirror Descent for Learning in Games
Authors:
Kenshi Abe,
Kaito Ariu,
Mitsuki Sakamoto,
Atsushi Iwasaki
Abstract:
This paper proposes a payoff perturbation technique for the Mirror Descent (MD) algorithm in games where the gradient of the payoff functions is monotone in the strategy profile space, potentially containing additive noise. The optimistic family of learning algorithms, exemplified by optimistic MD, successfully achieves {\it last-iterate} convergence in scenarios devoid of noise, leading the dynam…
▽ More
This paper proposes a payoff perturbation technique for the Mirror Descent (MD) algorithm in games where the gradient of the payoff functions is monotone in the strategy profile space, potentially containing additive noise. The optimistic family of learning algorithms, exemplified by optimistic MD, successfully achieves {\it last-iterate} convergence in scenarios devoid of noise, leading the dynamics to a Nash equilibrium. A recent re-emerging trend underscores the promise of the perturbation approach, where payoff functions are perturbed based on the distance from an anchoring, or {\it slingshot}, strategy. In response, we propose {\it Adaptively Perturbed MD} (APMD), which adjusts the magnitude of the perturbation by repeatedly updating the slingshot strategy at a predefined interval. This innovation empowers us to find a Nash equilibrium of the underlying game with guaranteed rates. Empirical demonstrations affirm that our algorithm exhibits significantly accelerated convergence.
△ Less
Submitted 24 June, 2024; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Last-Iterate Convergence with Full and Noisy Feedback in Two-Player Zero-Sum Games
Authors:
Kenshi Abe,
Kaito Ariu,
Mitsuki Sakamoto,
Kentaro Toyoshima,
Atsushi Iwasaki
Abstract:
This paper proposes Mutation-Driven Multiplicative Weights Update (M2WU) for learning an equilibrium in two-player zero-sum normal-form games and proves that it exhibits the last-iterate convergence property in both full and noisy feedback settings. In the former, players observe their exact gradient vectors of the utility functions. In the latter, they only observe the noisy gradient vectors. Eve…
▽ More
This paper proposes Mutation-Driven Multiplicative Weights Update (M2WU) for learning an equilibrium in two-player zero-sum normal-form games and proves that it exhibits the last-iterate convergence property in both full and noisy feedback settings. In the former, players observe their exact gradient vectors of the utility functions. In the latter, they only observe the noisy gradient vectors. Even the celebrated Multiplicative Weights Update (MWU) and Optimistic MWU (OMWU) algorithms may not converge to a Nash equilibrium with noisy feedback. On the contrary, M2WU exhibits the last-iterate convergence to a stationary point near a Nash equilibrium in both feedback settings. We then prove that it converges to an exact Nash equilibrium by iteratively adapting the mutation term. We empirically confirm that M2WU outperforms MWU and OMWU in exploitability and convergence rates.
△ Less
Submitted 26 May, 2023; v1 submitted 21 August, 2022;
originally announced August 2022.
-
Mutation-Driven Follow the Regularized Leader for Last-Iterate Convergence in Zero-Sum Games
Authors:
Kenshi Abe,
Mitsuki Sakamoto,
Atsushi Iwasaki
Abstract:
In this study, we consider a variant of the Follow the Regularized Leader (FTRL) dynamics in two-player zero-sum games. FTRL is guaranteed to converge to a Nash equilibrium when time-averaging the strategies, while a lot of variants suffer from the issue of limit cycling behavior, i.e., lack the last-iterate convergence guarantee. To this end, we propose mutant FTRL (M-FTRL), an algorithm that int…
▽ More
In this study, we consider a variant of the Follow the Regularized Leader (FTRL) dynamics in two-player zero-sum games. FTRL is guaranteed to converge to a Nash equilibrium when time-averaging the strategies, while a lot of variants suffer from the issue of limit cycling behavior, i.e., lack the last-iterate convergence guarantee. To this end, we propose mutant FTRL (M-FTRL), an algorithm that introduces mutation for the perturbation of action probabilities. We then investigate the continuous-time dynamics of M-FTRL and provide the strong convergence guarantees toward stationary points that approximate Nash equilibria under full-information feedback. Furthermore, our simulation demonstrates that M-FTRL can enjoy faster convergence rates than FTRL and optimistic FTRL under full-information feedback and surprisingly exhibits clear convergence under bandit feedback.
△ Less
Submitted 18 June, 2022;
originally announced June 2022.
-
Regulating Matching Markets with Constraints: Data-driven Taxation
Authors:
Akira Matsushita,
Kei Ikegami,
Kyohei Okumura,
Yoji Tomita,
Atsushi Iwasaki
Abstract:
This paper develops a framework to conduct a counterfactual analysis to regulate matching markets with regional constraints that impose lower and upper bounds on the number of matches in each region. Our work is motivated by the Japan Residency Matching Program, in which the policymaker wants to guarantee the least number of doctors working in rural regions to achieve the minimum standard of servi…
▽ More
This paper develops a framework to conduct a counterfactual analysis to regulate matching markets with regional constraints that impose lower and upper bounds on the number of matches in each region. Our work is motivated by the Japan Residency Matching Program, in which the policymaker wants to guarantee the least number of doctors working in rural regions to achieve the minimum standard of service. Among the multiple possible policies that satisfy such constraints, a policymaker wants to choose the best. To this end, we develop a discrete choice model approach that estimates the utility functions of agents from observed data and predicts agents' behavior under different counterfactual policies. Our framework also allows the policymaker to design the welfare-maximizing tax scheme, which outperforms the policy currently used in practice. Furthermore, a numerical experiment illustrates how our method works.
△ Less
Submitted 5 March, 2023; v1 submitted 28 May, 2022;
originally announced May 2022.
-
Anytime Capacity Expansion in Medical Residency Match by Monte Carlo Tree Search
Authors:
Kenshi Abe,
Junpei Komiyama,
Atsushi Iwasaki
Abstract:
This paper considers the capacity expansion problem in two-sided matchings, where the policymaker is allowed to allocate some extra seats as well as the standard seats. In medical residency match, each hospital accepts a limited number of doctors. Such capacity constraints are typically given in advance. However, such exogenous constraints can compromise the welfare of the doctors; some popular ho…
▽ More
This paper considers the capacity expansion problem in two-sided matchings, where the policymaker is allowed to allocate some extra seats as well as the standard seats. In medical residency match, each hospital accepts a limited number of doctors. Such capacity constraints are typically given in advance. However, such exogenous constraints can compromise the welfare of the doctors; some popular hospitals inevitably dismiss some of their favorite doctors. Meanwhile, it is often the case that the hospitals are also benefited to accept a few extra doctors. To tackle the problem, we propose an anytime method that the upper confidence tree searches the space of capacity expansions, each of which has a resident-optimal stable assignment that the deferred acceptance method finds. Constructing a good search tree representation significantly boosts the performance of the proposed method. Our simulation shows that the proposed method identifies an almost optimal capacity expansion with a significantly smaller computational budget than exact methods based on mixed-integer programming.
△ Less
Submitted 22 May, 2022; v1 submitted 14 February, 2022;
originally announced February 2022.
-
Extension of Sinkhorn Method: Optimal Movement Estimation of Agents Moving at Constant Velocity
Authors:
Daigo Okada,
Naotoshi Nakamura,
Takuya Wada,
Ayako Iwasaki,
Ryo Yamada
Abstract:
In the field of bioimaging, an important part of analyzing the motion of objects is tracking. We propose a method that applies the Sinkhorn distance for solving the optimal transport problem to track objects. The advantage of this method is that it can flexibly incorporate various assumptions in tracking as a cost matrix. First, we extend the Sinkhorn distance from two dimensions to three dimensio…
▽ More
In the field of bioimaging, an important part of analyzing the motion of objects is tracking. We propose a method that applies the Sinkhorn distance for solving the optimal transport problem to track objects. The advantage of this method is that it can flexibly incorporate various assumptions in tracking as a cost matrix. First, we extend the Sinkhorn distance from two dimensions to three dimensions. Using this three-dimensional distance, we compare the performance of two types of tracking technique, namely tracking that associates objects that are close to each other, which conventionally uses the nearest-neighbor method, and tracking that assumes that the object is moving at constant velocity, using three types of simulation data. The results suggest that when tracking objects moving at constant velocity, our method is superior to conventional nearest-neighbor tracking as long as the added noise is not excessively large. We show that the Sinkhorn method can be applied effectively to object tracking. Our simulation data analysis suggests that when objects are moving at constant velocity, our method, which sets acceleration as a cost, outperforms the traditional nearest-neighbor method in terms of tracking objects. To apply the proposed method to real bioimaging data, it is necessary to set an appropriate cost indicator based on the movement features.
△ Less
Submitted 11 July, 2019;
originally announced July 2019.
-
Approximately Stable Matchings with General Constraints
Authors:
Yasushi Kawase,
Atsushi Iwasaki
Abstract:
This paper focuses on two-sided matching where one side (a hospital or firm) is matched to the other side (a doctor or worker) so as to maximize a cardinal objective under general feasibility constraints. In a standard model, even though multiple doctors can be matched to a single hospital, a hospital has a responsive preference and a maximum quota. However, in practical applications, a hospital h…
▽ More
This paper focuses on two-sided matching where one side (a hospital or firm) is matched to the other side (a doctor or worker) so as to maximize a cardinal objective under general feasibility constraints. In a standard model, even though multiple doctors can be matched to a single hospital, a hospital has a responsive preference and a maximum quota. However, in practical applications, a hospital has some complicated cardinal preference and constraints. With such preferences (e.g., submodular) and constraints (e.g., knapsack or matroid intersection), stable matchings may fail to exist. This paper first determines the complexity of checking and computing stable matchings based on preference class and constraint class. Second, we establish a framework to analyze this problem on packing problems and the framework enables us to access the wealth of online packing algorithms so that we construct approximately stable algorithms as a variant of generalized deferred acceptance algorithm. We further provide some inapproximability results.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Approximately Stable Matchings with Budget Constraints
Authors:
Yasushi Kawase,
Atsushi Iwasaki
Abstract:
This paper considers two-sided matching with budget constraints where one side (firm or hospital) can make monetary transfers (offer wages) to the other (worker or doctor). In a standard model, while multiple doctors can be matched to a single hospital, a hospital has a maximum quota: the number of doctors assigned to a hospital cannot exceed a certain limit. In our model, a hospital instead has a…
▽ More
This paper considers two-sided matching with budget constraints where one side (firm or hospital) can make monetary transfers (offer wages) to the other (worker or doctor). In a standard model, while multiple doctors can be matched to a single hospital, a hospital has a maximum quota: the number of doctors assigned to a hospital cannot exceed a certain limit. In our model, a hospital instead has a fixed budget: the total amount of wages allocated by each hospital to doctors is constrained. With budget constraints, stable matchings may fail to exist and checking for the existence is hard. To deal with the nonexistence of stable matchings, we extend the "matching with contracts" model of Hatfield and Milgrom, so that it handles approximately stable matchings where each of the hospitals' utilities after deviation can increase by factor up to a certain amount. We then propose two novel mechanisms that efficiently return such a stable matching that exactly satisfies the budget constraints. In particular, by sacrificing strategy-proofness, our first mechanism achieves the best possible bound. Furthermore, we find a special case such that a simple mechanism is strategy-proof for doctors, keeping the best possible bound of the general case.
△ Less
Submitted 21 November, 2017; v1 submitted 17 November, 2017;
originally announced November 2017.
-
Near-Feasible Stable Matchings with Budget Constraints
Authors:
Yasushi Kawase,
Atsushi Iwasaki
Abstract:
We consider the matching with contracts framework of Hatfield and Milgrom when one side (a firm or hospital) can make monetary transfers (offer wages) to the other (a worker or doctor). In a standard model, monetary transfers are not restricted. However, we assume that each hospital has a fixed budget; that is, the total amount of wages allocated by each hospital to the doctors is constrained. Wit…
▽ More
We consider the matching with contracts framework of Hatfield and Milgrom when one side (a firm or hospital) can make monetary transfers (offer wages) to the other (a worker or doctor). In a standard model, monetary transfers are not restricted. However, we assume that each hospital has a fixed budget; that is, the total amount of wages allocated by each hospital to the doctors is constrained. With this constraint, stable matchings may fail to exist and checking for the existence is hard. To deal with the nonexistence, we focus on near-feasible matchings that can exceed each hospital budget by a certain amount, and We introduce a new concept of compatibility. We show that the compatibility condition is a sufficient condition for the existence of a near-feasible stable matching in the matching with contracts framework. Under a slight restriction on hospitals' preferences, we provide mechanisms that efficiently return a near-feasible stable matching with respect to the actual amount of wages allocated by each hospital. By sacrificing strategy-proofness, the best possible bound of budget excess is achieved.
△ Less
Submitted 16 October, 2019; v1 submitted 22 May, 2017;
originally announced May 2017.
-
Further improving security of Vector Stream Cipher
Authors:
Atsushi Iwasaki,
Ken Umeno
Abstract:
Vector Stream Cipher (VSC) is a stream cipher which consists of permutation polynomial over a ring of modulo $2^w$. The algorithm for generating key stream is very simple and the encryption is very fast. Some theoretical attacks for VSC have been reported so far since the invention of VSC in 2004. Then, the authors proposed some improvements and developed "Vector Stream Cipher 2.0 (VSC 2.0)" to be…
▽ More
Vector Stream Cipher (VSC) is a stream cipher which consists of permutation polynomial over a ring of modulo $2^w$. The algorithm for generating key stream is very simple and the encryption is very fast. Some theoretical attacks for VSC have been reported so far since the invention of VSC in 2004. Then, the authors proposed some improvements and developed "Vector Stream Cipher 2.0 (VSC 2.0)" to be immune against the theoretical attacks. In this paper, we propose further improvement of VSC 2.0 to publish as a new chaos cipher "Vector Stream Cipher 2.1 (VSC2.1)". VSC 2.1 is faster and more secure than VSC 2.0. Our result suggests that permutation polynomials over a ring of modulo $2^w$ are useful for cryptography.
△ Less
Submitted 6 November, 2016; v1 submitted 28 July, 2016;
originally announced July 2016.
-
Repeated Multimarket Contact with Private Monitoring: A Belief-Free Approach
Authors:
Atsushi Iwasaki,
Tadashi Sekiguchi,
Shun Yamamoto,
Makoto Yokoo
Abstract:
This paper studies repeated games where two players play multiple duopolistic games simultaneously (multimarket contact). A key assumption is that each player receives a noisy and private signal about the other's actions (private monitoring or observation errors). There has been no game-theoretic support that multimarket contact facilitates collusion or not, in the sense that more collusive equili…
▽ More
This paper studies repeated games where two players play multiple duopolistic games simultaneously (multimarket contact). A key assumption is that each player receives a noisy and private signal about the other's actions (private monitoring or observation errors). There has been no game-theoretic support that multimarket contact facilitates collusion or not, in the sense that more collusive equilibria in terms of per-market profits exist than those under a benchmark case of one market. An equilibrium candidate under the benchmark case is belief-free strategies. We are the first to construct a non-trivial class of strategies that exhibits the effect of multimarket contact from the perspectives of simplicity and mild punishment. Strategies must be simple because firms in a cartel must coordinate each other with no communication. Punishment must be mild to an extent that it does not hurt even the minimum required profits in the cartel. We thus focus on two-state automaton strategies such that the players are cooperative in at least one market even when he or she punishes a traitor. Furthermore, we identify an additional condition (partial indifference), under which the collusive equilibrium yields the optimal payoff.
△ Less
Submitted 22 November, 2019; v1 submitted 12 July, 2016;
originally announced July 2016.
-
One-stroke polynomials over a ring of modulo $2^w$
Authors:
Atsushi Iwasaki,
Ken Umeno
Abstract:
Permutation polynomials over a ring of modulo $2^w$ are compatible with digital computers and digital signal processors, and so they are in particular expected to be useful for cryptography and pseudo random number generator. In general, the period of the polynomial should be long in such fields. In this paper, we derive the necessary and sufficient condition which specify one-stroke polynomials w…
▽ More
Permutation polynomials over a ring of modulo $2^w$ are compatible with digital computers and digital signal processors, and so they are in particular expected to be useful for cryptography and pseudo random number generator. In general, the period of the polynomial should be long in such fields. In this paper, we derive the necessary and sufficient condition which specify one-stroke polynomials which are permutation polynomials whose periods are maximized.
△ Less
Submitted 27 July, 2016; v1 submitted 11 May, 2016;
originally announced May 2016.
-
Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module $2^w$
Authors:
Atsushi Iwasaki,
Ken Umeno
Abstract:
Odd degree Chebyshev polynomials over a ring of modulo $2^w$ have two kinds of period. One is an "orbital period". Odd degree Chebyshev polynomials are bijection over the ring. Therefore, when an odd degree Chebyshev polynomial iterate affecting a factor of the ring, we can observe an orbit over the ring. The "orbital period" is a period of the orbit. The other is a "degree period". It is observed…
▽ More
Odd degree Chebyshev polynomials over a ring of modulo $2^w$ have two kinds of period. One is an "orbital period". Odd degree Chebyshev polynomials are bijection over the ring. Therefore, when an odd degree Chebyshev polynomial iterate affecting a factor of the ring, we can observe an orbit over the ring. The "orbital period" is a period of the orbit. The other is a "degree period". It is observed when changing the degree of Chebyshev polynomials with a fixed argument of polynomials. Both kinds of period have not been completely studied. In this paper, we clarify completely both of them. The knowledge about them enables us to efficiently solve degree decision problem of Chebyshev polynomial over the ring, and so a key-exchange protocol with Chebyshev polynomial over the ring is not secure. In addition, we generalize the discussion and show that a key-exchange protocol with more generalized permutation polynomials which belong to a certain class is not secure.
△ Less
Submitted 29 March, 2016; v1 submitted 26 February, 2016;
originally announced February 2016.
-
False-name-proof Mechanisms for Hiring a Team
Authors:
Atsushi Iwasaki,
David Kempe,
Mahyar Salek,
Makoto Yokoo
Abstract:
We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not b…
▽ More
We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents' best interest to reveal ownership of all elements (which may not be known to the auctioneer a priori) as well as their true incurred costs.
We first propose and analyze a false-name-proof mechanism for the special case where each agent owns only one element in reality, but may pretend that this element is in fact a set of multiple elements. We prove that its frugality ratio is bounded by $2^n$, which, up to constants, matches a lower bound of $Ω(2^n)$ for all false-name-proof mechanisms in this scenario. We then propose a second mechanism for the general case in which agents may own multiple elements. It requires the auctioneer to choose a reserve cost a priori, and thus does not always purchase a solution. In return, it is false-name-proof even when agents own multiple elements. We experimentally evaluate the payment (as well as social surplus) of the second mechanism through simulation.
△ Less
Submitted 12 June, 2011;
originally announced June 2011.