Intervention with Private Information, Imperfect Monitoring and Costly Communication
This paper studies the interaction between a designer and a group of strategic and self-interested users who possess information the designer does not have. Because the users are strategic and self-interested, they will act to their own advantage, which will often be different from the interest of t...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on communications 2013-08, Vol.61 (8), p.3192-3205 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3205 |
---|---|
container_issue | 8 |
container_start_page | 3192 |
container_title | IEEE transactions on communications |
container_volume | 61 |
creator | Canzian, Luca Yuanzhang Xiao Zame, W. Zorzi, M. van der Schaar, M. |
description | This paper studies the interaction between a designer and a group of strategic and self-interested users who possess information the designer does not have. Because the users are strategic and self-interested, they will act to their own advantage, which will often be different from the interest of the designer, even if the latter is benevolent and seeks to maximize (some measure of) social welfare. In the settings we consider, the designer and the users can communicate (perhaps with noise), the designer can observe the actions of the users (perhaps with error) and the designer can commit to (plans of) actions - interventions - of its own. The designer's problem is to construct and implement a mechanism that provides incentives for the users to communicate and act in such a way as to further the interest of the designer - despite the fact that they are strategic and self-interested and possess private information. To address the designer's problem we propose a general and flexible framework that applies to many scenarios. To illustrate the usefulness of this framework, we discuss some simple examples, leaving further applications to other papers. In an important class of environments, we find conditions under which the designer can obtain its benchmark optimum - the utility that could be obtained if it had all information and could command the actions of the users - and conditions under which it cannot. More broadly we are able to characterize the solution to the designer's problem, even when it does not yield the benchmark optimum. Because the optimal mechanism may be difficult to construct and implement, we also propose a simpler and more readily implemented mechanism that, while falling short of the optimum, still yields the designer a "good" result. |
doi_str_mv | 10.1109/TCOMM.2013.061013.120558 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_1439733261</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6544194</ieee_id><sourcerecordid>1439733261</sourcerecordid><originalsourceid>FETCH-LOGICAL-c370t-e63d493646b8749bf88d2c74129f8674b4e1078a110125e7a2691ba1522f0d2d3</originalsourceid><addsrcrecordid>eNpdkE9P2zAYh61pSOuAT7BLpGnSDqS8r-3YznGqNqjUCg7lbLmJsxkldme7IL49CUE9cPod3uf99xBSICwRob7ere622yUFZEsQOAVSqCr1iSxwjBJUJT-TBUANpZBSfSFfU3oEAA6MLchu7bONT9ZnF3zx7PK_4j66J5NtsfZdiIOZClfFejjY2NkmF9vgXQ7R-b-F8W2xCin3L2MMw9G75g2_IGed6ZO9fM9z8vDn9251W27ubtarX5uyYRJyaQVrec0EF3sleb3vlGppIznSulNC8j23CFKZ8U-klZWGihr3BitKO2hpy87Jz3nuIYb_R5uyHlxqbN8bb8MxaeSsloxRgSP6_QP6GI7Rj9eNFJWcMqZgpNRMNTGkFG2nD9ENJr5oBD3p1m-69aRbz7r1rHts_fG-wKTG9F00vnHp1E-lkArZxH2bOWetPZVFxTnWnL0C7ISIHQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1427423380</pqid></control><display><type>article</type><title>Intervention with Private Information, Imperfect Monitoring and Costly Communication</title><source>IEEE Electronic Library (IEL)</source><creator>Canzian, Luca ; Yuanzhang Xiao ; Zame, W. ; Zorzi, M. ; van der Schaar, M.</creator><creatorcontrib>Canzian, Luca ; Yuanzhang Xiao ; Zame, W. ; Zorzi, M. ; van der Schaar, M.</creatorcontrib><description>This paper studies the interaction between a designer and a group of strategic and self-interested users who possess information the designer does not have. Because the users are strategic and self-interested, they will act to their own advantage, which will often be different from the interest of the designer, even if the latter is benevolent and seeks to maximize (some measure of) social welfare. In the settings we consider, the designer and the users can communicate (perhaps with noise), the designer can observe the actions of the users (perhaps with error) and the designer can commit to (plans of) actions - interventions - of its own. The designer's problem is to construct and implement a mechanism that provides incentives for the users to communicate and act in such a way as to further the interest of the designer - despite the fact that they are strategic and self-interested and possess private information. To address the designer's problem we propose a general and flexible framework that applies to many scenarios. To illustrate the usefulness of this framework, we discuss some simple examples, leaving further applications to other papers. In an important class of environments, we find conditions under which the designer can obtain its benchmark optimum - the utility that could be obtained if it had all information and could command the actions of the users - and conditions under which it cannot. More broadly we are able to characterize the solution to the designer's problem, even when it does not yield the benchmark optimum. Because the optimal mechanism may be difficult to construct and implement, we also propose a simpler and more readily implemented mechanism that, while falling short of the optimum, still yields the designer a "good" result.</description><identifier>ISSN: 0090-6778</identifier><identifier>EISSN: 1558-0857</identifier><identifier>DOI: 10.1109/TCOMM.2013.061013.120558</identifier><identifier>CODEN: IECMBT</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Benchmark testing ; Benchmarking ; Construction ; Economic models ; Economics ; Exact sciences and technology ; Falling ; Game theory ; Games ; General aspects ; Incentives ; incomplete information ; intervention ; mechanism design ; Monitoring ; Noise ; Operational research and scientific management ; Operational research. Management science ; Optimization ; Pricing ; Probability distribution ; Protocols ; resource allocation ; Studies ; Utilities</subject><ispartof>IEEE transactions on communications, 2013-08, Vol.61 (8), p.3192-3205</ispartof><rights>2015 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c370t-e63d493646b8749bf88d2c74129f8674b4e1078a110125e7a2691ba1522f0d2d3</citedby><cites>FETCH-LOGICAL-c370t-e63d493646b8749bf88d2c74129f8674b4e1078a110125e7a2691ba1522f0d2d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6544194$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6544194$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27678138$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Canzian, Luca</creatorcontrib><creatorcontrib>Yuanzhang Xiao</creatorcontrib><creatorcontrib>Zame, W.</creatorcontrib><creatorcontrib>Zorzi, M.</creatorcontrib><creatorcontrib>van der Schaar, M.</creatorcontrib><title>Intervention with Private Information, Imperfect Monitoring and Costly Communication</title><title>IEEE transactions on communications</title><addtitle>TCOMM</addtitle><description>This paper studies the interaction between a designer and a group of strategic and self-interested users who possess information the designer does not have. Because the users are strategic and self-interested, they will act to their own advantage, which will often be different from the interest of the designer, even if the latter is benevolent and seeks to maximize (some measure of) social welfare. In the settings we consider, the designer and the users can communicate (perhaps with noise), the designer can observe the actions of the users (perhaps with error) and the designer can commit to (plans of) actions - interventions - of its own. The designer's problem is to construct and implement a mechanism that provides incentives for the users to communicate and act in such a way as to further the interest of the designer - despite the fact that they are strategic and self-interested and possess private information. To address the designer's problem we propose a general and flexible framework that applies to many scenarios. To illustrate the usefulness of this framework, we discuss some simple examples, leaving further applications to other papers. In an important class of environments, we find conditions under which the designer can obtain its benchmark optimum - the utility that could be obtained if it had all information and could command the actions of the users - and conditions under which it cannot. More broadly we are able to characterize the solution to the designer's problem, even when it does not yield the benchmark optimum. Because the optimal mechanism may be difficult to construct and implement, we also propose a simpler and more readily implemented mechanism that, while falling short of the optimum, still yields the designer a "good" result.</description><subject>Applied sciences</subject><subject>Benchmark testing</subject><subject>Benchmarking</subject><subject>Construction</subject><subject>Economic models</subject><subject>Economics</subject><subject>Exact sciences and technology</subject><subject>Falling</subject><subject>Game theory</subject><subject>Games</subject><subject>General aspects</subject><subject>Incentives</subject><subject>incomplete information</subject><subject>intervention</subject><subject>mechanism design</subject><subject>Monitoring</subject><subject>Noise</subject><subject>Operational research and scientific management</subject><subject>Operational research. Management science</subject><subject>Optimization</subject><subject>Pricing</subject><subject>Probability distribution</subject><subject>Protocols</subject><subject>resource allocation</subject><subject>Studies</subject><subject>Utilities</subject><issn>0090-6778</issn><issn>1558-0857</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE9P2zAYh61pSOuAT7BLpGnSDqS8r-3YznGqNqjUCg7lbLmJsxkldme7IL49CUE9cPod3uf99xBSICwRob7ere622yUFZEsQOAVSqCr1iSxwjBJUJT-TBUANpZBSfSFfU3oEAA6MLchu7bONT9ZnF3zx7PK_4j66J5NtsfZdiIOZClfFejjY2NkmF9vgXQ7R-b-F8W2xCin3L2MMw9G75g2_IGed6ZO9fM9z8vDn9251W27ubtarX5uyYRJyaQVrec0EF3sleb3vlGppIznSulNC8j23CFKZ8U-klZWGihr3BitKO2hpy87Jz3nuIYb_R5uyHlxqbN8bb8MxaeSsloxRgSP6_QP6GI7Rj9eNFJWcMqZgpNRMNTGkFG2nD9ENJr5oBD3p1m-69aRbz7r1rHts_fG-wKTG9F00vnHp1E-lkArZxH2bOWetPZVFxTnWnL0C7ISIHQ</recordid><startdate>20130801</startdate><enddate>20130801</enddate><creator>Canzian, Luca</creator><creator>Yuanzhang Xiao</creator><creator>Zame, W.</creator><creator>Zorzi, M.</creator><creator>van der Schaar, M.</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20130801</creationdate><title>Intervention with Private Information, Imperfect Monitoring and Costly Communication</title><author>Canzian, Luca ; Yuanzhang Xiao ; Zame, W. ; Zorzi, M. ; van der Schaar, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c370t-e63d493646b8749bf88d2c74129f8674b4e1078a110125e7a2691ba1522f0d2d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Applied sciences</topic><topic>Benchmark testing</topic><topic>Benchmarking</topic><topic>Construction</topic><topic>Economic models</topic><topic>Economics</topic><topic>Exact sciences and technology</topic><topic>Falling</topic><topic>Game theory</topic><topic>Games</topic><topic>General aspects</topic><topic>Incentives</topic><topic>incomplete information</topic><topic>intervention</topic><topic>mechanism design</topic><topic>Monitoring</topic><topic>Noise</topic><topic>Operational research and scientific management</topic><topic>Operational research. Management science</topic><topic>Optimization</topic><topic>Pricing</topic><topic>Probability distribution</topic><topic>Protocols</topic><topic>resource allocation</topic><topic>Studies</topic><topic>Utilities</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Canzian, Luca</creatorcontrib><creatorcontrib>Yuanzhang Xiao</creatorcontrib><creatorcontrib>Zame, W.</creatorcontrib><creatorcontrib>Zorzi, M.</creatorcontrib><creatorcontrib>van der Schaar, M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Canzian, Luca</au><au>Yuanzhang Xiao</au><au>Zame, W.</au><au>Zorzi, M.</au><au>van der Schaar, M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intervention with Private Information, Imperfect Monitoring and Costly Communication</atitle><jtitle>IEEE transactions on communications</jtitle><stitle>TCOMM</stitle><date>2013-08-01</date><risdate>2013</risdate><volume>61</volume><issue>8</issue><spage>3192</spage><epage>3205</epage><pages>3192-3205</pages><issn>0090-6778</issn><eissn>1558-0857</eissn><coden>IECMBT</coden><abstract>This paper studies the interaction between a designer and a group of strategic and self-interested users who possess information the designer does not have. Because the users are strategic and self-interested, they will act to their own advantage, which will often be different from the interest of the designer, even if the latter is benevolent and seeks to maximize (some measure of) social welfare. In the settings we consider, the designer and the users can communicate (perhaps with noise), the designer can observe the actions of the users (perhaps with error) and the designer can commit to (plans of) actions - interventions - of its own. The designer's problem is to construct and implement a mechanism that provides incentives for the users to communicate and act in such a way as to further the interest of the designer - despite the fact that they are strategic and self-interested and possess private information. To address the designer's problem we propose a general and flexible framework that applies to many scenarios. To illustrate the usefulness of this framework, we discuss some simple examples, leaving further applications to other papers. In an important class of environments, we find conditions under which the designer can obtain its benchmark optimum - the utility that could be obtained if it had all information and could command the actions of the users - and conditions under which it cannot. More broadly we are able to characterize the solution to the designer's problem, even when it does not yield the benchmark optimum. Because the optimal mechanism may be difficult to construct and implement, we also propose a simpler and more readily implemented mechanism that, while falling short of the optimum, still yields the designer a "good" result.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TCOMM.2013.061013.120558</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0090-6778 |
ispartof | IEEE transactions on communications, 2013-08, Vol.61 (8), p.3192-3205 |
issn | 0090-6778 1558-0857 |
language | eng |
recordid | cdi_proquest_miscellaneous_1439733261 |
source | IEEE Electronic Library (IEL) |
subjects | Applied sciences Benchmark testing Benchmarking Construction Economic models Economics Exact sciences and technology Falling Game theory Games General aspects Incentives incomplete information intervention mechanism design Monitoring Noise Operational research and scientific management Operational research. Management science Optimization Pricing Probability distribution Protocols resource allocation Studies Utilities |
title | Intervention with Private Information, Imperfect Monitoring and Costly Communication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T15%3A04%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intervention%20with%20Private%20Information,%20Imperfect%20Monitoring%20and%20Costly%20Communication&rft.jtitle=IEEE%20transactions%20on%20communications&rft.au=Canzian,%20Luca&rft.date=2013-08-01&rft.volume=61&rft.issue=8&rft.spage=3192&rft.epage=3205&rft.pages=3192-3205&rft.issn=0090-6778&rft.eissn=1558-0857&rft.coden=IECMBT&rft_id=info:doi/10.1109/TCOMM.2013.061013.120558&rft_dat=%3Cproquest_RIE%3E1439733261%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1427423380&rft_id=info:pmid/&rft_ieee_id=6544194&rfr_iscdi=true |