Chapter 10
Matching Markets
From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World.
By David Easley and Jon Kleinberg. Cambridge University Press, 2010.
Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/
We have now seen a number of ways of thinking both about network structure and
about the behavior of agents as they interact with each other. A few of our examples have
brought these together directly — such as the issue of tra!c in a network, including Braess’s
Paradox — and in the next few chapters we explore this convergence of network structure
and strategic interaction more fully, and in a range of di"erent settings.
First, we think about markets as a prime example of network-structured interaction
between many agents. When we consider markets creating opportunities for interaction
among buyers and sellers, there is an implicit network encoding the access between these
buyers and sellers. In fact, there are a number of ways of using networks to model interactions
among market participants, and we will discuss several of these models. Later, in Chapter 12
on network exchange theory, we will discuss how market-style interactions become a metaphor
for the broad notion of social exchange, in which the social dynamics within a group can be
modeled by the power imbalances of the interactions within the group’s social network.
10.1 Bipartite Graphs and Perfect Matchings
Matching markets form the first class of models we consider, as the focus of the current
chapter. Matching markets have a long history of study in economics, operations research,
and other areas because they embody, in a very clean and stylized way, a number of basic
principles: the way in which people may have di"erent preferences for di"erent kinds of
goods, the way in which prices can decentralize the allocation of goods to people, and the
way in which such prices can in fact lead to allocations that are socially optimal.
We will introduce these various ingredients gradually, by progressing through a succession
of increasingly rich models. We begin with a setting in which goods will be allocated to people
Draft version: June 10, 2010
277
278 CHAPTER 10. MATCHING MARKETS
Room1
Room2
Room3
Room4
Room5
Vikram
Wendy
Xin
Yoram
Zoe
(a) Bipartite Graph
Room1
Room2
Room3
Room4
Room5
Vikram
Wendy
Xin
Yoram
Zoe
(b) A Perfect Matching
Figure 10.1: (a) An example of a bipartite graph. (b) A perfect matching in this graph,
indicated via the dark edges.
based on preferences, and these preferences will be expressed in network form, but there is
no explicit buying, selling, or price-setting. This first setting will also be a crucial component
of the more complex ones that follow.
Bipartite Graphs. The model we start with is called the bipartite matching problem, and
we can motivate it via the following scenario. Suppose that the administrators of a college
dormitory are ...
This document provides an overview of topological quantum computing using anyons. It first discusses motivations for alternative computing approaches due to limitations of traditional computing. It then introduces braid theory, including definitions of braids and their equivalence. Braids form a braid group that can represent any braid as a word. Anyons are quasiparticles that emerge in 2D systems and can represent quantum bits in a way that is robust to environmental perturbations. Braids representing the trajectories of anyons over time can encode quantum information and computations in a topological manner.
This document discusses social networks and methods for analyzing them. It begins by defining social networks and their essential characteristics. It then provides examples of different types of social networks including telephone networks, email networks, collaboration networks, and Wikipedia. It discusses techniques for clustering social networks including betweenness and the Girvan-Newman algorithm. It also covers partitioning graphs, neighborhood properties of graphs, directed graphs, the diameter of graphs, transitive closure, and reachability. Finally, it explains the concept of simrank, which measures node similarity in networks with multiple node types based on the probability of random walkers starting at one node ending up at another.
Methods for Calculating Empires in Quasicrystals Klee Irwin
This paper reviews the empire problem for quasiperiodic tilings and the existing methods for generating the empires of the vertex configurations in quasicrystals, while introducing a new and more efficient method based on the cut-and-project technique. Using Penrose tiling as an example, this method finds the forced tiles with the restrictions in the high dimensional lattice (the mother lattice) that can be cut-and-projected into the lower dimensional quasicrystal. We compare our method to the two existing methods, namely one method that uses the algorithm of the Fibonacci chain to force the Ammann bars in order to find the forced tiles of an empire and the method that follows the work of N.G. de Bruijn on constructing a Penrose tiling as the dual to a pentagrid. This new method is not only conceptually simple and clear, but it also allows us to calculate the empires of the vertex configurations in a defected quasicrystal by reversing the configuration of the quasicrystal to its higher dimensional lattice, where we then apply the restrictions. These advantages may provide a key guiding principle for phason dynamics and an important tool for self error-correction in quasicrystal growth.
This document presents a novel approach for measuring shape similarity and using it for object recognition. The key steps are:
1) Solving the correspondence problem between two shapes by attaching a descriptor called "shape context" to sample points on each shape. Shape context captures the distribution of remaining points relative to the reference point.
2) Using the point correspondences to estimate an aligning transformation between the shapes. This provides a measure of shape similarity as the matching error between corresponding points plus the magnitude of the transformation.
3) Treating recognition as a nearest neighbor problem to find the most similar stored prototype shape. The approach is demonstrated on various datasets including handwritten digits, silhouettes, and 3D objects
(DL輪読)Matching Networks for One Shot LearningMasahiro Suzuki
1. Matching Networks is a neural network architecture proposed by DeepMind for one-shot learning.
2. The network learns to classify novel examples by comparing them to a small support set of examples, using an attention mechanism to focus on the most relevant support examples.
3. The network is trained using a meta-learning approach, where it learns to learn from small support sets to classify novel examples from classes not seen during training.
The document discusses key concepts for quantifying and modeling social networks. It covers the following network properties:
1. Degree distribution - The distribution of the number of connections for each node. Real-world networks often have skewed degree distributions.
2. Path length and diameter - The shortest and longest distances between node pairs, averaged over all pairs. Real-world networks tend to have small path lengths.
3. Clustering coefficient - The likelihood that two neighbors of a node are also neighbors, quantifying local clustering. Social networks exhibit high clustering.
4. Connected components - The size of the largest subset of nodes that are all reachable from each other by paths. Real-world networks often have
This document discusses various topics in computer vision including affinity measures for image segmentation, normalized cuts, human stereopsis, epipolar geometry, and trinocular stereo. It also discusses tracking applications such as motion capture, recognition from motion, surveillance, and targeting. Vehicle tracking is discussed in detail for applications in predicting traffic flow using video from fixed cameras to initiate tracks automatically by constructing regions of interest that span each lane.
Electronic Supplementary Material for: Analytical reasoning task reveals limi...Dario Caliendo
This document provides supplementary material for an article on an analytical reasoning task that revealed limits of social learning in networks. It includes screenshots of the experimental tutorial and quiz questions. It then lists the questions used, including 3 Cognitive Reflection Test (CRT) questions and 4 Berlin Numeracy Test (BNT) questions. Graphs show response patterns to the BNT questions produced little variance. The document describes the network structures used - Barabasi-Albert, clustered, Erdos-Renyi, and full graph - and provides details on their properties at both the micro and macro levels. Finally, it includes graphs showing the evolution of correct and incorrect answers on different network/question combinations.
This document provides an overview of topological quantum computing using anyons. It first discusses motivations for alternative computing approaches due to limitations of traditional computing. It then introduces braid theory, including definitions of braids and their equivalence. Braids form a braid group that can represent any braid as a word. Anyons are quasiparticles that emerge in 2D systems and can represent quantum bits in a way that is robust to environmental perturbations. Braids representing the trajectories of anyons over time can encode quantum information and computations in a topological manner.
This document discusses social networks and methods for analyzing them. It begins by defining social networks and their essential characteristics. It then provides examples of different types of social networks including telephone networks, email networks, collaboration networks, and Wikipedia. It discusses techniques for clustering social networks including betweenness and the Girvan-Newman algorithm. It also covers partitioning graphs, neighborhood properties of graphs, directed graphs, the diameter of graphs, transitive closure, and reachability. Finally, it explains the concept of simrank, which measures node similarity in networks with multiple node types based on the probability of random walkers starting at one node ending up at another.
Methods for Calculating Empires in Quasicrystals Klee Irwin
This paper reviews the empire problem for quasiperiodic tilings and the existing methods for generating the empires of the vertex configurations in quasicrystals, while introducing a new and more efficient method based on the cut-and-project technique. Using Penrose tiling as an example, this method finds the forced tiles with the restrictions in the high dimensional lattice (the mother lattice) that can be cut-and-projected into the lower dimensional quasicrystal. We compare our method to the two existing methods, namely one method that uses the algorithm of the Fibonacci chain to force the Ammann bars in order to find the forced tiles of an empire and the method that follows the work of N.G. de Bruijn on constructing a Penrose tiling as the dual to a pentagrid. This new method is not only conceptually simple and clear, but it also allows us to calculate the empires of the vertex configurations in a defected quasicrystal by reversing the configuration of the quasicrystal to its higher dimensional lattice, where we then apply the restrictions. These advantages may provide a key guiding principle for phason dynamics and an important tool for self error-correction in quasicrystal growth.
This document presents a novel approach for measuring shape similarity and using it for object recognition. The key steps are:
1) Solving the correspondence problem between two shapes by attaching a descriptor called "shape context" to sample points on each shape. Shape context captures the distribution of remaining points relative to the reference point.
2) Using the point correspondences to estimate an aligning transformation between the shapes. This provides a measure of shape similarity as the matching error between corresponding points plus the magnitude of the transformation.
3) Treating recognition as a nearest neighbor problem to find the most similar stored prototype shape. The approach is demonstrated on various datasets including handwritten digits, silhouettes, and 3D objects
(DL輪読)Matching Networks for One Shot LearningMasahiro Suzuki
1. Matching Networks is a neural network architecture proposed by DeepMind for one-shot learning.
2. The network learns to classify novel examples by comparing them to a small support set of examples, using an attention mechanism to focus on the most relevant support examples.
3. The network is trained using a meta-learning approach, where it learns to learn from small support sets to classify novel examples from classes not seen during training.
The document discusses key concepts for quantifying and modeling social networks. It covers the following network properties:
1. Degree distribution - The distribution of the number of connections for each node. Real-world networks often have skewed degree distributions.
2. Path length and diameter - The shortest and longest distances between node pairs, averaged over all pairs. Real-world networks tend to have small path lengths.
3. Clustering coefficient - The likelihood that two neighbors of a node are also neighbors, quantifying local clustering. Social networks exhibit high clustering.
4. Connected components - The size of the largest subset of nodes that are all reachable from each other by paths. Real-world networks often have
This document discusses various topics in computer vision including affinity measures for image segmentation, normalized cuts, human stereopsis, epipolar geometry, and trinocular stereo. It also discusses tracking applications such as motion capture, recognition from motion, surveillance, and targeting. Vehicle tracking is discussed in detail for applications in predicting traffic flow using video from fixed cameras to initiate tracks automatically by constructing regions of interest that span each lane.
Electronic Supplementary Material for: Analytical reasoning task reveals limi...Dario Caliendo
This document provides supplementary material for an article on an analytical reasoning task that revealed limits of social learning in networks. It includes screenshots of the experimental tutorial and quiz questions. It then lists the questions used, including 3 Cognitive Reflection Test (CRT) questions and 4 Berlin Numeracy Test (BNT) questions. Graphs show response patterns to the BNT questions produced little variance. The document describes the network structures used - Barabasi-Albert, clustered, Erdos-Renyi, and full graph - and provides details on their properties at both the micro and macro levels. Finally, it includes graphs showing the evolution of correct and incorrect answers on different network/question combinations.
Principal Component Analysis, or PCA, is a factual method that permits you to sum up the data contained in enormous information tables by methods for a littler arrangement of "synopsis files" that can be all the more handily envisioned and broke down.
This document discusses different definitions of dimension, focusing on topological dimension and Hausdorff dimension. It provides examples of fractals like the Sierpinski triangle and Koch curve that challenge classical dimension definitions. While topological dimension aligns with intuition, the Hausdorff dimension considers how content scales with measurement. The document explains how fractals like the Sierpinski triangle have topological dimension of 1 but area of 0, requiring a fractional Hausdorff dimension to adequately measure their content. This provides the conceptual basis for Mandelbrot's definition of fractals as sets where the Hausdorff dimension exceeds the topological dimension.
The document discusses mathematical constants like pi and explores their digit sequences when expressed in different bases like base 10 and base 2. Despite being defined by simple formulas, the digit sequences of constants like pi appear highly complex and random, with no observable patterns even after examining billions of digits. Other rational numbers with non-terminating repeating digit sequences are also discussed.
This document discusses structured knowledge representation using semantic nets and frames. It covers key concepts like semantic nets, frames, slots, exceptions, probabilistic reasoning, and fuzzy logic. Specifically, it explains how semantic nets can be used to represent relationships between nodes and inheritance of properties, and how frames allow for default values and inheritance of attributes from superclasses.
The document provides information about scale models at a theme park, including:
- A scale model of five areas of the United States was created from 20 million plastic blocks to celebrate diversity in the country.
- The model of the U.S. Capitol building is 7.2 feet tall, which is 40 times smaller than the actual Capitol building.
- The question asks how tall the actual U.S. Capitol building is based on the information given.
This document provides an introduction and overview of a research paper on network synthesis for non-simultaneous requirements. It begins with an abstract describing how the paper will provide an introduction to matroid theory and the greedy algorithm to form the basis for an initial optimal network synthesis algorithm. It will then expand the algorithm to allow for non-uniform cost functions and explore generalizing the problem to allow for multiple commodity flows. The document provides definitions for key concepts like graphs, networks, requirements graphs, and formulates the network synthesis problem. It introduces matroids and the greedy algorithm, proving their relationship and showing how the greedy algorithm can be used to find optimal solutions for matroid problems. It provides an example matroid and greedy algorithm application.
This document discusses analyzing the spectral properties of social networks through their adjacency matrix eigenvalues. While random graph spectral properties are well-researched, less is known about real-world social networks. The author aims to address this gap by examining the eigenvalue spectra of several real social networks to learn about their structural properties. Analyzing network spectra provides insight not available from other analyses and helps characterize complex real-world networks.
The document discusses silhouette analysis, which is a method for validating and interpreting the consistency of clustering results. It defines the silhouette value as a measure of how closely matched an object is to its own cluster compared to other clusters. A high average silhouette value indicates that objects are well-clustered, while a low or negative value suggests the clustering may be inappropriate. The silhouette value ranges from -1 to 1, with higher values representing better clustering.
This document describes a method for simulating complex geological structures using block scenarios. It involves:
1) Creating a binary reference image from a human interpretation of seismic data.
2) Generating blocks of varying sizes based on marker points, with larger blocks in areas of fewer markers.
3) Simulating multiple realizations conditioned on the block scenario to characterize uncertainty.
4) Evaluating uncertainty using probability maps, P10/P90, and identifying areas of higher uncertainty.
This document provides an overview of linear regression machine learning techniques. It introduces linear regression models using one feature and multiple features. It discusses estimating regression coefficients to minimize error and find the best fitting line. The document also covers correlation, explaining that a correlation does not necessarily indicate causation. Multiple linear regression is described as fitting a linear function to multiple predictor variables. The risks of overfitting with too complex a model are noted. Code examples of implementing linear regression in Scikit-Learn and Statsmodels are referenced.
Cardinal direction relations in qualitative spatial reasoningijcsit
This summary provides the key details from the document in 3 sentences:
The document presents a new approach for representing cardinal direction relations in qualitative spatial reasoning. It introduces an efficient technique for calculating and representing grids for spatial objects, and determining the cardinal direction between objects based on their intersection with grid cells. This includes a novel indexing scheme for grid cells that allows simple and direct computation of direction relations between objects.
1. Graphical analysis is a powerful tool for determining relationships between experimental variables. Key is plotting variables such that the relationship appears as a straight line.
2. Linear relationships yield straight lines with slope equaling m and intercept b. Nonlinear relationships may require log-log or semilog plots.
3. Sources of error include measurement uncertainties. Propagating these through calculations yields final result uncertainties.
for sbi so Ds c c++ unix rdbms sql cn osalisha230390
This document contains 35 questions related to data structures and algorithms. It covers topics like data structures used in different areas like databases, networks and hierarchies. Other topics covered include trees, graphs, sorting, hashing and file structures. Sample problems are given related to these topics to test understanding.
Conceptual Spaces for Cognitive Architectures: A Lingua Franca for Different ...Antonio Lieto
We claim that Conceptual Spaces offer a lingua franca that allows to unify and generalize many aspects of the symbolic, sub-symbolic and diagrammatic approaches (by overcoming some of their typical problems) and to integrate them on a common ground. In doing so we extend and detail some of the arguments explored by Gardenfors [23] for defending the need of a conceptual, intermediate, representation level between
the symbolic and the sub-symbolic one. Additionally, we argue that Conceptual Spaces could offer a unifying framework for interpreting many kinds of diagrammatic and analogical representations. As a consequence, their adoption could also favor the integration of diagrammatical representation and
reasoning in Cognitive Architectures
Shape matching and object recognition using shape context belongie pami02irisshicat
1) The document presents a novel approach for measuring shape similarity and using it for object recognition. It involves finding point correspondences between shapes, estimating an aligning transformation, and computing distance as a sum of matching errors and transformation magnitude.
2) At the core is using a "shape context" descriptor at sample points to solve the correspondence problem as a graph matching problem. This provides correspondences to estimate an aligning transformation.
3) Shape similarity is then a measure of matching errors between corresponding points after alignment, allowing nearest neighbor classification for recognition. Results are shown for various datasets.
This document describes a model for measuring positional error when projecting harmonic points onto a circular screen. The model assumes projection of four collinear harmonic points onto a circle, representing a flat image and curved projection surface. Positional error is measured as the angle between projected and actual locations of points from the viewer's perspective. The goals are to determine optimal projector placement and viewer seating to minimize this error, especially for central points where viewers focus most.
Is Abstraction the Key to Artificial Intelligence? - Lorenza SaittaWithTheBest
With this comprehensive breakdown of abstraction's multiple layers and components, we can understand and answer the question if abstraction is essential to artificial intelligence.
Lorenza Saitta, Università del Piemonte Orientale
This document discusses network science and graph theory. It begins by introducing the Human Disease Network, which connects diseases that share a common genetic origin. It then crossed disciplinary boundaries and was featured in various publications and exhibitions. The rest of the document discusses network representations as graphs, using the example of the Bridges of Königsberg problem solved by Euler in 1735. It introduces basic graph concepts like nodes, links, directed and undirected networks, and discusses how different systems can be represented by the same graph structure.
This document describes a lesson plan for teaching students about transformations of quadratics. The lesson uses TI-Inspire software to allow students to explore how changing the coefficients a, b, and c affects the graph of a quadratic function. Students will first investigate how a affects the shape of the graph using sliders. They will then explore how b changes the location of the vertex and how c changes the y-intercept. Finally, students will graph multiple functions with roots of 3 and 5 to analyze similarities and differences between the graphs. The technology enables efficient exploration and comparison of graphs to build conceptual understanding of quadratic transformations.
Examine how nature is discussed throughout The Open Boat.” Loo.docxcravennichole326
Examine how nature is discussed throughout “The Open Boat.” Look at the literary critical piece by Anthony Channell Hilfer. Once you have established your own ideas, consider how Hilfer discusses nature in the short story and analyze the following questions: What does nature mean to the men aboard the boat? or Do their perceptions of nature shift throughout the story? Why or why not?
Do their perceptions of nature shift throughout the story? Why or why not?
Write down a loose response about what I think of the question and what I remember of the story.
ICE method.
I introduce the citation
C the citation itself
E explain its meaning to your argument.
The scenes shift with no discernable rhyme or reason. Crane invites every reader in. Critic Anthony Channell Hilfer disagrees with point, saying, “Crane’s image is an accusation of the putative picturesque spectators” (Hilfer 254). Hilfer’s challenge goes against what Crane is trying to do, by making nature a copilot through the reading.
3. Nature as Protagonist in “The Open Boat”
Anthony Channell Hilfer
Texas Studies in Literature and Language, Volume 54, Number 2, Summer
2012, pp. 248-257 (Article)
Published by University of Texas Press
DOI:
For additional information about this article
[ Access provided at 9 Apr 2020 17:36 GMT from Marymount University & (Viva) ]
https://doi.org/10.1353/tsl.2012.0012
https://muse.jhu.edu/article/476402
https://doi.org/10.1353/tsl.2012.0012
https://muse.jhu.edu/article/476402
Anthony Channell Hilfer248
3. Nature as Protagonist in “The Open Boat”
The bottom of the sea is cruel.
—Hart Crane, “Voyages”
As many critics have argued, questions of perspective and epistemology are
central to Stephen Crane’s “The Open Boat” (Kent; Hutchinson). The story’s
first sentence famously clues us to this: “None of them knew the color of
the sky” (68). But behind the uncertainties of perspective is a determinable
ontology, a presence, or rather, I shall argue, a sort of presence, the existence
of which implies a rectified aesthetic response. This response emerges, how-
ever, from negations, denials, and occultations: what is not seen, who is not
there, and what does not happen.3 Here again, when we look at nature we
behold things that are not there and miss “the nothing that is.”
Fully as much as Stevens in “The Snow Man,” Crane is concerned
with certain conventions of representation: personification, the pictur-
esque, the American sublime, and the melodramatic, which although it
does not inform “The Snow Man” is played on in Stevens’s “The Ameri-
can Sublime.” Crane’s story is intertextual with nature poetry, sentimental
poetry, hymns, and landscape art, as well as with Darwinism, theological
clichés, and, less obviously, theological actualities. For the most part these
conventions add up to what the Stevens poem declares is “not there.” To
get to “the nothing that is” we must first traverse this ocean of error. Doing
so helps keep our p.
Examine All Children Can Learn. Then, search the web for effec.docxcravennichole326
Examine
"All Children Can Learn"
. Then, search the web for effective, evidence-based differentiated strategies that are engaging, motivating, and address the needs of individual learners.
First, provide five evidence-based strategies:
Two instructional strategies (i.e., graphic organizers),
Two instructional tools (e.g., technology tool, device or iPad App, Web Quests, etc.),
One activity (e.g., Think-Pair-Share).
Second, for the two instructional strategies you listed explain how you can alter each to address the classroom needs you designed in Weeks One and Two and how the modification is relevant to the theory of differentiation.
.
More Related Content
Similar to Chapter 10Matching MarketsFrom the book Networks, Crow.docx
Principal Component Analysis, or PCA, is a factual method that permits you to sum up the data contained in enormous information tables by methods for a littler arrangement of "synopsis files" that can be all the more handily envisioned and broke down.
This document discusses different definitions of dimension, focusing on topological dimension and Hausdorff dimension. It provides examples of fractals like the Sierpinski triangle and Koch curve that challenge classical dimension definitions. While topological dimension aligns with intuition, the Hausdorff dimension considers how content scales with measurement. The document explains how fractals like the Sierpinski triangle have topological dimension of 1 but area of 0, requiring a fractional Hausdorff dimension to adequately measure their content. This provides the conceptual basis for Mandelbrot's definition of fractals as sets where the Hausdorff dimension exceeds the topological dimension.
The document discusses mathematical constants like pi and explores their digit sequences when expressed in different bases like base 10 and base 2. Despite being defined by simple formulas, the digit sequences of constants like pi appear highly complex and random, with no observable patterns even after examining billions of digits. Other rational numbers with non-terminating repeating digit sequences are also discussed.
This document discusses structured knowledge representation using semantic nets and frames. It covers key concepts like semantic nets, frames, slots, exceptions, probabilistic reasoning, and fuzzy logic. Specifically, it explains how semantic nets can be used to represent relationships between nodes and inheritance of properties, and how frames allow for default values and inheritance of attributes from superclasses.
The document provides information about scale models at a theme park, including:
- A scale model of five areas of the United States was created from 20 million plastic blocks to celebrate diversity in the country.
- The model of the U.S. Capitol building is 7.2 feet tall, which is 40 times smaller than the actual Capitol building.
- The question asks how tall the actual U.S. Capitol building is based on the information given.
This document provides an introduction and overview of a research paper on network synthesis for non-simultaneous requirements. It begins with an abstract describing how the paper will provide an introduction to matroid theory and the greedy algorithm to form the basis for an initial optimal network synthesis algorithm. It will then expand the algorithm to allow for non-uniform cost functions and explore generalizing the problem to allow for multiple commodity flows. The document provides definitions for key concepts like graphs, networks, requirements graphs, and formulates the network synthesis problem. It introduces matroids and the greedy algorithm, proving their relationship and showing how the greedy algorithm can be used to find optimal solutions for matroid problems. It provides an example matroid and greedy algorithm application.
This document discusses analyzing the spectral properties of social networks through their adjacency matrix eigenvalues. While random graph spectral properties are well-researched, less is known about real-world social networks. The author aims to address this gap by examining the eigenvalue spectra of several real social networks to learn about their structural properties. Analyzing network spectra provides insight not available from other analyses and helps characterize complex real-world networks.
The document discusses silhouette analysis, which is a method for validating and interpreting the consistency of clustering results. It defines the silhouette value as a measure of how closely matched an object is to its own cluster compared to other clusters. A high average silhouette value indicates that objects are well-clustered, while a low or negative value suggests the clustering may be inappropriate. The silhouette value ranges from -1 to 1, with higher values representing better clustering.
This document describes a method for simulating complex geological structures using block scenarios. It involves:
1) Creating a binary reference image from a human interpretation of seismic data.
2) Generating blocks of varying sizes based on marker points, with larger blocks in areas of fewer markers.
3) Simulating multiple realizations conditioned on the block scenario to characterize uncertainty.
4) Evaluating uncertainty using probability maps, P10/P90, and identifying areas of higher uncertainty.
This document provides an overview of linear regression machine learning techniques. It introduces linear regression models using one feature and multiple features. It discusses estimating regression coefficients to minimize error and find the best fitting line. The document also covers correlation, explaining that a correlation does not necessarily indicate causation. Multiple linear regression is described as fitting a linear function to multiple predictor variables. The risks of overfitting with too complex a model are noted. Code examples of implementing linear regression in Scikit-Learn and Statsmodels are referenced.
Cardinal direction relations in qualitative spatial reasoningijcsit
This summary provides the key details from the document in 3 sentences:
The document presents a new approach for representing cardinal direction relations in qualitative spatial reasoning. It introduces an efficient technique for calculating and representing grids for spatial objects, and determining the cardinal direction between objects based on their intersection with grid cells. This includes a novel indexing scheme for grid cells that allows simple and direct computation of direction relations between objects.
1. Graphical analysis is a powerful tool for determining relationships between experimental variables. Key is plotting variables such that the relationship appears as a straight line.
2. Linear relationships yield straight lines with slope equaling m and intercept b. Nonlinear relationships may require log-log or semilog plots.
3. Sources of error include measurement uncertainties. Propagating these through calculations yields final result uncertainties.
for sbi so Ds c c++ unix rdbms sql cn osalisha230390
This document contains 35 questions related to data structures and algorithms. It covers topics like data structures used in different areas like databases, networks and hierarchies. Other topics covered include trees, graphs, sorting, hashing and file structures. Sample problems are given related to these topics to test understanding.
Conceptual Spaces for Cognitive Architectures: A Lingua Franca for Different ...Antonio Lieto
We claim that Conceptual Spaces offer a lingua franca that allows to unify and generalize many aspects of the symbolic, sub-symbolic and diagrammatic approaches (by overcoming some of their typical problems) and to integrate them on a common ground. In doing so we extend and detail some of the arguments explored by Gardenfors [23] for defending the need of a conceptual, intermediate, representation level between
the symbolic and the sub-symbolic one. Additionally, we argue that Conceptual Spaces could offer a unifying framework for interpreting many kinds of diagrammatic and analogical representations. As a consequence, their adoption could also favor the integration of diagrammatical representation and
reasoning in Cognitive Architectures
Shape matching and object recognition using shape context belongie pami02irisshicat
1) The document presents a novel approach for measuring shape similarity and using it for object recognition. It involves finding point correspondences between shapes, estimating an aligning transformation, and computing distance as a sum of matching errors and transformation magnitude.
2) At the core is using a "shape context" descriptor at sample points to solve the correspondence problem as a graph matching problem. This provides correspondences to estimate an aligning transformation.
3) Shape similarity is then a measure of matching errors between corresponding points after alignment, allowing nearest neighbor classification for recognition. Results are shown for various datasets.
This document describes a model for measuring positional error when projecting harmonic points onto a circular screen. The model assumes projection of four collinear harmonic points onto a circle, representing a flat image and curved projection surface. Positional error is measured as the angle between projected and actual locations of points from the viewer's perspective. The goals are to determine optimal projector placement and viewer seating to minimize this error, especially for central points where viewers focus most.
Is Abstraction the Key to Artificial Intelligence? - Lorenza SaittaWithTheBest
With this comprehensive breakdown of abstraction's multiple layers and components, we can understand and answer the question if abstraction is essential to artificial intelligence.
Lorenza Saitta, Università del Piemonte Orientale
This document discusses network science and graph theory. It begins by introducing the Human Disease Network, which connects diseases that share a common genetic origin. It then crossed disciplinary boundaries and was featured in various publications and exhibitions. The rest of the document discusses network representations as graphs, using the example of the Bridges of Königsberg problem solved by Euler in 1735. It introduces basic graph concepts like nodes, links, directed and undirected networks, and discusses how different systems can be represented by the same graph structure.
This document describes a lesson plan for teaching students about transformations of quadratics. The lesson uses TI-Inspire software to allow students to explore how changing the coefficients a, b, and c affects the graph of a quadratic function. Students will first investigate how a affects the shape of the graph using sliders. They will then explore how b changes the location of the vertex and how c changes the y-intercept. Finally, students will graph multiple functions with roots of 3 and 5 to analyze similarities and differences between the graphs. The technology enables efficient exploration and comparison of graphs to build conceptual understanding of quadratic transformations.
Similar to Chapter 10Matching MarketsFrom the book Networks, Crow.docx (20)
Examine how nature is discussed throughout The Open Boat.” Loo.docxcravennichole326
Examine how nature is discussed throughout “The Open Boat.” Look at the literary critical piece by Anthony Channell Hilfer. Once you have established your own ideas, consider how Hilfer discusses nature in the short story and analyze the following questions: What does nature mean to the men aboard the boat? or Do their perceptions of nature shift throughout the story? Why or why not?
Do their perceptions of nature shift throughout the story? Why or why not?
Write down a loose response about what I think of the question and what I remember of the story.
ICE method.
I introduce the citation
C the citation itself
E explain its meaning to your argument.
The scenes shift with no discernable rhyme or reason. Crane invites every reader in. Critic Anthony Channell Hilfer disagrees with point, saying, “Crane’s image is an accusation of the putative picturesque spectators” (Hilfer 254). Hilfer’s challenge goes against what Crane is trying to do, by making nature a copilot through the reading.
3. Nature as Protagonist in “The Open Boat”
Anthony Channell Hilfer
Texas Studies in Literature and Language, Volume 54, Number 2, Summer
2012, pp. 248-257 (Article)
Published by University of Texas Press
DOI:
For additional information about this article
[ Access provided at 9 Apr 2020 17:36 GMT from Marymount University & (Viva) ]
https://doi.org/10.1353/tsl.2012.0012
https://muse.jhu.edu/article/476402
https://doi.org/10.1353/tsl.2012.0012
https://muse.jhu.edu/article/476402
Anthony Channell Hilfer248
3. Nature as Protagonist in “The Open Boat”
The bottom of the sea is cruel.
—Hart Crane, “Voyages”
As many critics have argued, questions of perspective and epistemology are
central to Stephen Crane’s “The Open Boat” (Kent; Hutchinson). The story’s
first sentence famously clues us to this: “None of them knew the color of
the sky” (68). But behind the uncertainties of perspective is a determinable
ontology, a presence, or rather, I shall argue, a sort of presence, the existence
of which implies a rectified aesthetic response. This response emerges, how-
ever, from negations, denials, and occultations: what is not seen, who is not
there, and what does not happen.3 Here again, when we look at nature we
behold things that are not there and miss “the nothing that is.”
Fully as much as Stevens in “The Snow Man,” Crane is concerned
with certain conventions of representation: personification, the pictur-
esque, the American sublime, and the melodramatic, which although it
does not inform “The Snow Man” is played on in Stevens’s “The Ameri-
can Sublime.” Crane’s story is intertextual with nature poetry, sentimental
poetry, hymns, and landscape art, as well as with Darwinism, theological
clichés, and, less obviously, theological actualities. For the most part these
conventions add up to what the Stevens poem declares is “not there.” To
get to “the nothing that is” we must first traverse this ocean of error. Doing
so helps keep our p.
Examine All Children Can Learn. Then, search the web for effec.docxcravennichole326
Examine
"All Children Can Learn"
. Then, search the web for effective, evidence-based differentiated strategies that are engaging, motivating, and address the needs of individual learners.
First, provide five evidence-based strategies:
Two instructional strategies (i.e., graphic organizers),
Two instructional tools (e.g., technology tool, device or iPad App, Web Quests, etc.),
One activity (e.g., Think-Pair-Share).
Second, for the two instructional strategies you listed explain how you can alter each to address the classroom needs you designed in Weeks One and Two and how the modification is relevant to the theory of differentiation.
.
Examine each of these items, which are available on the internet .docxcravennichole326
Examine each of these items, which are available on the internet:
1) for music, listen to the first movement of J.S. Bach's MAGNIFICAT; this is the High Baroque era. If you can find a performance with Sir John Eliot Gardiner and his Monteverdi Choir and the English Baroque soloists, go for it.
2) For art, find Giovanni Bellini's ST. FRANCIS IN THE DESERT; you might want to read up on the background of this wonderful painting. Not only St. Francis, but what else do you notice i the painting?
3) For architecture, look at the church at Melk Abbey, Austria; BE SURE to look at the interior shots. Again,
this is high Baroque--but in post-Reformation Catholicism, it had a political aim, too; can you figure it out?
After you have analyzed these, telling what you think the artists/musicians valued and were trying to express, tell me what
YOU think about them! Remember, if you read up on these items, LIST THE WORKS YOU CONSULTED! That way, you avoid plagiarism.
write a 1-page paper on each of these three, telling 1) where they found this value, 2) why it was important “back then,” and 3) is it still around today.
.
Examine a web browser interface and describe the various forms .docxcravennichole326
Examine a web browser interface and describe the various forms of analogy and composite interface metaphors that have been used in its design. What familiar knowledge has been combined with new functionality? need a couple of paragraphs.. and one reference
need this in the next 4 hours..
.
Examine a scenario that includes an inter-group conflict. In this sc.docxcravennichole326
Examine a scenario that includes an inter-group conflict. In this scenario, you are recognized as an authority in cross-cultural psychology and asked to serve as a consultant to help resolve the conflict. You will be asked to write up your recommendations in a 6-page paper not including your title and reference page.
Darley, J.M. & Latané, B. (1968). Bystander interview in emergencies: Diffusion of responsibility.
Journal of Personality and Social Psychology, 8
(4), 377-383.
Scenario: Culture, Psychology, and Community
Imagine an international organization has approached you to help resolve an inter-group conflict. You are an authority in cross-cultural psychology and have been asked to serve as a consultant based on a recent violent conflict involving a refugee community in your town and a local community organization. In the days, weeks, and months leading up to the violent conflict, there were incidents of discrimination and debates regarding the different views and practices people held about work, family, schools, and religious practice. Among the controversies has been the role of women’s participation in political, educational, and community groups
.
Part 1: Developing an Understanding
(2 pages)
Based on the scenario, explain how you can help integrate the two diverse communities so that there is increased understanding and appreciation of each group by the other group. (
Note
: Make sure to include in your explanation the different views and practices of cultural groups as well as the role of women.)
Based on your knowledge of culture and psychology, provide three possible suggestions/solutions that will help the community as a whole. In your suggestions make sure to include an explanation regarding group think and individualism vs. collectivism.
Part 2: Socio-Emotional, Cognitive, and Behavioral Aspects
(2 pages)
Based on your explanations in Part 1, how do your suggestions/solutions impact the socio-emotional, cognitive, and behavior aspects of the scenario and why?
Part 3: Gender, Cultural Values and Dimensions, and Group Dynamics
(2 pages)
Explain the impact of gender, cultural values and dimensions, and group dynamics in the scenario.
Further explain any implications that may arise from when working between and within groups.
Support your Assignment by citing all resources in APA style, including those in the Learning Resources.
.
Examine a current law, or a bill proposing a law, that has to do wit.docxcravennichole326
Examine a current law, or a bill proposing a law, that has to do with technology and criminal activity. The law can be at the state or federal level. Identify the law or bill, where it comes from, and its purpose or intent. Next, identify positive outcomes if the law is successful. Finally, identify at least two unintended consequences that the law could bring about. . . DUE 4/18, 2021
.
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxcravennichole326
Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT repeat the questions. Only submit your answers for example 1.A, 2. B……Ect
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate B. high-speed interface
C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network
interconnection devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network
interconnection devices
D. limited distances, limited capacity, and inappropriate network
interconnection devices
3. Which of following is NOT one of the designs that determines data rate and
distance?
A. the number of senders B. the number of receivers
C. transmission impairment D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth B. attenuation
C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation
C. electromagnetic isolation D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS B. SQL C. API D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server B. minicomputer C. PaaS D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds B. its high overhead
C. the extensive use of in-band signaling D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling B. outband signaling
C. common channel signaling D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell
C. packet D. segment
13. When using ATM, which of the following is NOT one of the advantages for the
use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C.
EXAM
Estructura 8.1 - Miniprueba A
Verbos
Complete the chart with the correct verb forms.
infinitivo
seguir
(1) [removed]
yo
(2) [removed]
morí
tú
seguiste
(3) [removed]
nosotras
seguimos
(4) [removed]
ellos
(5) [removed]
murieron
Completar
Fill in the blanks with the correct preterite forms of the verbs in parentheses.
Diego y Javier [removed] (conseguir) un mapa.
Esta mañana usted [removed] (despedirse) de los estudiantes.
Tú [removed] (sentirse) mal ayer.
La semana pasada yo no [removed] (dormir) bien.
Amparo [removed] (preferir) comer en casa.
Oraciones
Write sentences using the information provided. Use the preterite and make any necessary changes.
Modelo
Edgar / preferir / pollo asado
Edgar prefirió el pollo asado.
Álvaro y yo / servir / los entremeses
[removed]
¿quién / repetir / las instrucciones?
[removed]
ayer / yo / despedirse / de / mis sobrinos
[removed]
ustedes / dormirse / a las diez
[removed]
La cena
Fill in the blanks with the preterite form of the appropriate verbs from the list. Four verbs will not be used.
abrir
conseguir
escoger
leer
mirar
pedir
preferir
probar
repetir
sentirse
servir
vestirse
Anoche Jorge, Iván y yo salimos a cenar a Mi Tierra, un restaurante guatemalteco. Nosotros
(1) [removed]
este lugar porque Jorge
(2) [removed]
una reseña (
review
) en Internet que decía (
said
) que la comida es auténtica y muy sabrosa. No es un restaurante elegante; entonces nosotros
(3) [removed]
de bluejeans. De verdad, en Mi Tierra mis amigos y yo
(4) [removed]
como (
like
) en casa. El camarero que nos
(5) [removed]
fue muy amable. Para empezar, Jorge e Iván
(6) [removed]
tamales, pero yo
(7) [removed]
esperar el plato principal: carne de res con arroz y frijoles. Comimos tanto (
so much
) que no
(8) [removed]
nada de postre (
dessert
). ¡Fue una cena deliciosa!
.
Examine current practice guidelines related to suicide screeni.docxcravennichole326
Examine current practice guidelines related to suicide screening and prevention and how they could pertain to John.
Choose two of the following questions to answer as part of your initial post.
What events in John's life created a "downward spiral" into homelessness and hopelessness? Which events were related to social needs, mental health needs, and medical needs, and which could health care have addressed?
What were some of the barriers John faced in accessing medical care and mental health care?
How does homelessness and mental illness intersect? Do you believe homelessness may develop because of a mental health issue, or do you believe those who become homeless eventually sink into psychological despair?
The tipping point for many people who live at the margins of society may be things that could have been managed given the right support. How can your role as an APRN help identify, alleviate, or support those who are in need like John?
In your own experience, have you encountered a homeless individual? What was that like? Do you recall what you were thinking?
Please include at least three scholarly sources within your initial post.
Rubric:
Discussion Question Rubric
Note:
Scholarly resources are defined as evidence-based practice, peer-reviewed journals; textbook (do not rely solely on your textbook as a reference); and National Standard Guidelines. Review assignment instructions, as this will provide any additional requirements that are not specifically listed on the rubric.
Discussion Question Rubric – 100 PointsCriteriaExemplary
Exceeds ExpectationsAdvanced
Meets ExpectationsIntermediate
Needs ImprovementNovice
InadequateTotal PointsQuality of Initial PostProvides clear examples supported by course content and references.
Cites three or more references, using at least one new scholarly resource that was not provided in the course materials.
All instruction requirements noted.
40 points
Components are accurate and thoroughly represented, with explanations and application of knowledge to include evidence-based practice, ethics, theory, and/or role. Synthesizes course content using course materials and scholarly resources to support importantpoints.
Meets all requirements within the discussion instructions.
Cites two references.
35 points
Components are accurate and mostly represented primarily with definitions and summarization. Ideas may be overstated, with minimal contribution to the subject matter. Minimal application to evidence-based practice, theory, or role development. Synthesis of course content is present but missing depth and/or development.
Is missing one component/requirement of the discussion instructions.
Cites one reference, or references do not clearly support content.
Most instruction requirements are noted.
31 points
Absent application to evidence-based practice, theory, or role development. Synthesis of course content is superficial.
Demonstrates incomplete understandin.
Examine Case Study Pakistani Woman with Delusional Thought Processe.docxcravennichole326
Examine Case Study: Pakistani Woman with Delusional Thought Processes.
You will be asked to make three decisions concerning the medication to prescribe to this client. Be sure to consider factors that might impact the client’s pharmacokinetic and pharmacodynamic processes.
At each decision point stop to complete the following:
Decision #1
Which decision did you select?
Why did you select this decision? Support your response with evidence and references to the Learning Resources.
What were you hoping to achieve by making this decision? Support your response with evidence and references to the Learning Resources.
Explain any difference between what you expected to achieve with Decision #1 and the results of the decision. Why were they different?
Decision #2
Why did you select this decision? Support your response with evidence and references to the Learning Resources.
What were you hoping to achieve by making this decision? Support your response with evidence and references to the Learning Resources.
Explain any difference between what you expected to achieve with Decision #2 and the results of the decision. Why were they different?
Decision #3
Why did you select this decision? Support your response with evidence and references to the Learning Resources.
What were you hoping to achieve by making this decision? Support your response with evidence and references to the Learning Resources.
Explain any difference between what you expected to achieve with Decision #3 and the results of the decision. Why were they different?
Also include how ethical considerations might impact your treatment plan and communication with clients.
BACKGROUND
The client is a 34-year-old Pakistani female who moved to the United States in her late teens/early 20s. She is currently in an “arranged” marriage (her husband was selected for her since she was 9 years old). She presents to your office today following a 21 day hospitalization for what was diagnosed as “brief psychotic disorder.” She was given this diagnosis as her symptoms have persisted for less than 1 month.
Prior to admission, she was reporting visions of Allah, and over the course of a week, she believed that she was the prophet Mohammad. She believed that she would deliver the world from sin. Her husband became concerned about her behavior to the point that he was afraid of leaving their 4 children with her. One evening, she was “out of control” which resulted in his calling the police and her subsequent admission to an inpatient psych unit.
During today’s assessment, she appears quite calm, and insists that the entire incident was “blown out of proportion.” She denies that she believed herself to be the prophet Mohammad and states that her husband was just out to get her because he never loved her and wanted an “American wife” instead of her. She tells you that she knows this because the television is telling her so.
She currently weighs .
Examination of Modern LeadershipModule 1 Leadership History, F.docxcravennichole326
Examination of Modern Leadership
Module 1: Leadership: History, Fundamentals, and the Modern Context
Module 1 content establishes the context for the entire course dedicated to the examination of modern and postmodern leadership. The introduction of critical theory and its use in ORG561 provides a framework for investigation. The context of social, economic, political, and technological environments informs an exploration of modern and postmodern leadership approaches. Emphasis on leader self-awareness sets the stage for reflection, introspection, and personal leadership development.
Learning Outcomes
1. Compare and contrast historical leadership concepts against modern and postmodern organization needs.
2. Analyze leadership approaches using a critical framework.
3. Construct a personal leadership biography.
For Your Success & Readings
A key to success in ORG561 is to start early, build, reflect, reinforce, build, reflect, and reinforce.
Begin each week’s study by reading and comprehending the learning outcomes. Learning outcomes are always revealed in assignments, discussions, and lectures. Likewise, learning outcomes are reflected in rubrics, which are used as objective measures for scoring and grading. Establish the learning outcomes as your checklist for success.
In Module 1 criticaltheory is introduced through the readings, lecture, discussion, and Critical Thinking Assignment. The critical approach provides new frameworks on which to research leadership. You may not be familiar with critical inquiry, so seize the opportunity to advance your analytic skills. You are expected to use one or more critical frames in each module of this course. Take the time this week to fully understand the reasoning and context of critical theory.
Studying the history of leadership requires reading publications from earlier eras. Notice that some of the required and recommended readings for Module 1 are not current publications, but these contribute to understanding the earlier periods of organization and leadership study.
Postmodern leadership literature expounds on the notion that self-awareness is a critical component required to lead. In ORG561, the thread of self-examination is woven throughout the course. You will have opportunities to move beyond reflection to develop a better understanding of personal assumptions and biases, skills and competencies, and professional development plans, all related to leadership. Embrace the opportunity!
Required
· Introduction and Chapters 1 & 2 in Leadership: A Critical Text
· Axley, S. R. (1990). The practical qualities of effective leaders. Industrial Management, 32(5), 29-31.
· Brocato, B., Jelen, J., Schmidt, T., & Gold, S. (2011). Leadership conceptual ambiguities.Journal of Leadership Studies, 5(1), 35-50. doi:10.1002/jls.20203
· Gandolfi, F., & Stone, S. (2016). Clarifying leadership: High-impact leaders in a time of leadership crisis. Revista De Management Comparat International, 17(3), 212-224.
· Blom, M. .
Examine current international OB issues that challenge organizat.docxcravennichole326
Examine current international OB issues that challenge organizational leaders to resolve critical issues involving cross-cultural communication, negotiation, leadership, motivation, decision-making, among others.
(1) identify the key organizational behavior issues facing management,
(2) what impact the international environment has on these issues,
(3) strategies management should use to overcome these issues,
(4) how these strategies will impact the overall organizational operations, and
(5) identify the potential costs and risks to the organizations of implementing the newly developed strategies.
Offer a set of recommendations, which must be derived from both data and theory. Teams must include aspects of global leadership, global motivation and global team-management in their work.
APA format, Times New Roman (12), 20-25 pages, No plagiarism.
.
Executive Program Practical Connection Assignment .docxcravennichole326
Executive Program Practical Connection Assignment
Component Proficient (15 to 20 points) Competent (8 to 14 points) Novice (1 to 7 points) Score
Assignment
Requirements
Student completed all required
portions of the assignment
Completed portions of the
assignment
Did not complete the required
assignment.
Writing Skills,
Grammar, and APA
Formatting
Assignment strongly demonstrates
graduate-level proficiency in
organization, grammar, and style.
Assignment is well written, and ideas
are well developed and explained.
Demonstrates strong writing skills.
Student paid close attention to spelling
and punctuation. Sentences and
paragraphs are grammatically correct.
Proper use of APA formatting. Properly
and explicitly cited outside resources.
Reference list matches citations.
Assignment demonstrates graduate-
level proficiency in organization,
grammar, and style.
Assignment is effectively
communicated, but some sections
lacking clarity. Student paid some
attention to spelling and
punctuation, but there are errors
within the writing. Needs attention
to proper writing skills.
Use of APA formatting and citations
of outside resources, but has a few
instances in which proper citations
are missing.
Assignment does not demonstrate
graduate-level proficiency in
organization, grammar, and style.
Assignment is poorly written and
confusing. Ideas are not
communicated effectively. Student
paid no attention to spelling and
punctuation. Demonstrates poor
writing skills.
The assignment lacks the use of APA
formatting and does not provide
proper citations or includes no
citations.
Maintains
purpose/focus
Submission is well organized and has a
tight and cohesive focus that is
integrated throughout the document
Submissions has an organizational
structure and the focus is clear
throughout.
Submission lacks focus or contains
major drifts in focus
Understanding of
Course Content
Student demonstrates understand of
course content and knowledge.
Student demonstrates some
understanding of course content
and knowledge.
Student does not demonstrate
understanding of course content and
knowledge.
Work Environment
Application
Student strongly demonstrates the
practical application, or ability to apply,
of course objectives within a work
environment.
Student demonstrates some
practical application, or ability to
apply, of course objectives within a
work environment.
Student does not demonstrate the
practical application, or ability to
apply, of course objectives within a
work environment.
Executive Program Practical Connection Assignment
At UC, it is a priority that students are provided with strong educational programs and courses that
allow them to be servant-leaders in their disciplines and communities, linking research with practice and
kn.
Executive Program Practical Connection Assignment Component .docxcravennichole326
Executive Program Practical Connection Assignment
Component
Proficient (15 to 20 points)
Competent (8 to 14 points)
Novice (1 to 7 points)
Score
Assignment Requirements
Student completed all required portions of the assignment
Completed portions of the assignment
Did not complete the required assignment.
Writing Skills, Grammar, and APA Formatting
Assignment strongly demonstrates graduate-level proficiency in organization, grammar, and style.
Assignment is well written, and ideas are well developed and explained. Demonstrates strong writing skills. Student paid close attention to spelling and punctuation. Sentences and paragraphs are grammatically correct.
Proper use of APA formatting. Properly and explicitly cited outside resources. Reference list matches citations.
Assignment demonstrates graduate-level proficiency in organization, grammar, and style.
Assignment is effectively communicated, but some sections lacking clarity. Student paid some attention to spelling and punctuation, but there are errors within the writing. Needs attention to proper writing skills.
Use of APA formatting and citations of outside resources, but has a few instances in which proper citations are missing.
Assignment does not demonstrate graduate-level proficiency in organization, grammar, and style.
Assignment is poorly written and confusing. Ideas are not communicated effectively. Student paid no attention to spelling and punctuation. Demonstrates poor writing skills.
The assignment lacks the use of APA formatting and does not provide proper citations or includes no citations.
Maintains purpose/focus
Submission is well organized and has a tight and cohesive focus that is integrated throughout the document
Submissions has an organizational structure and the focus is clear throughout.
Submission lacks focus or contains major drifts in focus
Understanding of Course Content
Student demonstrates understand of course content and knowledge.
Student demonstrates some understanding of course content and knowledge.
Student does not demonstrate understanding of course content and knowledge.
Work Environment Application
Student strongly demonstrates the practical application, or ability to apply, of course objectives within a work environment.
Student demonstrates some practical application, or ability to apply, of course objectives within a work environment.
Student does not demonstrate the practical application, or ability to apply, of course objectives within a work environment.
.
Executive Program Group Project Assignment Component Profi.docxcravennichole326
Executive Program Group Project Assignment
Component
Proficient (15 to 20 points)
Competent (8 to 14 points)
Novice (1 to 7 points)
Score
Assignment Requirements
Student completed all required portions of the assignment
Completed portions of the assignment
Did not complete the required assignment.
Writing Skills, Grammar, and APA Formatting
Assignment strongly demonstrates graduate-level proficiency in organization, grammar, and style.
Assignment is well written, and ideas are well developed and explained. Demonstrates strong writing skills. Student paid close attention to spelling and punctuation. Sentences and paragraphs are grammatically correct.
Proper use of APA formatting. Properly and explicitly cited outside resources. Reference list matches citations.
Assignment demonstrates graduate-level proficiency in organization, grammar, and style.
Assignment is effectively communicated, but some sections lacking clarity. Student paid some attention to spelling and punctuation, but there are errors within the writing. Needs attention to proper writing skills.
Use of APA formatting and citations of outside resources, but has a few instances in which proper citations are missing.
Assignment does not demonstrate graduate-level proficiency in organization, grammar, and style.
Assignment is poorly written and confusing. Ideas are not communicated effectively. Student paid no attention to spelling and punctuation. Demonstrates poor writing skills.
The assignment lacks the use of APA formatting and does not provide proper citations or includes no citations.
Maintains purpose/focus
Submission is well organized and has a tight and cohesive focus that is integrated throughout the document
Submissions has an organizational structure and the focus is clear throughout.
Submission lacks focus or contains major drifts in focus
Understanding of Course Content
Student demonstrates understand of course content and knowledge.
Student demonstrates some understanding of course content and knowledge.
Student does not demonstrate understanding of course content and knowledge.
Work Environment Application
Student strongly demonstrates the practical application, or ability to apply, of course objectives within a work environment.
Student demonstrates some practical application, or ability to apply, of course objectives within a work environment.
Student does not demonstrate the practical application, or ability to apply, of course objectives within a work environment.
Criteria Excellent Satisfactory Less than Satisfactory Not Completed
Log
Completion
4 points
Food logs are
complete with detailed
food/beverage items
3 points
Food logs are
complete but lack
some detail on
food/beverage items
(3 pts)
2 points
Food logs are
complete are missing
substantial detail on
food/beverage items
0 points
Student did not
complete this
component of the
project.
/ 4
Por.
Executive Practical Connection Activityit is a priority that stu.docxcravennichole326
Executive Practical Connection Activity
it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
· Provide a 500 word (or 2 pages double spaced) minimum reflection.
· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
· Share a personal connection that identifies specific knowledge and theories from this course.
· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
· You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
MY ROLE: BIGDATA/KAFKA ADMIN
Need Plagiarism report for this Assignement.
****Directions
Choose from one of the following tweets and answer the 4 questions, Include at least one scholarly source***** The link is included in each tweet for more information.
1. Identify a healthcare issue within your community and explain the issue to your class colleagues. (You may use the same issue you identified in Week 2, but please expand your responses to address this week's focus).
2. Describe the type of healthcare policy you would advocate for in an effort to change this issue.
3. What type of campaign would you need to launch in order to gather a network of support?
4. Compose a Tweet that describes what you have shared with your class colleagues. Remember, Twitter only allows for 140 characters so you will need to be concise.
1. NR708HealthPol Retweeted
Tara Heagele, PhD, RN, PCCN, EMT@TaraHeagele
#NurseTwitter Hurricane season starts today! Helping Vulnerable People Before Disasters Strike | Campaign for Action https://campaignforaction.org/helping-vulnerable-people-before-disasters-strike/#.XtUB00-UAZ4.twitter …
Helping Vulnerable People Before Disasters Strike | Campaign for Action
Floods, tornadoes, heat waves, blizzards, earthquakes, and hurricanes threaten the health and well-being of millions of people each year
campaignforaction.org
13h
·
·
2. NR708HealthPol Retweeted
Diana Mason@djmasonrn
By @AmyAnderso.
Executive FunctionThe Search for an Integrated AccountMari.docxcravennichole326
Executive Function
The Search for an Integrated Account
Marie T. Banich
Department of Psychology & Neuroscience, and Institute of Cognitive Science, University of Colorado at Boulder;
Department of Psychiatry, University of Colorado Denver
ABSTRACT—In general, executive function can be thought
of as the set of abilities required to effortfully guide be-
havior toward a goal, especially in nonroutine situations.
Psychologists are interested in expanding the under-
standing of executive function because it is thought to be a
key process in intelligent behavior, it is compromised in a
variety of psychiatric and neurological disorders, it varies
across the life span, and it affects performance in compli-
cated environments, such as the cockpits of advanced
aircraft. This article provides a brief introduction to the
concept of executive function and discusses how it is
assessed and the conditions under which it is compromised.
A short overview of the diverse theoretical viewpoints re-
garding its psychological and biological underpinnings is
also provided. The article concludes with a consideration
of how a multilevel approach may provide a more inte-
grated account of executive function than has been previ-
ously available.
KEYWORDS—executive function; frontal lobe; prefrontal
cortex; inhibition; task switching; working memory; atten-
tion; top-down control
Like other psychological constructs, such as memory, executive
function is multidimensional. As such, there exists a variety of
models that provide varying viewpoints as to its basic component
processes. Nonetheless, common across most of them is the idea
that executive function is a process used to effortfully guide
behavior toward a goal, especially in nonroutine situations.
Various functions or abilities are thought to fall under the rubric
of executive function. These include prioritizing and sequencing
behavior, inhibiting familiar or stereotyped behaviors, creating
and maintaining an idea of what task or information is most
relevant for current purposes (often referred to as an attentional
or mental set), providing resistance to information that is dis-
tracting or task irrelevant, switching between task goals, uti-
lizing relevant information in support of decision making,
categorizing or otherwise abstracting common elements across
items, and handling novel information or situations. As can be
seen from this list, the functions that fall under the category of
executive function are indeed wide ranging.
ASSESSING EXECUTIVE FUNCTION
The very nature of executive function makes it difficult to
measure in the clinic or the laboratory; it involves an individual
guiding his or her behavior, especially in novel, unstructured,
and nonroutine situations that require some degree of judgment.
In contrast, standard testing situations are structured—partic-
ipants are explicitly told what the task is, given rules for per-
forming the task, and provide.
Executive Compensation and IncentivesMartin J. ConyonEx.docxcravennichole326
Executive Compensation and Incentives
Martin J. Conyon*
Executive Overview
The objective of a properly designed executive compensation package is to attract, retain, and motivate
CEOs and senior management. The standard economic approach for understanding executive pay is the
principal-agent model. This paper documents the changes in executive pay and incentives in U.S. firms
between 1993 and 2003. We consider reasons for these transformations, including agency theory, changes
in the managerial labor markets, shifts in firm strategy, and theories concerning managerial power. We show that
boards and compensation committees have become more independent over time. In addition, we demonstrate
that compensation committees containing affiliated directors do not set greater pay or fewer incentives.
Introduction
E
xecutive compensation is a complex and con-
troversial subject. For many years, academics,
policymakers, and the media have drawn atten-
tion to the high levels of pay awarded to U.S.
chief executive officers (CEOs), questioning
whether they are consistent with shareholder in-
terests.1 Some academics have further argued that
flaws in CEO pay arrangements and deviations
from shareholders’ interests are widespread and
considerable.2 For example, Lucian Bebchuk and
Jesse Fried provide a lucid account of the mana-
gerial power view and accompanying evidence.3
Marianne Bertrand and Sendhil Mullainathan too
provide an analysis of the ‘skimming view’ of CEO
pay.4 In contrast, John Core et al. present an
economic contracting approach to executive pay
and incentives, assessing whether CEOs receive
inefficient pay without performance.5 In this pa-
per, we show what has happened to CEO pay in
the United States. We do not claim to distinguish
between the contracting and managerial power
views of executive pay. Instead, we document the
pattern of executive pay and incentives in the
United States, investigating whether this pattern
is consistent with economic theory.
The Context: Who Sets Executive Pay?
B
efore examining the empirical evidence pre-
sented in this paper, it is important to consider
the pay-setting process and who sets executive
pay. The standard economic theory of executive
compensation is the principal-agent model.6 The
theory maintains that firms seek to design the most
efficient compensation packages possible in order to
attract, retain, and motivate CEOs, executives, and
managers.7 In the agency model, shareholders set
pay. In practice, however, the compensation com-
mittee of the board determines pay on behalf of
shareholders. A principal (shareholder) designs a
contract and makes an offer to an agent (CEO/
manager). Executive compensation ameliorates a
moral hazard problem (i.e., manager opportunism)
arising from low firm ownership. By using stock
options, restricted stock, and long-term contracts,
shareholders motivate the CEO to maximize firm
value. In other words, shareholders try to design
optimal compensation packages .
Executing the StrategyLearning ObjectivesAfter reading.docxcravennichole326
Executing the Strategy
Learning Objectives
After reading this chapter, you should be able to:
• Distinguish good operational plans from weak ones.
• Detail the value of tracking progress on all operational plans.
• Discuss why emergent strategies occur and how they might affect an organization’s
current strategy.
• Implement the ten basic steps of a generic strategic formulation process.
• Manage, improve, and evaluate an existing strategic management process.
Chapter 9
Neil Webb/Ikon Images/Getty Images
spa81202_09_c09.indd 247 1/16/14 10:08 AM
CHAPTER 9Section 9.1 Managing Operational Plans
Implementing a strategy (see Figure 1.1) in the real world is not a leisurely swim across
a calm pond on a sunny day, but rather like crossing from one bank of a raging river to
the other, encountering hidden eddies, fog, driving rain, lightning, and riptides along the
way. While it is not impossible to reach the other bank (the goal), the task often becomes
one of overcoming obstacles and making constant adjustments without losing sight of the
goal. Implementation is like that. Even the most brilliant strategy is worthless if it cannot
be implemented.
This chapter focuses on strategy execution and its difficulties. Part of the chapter is devoted
to assessing, improving, and managing the strategy formulation process itself.
9.1 Managing Operational Plans
The process for obtaining board approval of operational plans is covered in this chapter.
Exactly what is it that gets approved? An operational plan is a document that specifies the
projects or tasks that must be accomplished to achieve particular operational objectives.
Many of these plans will contain activities that are ongoing. Some will include plans for
enhanced or new services. Details specified in operational plans include the names of those
who will be involved and the indi-
vidual responsible for each one, what
equipment will be needed, when each
will start and end, and the estimated
costs for each activity. Given the level
of detail required, it should come as
no surprise that an operational plan
for a large functional unit, such as the
nursing department in a hospital, can
run to many pages, as there are lots of
activities to be detailed. Operational
plans for small HSOs such as physi-
cian clinics and community health
centers may be just a few pages long
unless new strategic initiatives are to
be undertaken.
It takes contributions from everyone
who will be involved in that HSO’s
operations to create such plans. They
will make sure that continuing cur-
rent operations are included in the plans, which is easily done. What adds a level of com-
plexity and difficulty is incorporating additional tasks demanded by a change in strategy.
Consider the following scenarios, which illustrate the difficulty in creating operational
plans that involve more than simply repeating what was done the previous year:
Javier Larrea/age fotostock/Getty Ima.
Executing Strategies in a Global Environment Examining the Case of .docxcravennichole326
Executing Strategies in a Global Environment: Examining the Case of Federal Express 5-7 pages
Requirements:
1.
An
al
yz
e
Fe
d
era
l
E
x
pre
ss
’
s
v
a
lu
e
cr
e
atio
n
f
r
ont
i
e
r
,
a
n
d
deter
m
in
e
w
h
i
ch
o
f
th
e
f
ou
r
bu
i
l
d
i
ngb
l
oc
k
s
o
f
c
o
m
pet
i
t
i
v
e
a
d
v
a
nta
g
e
t
h
e
co
m
pa
n
y
n
eed
s
i
n
orde
r
t
o
con
t
i
n
u
e
t
o
m
a
i
n
t
a
i
n
a
b
o
v
e-a
v
er
a
g
e
pro
f
ita
b
i
l
i
t
y
.
Provi
d
ea
ra
ti
o
n
aletosup
p
orttheresponse.
2.
Deter
m
i
n
e
th
e
m
a
i
n
aspe
ct
o
f
produc
t
d
i
ff
erent
i
atio
n
a
n
d
capac
i
t
y
c
o
ntr
o
l
t
h
a
t
Fe
d
era
l
E
x
pre
s
s
c
oul
d
us
e
i
n
or
d
e
r
t
o
m
a
i
n
t
a
i
n
a
n
ed
g
eo
v
e
r
i
tsr
i
v
a
l
s
.J
u
st
i
f
y
t
h
er
e
sp
on
se.
3.
A
ss
es
s
th
e
e
f
f
i
c
i
en
c
y
o
f
Federa
l
E
x
pre
ss
’
s
c
ur
r
en
t
bu
s
i
ne
ss
m
odel
,
a
n
d
reco
m
m
en
d
o
n
e
(1
)
ne
w
bu
s
i
n
es
s
-leve
l
stra
t
e
g
y
t
h
a
t
gi
v
e
s
t
h
e
co
m
pa
n
ya
co
m
p
et
i
t
i
ve
a
dvant
a
g
e
ove
r
it
s
r
i
v
a
l
s.
P
r
o
v
i
d
earat
i
o
n
ale
f
o
rthereco
m
m
enda
ti
on.
4.
E
x
a
m
in
e
th
e
m
anne
r
i
n
wh
i
c
h
overa
l
l
g
l
o
b
a
l
co
m
pet
i
t
i
o
n
m
a
y
i
m
pa
ct
th
e
n
e
w
bu
s
i
ne
ss
strate
g
y
tha
t
y
o
u
re
c
o
m
m
ende
d
i
n
Que
s
t
i
o
n
3
.
Next
,
su
g
ge
st
on
e
(1
)
si
g
n
i
f
i
c
an
t
w
a
y
t
ha
t
Feder
a
l
E
x
pre
s
s
m
a
y
c
on
f
r
on
t
i
ts
g
l
ob
a
lc
o
m
pet
it
i
o
n
.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
Chapter 10Matching MarketsFrom the book Networks, Crow.docx
1. Chapter 10
Matching Markets
From the book Networks, Crowds, and Markets: Reasoning
about a Highly Connected World.
By David Easley and Jon Kleinberg. Cambridge University
Press, 2010.
Complete preprint on-line at
http://www.cs.cornell.edu/home/kleinber/networks-book/
We have now seen a number of ways of thinking both about
network structure and
about the behavior of agents as they interact with each other. A
few of our examples have
brought these together directly — such as the issue of tra!c in a
network, including Braess’s
Paradox — and in the next few chapters we explore this
convergence of network structure
and strategic interaction more fully, and in a range of di"erent
settings.
First, we think about markets as a prime example of network-
structured interaction
between many agents. When we consider markets creating
opportunities for interaction
2. among buyers and sellers, there is an implicit network encoding
the access between these
buyers and sellers. In fact, there are a number of ways of using
networks to model interactions
among market participants, and we will discuss several of these
models. Later, in Chapter 12
on network exchange theory, we will discuss how market-style
interactions become a metaphor
for the broad notion of social exchange, in which the social
dynamics within a group can be
modeled by the power imbalances of the interactions within the
group’s social network.
10.1 Bipartite Graphs and Perfect Matchings
Matching markets form the first class of models we consider, as
the focus of the current
chapter. Matching markets have a long history of study in
economics, operations research,
and other areas because they embody, in a very clean and
stylized way, a number of basic
principles: the way in which people may have di"erent
preferences for di"erent kinds of
goods, the way in which prices can decentralize the allocation
of goods to people, and the
way in which such prices can in fact lead to allocations that are
3. socially optimal.
We will introduce these various ingredients gradually, by
progressing through a succession
of increasingly rich models. We begin with a setting in which
goods will be allocated to people
Draft version: June 10, 2010
277
278 CHAPTER 10. MATCHING MARKETS
Room1
Room2
Room3
Room4
Room5
Vikram
Wendy
Xin
Yoram
Zoe
4. (a) Bipartite Graph
Room1
Room2
Room3
Room4
Room5
Vikram
Wendy
Xin
Yoram
Zoe
(b) A Perfect Matching
Figure 10.1: (a) An example of a bipartite graph. (b) A perfect
matching in this graph,
indicated via the dark edges.
based on preferences, and these preferences will be expressed in
network form, but there is
no explicit buying, selling, or price-setting. This first setting
will also be a crucial component
of the more complex ones that follow.
5. Bipartite Graphs. The model we start with is called the bipartite
matching problem, and
we can motivate it via the following scenario. Suppose that the
administrators of a college
dormitory are assigning rooms to returning students for a new
academic year; each room
is designed for a single student, and each student is asked to list
several acceptable options
for the room they’d like to get. Students can have di"erent
preferences over rooms; some
people might want larger rooms, quieter rooms, sunnier rooms,
and so forth — and so the
lists provided by the students may overlap in complex ways.
We can model the lists provided by the students using a graph,
as follows. There is a
node for each student, a node for each room, and an edge
connecting a student to a room if
the student has listed the room as an acceptable option. Figure
10.1(a) shows an example
with five students and five rooms (indicating, for instance, that
the student named Vikram
has listed each of Rooms 1, 2, and 3 as acceptable options,
while the student named Wendy
only listed Room 1).
6. This type of graph is bipartite, an important property that we
saw earlier, in a di"erent
10.1. BIPARTITE GRAPHS AND PERFECT MATCHINGS 279
context, in talking about a!liation networks in Chapter 4. In a
bipartite graph the nodes
are divided into two categories, and each edge connects a node
in one category to a node
in the other category. In this case, the two categories are
students and rooms. Just as
bipartite graphs were useful in Chapter 4 to represent the
participation of people in di"erent
activities, here they are useful for modeling situations in which
individuals or objects of one
type are being assigned or matched up with individuals or
objects of another type. As in
Chapter 4, we will generally draw bipartite graphs as in Figure
10.1(a), with the two di"erent
categories of nodes drawn as two parallel vertical columns, and
the edges crossing between
the two columns.
Perfect Matchings. Let’s return to the task that the college dorm
administrators were
7. trying to solve: assigning each student a room that they’d be
happy to accept. This task has
a natural interpretation in terms of the graph we’ve just drawn:
since the edges represent
acceptable options for students, we want to assign a distinct
room to each student, so that
each student is assigned a room to which he or she is connected
by an edge. Figure 10.1(b)
shows such an assignment, with the darkened edges indicating
who gets which room.
We will refer to such an assignment as a perfect matching:
When there are an equal number of nodes on each side of a
bipartite graph, a
perfect matching is an assignment of nodes on the left to nodes
on the right, in
such a way that
(i) each node is connected by an edge to the node it is assigned
to, and
(ii) no two nodes on the left are assigned to the same node on
the right.
As this picture makes clear, there is an equivalent way to think
about perfect matchings in
terms of the edges that form the assignment: a perfect matching
8. can also be viewed as a
choice of edges in the bipartite graph so that each node is the
endpoint of exactly one of the
chosen edges.
Constricted Sets. If a bipartite graph has a perfect matching, it’s
easy to demonstrate
this: you just indicate the edges that form the perfect matching.
But what if a bipartite
graph has no perfect matching? What could you show someone
to convince them that there
isn’t one?
At first glance, this is not clear; one naturally worries that the
only way to convince
someone that there is no perfect matching is to plow through all
the possibilities and show
that no pairing works. But in fact there is a clean way to
demonstrate that no perfect
matching exists, based on the idea illustrated in Figure 10.2.
First, Figure 10.2(a) shows
a bipartite graph that contains no perfect matching. In Figure
10.2(b) we show a succinct
reason why there is no perfect matching in this graph: the set
consisting of Vikram, Wendy,
10. Vikram
Wendy
Xin
Yoram
Zoe
(b) A constricted set demonstrating
there is no perfect matching
Figure 10.2: (a) A bipartite graph with no perfect matching. (b)
A constricted set demon-
strating there is no perfect matching.
and Xin, taken together, has collectively provided only two
options for rooms that would
be acceptable to any of them. With three people and only two
acceptable rooms, there is
clearly no way to construct a perfect matching — one of these
three people would have to
get an option they didn’t want in any assignment of rooms.
We call the set of three students in this example a constricted
set, since their edges to
the other side of the bipartite graph “constrict” the formation of
a perfect matching. This
example points to a general phenomenon, which we can make
11. precise by defining in general
what it means for a set to be constricted, as follows. First, for
any set of nodes S on the
right-hand side of a bipartite graph, we say that a node on the
left-hand side is a neighbor
of S if it has an edge to some node in S. We define the neighbor
set of S, denoted N (S), to
be the collection of all neighbors of S. Finally, we say that a set
S on the right-hand side is
constricted if S is strictly larger than N (S) — that is, S contains
strictly more nodes than
N (S) does.
Any time there’s a constricted set S in a bipartite graph, it
immediately shows that there
can be no perfect matching: each node in S would have to be
matched to a di"erent node
in N (S), but there are more nodes in S than there are in N (S),
so this is not possible.
10.1. BIPARTITE GRAPHS AND PERFECT MATCHINGS 281
Room1
Room2
13. Valuations
(b) An optimal assignment
Figure 10.3: (a) A set of valuations. Each person’s valuations
for the objects appears as a
list next to them. (b) An optimal assignment with respect to
these valuations.
So it’s fairly easy to see that constricted sets form one kind of
obstacle to the presence of
perfect matchings. What’s also true, though far from obvious, is
that constricted sets are in
fact the only kind of obstacle. This is the crux of the following
fact, known as the Matching
Theorem.
Matching Theorem: If a bipartite graph (with equal numbers of
nodes on the left
and right) has no perfect matching, then it must contain a
constricted set.
The Matching Theorem was independently discovered by Denes
König in 1931 and Phillip
Hall in 1935 [280]. Without the theorem, one might have
imagined that a bipartite graph
could fail to have a perfect matching for all sorts of reasons,
some of them perhaps even too
complicated to explain; but what the theorem says is that the
14. simple notion of a constricted
set is in fact the only obstacle to having a perfect matching. For
our purposes in this chapter,
we will only need to use the fact that the Matching Theorem is
true, without having to go
into the details of its proof. However, its proof is elegant as
well, and we describe a proof of
the theorem in Section 10.6 at the end of this chapter.
One way to think about the Matching Theorem, using our
example of students and
rooms, is as follows. After the students submit their lists of
acceptable rooms, it’s easy for
the dormitory administrators to explain to the students what
happened, regardless of the
outcome. Either they can announce the perfect matching giving
the assignment of students
to rooms, or they can explain that no assignment is possible by
indicating a set of students
who collectively gave too small a set of acceptable options.
This latter case is a constricted
set.
282 CHAPTER 10. MATCHING MARKETS
16. Figure 10.4: (a) A bipartite graph in which we want to search
for a perfect matching. (b) A
corresponding set of valuations for the same nodes so that
finding the optimal assignment
lets us determine whether there is a perfect matching in the
original graph.
10.2 Valuations and Optimal Assignments
The problem of bipartite matching from the previous section
illustrates some aspects of a
market in a very simple form: individuals express preferences in
the form of acceptable op-
tions; a perfect matching then solves the problem of allocating
objects to individuals accord-
ing to these preferences; and if there is no perfect matching, it
is because of a “constriction”
in the system that blocks it.
We now want to extend this model to introduce some additional
features. First, rather
than expressing preferences simply as binary “acceptable-or-
not” choices, we allow each
individual to express how much they’d like each object, in
numerical form. In our example
of students and dorm rooms from Section 10.1, suppose that
rather than specifying a list
of acceptable rooms, each student provides a numerical score
17. for each room, indicating how
happy they’d be with it. We will refer to these numbers as the
students’ valuations for the
respective rooms. Figure 10.3(a) shows an example of this with
three students and three
rooms; for instance, Xin’s valuations for Rooms 1, 2, and 3 are
12, 2, and 4 respectively
(while Yoram’s valuations for Rooms 1, 2, and 3 are 8, 7, and 6
respectively). Notice that
students may disagree on which rooms are better, and by how
much.
We can define valuations whenever we have a collection of
individuals evaluating a col-
lection of objects. And using these valuations, we can evaluate
the quality of an assignment
of objects to individuals, as follows: it is the sum of each
individual’s valuation for what
10.2. VALUATIONS AND OPTIMAL ASSIGNMENTS 283
they get.1 Thus, for example, the quality of the assignment
illustrated in Figure 10.3(b) is
12 + 6 + 5 = 23.
If the dorm administrators had accurate data on each student’s
18. valuations for each room,
then a reasonable way to assign rooms to students would be to
choose the assignment of
maximum possible quality. We will refer to this as the optimal
assignment, since it maximizes
the total happiness of everyone for what they get. You can
check that the assignment in
Figure 10.3(b) is in fact the optimal assignment for this set of
valuations. Of course, while
the optimal assignment maximizes total happiness, it does not
necessarily give everyone their
favorite item; for example, in Figure 10.3(b), all the students
think Room 1 is the best, but
it can only go to one of them.
In a very concrete sense, the problem of finding an optimal
assignment also forms a
natural generalization of the bipartite matching problem from
Section 10.1. Specifically,
it contains the bipartite matching problem as a special case.
Here is why. Suppose, as in
Section 10.1, that there are an equal number of students and
rooms, and each student simply
submits a list of acceptable rooms without providing a
numerical valuation; this gives us a
19. bipartite graph as in Figure 10.4(a). We would like to know if
this bipartite graph contains
a perfect matching, and we can express precisely this question
in the language of valuations
and optimal assignments as follows. We give each student a
valuation of 1 for each room
they included on their acceptable list, and a valuation of 0 for
each room they omitted from
their list. Applying this translation to the graph in Figure
10.4(a), for example, we get the
valuations shown in Figure 10.4(b). Now, there is a perfect
matching precisely when we can
find an assignment that gives each student a room that he or she
values at 1 rather than 0
— that is, precisely when the optimal assignment has a total
valuation equal to the number
of students. This simple translation shows how the problem of
bipartite matching is implicit
in the broader problem of finding an optimal assignment.
While the definition of an optimal assignment is quite natural
and general, it is far
from obvious whether there is a comparably natural way to find
or characterize the optimal
20. assignment for a given set of valuations. This is in fact a bit
subtle; we will describe a way
to determine an optimal assignment, in the context of a broader
market interpretation of
this problem, in the two next sections.
1Of course, this notion of the quality of an assignment is
appropriate only if adding individual’s valuations
makes sense. We can interpret individual valuations here as the
maximum amount the individuals are willing
to pay for items, so the sum of their valuations for the items
they are assigned is just the maximum amount
the group would be willing to pay in total for the assignment.
The issue of adding individuals’ payo!s was
also discussed in Chapter 6, where we defined social optimality
using the sum of payo!s in a game.
284 CHAPTER 10. MATCHING MARKETS
10.3 Prices and the Market-Clearing Property
Thus far, we have been using the metaphor of a central
“administrator” who determines
a perfect matching, or an optimal assignment, by collecting data
from everyone and then
performing a centralized computation. And while there are
clearly instances of market-like
activity that function this way (such as our example of students
and dorm rooms), a more
21. standard picture of a market involves much less central
coordination, with individuals making
decisions based on prices and their own valuations.
Capturing this latter idea brings us to the crucial step in our
formulation of matching
markets: understanding the way in which prices can serve to
decentralize the market. We
will see that if we replace the role of the central administrator
by a particular scheme for
pricing items, then allowing individuals to follow their own
self-interest based on valuations
and prices can still produce optimal assignments.
To describe this, let’s change the housing metaphor slightly,
from students and dorm
rooms to one where the role of prices is more natural. Suppose
that we have a collection
of sellers, each with a house for sale, and an equal-sized
collection of buyers, each of whom
wants a house. By analogy with the previous section, each buyer
has a valuation for each
house, and as before, two di"erent buyers may have very
di"erent valuations for the same
houses. The valuation that a buyer j has for the house held by
22. seller i will be denoted vij,
with the subscripts i and j indicating that the valuation depends
on both the identity of
the seller i and the buyer j. We also assume that each valuation
is a non-negative whole
number (0, 1, 2, . . .). We assume that sellers have a valuation
of 0 for each house; they care
only about receiving payment from buyers, which we define
next.2
Prices and Payo!s. Suppose that each seller i puts his house up
for sale, o"ering to sell
it for a price pi ! 0. If a buyer j buys the house from seller i at
this price, we will say that
the buyer’s payo! is her valuation for this house, minus the
amount of money she had to pay:
vij " pi. So given a set of prices, if buyer j wants to maximize
her payo", she will buy from
the seller i for which this quantity vij "pi is maximized — with
the following caveats. First,
if this quantity is maximized in a tie between several sellers,
then the buyer can maximize
her payo" by choosing any one of them. Second, if her payo" vij
" pi is negative for every
choice of seller i, then the buyer would prefer not to buy any
house: we assume she can
obtain a payo" of 0 by simply not transacting.
23. We will call the seller or sellers that maximize the payo" for
buyer j the preferred sellers
2Our assumption that sellers all have valuations of 0 for their
houses is done for the sake of simplicity; if
we wanted, we could directly adapt the arguments here to the
case in which “zero” is really some minimum
base level, and all other valuations and prices represent amounts
above this base level. It is also not hard to
adapt our analysis to the case in which sellers each might have
di!erent valuations for their houses. Since
none of these more general models add much to the underlying
set of ideas, we will stick with the simple
assumption that sellers have valuations of 0 for houses.
10.3. PRICES AND THE MARKET-CLEARING PROPERTY
285
a
b
c
x
y
z
12, 4, 2
8, 7, 6
24. 7, 5, 2
Sellers Buyers Valuations
(a) Buyer Valuations
a
b
c
x
y
z
12, 4, 2
8, 7, 6
7, 5, 2
5
2
0
Prices Sellers Buyers Valuations
(b) Market-Clearing Prices
a
25. b
c
x
y
z
12, 4, 2
8, 7, 6
7, 5, 2
2
1
0
Prices Sellers Buyers Valuations
(c) Prices that Don’t Clear the Market
a
b
c
x
y
26. z
12, 4, 2
8, 7, 6
7, 5, 2
3
1
0
Prices Sellers Buyers Valuations
(d) Market-Clearing Prices (Tie-Breaking Required)
Figure 10.5: (a) Three sellers (a, b, and c) and three buyers (x,
y, and z). For each buyer node, the
valuations for the houses of the respective sellers appear in a
list next to the node. (b) Each buyer creates a
link to her preferred seller. The resulting set of edges is the
preferred-seller graph for this set of prices. (c)
The preferred-seller graph for prices 2, 1, 0. (d) The preferred-
seller graph for prices 3, 1, 0.
of buyer j, provided the payo" from these sellers is not negative.
We say that buyer j has
no preferred seller if the payo"s vij " pi are negative for all
choices of i.
In Figures 10.5(b)-10.5(d), we show the results of three di"erent
sets of prices for the
27. same set of buyer valuations. Note how the sets of preferred
sellers for each buyer change
depending on what the prices are. So for example, in Figure
10.5(b), buyer x would receive a
payo" of 12"5 = 7 if she buys from a, a payo" of 4"2 = 2 if she
buys from b, and 2"0 = 2
if she buys from c. This is why a is her unique preferred seller.
We can similarly determine
the payo"s for buyers y (3, 5, and 6) and z (2, 3, and 2) for
transacting with sellers a, b, and
c respectively.
286 CHAPTER 10. MATCHING MARKETS
Market-Clearing Prices. Figure 10.5(b) has the particularly nice
property that if each
buyer simply claims the house that she likes best, each buyer
ends up with a di"erent house:
somehow the prices have perfectly resolved the contention for
houses. And this happens
despite the fact that each of the three buyers value the house of
seller a the highest; it is the
high price of 5 that dissuades buyers y and z from pursuing this
house.
We will call such a set of prices market-clearing, since they
28. cause each house to get bought
by a di"erent buyer. In contrast, Figure 10.5(c) shows an
example of prices that are not
market-clearing, since buyers x and z both want the house
o"ered by seller a — so in this
case, when each buyer pursues the house that maximizes their
payo", the contention for
houses is not resolved. (Notice that although each of a, b, and c
is a preferred seller for y,
since they all give y equal payo"s, this does not help with the
contention between x and z.)
Figure 10.5(d) illustrates one further subtlety in the notion of
market-clearing prices.
Here, if the buyers coordinate so that each chooses the
appropriate preferred seller, then
each buyer gets a di"erent house. (This requires that y take c’s
house and z take b’s house.)
Since it is possible to eliminate contention using preferred
sellers, we will say that this set
of prices is market-clearing as well, even though a bit of
coordination is required due to ties
in the maximum payo"s. In some cases, ties like this may be
inevitable: for example, if
all buyers have the same valuations for everything, then no
29. choice of prices will break this
symmetry.
Given the possibility of ties, we will think about market-
clearing prices more generally
as follows. For a set of prices, we define the preferred-seller
graph on buyers and sellers by
simply constructing an edge between each buyer and her
preferred seller or sellers. (There
will be no edge out of a buyer if she has no preferred seller.) So
in fact, Figures 10.5(b)-
10.5(d) are just drawings of preferred-seller graphs for each of
the three indicated sets of
prices. Now we simply say: a set of prices is market-clearing if
the resulting preferred-seller
graph has a perfect matching.
Properties of Market-Clearing Prices. In a way, market-clearing
prices feel a bit too
good to be true: if sellers set prices the right way, then self-
interest runs its course and
(potentially with a bit of coordination over tie-breaking) all the
buyers get out of each
other’s way and claim di"erent houses. We’ve seen that such
prices can be achieved in one
30. very small example; but in fact, something much more general
is true:
Existence of Market-Clearing Prices: For any set of buyer
valuations, there exists
a set of market-clearing prices.
So market-clearing prices are not just a fortuitous outcome in
certain cases; they are always
present. This is far from obvious, and we will turn shortly to a
method for constructing
market-clearing prices that, in the process, proves they always
exist.
10.3. PRICES AND THE MARKET-CLEARING PROPERTY
287
Before doing this, we consider another natural question: the
relationship between market-
clearing prices and social welfare. Just because market-clearing
prices resolve the contention
among buyers, causing them to get di"erent houses, does this
mean that the total valuation
of the resulting assignment will be good? In fact, there is
something very strong that can
be said here as well: market-clearing prices (for this buyer-
seller matching problem) always
31. provide socially optimal outcomes:
Optimality of Market-Clearing Prices: For any set of market-
clearing prices, a
perfect matching in the resulting preferred-seller graph has the
maximum total
valuation of any assignment of sellers to buyers.
Compared with the previous claim on the existence of market-
clearing prices, this fact about
optimality can be justified by a much shorter, if somewhat
subtle, argument.
The argument is as follows. Consider a set of market-clearing
prices, and let M be
a perfect matching in the preferred-seller graph. Now, consider
the total payo! of this
matching, defined simply as the sum of each buyer’s payo" for
what she gets. Since each
buyer is grabbing a house that maximizes her payo"
individually, M has the maximum total
payo! of any assignment of houses to buyers. Now how does
total payo" relate to total
valuation, which is what we’re hoping that M maximizes? If
buyer j chooses house i, then
her valuation is vij and her payo" is vij " pi. Thus, the total
32. payo" to all buyers is simply
the total valuation, minus the sum of all prices:
Total Payo" of M = Total Valuation of M " Sum of all prices.
But the sum of all prices is something that doesn’t depend on
which matching we choose
(it’s just the sum of everything the sellers are asking for,
regardless of how they get paired up
with buyers). So a matching M that maximizes the total payo" is
also one that maximizes
the total valuation. This completes the argument.
There is another important way of thinking about the optimality
of market-clearing
prices, which turns out to be essentially equivalent to the
formulation we’ve just described.
Suppose that instead of thinking about the total valuation of the
matching, we think about
the total of the payo"s received by all participants in the market
— both the sellers and
the buyers. For a buyer, her payo" is defined as above: it is her
valuation for the house she
gets minus the price she pays. A seller’s payo" is simply the
amount of money he receives in
payment for his house. Therefore, in any matching, the total of
the payo"s to all the sellers
33. is simply equal to the sum of the prices (since they all get paid,
and it doesn’t matter which
buyer pays which seller). Above, we just argued that the total of
the payo"s to all the buyers
is equal to the total valuation of the matching M , minus the
sum of all prices. Therefore,
the total of the payo"s to all participants — both the sellers and
the buyers — is exactly
equal to the total valuation of the matching M ; the point is that
the prices detract from
288 CHAPTER 10. MATCHING MARKETS
the total buyer payo" by exactly the amount that they contribute
to the total seller payo",
and hence the sum of the prices cancels out completely from
this calculation. Therefore,
to maximize the total payo"s to all participants, we want prices
and a matching that lead
to the maximum total valuation, and this is achieved by using
market-clearing prices and a
perfect matching in the resulting preferred-seller graph. We can
summarize this as follows.
Optimality of Market-Clearing Prices (equivalent version): A
34. set of market-
clearing prices, and a perfect matching in the resulting
preferred-seller graph,
produces the maximum possible sum of payo!s to all sellers and
buyers.
10.4 Constructing a Set of Market-Clearing Prices
Now let’s turn to the harder challenge: understanding why
market-clearing prices must
always exist. We’re going to do this by taking an arbitrary set
of buyer valuations, and
describing a procedure that arrives at market-clearing prices.
The procedure will in fact
be a kind of auction — not a single-item auction of the type we
discussed in Chapter 9,
but a more general kind taking into account the fact that there
are multiple things being
auctioned, and multiple buyers with di"erent valuations. This
particular auction procedure
was described by the economists Demange, Gale, and
Sotomayor in 1986 [129], but it’s
actually equivalent to a construction of market-clearing prices
discovered by the Hungarian
mathematician Egerváry seventy years earlier, in 1916 [280].
35. Here’s how the auction works. Initially all sellers set their
prices to 0. Buyers react by
choosing their preferred seller(s), and we look at the resulting
preferred-seller graph. If this
graph has a perfect matching we’re done. Otherwise — and this
is the key point — there is
a constricted set of buyers S. Consider the set of neighbors N
(S), which is a set of sellers.
The buyers in S only want what the sellers in N (S) have to sell,
but there are fewer sellers
in N (S) than there are buyers in S. So the sellers in N (S) are in
“high demand” — too
many buyers are interested in them. They respond by each
raising their prices by one unit,
and the auction then continues.
There’s one more ingredient, which is a reduction operation on
the prices. It will be
useful to have our prices scaled so that the smallest one is 0.
Thus, if we ever reach a point
where all prices are strictly greater than 0 — suppose the
smallest price has value p > 0 —
then we reduce the prices by subtracting p from each one. This
drops the lowest price to 0,
and shifts all other prices by the same relative amount.
36. A general round of the auction looks like what we’ve just
described.
(i) At the start of each round, there is a current set of prices,
with the smallest
one equal to 0.
(ii) We construct the preferred-seller graph and check whether
there is a perfect
matching.
10.4. CONSTRUCTING A SET OF MARKET-CLEARING
PRICES 289
(iii) If there is, we’re done: the current prices are market-
clearing.
(iv) If not, we find a constricted set of buyers S and their
neighbors N (S).
(v) Each seller in N (S) (simultaneously) raises his price by one
unit.
(vi) If necessary, we reduce the prices — the same amount is
subtracted from
each price so that the smallest price becomes zero.
(vii) We now begin the next round of the auction, using these
new prices.
37. The full-page Figure 10.6 shows what happens when we apply
the auction procedure to the
example from Figure 10.5.
The example in Figure 10.6 illustrates two aspects of this
auction that should be empha-
sized. First, in any round where the set of “over-demanded”
sellers N (S) consists of more
than one individual, all the sellers in this set raise their prices
simultaneously. For example,
in the third round in Figure 10.6, the set N (S) consists of both a
and b, and so they both
raise their prices so as to produce the prices used for the start of
the fourth round. Second,
while the auction procedure shown in Figure 10.6 produces the
market-clearing prices shown
in Figure 10.5(d), we know from Figure 10.5(b) that there can
be other market-clearing
prices for the same set of buyer valuations.
Showing that the Auction Must Come to an End. Here is a key
property of the
auction procedure we’ve defined: the only way it can come to
end is if it reaches a set of
market-clearing prices; otherwise, the rounds continue. So if we
can show that the auction
38. must come to an end for any set of buyer valuations — i.e. that
the rounds cannot go on
forever — then we’ve shown that market-clearing prices always
exist.
It’s not immediately clear, however, why the auction must
always come to an end. Con-
sider, for example, the sequence of steps the auction follows in
Figure 10.6: prices change,
di"erent constricted sets form at di"erent points in time, and
eventually the auction stops
with a set of market-clearing prices. But why should this happen
in general? Why couldn’t
there be a set of valuations that cause the prices to constantly
shift around so that some set
of buyers is always constricted, and the auction never stops?
In fact, the prices can’t shift forever without stopping; the
auction must always come to
an end. The way we’re going to show this is by identifying a
precise sense in which a certain
kind of “potential energy” is draining out of the auction as it
runs; since the auction starts
with only a bounded supply of this potential energy at the
beginning, it must eventually run
39. out.
Here is how we define this notion of potential energy precisely.
For any current set of
prices, define the potential of a buyer to be the maximum payo"
she can currently get from
any seller. This is the buyer’s potential payo"; the buyer will
actually get this payo" if the
current prices are market-clearing prices. We also define the
potential of a seller to be the
290 CHAPTER 10. MATCHING MARKETS
a
b
c
x
y
z
12, 4, 2
8, 7, 6
7, 5, 2
40. 0
0
0
Prices Sellers Buyers Valuations
(a) Start of first round
a
b
c
x
y
z
12, 4, 2
8, 7, 6
7, 5, 2
1
0
0
Prices Sellers Buyers Valuations
41. (b) Start of second round
a
b
c
x
y
z
12, 4, 2
8, 7, 6
7, 5, 2
2
0
0
Prices Sellers Buyers Valuations
(c) Start of third round
a
b
c
42. x
y
z
12, 4, 2
8, 7, 6
7, 5, 2
3
1
0
Prices Sellers Buyers Valuations
(d) Start of fourth round
Figure 10.6: The auction procedure applied to the example from
Figure 10.5. Each separate picture shows
steps (i) and (ii) of successive rounds, in which the preferred-
seller graph for that round is constructed.
(a) In the first round, all prices start at 0. The set of all buyers
forms a constricted set S, with
N (S) equal to the seller a. So a raises his price by one unit and
the auction continues to the
second round.
(b) In the second round, the set of buyers consisting of x and z
forms a constricted set S, with
N (S) again equal to the seller a. Seller a again raises his price
43. by one unit and the auction
continues to the third round. (Notice that in this round, we
could alternately have identified
the set of all buyers as a di!erent constricted set S, in which
case N (S) would have been
the set of sellers a and b. There is no problem with this — it
just means that there can be
multiple options for how to run the auction procedure in certain
rounds, with any of these
options leading to market-clearing prices when the auction
comes to an end.)
(c) In the third round, the set of all buyers forms a constricted
set S, with N (S) equal to the
set of two sellers a and b. So a and b simultaneously raise their
prices by one unit each, and
the auction continues to the fourth round.
(d) In the fourth round, when we build the preferred-seller
graph, we find it contains a perfect
matching. Hence, the current prices are market-clearing and the
auction comes to an end.
10.5. HOW DOES THIS RELATE TO SINGLE-ITEM
AUCTIONS? 291
current price he is charging. This is the seller’s potential payo";
the seller will actually get
this payo" if the current prices are market-clearing prices.
Finally, we define the potential
energy of the auction to be the sum of the potential of all
participants, both buyers and
44. sellers.
How does the potential energy of the auction behave as we run
it? It begins with all
sellers having potential 0, and each buyer having a potential
equal to her maximum valuation
for any house — so the potential energy of the auction at the
start is some whole number
P0 ! 0. Also, notice that at the start of each round of the
auction, everyone has potential
at least 0. The sellers always have potential at least 0 since the
prices are always at least 0.
Because of the price-reduction step in every round, the lowest
price is always 0, and therefore
each buyer is always doing at least as well as the option of
buying a 0-cost item, which gives
a payo" of at least 0. (This also means that each buyer has at
least one preferred seller at
the start of each round.) Finally, since the potentials of the
sellers and buyers are all at least
0 at the start of each round, so is the potential energy of the
auction.
Now, the potential only changes when the prices change, and
this only happens in steps
(v) and (vi). Notice that the reduction of prices, as defined
45. above, does not change the
potential energy of the auction: if we subtract p from each
price, then the potential of each
seller drops by p, but the potential of each buyer goes up by p
— it all cancels out. Finally,
what happens to the potential energy of the auction in step (v),
when the sellers in N (S)
all raise their prices by one unit? Each of these sellers’
potentials goes up by one unit. But
the potential of each buyer in S goes down by one unit, since all
their preferred houses just
got more expensive. Since S has strictly more nodes than N (S)
does, this means that the
potential energy of the auction goes down by at least one unit
more than it goes up, so it
strictly decreases by at least one unit.
So what we’ve shown is that in each step that the auction runs,
the potential energy of
the auction decreases by at least one unit. It starts at some fixed
value P0, and it can’t drop
below 0, so the auction must come to an end within P0 steps —
and when it comes to an
end, we have our market-clearing prices.
46. 10.5 How Does this Relate to Single-Item Auctions?
We talked in Chapter 9 about single-item auctions, and we’ve
now seen a more complex
type of auction based on bipartite graphs. It makes sense to ask
how these di"erent kinds
of auctions relate to each other. In fact, there is a very natural
way to view the single-item
auction — both the outcome and the procedure itself — as a
special case of the bipartite
graph auction we’ve just defined. We can do this as follows.
Suppose we have a set of n buyers and a single seller auctioning
an item; let buyer j
have valuation vj for the item. To map this to our model based
on perfect matchings, we
292 CHAPTER 10. MATCHING MARKETS
a
b
c
x
y
47. z
3, 0, 0
2, 0, 0
1, 0, 0
0
0
0
Prices Sellers Buyers Valuations
(a) Start of the Auction
a
b
c
x
y
z
3, 0, 0
2, 0, 0
1, 0, 0
48. 2
0
0
Prices Sellers Buyers Valuations
(b) End of the Auction
Figure 10.7: A single-item auction can be represented by the
bipartite graph model: the
item is represented by one seller node, and then there are
additional seller nodes for which
all buyers have 0 valuation. (a) The start of the bipartite graph
auction. (b) The end of the
bipartite graph auction, when buyer x gets the item at the
valuation of buyer y.
need an equal number of buyers and sellers, but this is easily
dealt with: we create n " 1
“fake” additional sellers (who conceptually represent n " 1
di"erent ways to fail to acquire
the item), and we give buyer j a valuation of 0 for the item
o"ered by each of these fake
sellers. With the real seller labeled 1, this means we have v1j =
vj, the valuation of buyer j
for the real item; and vij = 0 for larger values of i.
Now we have a genuine instance of our bipartite graph model:
from a perfect matching
of buyers to sellers, we can see which buyer ends up paired with
the real seller (this is the
49. buyer who gets the item), and from a set of market-clearing
prices, we will see what the real
item sells for.
Moreover, the price-raising procedure to produce market-
clearing prices — based on
finding constricted sets — has a natural meaning here as well.
The execution of the procedure
on a simple example is shown in Figure 10.7. Initially, all
buyers will identify the real seller
as their preferred seller (assuming that they all have positive
valuations for the item). The
first constricted set S we find is the set of all buyers, and N (S)
is just the single real seller.
Thus, the seller raises his price by one unit. This continues as
long as at least two buyers
have the real seller as their unique preferred seller: they form a
constricted set S with N (S)
equal to the real seller, and this seller raises his price by a unit.
The prices of the fake items
remain fixed at 0 throughout the auction. Finally, when all but
one buyer has identified other
sellers as preferred sellers, the graph has a perfect matching.
This happens at precisely the
50. moment that the buyer with the second-highest valuation drops
out — in other words, the
buyer with the highest valuation gets the item, and pays the
second-highest valuation. So
the bipartite graph procedure precisely implements an ascending
bid (English) auction.
10.6. ADVANCED MATERIAL: A PROOF OF THE
MATCHING THEOREM 293
10.6 Advanced Material: A Proof of the Matching
Theorem
The discussion in this chapter provides a complete proof that
market-clearing prices exist,
omitting the details in only one place: we deferred the proof of
the Matching Theorem
in Section 10.1, since it was enough for our purposes to use it in
a “black-box” fashion.
However, the standard proof of the Matching Theorem in fact
provides important insights
into the structure of bipartite graphs, and so we present it here.
Recall that the statement is the following.
Claim: If a bipartite graph (with equal numbers of nodes on the
left and right)
51. has no perfect matching, then it must contain a constricted set.
The tricky part of proving this is to come up with some means
of identifying a constricted
set in a bipartite graph, knowing only that it contains no perfect
matching. Our general
plan for doing this will be as follows. We will take a bipartite
graph, with equal numbers of
nodes on the left and right but no perfect matching, and
consider a matching that includes
as many nodes as possible — we will call this a maximum
matching. We then try to enlarge
it, by searching for a way to include one more node from each
side in the matching. This
will fail (since the matching is already as large as possible for
the given graph), and we show
that when this search for a larger matching fails, it produces a
constricted set.
Naturally, there is a lot that needs to be fleshed out in this
strategy, and the first step is
to consider how one goes about “enlarging” a matching in a
bipartite graph. This will turn
out to be the key issue in the whole proof.
Alternating and Augmenting Paths. With this in mind, let’s
forget about constricted
52. sets for a little while and simply think about matchings and how
they can be enlarged. As a
first example, consider the bipartite graph in Figure 10.8(a),
with a matching indicated using
bold edges. (We’ll say that the matching edges are the edges
used in a given matching, and
the non-matching edges are the other, unused ones.) The
matching shown in Figure 10.8(a)
is not a maximum matching — we could clearly pair up W with
A and X with B to get a
larger one, as in Figure 10.8(c).
For examples this small, it’s easy just to look at the picture of
the graph and see how
to find a larger matching. But for bipartite graphs that are more
complicated, it’s useful
to have a more principled way of growing a smaller matching
into a larger one. Here’s how
we can do this in Figure 10.8(a). We start at node W , looking
for a matching that would
include it while still also including everyone who’s currently
matched. It’s not immediately
obvious whether we can pair up W with A, since A is already
matched to X. So we try
53. “undoing” the pairing of A and X, which would let W and A be
matched. This in turn frees
up X, which can then be matched with B, and we’ve enlarged
the matching.
294 CHAPTER 10. MATCHING MARKETS
WA
B X
(a) A matching that is not of max-
imum size
WA
B X
(b) An augmenting path
WA
B X
(c) A larger (perfect) matching
Figure 10.8: (a) A matching that does not have maximum size.
(b) What a matching does
not have maximum size, we can try to find an augmenting path
that connects unmatched
nodes on opposite sides while alternating between non-matching
and matching edges. (c)
If we then swap the edges on this path — taking out the
54. matching edges on the path and
replacing them with the non-matching edges — then we obtain a
larger matching.
This process is depicted in Figure 10.8(b). We followed a
zigzag path through the bipartite
graph, alternately adding unused edges to the matching while
removing currently used edges
from the matching: in particular, we added the edges A-W and
B-X to the matching, while
removing the edge A-X. It was also important that the path was
simple — it did not repeat
any nodes. We will call a simple path that alternates between
non-matching and matching
edges in this way an alternating path.
This example illustrates a principle that’s true in general. In any
bipartite graph with a
matching, if we can find an alternating path that begins and
ends at an unmatched node,
then we can swap the roles of all edges on this path: each non-
matching edge gets put into
the matching, and each edge on the path that is currently in the
matching gets removed from
it. In this way, all the nodes in the path become paired up: we
have managed to include the
55. two formerly unmatched endpoints in the matching, thereby
enlarging it. We can summarize
this as follows:
Claim: In a bipartite graph with a matching, if there is an
alternating path whose
endpoints are unmatched nodes, then the matching can be
enlarged.
In view of this, we call an alternating path with unmatched
endpoints an augmenting path,
since it gives us a way to augment the matching.
Augmenting paths can get much longer than what we see in
Figure 10.8. For example, in
Figure 10.9, we show an augmenting path that includes a total
of eight nodes, and succeeds
in including its two endpoints W and D in the matching. It’s
also the case that augmenting
paths can be harder to find than these two simple examples
might suggest. In each of these
examples, looking for the augmenting path never involves any
real choices — we just keep
10.6. ADVANCED MATERIAL: A PROOF OF THE
MATCHING THEOREM 295
56. WA
B X
C
D
Y
Z
(a) A matching that is not of max-
imum size
WA
B X
C
D
Y
Z
(b) An augmenting path
WA
B X
C
D
57. Y
Z
(c) A larger (perfect) matching
Figure 10.9: The principle used in Figure 10.8 can be applied to
larger bipartite graphs as
well, sometimes producing long augmenting paths.
following the only edge available at each step. But in more
complicated bipartite graphs,
there can be lots of dead-ends in the search for an augmenting
path. Consider, for example,
the graph with a matching in Figure 10.10(a). There is in fact an
augmenting path that
succeeds in including W and D in the matching, but even on this
relatively small example
one needs to check a bit carefully to find it. Moreover, there are
other alternating paths
starting from W — such as W -A-X and W -B-Y -C-Z — that
don’t make it to the other
unmatched node D, as well as paths from W to D — such as W -
B-Z-C-Y -D — that are
not alternating.
Searching for an Augmenting Path. Fortunately, however, there
is a natural procedure
58. we can use to search for an augmenting path in a bipartite graph
with a matching. It works
by simply adapting the breadth-first search (BFS) procedure to
include the requirement of
alternation — as a result, we will refer to this new procedure as
alternating BFS.
Here is how it works. We start at any unmatched node on the
right. Then, as in
traditional BFS, we explore the rest of the graph layer by layer,
adding new nodes to the
next layer when they are connected by an edge to a node in the
current layer. Because
the graph is bipartite, these layers will alternate between
consisting of nodes on the left
296 CHAPTER 10. MATCHING MARKETS
WA
B X
C
D
Y
59. Z
(a) A matching that is not of max-
imum size
WA
B X
C
D
Y
Z
(b) An augmenting path
WA
B X
C
D
Y
Z
(c) A larger (perfect) matching
Figure 10.10: In more complex graphs, finding an augmenting
path can require a more
careful search, in which choices lead to “dead ends” while
60. others connect two unmatched
nodes.
and nodes on the right. Now, here is the di"erence from
traditional BFS: because we are
searching specifically for an augmenting path, we want the
paths that move downward layer-
by-layer to all be alternating. Thus, when we build a new layer
of nodes from the left-hand
side, we should only use non-matching edges to discover new
nodes; and when we build a
new layer of nodes from the right-hand side, we should only use
matching edges to discover
new nodes.
Figure 10.11 shows how this works on the example from Figure
10.10(a). Starting at W
(which we’ll think of as layer 0), we build the first layer by
following non-matching edges to
A and B. We then build the second layer by only following
matching edges, which leads us
to nodes X and Y . Following non-matching edges from this
layer to new nodes not already
discovered, we get a third layer consisting of C and D; and
finally, taking the matching edge
from C brings us to Z in the fourth layer. Notice that in this
61. process, we never used the
edge B-Z: we couldn’t use it out of B in the first layer, because
we were only allowed to
follow matching edges at that point; and we couldn’t use it out
of Z in the fourth layer,
because by then B had already been discovered.
Now, the crucial thing to observe is that if this alternating BFS
procedure ever produces
10.6. ADVANCED MATERIAL: A PROOF OF THE
MATCHING THEOREM 297
W
A B
X
C D
Y
Z
B-Z edge not
part of search
Figure 10.11: In an alternating breadth-first search, one
constructs layers that alternately
use non-matching and matching edges; if an unmatched node is
62. ever reached, this results in
an augmenting path.
a layer containing an unmatched node from the left-hand side of
the graph, we have found
an augmenting path (and can thus enlarge the matching). We
simply move downward in
a path from the unmatched node in layer 0 to the unmatched
node from the left-hand
side, proceeding one layer at a time. The edges on this path will
alternate between being
non-matching and matching, and so this will be an augmenting
path.
Augmenting Paths and Constricted Sets. This gives us a
systematic procedure to
search for an augmenting path. However, it leaves a basic
question unresolved: if this search
procedure fails to find an augmenting path, can we necessarily
conclude that there is no
perfect matching? This is certainly not a priori clear: why
couldn’t it be that there is a
perfect matching hidden somewhere in the graph, and we just
need a more powerful way to
find it? But in fact, alternating BFS is all that we need: what
we’ll show now is that when
63. 298 CHAPTER 10. MATCHING MARKETS
W
Layer 1
Layer 2
Layer 3
Layer 4
Layer 0
}
}
equal numbers
of nodes
equal numbers
of nodes
Figure 10.12: A schematic view of alternating breadth-first
search, which produces pairs of
layers of equal size.
alternating BFS fails to find an augmenting path, we can in fact
extract from this failed
search a constricted set that proves there is no perfect matching.
Here is how. Consider any bipartite graph, and suppose we are
64. currently looking at a
matching in it that is not perfect. Suppose further that we
perform an alternating BFS
from an unmatched node W on the right-hand side, and we fail
to reach any unmatched
node on the left-hand side. The resulting set of layers at the end
of the search will look
schematically like what’s depicted in Figure 10.12. More
concretely, Figure 10.13(a) shows
a specific example of a graph with no perfect matching, and
Figure 10.13(b) shows a set of
layers from a failed alternating BFS on this example.
Let’s make some observations about the structure after a failed
search.
1. First, the even-numbered layers consist of nodes from the
right-hand side, while the
odd-numbered layers consist of nodes from the left-hand side.
10.6. ADVANCED MATERIAL: A PROOF OF THE
MATCHING THEOREM 299
WA
B X
65. C
D
Y
Z
(a) A maximum matching that
is not perfect
W
A B
X Y
(b) A failed search for an aug-
menting path
WA
B X
C
D
Y
Z
(c) The resulting constricted set
Figure 10.13: (a) A matching that has maximum size, but is not
perfect. (b) For such a
66. matching, the search for an augment path using alternating
breadth-first search will fail. (c)
The failure of this search exposes a constricted set: the set of
nodes belonging to the even
layers.
2. Moreover, each odd layer contains exactly the same number
of nodes as the subsequent
even layer. This is because we never reach an unmatched node
in an odd layer: so in
every odd layer, the nodes are all connected by their matching
edges to distinct nodes
in the next layer, as illustrated in Figure 10.12.
3. So not counting node W in layer 0, there are exactly the same
number of nodes in even
layers (numbered 2 and higher) as there are in odd layers.
Counting the one extra
node in layer 0, there are strictly more nodes in even layers
overall than there are in
odd layers.
4. Finally, every node in an even layer has all of its neighbors
in the graph present in some
layer. This is because each even-layer node other than W has its
matched partner just
above it in the previous layer; and if any of its other neighbors
were not already present
67. in a higher layer, they would be added to the next layer down,
when we’re allowed to
explore using non-matching edges.
(Notice that it’s not necessarily true that every node in an odd
layer has all of its
300 CHAPTER 10. MATCHING MARKETS
neighbors in the graph present in some layer. For example, in
Figure 10.13(b), node
B’s neighbor Z is not present in any layer. This is because we
were not allowed to add
Z when we got to B in the search, since we could only follow
the matching edge out
of B.)
Putting these observations together, we discover the following
fact: the set of nodes in all
even layers, at the end of a failed alternating BFS, forms a
constricted set. This is simply
because it’s a set of nodes S on the right-hand side whose set of
neighbors — because they’re
contained among the nodes in the odd layers — is strictly
smaller than S is. Figures 10.13(b)
68. and 10.13(c) show how this works in one specific example.
This completes our plan — to extract a constricted set from the
failure of alternating
BFS. Here is one way to summarize the conclusion.
Claim: Consider any bipartite graph with a matching, and let W
be any un-
matched node on the right-hand side. Then either there is an
augmenting path
beginning at W , or there is a constricted set containing W .
The Matching Theorem. The fact we’ve just discovered is the
crucial step in proving
the Matching Theorem; from here it’s easy, as follows.
Consider a bipartite graph with an equal number of nodes on the
left and right, and
suppose it has no perfect matching. Let’s take a maximum
matching in it — one that
includes as many edges as possible. Since this matching is not
perfect, and since there are
an equal number of nodes on the two sides of the bipartite
graph, there must be a node W
on the right-hand side that is unmatched. We know there cannot
be an augmenting path
containing W , since then we’d be able to enlarge the matching
69. — and that isn’t possible
since we chose a matching of maximum size. Now, by our
previous claim, since there is
no augmenting path beginning at W , there must be a constricted
set containing W . Since
we’ve deduced the existence of a constricted set from the fact
that the graph has no perfect
matching, this completes the proof of the Matching Theorem.
Computing a Perfect Matching. One final dividend from this
analysis is that we actu-
ally have a reasonably e!cient method to determine whether a
graph has a perfect matching
— enormously more e!cient than the brute-force approach of
trying all ways to pair up the
nodes on the left and right.
The method works as follows. Given a bipartite graph with an
equal number of nodes
on the left and right, we will progress through a sequence of
matchings, and each matching
in the sequence will be one edge larger than the previous one.
We can start from the empty
matching — the trivial one in which no nodes at all are paired.
Now in general, we look at
70. our current matching and find an unmatched node W . We use
alternating BFS to search for
10.6. ADVANCED MATERIAL: A PROOF OF THE
MATCHING THEOREM 301
WA
B X
C
D
Y
Z
Figure 10.14: If the alternating breadth-first search fails from
any node on the right-hand
side, this is enough to expose a constricted set and hence prove
there is no perfect matching.
However, it is still possible that an alternating breadth-first
search could still succeed from
some other node. (In this case, the search from W would fail,
but the search from Y would
succeed.)
an augmenting path beginning at W . If we find one, we use this
augmenting path to enlarge
the matching, and we continue with this new matching. If we
don’t find one, we can stop
71. with a constricted set that proves the graph has no perfect
matching.
Since the matchings get larger in every step while the process is
running, the number of
matchings we pass through can be at most the number of nodes
on each side of the graph.
By then, we will either have reached a perfect matching, or
stopped earlier with a constricted
set.
An interesting question is the following: when the procedure
stops with a constricted
set, are we guaranteed to have a maximum matching? As we’ve
described the procedure so
far, the answer is no. Consider for example Figure 10.14. If we
try to find an augmenting
path starting at W , then we will fail (producing the constricted
set consisting of W and X).
This is indeed enough to prove there is no perfect matching.
However, it does not mean that
the current matching has maximum size: if we instead had
searched for an augmenting path
starting from Y , we would have succeeded, producing the path
Y -B-Z-D. In other words,
if we’re looking for a maximum matching and not just a perfect
72. matching, it can matter
302 CHAPTER 10. MATCHING MARKETS
where we start our search for an augmenting path; certain parts
of the graph can become
“wedged,” while other still contain the potential for enlarging
the matching.
However, there is a variation on our procedure that is
guaranteed to produce a maximum
matching. We won’t go through all the details of this (see e.g.
[260] for more), but the
idea is as follows. By revisiting the analysis we’ve used thus
far, and adapting it a little
bit, one can show that if there is no augmenting path beginning
at any node on the right-
hand side, then in fact the current matching has maximum size.
This shows that if, as we
progress through larger and larger matchings, we always search
for an augmenting path from
every node on the right-hand side, then either one of these
searches will succeed, or else we
can conclude that the current matching has maximum size. And
while this sounds like an
73. expensive thing to do — having to search separately from each
node on the right — in fact
it can be done e!ciently by making all the unmatched nodes on
the right constitute layer 0
in the alternating BFS, and otherwise running it as before. Then
if an unmatched node on
the left is ever reached in some layer, we can follow the path
from the appropriate node in
layer 0 down to it, producing an augmenting path.
A lot of work has gone into the design of e!cient methods for
finding maximum matchings
in bipartite graphs, and there are a number of further
improvements possible, including
versions of alternating BFS that try to find many augmenting
paths simultaneously, thereby
cutting down the number of intermediate matchings one must
pass through on the way to
the maximum. Determining how e!ciently maximum matchings
can be found remains an
open area of research.
10.7 Exercises
1. Suppose we have a set of 2 sellers labeled a and b, and a set
of 2 buyers labeled x and
74. y. Each seller is o"ering a distinct house for sale, and the
valuations of the buyers for
the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
x 2 4
y 3 6
Suppose that a charges a price of 0 for his house, and b charges
a price of 1 for his
house. Is this set of prices market-clearing? Give a brief (1-3
sentence) explanation; as
part of your answer, say what the preferred-seller graph is with
this given set of prices,
and use this in your explanation.
2. Suppose we have a set of 3 sellers labeled a, b, and c, and a
set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
10.7. EXERCISES 303
75. Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 5 7 1
y 2 3 1
z 5 4 4
Suppose that sellers a and b each charge 2, and seller c charges
1. Is this set of prices
market-clearing? Give a brief explanation.
3. Suppose we have a set of 3 sellers labeled a, b, and c, and a
set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
76. x 2 4 6
y 3 5 1
z 4 7 5
Suppose that sellers a and c each charge 1, and seller b charges
3. Is this set of prices
market-clearing? Give a brief explanation.
4. Suppose we have a set of 3 sellers labeled a, b, and c, and a
set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 12 9 8
y 10 3 6
z 8 6 5
Suppose that a charges a price of 3 for his house, b charges a
price of 1 for his house,
and c charges a price of 0. Is this set of prices market-clearing?
If so, explain which
77. buyer you would expect to get which house; if not, say which
seller or sellers should
raise their price(s) in the next round of the bipartite-graph
auction procedure from
Chapter 10.
5. Suppose we have a set of 3 sellers labeled a, b, and c, and a
set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
304 CHAPTER 10. MATCHING MARKETS
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 7 7 4
y 7 6 3
z 5 4 3
Suppose that a charges a price of 4 for his house, b charges a
price of 3 for his house,
78. and c charges a price of 1. Is this set of prices market-clearing?
Give an explanation
for your answer, using the relevant definitions from Chapter 10.
6. Suppose we have a set of 3 sellers labeled a, b, and c, and a
set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 6 3 2
y 10 5 4
z 7 8 6
Suppose that a charges a price of 4 for his house, b charges a
price of 1 for his house,
and c charges a price of 0. Is this set of prices market-clearing?
If so, explain which
buyer you would expect to get which house; if not, say which
seller or sellers should
raise their price(s) in the next round of the bipartite-graph
79. auction procedure from
Chapter 10.
7. Suppose we have a set of 3 sellers labeled a, b, and c, and a
set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 6 8 7
y 5 6 6
z 3 6 5
Suppose that a charges a price of 2 for his house, b charges a
price of 5 for his house,
and c charges a price of 4. Is this set of prices market-clearing?
If so, explain which
buyer you would expect to get which house; if not, say which
seller or sellers should
raise their price(s) in the next round of the bipartite-graph
auction procedure from
80. Chapter 10.
10.7. EXERCISES 305
8. Suppose we have a set of 2 sellers labeled a and b, and a set
of 2 buyers labeled x and
y. Each seller is o"ering a distinct house for sale, and the
valuations of the buyers for
the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
x 7 5
y 4 1
Describe what happens if we run the bipartite graph auction
procedure to determine
market-clearing prices, by saying what the prices are at the end
of each round of the
auction, including what the final market-clearing prices are
when the auction comes to
an end.
9. Suppose we have a set of 3 sellers labeled a, b, and c, and a
81. set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 3 6 4
y 2 8 1
z 1 2 3
Describe what happens if we run the bipartite graph auction
procedure from Chap-
ter 10, by saying what the prices are at the end of each round of
the auction, including
what the final market-clearing prices are when the auction
comes to an end.
(Note: In some rounds, you may notice that there are multiple
choices for the con-
stricted set of buyers A. Under the rules of the auction, you can
choose any such
constricted set. It’s interesting to consider — though not
82. necessary for this question
— how the eventual set of market-clearing prices depends on
how one chooses among
the possible constricted sets.)
10. Suppose we have a set of 3 sellers labeled a, b, and c, and a
set of 3 buyers labeled
x, y, and z. Each seller is o"ering a distinct house for sale, and
the valuations of the
buyers for the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 9 7 4
y 5 9 7
z 11 10 8
306 CHAPTER 10. MATCHING MARKETS
Describe what happens if we run the bipartite graph auction
procedure from Chap-
ter 10, by saying what the prices are at the end of each round of
83. the auction, including
what the final market-clearing prices are when the auction
comes to an end.
(Note: In some rounds, you may notice that there are multiple
choices for the con-
stricted set of buyers A. Under the rules of the auction, you can
choose any such
constricted set. It’s interesting to consider — though not
necessary for this question
— how the eventual set of market-clearing prices depends on
how one chooses among
the possible constricted sets.)
x
y
a
b
z
c
Figure 10.15: The map for a parking-space market. (Image from
Google Maps,
http://maps.google.com/)
11. Figure 10.15 shows a map of part of the Back Bay section of
84. Boston. Suppose that the
dark circles labeled x, y, and z represent people living in
apartments in Back Bay who
want to rent parking spaces by the month for parking their cars.
(Due to the density
of buildings, these parking spaces may be a short walk from
where they live, rather
than right at their apartment.) The dark circles labeled a, b, and
c represent parking
10.7. EXERCISES 307
spaces available for rent.
Let’s define the distance between a person and a parking space
to be the number
of blocks they’d have to walk from their apartment to the
parking space. Thus, for
example, z is at a distance of 2 from space c, while y is at a
distance of 5 from c and x
is at a distance of 6 from c. (We’ll ignore the fact that the block
between Gloucester
and Hereford is a bit shorter than the others; all blocks will be
treated as the same in
counting distance.)
85. Suppose that a person has a valuation for a potential parking
space equal to
8 " (their distance to the parking space).
(Notice that this formula gives higher valuations to closer
parking spaces.) In terms of
these valuations, we’d like to think about prices that could be
charged for the parking
spaces.
(a) Describe how you would set up this question as a matching
market in the style of
Chapter 10. Say who the sellers and buyers would be in your
set-up, as well as the
valuation each buyer has for the item o"ered by each seller.
(b) Describe what happens if we run the bipartite graph auction
procedure from
Chapter 10 on the matching market you set up in (a), by saying
what the prices
are at the end of each round of the auction, including what the
final market-clearing
prices are when the auction comes to an end.
(Note: In some rounds, you may notice that there are multiple
choices for the con-
86. stricted set of buyers. Under the rules of the auction, you can
choose any such con-
stricted set. It’s interesting to consider — though not necessary
for this question —
how the eventual set of market-clearing prices depends on how
one chooses among the
possible constricted sets.)
(c) At a more informal level, how do the prices you determined
for the parking spaces
in (b) relate to these spaces’ intuitive “attractiveness” to the
people in apartments x,
y, and z? Explain.
12. Suppose we have a set of 2 sellers labeled a and b, and a set
of 2 buyers labeled x and
y. Each seller is o"ering a distinct house for sale, and the
valuations of the buyers for
the houses are as follows.
Buyer Value for
a’s house
Value for
b’s house
x 4 1
y 3 2
87. 308 CHAPTER 10. MATCHING MARKETS
In general, there will be multiple sets of market-clearing prices
for a given set of sellers,
buyers, and valuations: any set of prices that produces a
preferred-seller graph with a
perfect matching is market-clearing.
As a way of exploring this issue in the context of the example
above, give three di!erent
sets of market-clearing prices for this matching market. The
prices should be whole
numbers (i.e. they should be numbers from 0, 1, 2, 3, 4, 5, 6, . .
.). (Note that for two sets
of market-clearing prices to be di"erent, it is enough that they
not consist of exactly
the same set of numbers.) Explain your answer.
13. Suppose you want to design an auction for the following
type of situation: you have
two identical copies of a valuable object, and there are four
potential buyers for the
object. Each potential buyer i wants at most one copy, and has a
value vi for either
copy.
88. You decide to design the auction by analogy with the way in
which we derived the
single-item ascending-bid (English) auction from the general
procedure for matching
markets. In the present case, as there, you want to create a
bipartite graph that
encodes the situation, and then see what prices the bipartite
graph auction procedure
comes up with.
(a) Describe how this construction would work using an
example with four potential
buyers. In creating your example, first choose specific
valuations for the potential
buyers, and then show how the auction proceeds and what the
market-clearing prices
are.
(b) In the case of the single-item auction, the bipartite graph
procedure yielded the
simple rule from the ascending-bid (English) auction: sell to the
highest bidder at the
second-highest price. Describe in comparably simple terms what
the rule is for the
current case of two identical items (i.e. your description should
89. not involve the terms
“bipartite”, “graph,” or “matching”).
14. In Chapter 10, we discussed the notion of social-welfare
maximization for matching
markets: finding a matching M that maximizes the sum of
buyers’ valuations for what
they get, over all possible perfect matchings. We can call such a
matching social-
welfare-maximizing. However, the sum of buyers’ valuations is
not the only quantity
one might want to maximize; another natural goal might be to
make sure that no
individual buyer gets a valuation that is too small.
With this in mind, let’s define the baseline of a perfect
matching M to be the minimum
valuation that any buyer has for the item they get in M . We
could then seek a perfect
matching M whose baseline is as large as possible, over all
possible perfect matchings.
We will call such a matching baseline-maximizing.
10.7. EXERCISES 309
90. For example, in the following set of valuations,
Buyer Value for
a’s house
Value for
b’s house
Value for
c’s house
x 9 7 4
y 5 9 7
z 11 10 8
the matching M consisting of the pairs a-x, b-y, and c-z has a
baseline of 8 (this is
the valuation of z for what she gets, which is lower than the
valuations of x and y for
what they get), while the matching M ! consisting of the pairs b-
x, c-y, and a-z has a
baseline of 7. In fact the first of these example matchings, M ,
is baseline-maximizing
for this sample set of valuations.
Now, finding a perfect matching that is baseline-maximizing is
grounded in a kind of
“egalitarian” motivation — no one should be left too badly o".
This may sometimes
be at odds with the goal of social-welfare maximization. We
91. now explore this tension
further.
(a) Give an example of equal-sized sets of sellers and buyers,
with valuations on the
buyers, so that there is no perfect matching that is both social-
welfare-maximizing and
baseline-maximizing. (In other words, in your example, social-
welfare maximization
and baseline maximization should only occur with di"erent
matchings.)
(b) It is also natural to ask whether a baseline-maximizing
matching can always be
supported by market-clearing prices. Here is a precise way to
ask the question.
For any equal-sized sets of sellers and buyers, with valuations
on the buyers,
is there always a set of market-clearing prices so that the
resulting preferred-
seller graph contains a baseline-maximizing perfect matching M
?
Give a yes/no answer to this question, together with a
justification of your answer. (If
you answer “yes,” you should explain why there must always
exist such a set of market-
92. clearing prices; if you answer “no,” you should explain why
there can be examples in
which a baseline-maximizing matching cannot be found in the
preferred-seller graph
resulting from market-clearing prices.)
15. Consider again the set-up for the bipartite graph auction,
with an equal number of
buyers and sellers, and with each buyer having a valuation for
the object being sold
by each seller. Suppose that we have an instance of this problem
in which there is a
particular seller i who is the favorite: every buyer j has a higher
valuation for seller
i’s object than for the object being sold by any other seller k.
(In notation, we have
vij > vkj for all choices of j and k #= i.)
310 CHAPTER 10. MATCHING MARKETS
Consider a set of market-clearing prices in this situation. Must
it be the case that the
price charged by seller i is at least as high as the price charged
by any other seller?
93. Give an explanation for your answer.
Chapter 9
Auctions
From the book Networks, Crowds, and Markets: Reasoning
about a Highly Connected World.
By David Easley and Jon Kleinberg. Cambridge University
Press, 2010.
Complete preprint on-line at
http://www.cs.cornell.edu/home/kleinber/networks-book/
In Chapter 8, we considered a first extended application of
game-theoretic ideas, in our
analysis of tra!c flow through a network. Here we consider a
second major application —
the behavior of buyers and sellers in an auction.
An auction is a kind of economic activity that has been brought
into many people’s
everyday lives by the Internet, through sites such as eBay. But
auctions also have a long
history that spans many di"erent domains. For example, the U.S.
government uses auctions
to sell Treasury bills and timber and oil leases; Christie’s and
Sotheby’s use them to sell art;
94. and Morrell & Co. and the Chicago Wine Company use them to
sell wine.
Auctions will also play an important and recurring role in the
book, since the simplified
form of buyer-seller interaction they embody is closely related
to more complex forms of
economic interaction as well. In particular, when we think in
the next part of the book
about markets in which multiple buyers and sellers are
connected by an underlying network
structure, we’ll use ideas initially developed in this chapter for
understanding simpler auction
formats. Similarly, in Chapter 15, we’ll study a more complex
kind of auction in the context
of a Web search application, analyzing the ways in which search
companies like Google,
Yahoo!, and Microsoft use an auction format to sell advertising
rights for keywords.
9.1 Types of Auctions
In this chapter we focus on di"erent simple types of auctions,
and how they promote di"erent
kinds of behavior among bidders. We’ll consider the case of a
seller auctioning one item to
a set of buyers. We could symmetrically think of a situation in
95. which a buyer is trying to
purchase a single item, and runs an auction among a set of
multiple sellers, each of whom is
able to provide the item. Such procurement auctions are
frequently run by governments to
Draft version: June 10, 2010
249
250 CHAPTER 9. AUCTIONS
purchase goods. But here we’ll focus on the case in which the
seller runs the auction.
There are many di"erent ways of defining auctions that are
much more complex than
what we consider here. The subsequent chapters will generalize
our analysis to the case in
which there are multiple goods being sold, and the buyers
assign di"erent values to these
goods. Other variations, which fall outside the scope of the
book, include auctions in which
goods are sold sequentially over time. These more complex
variations can also be analyzed
using extensions of the ideas we’ll talk about here, and there is
a large literature in economics
96. that considers auctions at this broad level of generality [256,
292].
The underlying assumption we make when modeling auctions is
that each bidder has an
intrinsic value for the item being auctioned; she is willing to
purchase the item for a price
up to this value, but not for any higher price. We will also refer
to this intrinsic value as the
bidder’s true value for the item. There are four main types of
auctions when a single item is
being sold (and many variants of these types).
1. Ascending-bid auctions, also called English auctions. These
auctions are carried out
interactively in real time, with bidders present either physically
or electronically. The
seller gradually raises the price, bidders drop out until finally
only one bidder remains,
and that bidder wins the object at this final price. Oral auctions
in which bidders
shout out prices, or submit them electronically, are forms of
ascending-bid auctions.
2. Descending-bid auctions, also called Dutch auctions. This is
also an interactive auction
97. format, in which the seller gradually lowers the price from some
high initial value until
the first moment when some bidder accepts and pays the current
price. These auctions
are called Dutch auctions because flowers have long been sold
in the Netherlands using
this procedure.
3. First-price sealed-bid auctions. In this kind of auction,
bidders submit simultaneous
“sealed bids” to the seller. The terminology comes from the
original format for such
auctions, in which bids were written down and provided in
sealed envelopes to the
seller, who would then open them all together. The highest
bidder wins the object and
pays the value of her bid.
4. Second-price sealed-bid auctions, also called Vickrey
auctions. Bidders submit simul-
taneous sealed bids to the sellers; the highest bidder wins the
object and pays the
value of the second-highest bid. These auctions are called
Vickrey auctions in honor
of William Vickrey, who wrote the first game-theoretic analysis
of auctions (including
98. the second-price auction [400]). Vickery won the Nobel
Memorial Prize in Economics
in 1996 for this body of work.
9.2. WHEN ARE AUCTIONS APPROPRIATE? 251
9.2 When are Auctions Appropriate?
Auctions are generally used by sellers in situations where they
do not have a good estimate
of the buyers’ true values for an item, and where buyers do not
know each other’s values. In
this case, as we will see, some of the main auction formats can
be used to elicit bids from
buyers that reveal these values.
Known Values. To motivate the setting in which buyers’ true
values are unknown, let’s
start by considering the case in which the seller and buyers
know each other’s values for an
item, and argue that an auction is unnecessary in this scenario.
In particular, suppose that
a seller is trying to sell an item that he values at x, and suppose
that the maximum value
held by a potential buyer of the item is some larger number y.
99. In this case, we say there is a
surplus of y ! x that can be generated by the sale of the item: it
can go from someone who
values it less (x) to someone who values it more (y).
If the seller knows the true values that the potential buyers
assign to the item, then he
can simply announce that the item is for sale at a fixed price
just below y, and that he will
not accept any lower price. In this case, the buyer with value y
will buy the item, and the
full value of the surplus will go to the seller. In other words, the
seller has no need for an
auction in this case: he gets as much as he could reasonably
expect just by announcing the
right price.
Notice that there is an asymmetry in the formulation of this
example: we gave the seller
the ability to commit to the mechanism that was used for selling
the object. This ability
of the seller to “tie his hands” by committing to a fixed price is
in fact very valuable to
him: assuming the buyers believe this commitment, the item is
sold for a price just below
y, and the seller makes all the surplus. In contrast, consider
100. what would happen if we gave
the buyer with maximum value y the ability to commit to the
mechanism. In this case,
this buyer could announce that she is willing to purchase the
item for a price just above
the larger of x and the values held by all other buyers. With this
announcement, the seller
would still be willing to sell — since the price would be above
x — but now at least some
of the surplus would go to the buyer. As with the seller’s
commitment, this commitment by
the buyer also requires knowledge of everyone else’s values.
These examples show how commitment to a mechanism can
shift the power in the trans-
action in favor of the seller or the buyer. One can also imagine
more complex scenarios in
which the seller and buyers know each other’s values, but
neither has the power to unilater-
ally commit to a mechanism. In this case, one may see some
kind of bargaining take place
over the price; we discuss the topic of bargaining further in
Chapter 12. As we will discover
in the current chapter, the issue of commitment is also crucial in
the context of auctions —
101. specifically, it is important that a seller be able to reliably
commit in advance to a given
auction format.
252 CHAPTER 9. AUCTIONS
Unknown Values. Thus far we’ve been discussing how sellers
and buyers might interact
when everyone knows each other’s true values for the item.
Beginning in the next section,
we’ll see how auctions come into play when the participants do
not know each other’s values.
For most of this chapter we will restrict our attention to the case
in which the buyers
have independent, private values for the item. That is, each
buyer knows how much she
values the item, she does not know how much others value it,
and her value for it does not
depend on others’ values. For example, the buyers could be
interested in consuming the
item, with their values reflecting how much they each would
enjoy it.
Later we will also consider the polar opposite of this setting —
the case of common
102. values. Suppose that an item is being auctioned, and instead of
consuming the item, each
buyer plans to resell the item if she gets it. In this case
(assuming the buyers will do a
comparably good job of reselling it), the item has an unknown
but common value regardless
of who acquires it: it is equal to how much revenue this future
reselling of the item will
generate. Buyers’ estimates of this revenue may di"er if they
have some private information
about the common value, and so their valuations of the item
may di"er. In this setting, the
value each buyer assigns to the object would be a"ected by
knowledge of the other buyers’
valuations, since the buyers could use this knowledge to further
refine their estimates of the
common value.
9.3 Relationships between Di!erent Auction Formats
Our main goal will be to consider how bidders behave in
di"erent types of auctions. We begin
in this section with some simple, informal observations that
relate behavior in interactive
auctions (ascending-bid and descending-bid auctions, which
103. play out in real time) with
behavior in sealed-bid auctions. These observations can be
made mathematically rigorous,
but for the discussion here we will stick to an informal
description.
Descending-Bid and First-Price Auctions. First, consider a
descending-bid auction.
Here, as the seller is lowering the price from its high initial
starting point, no bidder says
anything until finally someone actually accepts the bid and pays
the current price. Bidders
therefore learn nothing while the auction is running, other than
the fact that no one has
yet accepted the current price. For each bidder i, there’s a first
price bi at which she’ll be
willing to break the silence and accept the item at price bi. So
with this view, the process
is equivalent to a sealed-bid first-price auction: this price bi
plays the role of bidder i’s bid;
the item goes to the bidder with the highest bid value; and this
bidder pays the value of her
bid in exchange for the item.
104. 9.3. RELATIONSHIPS BETWEEN DIFFERENT AUCTION
FORMATS 253
Ascending-Bid and Second-Price Auctions. Now let’s think
about an ascending-bid
auction, in which bidders gradually drop out as the seller
steadily raises the price. The
winner of the auction is the last bidder remaining, and she pays
the price at which the
second-to-last bidder drops out.1
Suppose that you’re a bidder in such an auction; let’s consider
how long you should stay
in the auction before dropping out. First, does it ever make
sense to stay in the auction after
the price reaches your true value? No: by staying in, you either
lose and get nothing, or else
you win and have to pay more than your value for the item.
Second, does it ever make sense
to drop out before the price reaches your true value for the
item? Again, no: if you drop
out early (before your true value is reached), then you get
nothing, when by staying in you
might win the item at a price below your true value.
So this informal argument indicates that you should stay in an
ascending-bid auction up
105. to the exact moment at which the price reaches your true value.
If we think of each bidder
i’s “drop-out price” as her bid bi, this says that people should
use their true values as their
bids.
Moreover, with this definition of bids, the rule for determining
the outcome of an ascending-
bid auction can be reformulated as follows. The person with the
highest bid is the one who
stays in the longest, thus winning the item, and she pays the
price at which the second-to-
last person dropped out — in other words, she pays the bid of
this second-to-last person.
Thus, the item goes to the highest bidder at a price equal to the
second-highest bid. This
is precisely the rule used in the sealed-bid second-price auction,
with the di"erence being
that the ascending-bid auction involves real-time interaction
between the buyers and seller,
while the sealed-bid version takes place purely through sealed
bids that the seller opens and
evaluates. But the close similarity in rules helps to motivate the
initially counter-intuitive
106. pricing rule for the second-price auction: it can be viewed as a
simulation, using sealed
bids, of an ascending-bid auction. Moreover, the fact that
bidders want to remain in an
ascending-bid auction up to exactly the point at which their true
value is reached provides
the intuition for what will be our main result in the next section:
after formulating the
sealed-bid second-price auction in terms of game theory, we
will find that bidding one’s true
value is a dominant strategy.
1It’s conceptually simplest to think of three things happening
simultaneously at the end of an ascending-
bid auction: (i) the second-to-last bidder drops out; (ii) the last
remaining bidder sees that she is alone and
stops agreeing to any higher prices; and (iii) the seller awards
the item to this last remaining bidder at the
current price. Of course, in practice we might well expect that
there is some very small increment by which
the bid is raised in each step, and that the last remaining bidder
actually wins only after one more raising
of the bid by this tiny increment. But keeping track of this small
increment makes for a more cumbersome
analysis without changing the underlying ideas, and so we will
assume that the auction ends at precisely the
moment when the second-highest bidder drops out.
254 CHAPTER 9. AUCTIONS
107. Comparing Auction Formats. In the next two sections we will
consider the two main
formats for sealed-bid auctions in more detail. Before doing
this, it’s worth making two
points. First, the discussion in this section shows that when we
analyze bidder behav-
ior in sealed-bid auctions, we’re also learning about their
interactive analogues — with
the descending-bid auction as the analogue of the sealed-bid
first-price auction, and the
ascending-bid auction as the analogue of the sealed-bid second-
price auction.
Second, a purely superficial comparison of the first-price and
second-price sealed-bid
auctions might suggest that the seller would get more money for
the item if he ran a first-
price auction: after all, he’ll get paid the highest bid rather than
the second-highest bid. It
may seem strange that in a second-price auction, the seller is
intentionally undercharging
the bidders. But such reasoning ignores one of the main
messages from our study of game
theory — that when you make up rules to govern people’s
behavior, you have to assume
108. that they’ll adapt their behavior in light of the rules. Here, the
point is that bidders in a
first-price auction will tend to bid lower than they do in a
second-price auction, and in fact
this lowering of bids will tend to o"set what would otherwise
look like a di"erence in the
size of the winning bid. This consideration will come up as a
central issue at various points
later in the chapter.
9.4 Second-Price Auctions
The sealed-bid second-price auction is particularly interesting,
and there are a number of
examples of it in widespread use. The auction form used on
eBay is essentially a second-price
auction. The pricing mechanism that search engines use to sell
keyword-based advertising is
a generalization of the second-price auction, as we will see in
Chapter 15. One of the most
important results in auction theory is the fact we mentioned
toward the end of the previous
section: with independent, private values, bidding your true
value is a dominant strategy in
a second price sealed-bid auction. That is, the best choice of bid
109. is exactly what the object
is worth to you.
Formulating the Second-Price Auction as a Game. To see why
this is true, we
set things up using the language of game theory, defining the
auction in terms of players,
strategies, and payo"s. The bidders will correspond to the
players. Let vi be bidder i’s true
value for the object. Bidder i’s strategy is an amount bi to bid
as a function of her true
value vi. In a second-price sealed-bid auction, the payo" to
bidder i with value vi and bid bi
is defined as follows.
If bi is not the winning bid, then the payo! to i is 0. If bi is the
winning bid, and
some other bj is the second-place bid, then the payo! to i is vi !
bj.
9.4. SECOND-PRICE AUCTIONS 255
Alternate bid bi''
Truthful bid bi = vi
Alternate bid bi'
110. Raised bid affects outcome only if
highest other bid bj is in between.
If so, i wins but pays more than value.
Lowered bid affects outcome only if
highest other bid bk is in between.
If so, i loses when it was possible
to win with non-negative payoff
Figure 9.1: If bidder i deviates from a truthful bid in a second-
price auction, the payo" is
only a"ected if the change in bid changes the win/loss outcome.
To make this completely well-defined, we need to handle the
possibility of ties: what do
we do if two people submit the same bid, and it’s tied for the
largest? One way to handle this
is to assume that there is a fixed ordering on the bidders that is
agreed on in advance, and if
a set of bidders ties for the numerically largest bid, then the
winning bid is the one submitted
by the bidder in this set that comes first in this order. Our
formulation of the payo"s works
with this more refined definition of “winning bid” and “second-
place bid.” (And note that
in the case of a tie, the winning bidder receives the item but
pays the full value of her own
111. bid, for a payo" of zero, since in the event of a tie the first-
place and second-place bids are
equal.)
There is one further point worth noting about our formulation of
auctions in the language
of game theory. When we defined games in Chapter 6, we
assumed that each player knew the
payo"s of all players in the game. Here this isn’t the case, since
the bidders don’t know each
other’s values, and so strictly speaking we need to use a slight
generalization of the notions
256 CHAPTER 9. AUCTIONS
from Chapter 6 to handle this lack of knowledge. For our
analysis here, however, since we
are focusing on dominant strategies in which a player has an
optimal strategy regardless of
the other players’ behavior, we will be able to disregard this
subtlety.
Truthful Bidding in Second-Price Auctions. The precise
statement of our claim about
second-price auctions is as follows.
Claim: In a sealed-bid second-price auction, it is a dominant
112. strategy for each
bidder i to choose a bid bi = vi.
To prove this claim, we need to show that if bidder i bids bi =
vi, then no deviation from
this bid would improve her payo", regardless of what strategy
everyone else is using. There
are two cases to consider: deviations in which i raises her bid,
and deviations in which i
lowers her bid. The key point in both cases is that the value of
i’s bid only a"ects whether
i wins or loses, but never a"ects how much i pays in the event
that she wins — the amount
paid is determined entirely by the other bids, and in particular
by the largest among the
other bids. Since all other bids remain the same when i changes
her bid, a change to i’s bid
only a"ects her payo" if it changes her win/loss outcome. This
argument is summarized in
Figure 9.1.
With this in mind, let’s consider the two cases. First, suppose
that instead of bidding
vi, bidder i chooses a bid b
!
i > vi. This only a"ects bidder i’s payo" if i would lose with bid
113. vi but would win with bid b
!
i. In order for this to happen, the highest other bid bj must be
between bi and b
!
i. In this case, the payo" to i from deviating would be at most vi
! bj " 0,
and so this deviation to bid b!i does not improve i’s payo".
Next, suppose that instead of bidding vi, bidder i chooses a bid
b
!!
i < vi. This only a"ects
bidder i’s payo" if i would win with bid vi but would lose with
bid b
!!
i . So before deviating,
vi was the winning bid, and the second-place bid bk was
between vi and b
!!
i . In this case, i’s
payo" before deviating was vi ! bk # 0, and after deviating it is
0 (since i loses), so again
this deviation does not improve i’s payo".
This completes the argument that truthful bidding is a dominant
strategy in a sealed-
bid second-price auction. The heart of the argument is the fact
noted at the outset: in a
114. second-price auction, your bid determines whether you win or
lose, but not how much you
pay in the event that you win. Therefore, you need to evaluate
changes to your bid in light
of this. This also further highlights the parallels to the
ascending-bid auction. There too,
the analogue of your bid — i.e. the point up to which you’re
willing to stay in the auction
— determines whether you’ll stay in long enough to win; but
the amount you pay in the
event that you win is determined by the point at which the
second-place bidder drops out.
The fact that truthfulness is a dominant strategy also makes
second-price auctions con-
ceptually very clean. Because truthful bidding is a dominant
strategy, it is the best thing
to do regardless of what the other bidders are doing. So in a
second-price auction, it makes
9.5. FIRST-PRICE AUCTIONS AND OTHER FORMATS 257
sense to bid your true value even if other bidders are
overbidding, underbidding, colluding,
or behaving in other unpredictable ways. In other words,
115. truthful bidding is a good idea even
if the competing bidders in the auction don’t know that they
ought to be bidding truthfully
as well.
We now turn to first-price auctions, where we’ll find that the
situation is much more
complex. In particular, each bidder now has to reason about the
behavior of her competitors
in order to arrive at an optimal choice for her own bid.
9.5 First-Price Auctions and Other Formats
In a sealed-bid first-price auction, the value of your bid not
only a"ects whether you win but
also how much you pay. As a result, most of the reasoning from
the previous section has to
be redone, and the conclusions are now di"erent.
To begin with, we can set up the first-price auction as a game in
essentially the same
way that we did for second-price auctions. As before, bidders
are players, and each bidder’s
strategy is an amount to bid as a function of her true value. The
payo" to bidder i with
value vi and bid bi is simply the following.