Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/3237383.3237925acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Ranking Mechanism Design for Price-setting Agents in E-commerce

Published: 09 July 2018 Publication History

Abstract

Ranking algorithms of e-commerce sites take the buyer's search query and information of the corresponding sellers' items as input, and output a ranking of sellers' items that maximizes sites' objectives. However, the conversion rate of each item (i.e., the probability of a completed transaction) not only depends on the ranking given by the site (which controls click-through rates), but also depends on the item price set by its seller(which controls the buyer's willingness to buy). As a result, a ranking algorithm is in fact a mechanism that deals with sellers who strategically set item prices. An interesting fact about this setting, at least the status quo for the largest e-commerce sites such as Taobao, Amazon, and eBay, is that sellers are usually not given the option to report their private costs but can only communicate with the site by setting item prices. In terms of mechanism design, this is a setting where the designer is restricted to design a specific type of indirect mechanisms. We follow the framework of implementing optimal direct mechanisms by indirect mechanisms to tackle this optimal indirect ranking mechanism design problem. We firstly define a related optimal direct ranking mechanism design setting and use Myerson's characterization to optimize in that setting. We then characterize the class of direct mechanisms which could be implemented by indirect mechanisms, and construct a mapping that maps the mechanisms designed in the previous direct setting to indirect mechanisms in the original setting where sellers are allowed only to set item prices. We show that, using this technique, one can obtain mechanisms in the indirect setting that maximize expected total trading volume. We then present the mechanism employed by one of the largest e-commerce websites currently, get a Bayesian Nash Equilibrium of it and obtain the gap of the volume of the site's mechanism and the optimal mechanism. Given real dataset from the site, we also simulate our optimal mechanism and the site's mechanism, and it shows that our mechanism outperforms the site's mechanism significantly.

References

[1]
Larry Blume, David Easley, Jon Kleinberg, and Eva Tardos . 2007. Trading networks with price-setting agents. In Proceedings of the 8th ACM conference on Electronic commerce. ACM, 143--151.
[2]
Liad Blumrosen and Michal Feldman . 2006. Implementation with a bounded action space. In Proceedings of the 7th ACM conference on Electronic commerce. ACM, 62--71.
[3]
Liad Blumrosen and Michal Feldman . 2013. Mechanism design with a restricted action space. Games and Economic Behavior Vol. 82 (2013), 424--443.
[4]
Qingpeng Cai, Aris Filos-Ratsikas, Chang Liu, and Pingzhong Tang . 2016. Mechanism Design for Personalized Recommender Systems Proceedings of the 10th ACM Conference on Recommender Systems. ACM, 159--166.
[5]
Qingpeng Cai, Aris Filos-Ratsikas, Pingzhong Tang, and Yiwei Zhang . 2018 a. Reinforcement Mechanism Design for e-commerce. In Proceedings of the 2018 Web Conference. ACM.
[6]
Qingpeng Cai, Aris Filos-Ratsikas, Pingzhong Tang, and Yiwei Zhang . 2018 b. Reinforcement Mechanism Design for Fraudulent Behaviour in e-Commerce AAAI.
[7]
Benjamin Edelman and Michael Schwarz . 2010. Optimal auction design and equilibrium selection in sponsored search auctions. The American Economic Review Vol. 100, 2 (2010), 597--602.
[8]
Boi Faltings . 2013. Using Incentives to Obtain Truthful Information. Agents and Artificial Intelligence. Springer, 3--10.
[9]
Michael L Fredman and Robert Endre Tarjan . 1987. Fibonacci heaps and their uses in improved network optimization algorithms. Journal of the ACM (JACM) Vol. 34, 3 (1987), 596--615.
[10]
Renato Gomes and Kane Sweeney . 2014. Bayes--nash equilibria of the generalized second-price auction. Games and Economic Behavior Vol. 86 (2014), 421--437.
[11]
Yannai A Gonczarowski and Noam Nisan . 2017. Efficient empirical revenue maximization in single-parameter auction environments Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. ACM, 856--868.
[12]
Jason Hartline and Samuel Taggart . 2016. Non-Revelation Mechanism Design. arXiv preprint arXiv:1608.01875 (2016).
[13]
Jason D Hartline and Brendan Lucier . 2010. Bayesian algorithmic mechanism design. In Proceedings of the forty-second ACM symposium on Theory of computing. ACM, 301--310.
[14]
Scott Johnson, John W Pratt, and Richard J Zeckhauser . 1990. Efficiency despite mutually payoff-relevant private information: The finite case. Econometrica: Journal of the Econometric Society (1990), 873--900.
[15]
Radu Jurca and Boi Faltings . 2008. Truthful opinions from the crowds. ACM SIGecom Exchanges, Vol. 7, 2 (2008), 3.
[16]
Radu Jurca, Boi Faltings, et almbox. . 2009. Mechanisms for making crowds truthful. Journal of Artificial Intelligence Research, Vol. 34, 1 (2009), 209.
[17]
Sébastien Lahaie . 2006. An analysis of alternative slot auction designs for sponsored search Proceedings of the 7th ACM Conference on Electronic Commerce. ACM, 218--227.
[18]
Yicheng Liu and Pingzhong Tang . 2016. Single Item Auctions with Discrete Action Spaces. Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 1305--1306.
[19]
Roger B Myerson . 1981. Optimal auction design. Mathematics of operations research Vol. 6, 1 (1981), 58--73.
[20]
Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V Vazirani . 2007. Algorithmic game theory. Vol. Vol. 1. Cambridge University Press Cambridge.
[21]
Michael H Rothkopf and Ronald M Harstad . 1994. On the role of discrete bid levels in oral auctions. European Journal of Operational Research Vol. 74, 3 (1994), 572--581.
[22]
Yoav Shoham and Kevin Leyton-Brown . 2008. Multiagent systems: Algorithmic, game-theoretic, and logical foundations. Cambridge University Press.
[23]
Pingzhong Tang . 2017. Reinforcement mechanism design. In Early Carrer Highlights at Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI), pages 5146--5150.
[24]
Jie Zhang, Robin Cohen, and Kate Larson . 2012. Combing trust modeling and mechanism design for promoting honesty in e-marketplaces. Computational Intelligence Vol. 28, 4 (2012), 549--578.

Cited By

View all
  • (2021)Constrained Dual-Level Bandit for Personalized Impression Regulation in Online Ranking SystemsACM Transactions on Knowledge Discovery from Data10.1145/346134016:2(1-23)Online publication date: 21-Jul-2021
  • (2019)Fraud Regulating Policy for E-Commerce via Constrained Contextual BanditsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331846(1377-1385)Online publication date: 8-May-2019

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
AAMAS '18: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems
July 2018
2312 pages

Sponsors

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 09 July 2018

Check for updates

Author Tags

  1. e-commerce
  2. mechanism design
  3. ranking

Qualifiers

  • Research-article

Funding Sources

  • National Natural Science Foundation of China Grant
  • China Youth 1000-talent program
  • Alibaba Innovative Research program

Conference

AAMAS '18
Sponsor:
AAMAS '18: Autonomous Agents and MultiAgent Systems
July 10 - 15, 2018
Stockholm, Sweden

Acceptance Rates

AAMAS '18 Paper Acceptance Rate 149 of 607 submissions, 25%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Constrained Dual-Level Bandit for Personalized Impression Regulation in Online Ranking SystemsACM Transactions on Knowledge Discovery from Data10.1145/346134016:2(1-23)Online publication date: 21-Jul-2021
  • (2019)Fraud Regulating Policy for E-Commerce via Constrained Contextual BanditsProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331846(1377-1385)Online publication date: 8-May-2019

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media