Networks of Strategic Agents: Social Norms, Incentives and Learning

Much of society is organized in networks: autonomous communication networks, social networks, economic networks. However, to enable the efficient and robust operation of networks several key challenges need to be overcome: the interacting agents (people, devices, software, companies, etc.) are strategic, heterogeneous and have incomplete information about the other agents. This dissertation develops systematic solutions to address these challenges. The first part of this dissertation studies how to incentivize self-interested agents to take socially optimal actions. In many service exchange networks, agents connect to other agents to request services (e.g. favors, goods, information etc.); however, since agents who provide service gain no (immediate) benefit but only incur costs, they have an incentive to withhold their service. This dissertation designs and analyzes incentives mechanisms that rely on various types of social reciprocation, including exchange of fiat money and rating systems. The analysis builds on the theory of repeated and stochastic games with imperfect monitoring, but requires significant innovations to address the unique characteristics and requirements of online communities and networks: the anonymity and heterogeneity of agents, informational constraints (for both agents and the network manager), real-time constraints, network topology constraints, etc. The second part of this dissertation studies how agents learn in networks. In many networks, agents need to learn how to cooperate with each other to achieve a common goal. This dissertation designs the first multi-agent learning algorithm that is able to achieve cooperation without requiring any explicit message exchange with other agents and to provide performance guarantees, including characterizing the speed of convergence. A final part of the dissertation aims to address the problem of adverse selection in networks. The goal is to design and analyze reputation-based social norms that aim to eliminate agents of low qualities from participating in networks and communities. For this, a system of reputation in which agents’ reputation is determined based on their productivity when working alone or with others. If the agents’ reputation at the time of their evaluation (determined by the social norm) is higher than a quality/productivity level (determined by the social norm) they can remain in the network; otherwise they are expelled. The dissertation designs and analyzes social norms that maximize the productivity of the society.

[1]  Tao Mei,et al.  Towards Cross-Domain Learning for Social Video Popularity Prediction , 2013, IEEE Transactions on Multimedia.

[2]  Junlan Feng,et al.  Robust Sentiment Detection on Twitter from Biased and Noisy Data , 2010, COLING.

[3]  David A. Shamma,et al.  Viral Actions: Predicting Video View Counts Using Synchronous Sharing Behaviors , 2011, ICWSM.

[4]  John Langford,et al.  The Epoch-Greedy Algorithm for Multi-armed Bandits with Side Information , 2007, NIPS.

[5]  Kavé Salamatian,et al.  An Approach to Model and Predict the Popularity of Online Contents with Explanatory Factors , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[6]  Chen Tian,et al.  Optimizing cost and performance for content multihoming , 2012, SIGCOMM '12.

[7]  Pablo Rodriguez,et al.  I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.

[8]  Mihaela van der Schaar,et al.  Distributed Online Learning in Social Recommender Systems , 2013, IEEE Journal of Selected Topics in Signal Processing.

[9]  David Barber,et al.  Online Learning from Finite Training Sets and Robustness to Input Bias , 1998, Neural Computation.

[10]  H. Varian,et al.  Predicting the Present with Google Trends , 2009 .

[11]  E. Lazega Introduction : Collegial Phenomenon : The Social Mechanisms of Cooperation Among Peers in a Corporate Law Partnership , 2001 .

[12]  Dirk Bergemann,et al.  Optimal pricing with recommender systems , 2006, EC '06.

[13]  N. Kiyotaki,et al.  On Money as a Medium of Exchange , 1989, Journal of Political Economy.

[14]  Mihaela van der Schaar,et al.  Token economy for online exchange systems , 2012, AAMAS.

[15]  Brian D. Davison,et al.  Predicting popular messages in Twitter , 2011, WWW.

[16]  Mihaela van der Schaar,et al.  Distributed Multi-Agent Online Learning Based on Global Feedback , 2015, IEEE Transactions on Signal Processing.

[17]  Krishna P. Gummadi,et al.  Predicting emerging social conventions in online social networks , 2012, CIKM.

[18]  Joseph Y. Halpern,et al.  Optimizing scrip systems: efficiency, crashes, hoarders, and altruists , 2007, EC '07.

[19]  R. Axelrod The Emergence of Cooperation among Egoists , 1981, American Political Science Review.

[20]  Carlos Alós-Ferrer,et al.  Dynamical Systems with a Continuum of Randomly Matched Agents , 1999 .

[21]  Nicolò Cesa-Bianchi,et al.  Combinatorial Bandits , 2012, COLT.

[22]  Yutaka Matsuo,et al.  Earthquake shakes Twitter users: real-time event detection by social sensors , 2010, WWW '10.

[23]  Peter Auer,et al.  Using Confidence Bounds for Exploitation-Exploration Trade-offs , 2003, J. Mach. Learn. Res..

[24]  Glenn Ellison Basins of Attraction, Long-Run Stochastic Stability, and the Speed of Step-by-Step Evolution , 2000 .

[25]  Gabriele Camera,et al.  Money, Credit and Banking , 2005, J. Econ. Theory.

[26]  Mihaela van der Schaar,et al.  Token System Design for Autonomic Wireless Relay Networks , 2013, IEEE Transactions on Communications.

[27]  Vikram Krishnamurthy,et al.  Quickest Detection POMDPs With Social Learning: Interaction of Local and Global Decision Makers , 2010, IEEE Transactions on Information Theory.

[28]  Mubarak Shah,et al.  High-level event recognition in unconstrained videos , 2013, International Journal of Multimedia Information Retrieval.

[29]  Mihaela van der Schaar,et al.  A Distributed Approach for Optimizing Cascaded Classifier Topologies in Real-Time Stream Mining Systems , 2010, IEEE Transactions on Image Processing.

[30]  David A. Miller,et al.  Enforcing Cooperation in Networked Societies , 2013 .

[31]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[32]  Baochun Li,et al.  Demand forecast and performance prediction in peer-assisted on-demand streaming systems , 2011, 2011 Proceedings IEEE INFOCOM.

[33]  Cong Shen,et al.  Silence is Gold: Strategic Interference Mitigation Using Tokens in Heterogeneous Small Cell Networks , 2015, IEEE Journal on Selected Areas in Communications.

[34]  Ahmed Riahi-Belkaoui The cultural shaping of accounting , 1995 .

[35]  Ruilin Zhou,et al.  Individual and Aggregate Real Balances in a Random Matching Model , 1996 .

[36]  Daniel Pérez Palomar,et al.  Alternative Distributed Algorithms for Network Utility Maximization: Framework and Applications , 2007, IEEE Transactions on Automatic Control.

[37]  Narayana R. Kocherlakota,et al.  The Two-Money Theorem , 2002 .

[38]  Roi Blanco,et al.  Hybrid models for future event prediction , 2011, CIKM '11.

[39]  R. Merton The Matthew Effect in Science , 1968, Science.

[40]  Xueqi Cheng,et al.  Popularity prediction in microblogging network: a case study on sina weibo , 2013, WWW.

[41]  Bhaskar Krishnamachari,et al.  Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations , 2010, IEEE/ACM Transactions on Networking.

[42]  Ke Xu,et al.  On popularity prediction of videos shared in online social networks , 2013, CIKM.

[43]  Yiannis Kompatsiaris,et al.  Enhancing video concept detection with the use of tomographs , 2013, 2013 IEEE International Conference on Image Processing.

[44]  Song Wen,et al.  Understanding video propagation in online social networks , 2012, 2012 IEEE 20th International Workshop on Quality of Service.

[45]  Mihaela van der Schaar,et al.  Learning relaying strategies in cellular D2D networks with token-based incentives , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[46]  Thomas P. Hayes,et al.  Stochastic Linear Optimization under Bandit Feedback , 2008, COLT.

[47]  H. Vincent Poor,et al.  Social learning and bayesian games in multiagent signal processing: how do local and global decision makers interact? , 2013, IEEE Signal Processing Magazine.

[48]  A. Dixit,et al.  Monopolistic competition and optimum product diversity , 1977 .

[49]  Z. Neda,et al.  Measuring preferential attachment in evolving networks , 2001, cond-mat/0104131.

[50]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[51]  Nabil Amara,et al.  The impact of transaction costs on the institutional structuration of collaborative academic research , 1998 .

[52]  Joseph Y. Halpern,et al.  Efficiency and nash equilibria in a scrip system for P2P networks , 2006, EC '06.

[53]  Barry Bozeman,et al.  The Impact of Research Collaboration on Scientific Productivity , 2005 .

[54]  Mihaela van der Schaar,et al.  A Rules-Based Approach for Configuring Chains of Classifiers in Real-Time Stream Mining Systems , 2009, EURASIP J. Adv. Signal Process..

[55]  Mihaela van der Schaar,et al.  A Game Theoretic Analysis of Incentives in Content Production and Sharing Over Peer-to-Peer Networks , 2009, IEEE Journal of Selected Topics in Signal Processing.

[56]  Yong Tan,et al.  Evaluation and design of online cooperative feedback mechanisms for reputation management , 2005, IEEE Transactions on Knowledge and Data Engineering.

[57]  Chrysanthos Dellarocas,et al.  Reputation Mechanism Design in Online Trading Environments with Pure Moral Hazard , 2005, Inf. Syst. Res..

[58]  Ananthram Swami,et al.  Distributed Algorithms for Learning and Cognitive Medium Access with Logarithmic Regret , 2010, IEEE Journal on Selected Areas in Communications.

[59]  Elinor Ostrom,et al.  tragedy of the commons , 2010 .

[60]  Joseph M. Hellerstein,et al.  Flux: an adaptive partitioning operator for continuous query systems , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[61]  Mihaela van der Schaar,et al.  Adaptive Topologic Optimization for Large-Scale Stream Mining , 2010, IEEE Journal of Selected Topics in Signal Processing.

[62]  J. Walrand,et al.  Asymptotically efficient allocation rules for the multiarmed bandit problem with multiple plays-Part II: Markovian rewards , 1987 .

[63]  Matthew Elliott,et al.  A Network Approach to Public Goods , 2017, Journal of Political Economy.

[64]  Michael Waldman,et al.  Up-or-Out Contracts: A Signaling Perspective , 1990, Journal of Labor Economics.

[65]  J. Gittins Bandit processes and dynamic allocation indices , 1979 .

[66]  John N. Tsitsiklis,et al.  Linearly Parameterized Bandits , 2008, Math. Oper. Res..

[67]  Wei Chu,et al.  Contextual Bandits with Linear Payoff Functions , 2011, AISTATS.

[68]  Augusto Ciuffoletti Secure token passing at application level , 2010, Future Gener. Comput. Syst..

[69]  Tao Zhu,et al.  Noncash payment methods in a cashless economy , 2009 .

[70]  Jussara M. Almeida,et al.  Using early view patterns to predict the popularity of youtube videos , 2013, WSDM.

[71]  W. Chou,et al.  Social Media Use in the United States: Implications for Health Communication , 2009, Journal of medical Internet research.

[72]  Bernardo A. Huberman,et al.  Predicting the popularity of online content , 2008, Commun. ACM.

[73]  Feng Wang,et al.  Understand Instant Video Clip Sharing on Mobile Platforms: Twitter's Vine as a Case Study , 2014, NOSSDAV.

[74]  Tai-Wei Hu,et al.  Coalition‐Proof Trade and the Friedman Rule in the Lagos‐Wright Model , 2007, Journal of Political Economy.

[75]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[76]  Miao Chen,et al.  Toward Predicting Popularity of Social Marketing Messages , 2011, SBP.

[77]  Darrell Duffie,et al.  Existence of independent random matching , 2007 .

[78]  Raghuram G. Rajan,et al.  The Firm as a Dedicated Hierarchy: A Theory of the Origin and Growth of Firms , 1998 .

[79]  Mihaela van der Schaar,et al.  Conjectural Equilibrium in Multiuser Power Control Games , 2009, IEEE Transactions on Signal Processing.

[80]  Rosemary Walker,et al.  Empirical analysis of up-or-out rules for promotion policies , 2005 .

[81]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[82]  John Langford,et al.  Efficient Optimal Learning for Contextual Bandits , 2011, UAI.

[83]  P. Whittle Multi‐Armed Bandits and the Gittins Index , 1980 .

[84]  Mihaela van der Schaar,et al.  Finding It Now: Construction and Configuration of Networked Classifiers in Real-Time Stream Mining Systems , 2013, Handbook of Signal Processing Systems.

[85]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[86]  A. Siow,et al.  Tenure and Other Unusual Personnel Practices in Academia , 1998 .

[87]  Matthew Rowe Forecasting audience increase on YouTube , 2011 .

[88]  Qing Zhao,et al.  Learning in a Changing World: Restless Multiarmed Bandit With Unknown Dynamics , 2010, IEEE Transactions on Information Theory.

[89]  Mihaela van der Schaar,et al.  Distributed spectrum sensing in the presence of selfish users , 2013, 2013 5th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[90]  Ricardo de O. Cavalcanti,et al.  A Model of Private Bank-Note Issue , 1999 .

[91]  B. O'Flaherty,et al.  On the Job Screening, Up or Out Rules, and Firm Growth , 1992 .

[92]  Qian Zhang,et al.  Achieving cooperative spectrum sensing in wireless cognitive radio networks , 2009, MOCO.

[93]  Mihaela van der Schaar,et al.  Social Norm Design for Information Exchange Systems with Limited Observations , 2012, IEEE Journal on Selected Areas in Communications.

[94]  Stephen A. Jarvis,et al.  A Payment-based Incentive and Service Differentiation Mechanism for Peer-to-Peer Streaming Broadcast , 2006, 200614th IEEE International Workshop on Quality of Service.

[95]  Wolfgang Kellerer,et al.  Outtweeting the Twitterers - Predicting Information Cascades in Microblogs , 2010, WOSN.

[96]  Ricardo de O. Cavalcanti,et al.  Inside and outside Money as Alternative Media of Exchange , 1999 .

[97]  M. Jackson,et al.  Social Capital and Social Quilts: Network Patterns of Favor Exchange , 2011 .

[98]  Jie Tang,et al.  Citation count prediction: learning to estimate future citations for literature , 2011, CIKM '11.

[99]  H. Vincent Poor,et al.  Quickest Detection in Cognitive Radio: A Sequential Change Detection Framework , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[100]  Daniela Puzzello,et al.  Independent random matching , 2012 .

[101]  István Hegedüs,et al.  Gossip-based distributed stochastic bandit algorithms , 2013, ICML.

[102]  William J. Bertin,et al.  Publish or Perish: What the Competition Is Really Doing , 1992 .

[103]  Mihaela van der Schaar,et al.  Rating Protocols in Online Communities , 2014, TEAC.

[104]  Aleksandrs Slivkins,et al.  Contextual Bandits with Similarity Information , 2009, COLT.

[105]  Michihiro Kandori Social Norms and Community Enforcement , 1992 .

[106]  Bernardo A. Huberman,et al.  Predicting the Future with Social Media , 2010, Web Intelligence.

[107]  H. Robbins,et al.  Asymptotically efficient adaptive allocation rules , 1985 .

[108]  Emin Gün Sirer,et al.  KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .

[109]  Lifeng Sun,et al.  Guiding internet-scale video service deployment using microblog-based prediction , 2012, 2012 Proceedings IEEE INFOCOM.

[110]  Ibrahim Matta,et al.  Describing and forecasting video access patterns , 2011, 2011 Proceedings IEEE INFOCOM.

[111]  R. Srikant,et al.  Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.

[112]  Wei Chen,et al.  Combinatorial Multi-Armed Bandit: General Framework and Applications , 2013, ICML.

[113]  Elizabeth A. Corley,et al.  Scientists' collaboration strategies: implications for scientific and technical human capital , 2004 .

[114]  Jeffrey K. MacKie-Mason,et al.  Pricing Congestible Network Resources (Invited Paper) , 1995, IEEE J. Sel. Areas Commun..

[115]  Tad Hogg,et al.  Using a model of social dynamics to predict popularity of news , 2010, WWW '10.

[116]  Michael Timmers,et al.  On the Use of Reservoir Computing in Popularity Prediction , 2010, 2010 2nd International Conference on Evolving Internet.

[117]  Manfred K. Warmuth,et al.  The Weighted Majority Algorithm , 1994, Inf. Comput..

[118]  Mihaela van der Schaar,et al.  Incentivizing information sharing in networks , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[119]  Mihaela van der Schaar,et al.  Configuring Competing Classifier Chains in Distributed Stream Mining Systems , 2007, IEEE Journal of Selected Topics in Signal Processing.

[120]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[121]  Gabriele Camera,et al.  Money and Price Dispersion , 1998 .

[122]  Wolfgang Nejdl,et al.  How useful are your comments?: analyzing and predicting youtube comments and comment ratings , 2010, WWW '10.

[123]  Ke Xu,et al.  Video sharing in online social networks: measurement and analysis , 2012, NOSSDAV '12.

[124]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[125]  Konrad Podczeck,et al.  On existence of rich Fubini extensions , 2010 .

[126]  Aleksander Berentsen,et al.  Money Inventories in Search Equilibrium , 2000 .

[127]  Mihaela van der Schaar,et al.  Rating systems for enhanced cyber-security investments , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[128]  Mingyan Liu,et al.  Online Learning of Rested and Restless Bandits , 2011, IEEE Transactions on Information Theory.