Linear Programming for Mechanism Design: An Application to Bidder

39
Linear Programming for Mechanism Design: An Application to Bidder Collusion at First-Price Auctions Giuseppe Lopomo [email protected] Leslie M. Marx [email protected] Peng Sun [email protected] Fuqua School of Business, Duke University, Durham, NC 27708 March 27, 2008 Abstract We demonstrate the use of linear programming techniques in the analysis of mechanism design problems. We use these techniques to analyze the extent to which a rst-price auction is robust to collusion when, contrary to some prior literature on collusion at rst-price auctions, the cartel cannot prevent its members from bidding at the auction. In this case, cartels have been shown to be less protable facing a rst-price auction than facing other common auction formats, but we show the stronger result that in certain environments collusion at a rst-price auction is not protable at all. Our results suggest that rst- price auctions are more robust to collusion than previously believed. Subject classications: Economics: mechanism design. Games/group decisions: Bidding/auctions. The authors thank Bob Marshall for helpful comments.

Transcript of Linear Programming for Mechanism Design: An Application to Bidder

Page 1: Linear Programming for Mechanism Design: An Application to Bidder

Linear Programming for Mechanism Design:

An Application to Bidder Collusion at

First-Price Auctions�

Giuseppe Lopomo

[email protected]

Leslie M. Marx

[email protected]

Peng Sun

[email protected]

Fuqua School of Business, Duke University, Durham, NC 27708

March 27, 2008

Abstract

We demonstrate the use of linear programming techniques in the analysis

of mechanism design problems. We use these techniques to analyze the extent

to which a �rst-price auction is robust to collusion when, contrary to some

prior literature on collusion at �rst-price auctions, the cartel cannot prevent its

members from bidding at the auction. In this case, cartels have been shown to

be less pro�table facing a �rst-price auction than facing other common auction

formats, but we show the stronger result that in certain environments collusion

at a �rst-price auction is not pro�table at all. Our results suggest that �rst-

price auctions are more robust to collusion than previously believed.

Subject classi�cations: Economics: mechanism design. Games/group decisions:

Bidding/auctions.

�The authors thank Bob Marshall for helpful comments.

Page 2: Linear Programming for Mechanism Design: An Application to Bidder

1 Introduction

The economics literature on mechanism design provides techniques for analyzing how

individual preferences can be elicited and used to make collective decisions (see the

foundational paper Hurwicz (1973), surveys in Eatwell, Milgate, and Newman (1989),

especially Myerson (1989) and Ledyard (1989), and the textbook Mas-Colell, Whin-

ston, and Green (1995)). These techniques have been particularly useful in the design

of auctions (Milgrom (1985, 1989), Wilson (1987), McAfee and McMillan (1992),

and McMillan (1994)), but also have applications to matching models (Roth and

Sotomayor (1990)), price discrimination (Varian (1989)), and a variety of other eco-

nomic applications. The operations research/management science literatures see ap-

plications in revenue management (Vulcano, van Ryzin, and Maglaras (2002)), B2B

procurement auctions (Gallien and Wein (2005) and Beil and Wein (2003)) and var-

ious other applications of combinatorial auctions summarized in Cramton, Shoham

and Steinberg (2006). Several computer science applications are described in Rosen-

schein and Zlotkin (1994), and Varian (2000) discusses the role of computerized agents

in mechanism design.

A variety of mechanism design problems can be reformulated as linear programs,

which recent software and hardware innovations allow to be solved quickly. These

innovations open the door for linear programming techniques to be used to inform

the search for analytic results for these problems. In this paper, we direct these

techniques at the problem of auction design in the face of collusive behavior by the

bidders.

Although auction design has bene�ted from the application of mechanism design

techniques, much of the auction design literature assumes noncooperative behavior

by the bidders. Unfortunately, auctions can be susceptible to collusion among the

bidders. Such collusion decreases the revenue obtained by the seller and can distort

the e¢ ciency of an auction. In the U.S., bid rigging is a per se violation of the

Sherman Act. In an attempt to alert the public to the problem of bidder collusion

and other price �xing schemes, the U.S. Department of Justice publishes the primer

�Price Fixing & Bid Rigging �They Happen: What They Are and What to Look

For�(available at http://www.usdoj.gov/atr/public/guidelines/pfbrprimer.pdf). Un-

derstanding the mechanisms by which bidders support collusive agreements can be

valuable for informing the choice of auction format, detecting and prosecuting cartels,

1

Page 3: Linear Programming for Mechanism Design: An Application to Bidder

and also potentially for understanding within-organization mechanism design, where

an organization might want to encourage �collusion�among its employees.

In this paper, we address an open question in the literature on auction design,

which is the extent to which a �rst-price auction is robust to collusion. As described in

Section 2, results in the literature suggest that a �rst-price auction is more robust to

collusion than a second-price or ascending-bid auction, but that a �rst-price auction is

still vulnerable to collusion (see Section 2 for the underlying intuition). In this paper,

we illustrate how linear programming techniques can be used to study this question

and ultimately to facilitate analytic results showing that in certain environments,

not only is the �rst-price auction more robust to collusion than some other auction

formats, but in fact no pro�table collusion is possible at a �rst-price auction. This

result provides a strong theoretical basis for the existing recommendation that sellers

concerned about collusion use a �rst-price rather than second-price or ascending-bid

auction (see �Practical conclusion 1�of Kovacic et al. (2006)).

As we show in this paper, the mechanism design problem for a bidding cartel at

an auction can be formulated as a linear program. Thus, given su¢ cient computing

power, for discrete environments we can solve for the optimal collusive mechanism.

Using noncooperative bidding as a benchmark, we can calculate the gain to bidders

and loss to the seller from collusion. Furthermore, a study of the solutions generated

by the linear programming techniques to a variety of examples can inform us as to

which constraints are binding and, as in the case of this paper, facilitate analytic

proofs based on duality arguments. Speci�cally, using insights gained through solved

numerical examples, we are able to use linear programming duality arguments to

prove that for a class of symmetric environments pro�table collusion is not possible

at a �rst-price auction. Although we leave analytical results for the asymmetric

case to future research, numerical solutions of linear programs for the asymmetric

case suggest that �rst-price auctions are robust to collusion in certain asymmetric

environments as well.

We believe the techniques illustrated in this paper have potential value in a va-

riety of mechanism design applications. Our concluding section provides additional

discussion related to this.

The paper proceeds as follows. In Section 2, we provide background on bidder

collusion at �rst-price auctions. In Section 3, we describe the model and the mech-

anism design problem of the cartel. In Section 4, we present our main results. In

2

Page 4: Linear Programming for Mechanism Design: An Application to Bidder

Section 5 we discuss extensions. In Section 6 we provide concluding discussion.

2 Collusion at �rst-price auctions

A common auction form is the �rst-price auction, in which bidders simultaneously

submit bids and the high bidder wins and pays the amount of its bid. Our results

apply equally to sealed-bid procurements, in which the low bidder wins, as long as

the only dimension of the bid is price.

Bidding cartels at �rst-price auctions have been prosecuted in: U.S. v. A-A-A Elec.

Co., Inc. (1986); U.S. v. W.F. Brinkley & Son Construction Company, Inc. (1986);

U.S. v. Raymond J. Lyons (1982) (sheet metal); and U.S. v. Addyston Pipe & Steel

Co. et al. (1897). In each of these cases, colluding bidders met prior to the auction to

discuss their bids and determine transfer payments among the cartel members. For

example, in U.S. v. Addyston Pipe, colluding cast-iron pipe manufacturers met prior

to the auction, determined how the colluding �rms would bid at the auction, and

agreed on transfer payments:

�... the executive committee determines the price at which the bid is to be

put in by some company in the association, and the question to which company

this bid shall go is settled by the highest bonus which any one of the companies

... will agree to pay or bid for the order. ... the company to whom the right

to bid upon the work is assigned sends in its estimate or bid to the city or

company desiring pipe, and the amount thus bid is �protected�by bids from

such of the other members of the association as are invited to bid, and by the

bidding in all instances being slightly above the one put in by the company

to whom the contract is to go. ... Settlements are made at stated times of

the bonus account debited against each company, where these largely o¤set

each other, so that small sums are in fact paid by any company in balancing

accounts.�(U.S. v. Addyston Pipe & Steel Co. et al. (1897) at p.3)

In this paper, we focus on collusion at �rst-price auctions in an environment in

which the cartel can communicate prior to the auction and enforce transfer payments

among cartel members, although because our main results are �negative�in the sense

that they show pro�table collusion is not possible, eliminating the ability of the cartel

to determine transfer payments does not a¤ect these results. In addition, we focus on

3

Page 5: Linear Programming for Mechanism Design: An Application to Bidder

a cartel operating at a one-shot auction, but with repeated interaction, a number of

authors show that for su¢ ciently large discount factors, a cartel can do better than

noncooperative play (see Oren and Rothkopf (1975), Aoyagi (2003), Skrzypacz and

Hopenhayn (2004), Blume and Heidhues (2006), and Hörner and Jamison (2008)).

Thus, our results suggest bene�ts for sellers concerned about collusion from limiting

repeated interaction among the bidders.

We focus on cartels that operate prior to the auction. Thus, we assume the cartel

cannot condition transfer payments on the outcome of the auction, i.e., a cartel cannot

impose penalties on its members after the auction if the auction outcome does not

correspond to the cartel�s desired actions. This restriction would be imposed on a

cartel if, for example, the auction�s outcome were not observable. Of course, a seller

facing a cartel that relied on the observation of the auction�s outcome to enforce cartel

behavior would have an incentive to suppress information about auction outcomes

beyond notifying the winning bidder that it had won and collecting payment.

In our environment, the cartel would maximize its collusive gain if it could suppress

all within-cartel rivalry and send the only the highest-valuing ring member to the

auction to bid against the non-cartel bidders. This outcome is obtained in the model

of McAfee and McMillan (1992), a seminal paper on collusion at �rst-price auctions.

In that paper, cartel members �rst bid for the right to be the sole cartel member to

attend the auction. The highest bidding cartel member is sent to the main auction,

while other cartel members are prevented from bidding at the main auction. McAfee

and McMillan focus on the case of symmetric bidders and an all-inclusive cartel, in

which case the mechanism is e¢ cient and extracts all surplus from the seller. In

equilibrium, the lone cartel member to attend the auction is the one with the highest

value for the object, and that cartel member wins the object at a price equal to the

seller�s reserve price.

In the McAfee and McMillan (1992) environment, the cartel can extract all the

surplus from the seller, so clearly in that environment using a �rst-price auction

does nothing to protect the seller from collusion among the bidders. However, the

mechanism of McAfee and McMillan relies on the assumption that the cartel can send

one designated cartel member to the auction and prevent all others from submitting

bids. Although this may be possible in some settings, it is not possible in others.

If the cartel cannot prevent its members from submitting bids, the mechanism of

McAfee and McMillan (1992) does not function as intended. To see this, note that if

4

Page 6: Linear Programming for Mechanism Design: An Application to Bidder

the high-valuing cartel member is sent to the auction and told to submit a bid equal

to the seller�s reserve price, other cartel members with values greater than the reserve

price will have an incentive to enter bids at the auction, eating away at the collusive

gain. To see that this type of cheating can be a concern of a cartel, note that in U.S.

v. Brinkley & Son (1986), the cartel decided that Brinkley would submit the winning

bid and took measures to monitor other cartel members�bids by having at least one

of the other cartel members give its bid form to Brinkley to submit for it.

The threat of cheating by cartel members that are not selected by the cartel

to win the auction does not arise in second-price or ascending bid auctions. Even

without the ability to prevent cartel members from submitting bids, Marshall and

Marx (2007) show that at a second-price or ascending-bid auction a cartel can achieve

the �rst-best collusive outcome. (See also the mechanism of Graham and Marshall

(1987) for environments in which the cartel can condition on the identity of the

winner and the price paid.) To see why this holds, note that in a second-price

or ascending-bid auction, the high-valuing cartel member need not change its bid

relative to non-cooperative bidding in order to obtain a collusive gain. In contrast,

at a �rst-price auction, unless the high-valuing cartel member reduces its bid below

its non-cooperative bid, there is no collusive gain. This lowering of the high-valuing

cartel member�s bid creates incentives for cheating by other cartel members.

Marshall and Marx (2007) formalize the notion that collusion is less pro�table at

a �rst-price auction than a second-price or ascending-bid auction when the cartel can

prevent cartel members from bidding at the auction. They show that the cartel can

suppress all within-cartel rivalry at a second-price or ascending-bid auction, but not

at a �rst-price auction.

Although Marshall and Marx (2007) show that collusion is less pro�table at a

�rst-price auction, they do not show how much less pro�table. They leave as an open

question whether there exists a collusive mechanism that does better than noncooper-

ative play when a cartel cannot prevent its members from bidding. They suggest the

possibility of a pro�table collusive mechanism based on the following intuition. A car-

tel at a �rst-price auction could �rst identify the highest and second-highest-valuing

cartel member. Then if the highest-valuing cartel member�s noncooperative bid is

greater than the second-highest value, then ask the highest-valuing cartel member to

reduce its bid slightly relative to its noncooperative bid. But if the highest-valuing

cartel member�s noncooperative bid is less than the second-highest value, then simply

5

Page 7: Linear Programming for Mechanism Design: An Application to Bidder

tell all cartel members to bid noncooperatively. At �rst glance, it seems this type

of mechanism should avoid any incentives for cheating by non-highest-valuing cartel

members. However, the logic is �awed� a cartel member who is told to bid noncoop-

eratively will infer that with some probability its value is second-highest but that it

can outbid the highest-valuing ring member and win the object by increasing its bid

slightly.

In this paper, we show that collusion is not possible at a �rst-price auction in the

sense that no collusive mechanism increases bidder surplus relative to noncooperative

play for a set of environments with symmetric bidders if the cartel cannot prevent its

members from bidding at the auction. Much of the auctions literature characterizes

�rst-price auctions as less susceptible to collusion than other auction formats such

as second-price and ascending-bid auctions (see, e.g., Robinson (1985), Marshall and

Meurer (2004), and Marshall and Marx (2007)), but this is the �rst result showing

that in some environments a �rst-price auction is immune to certain types of collusion.

3 Model

3.1 Setup

We focus on a single-object �rst-price auction with a non-strategic seller, although

our results (appropriately adjusted) continue to hold in the presence of a �xed reserve

price. The high bidder wins and pays the amount of its bid. In the case of a tie, we

assume the object is randomly allocated to one of the bidders with the high bid. We

assume bidders have independent private values and are risk neutral.

For tractability, we assume there are only 2 bidders, but the results should extend

to any �nite number of bidders.

Each bidder i 2 f1; 2g independently draws a value vi from a distribution Fi with�nite support Vi. Let V � V1�V2. Let fi(vi) be the probability that bidder i�s valueis vi. Where convenient we assume discrete bids, but with a vanishingly small bid

increment. Let B denote the set of feasible bids.Let ui (bi; b�i; vi) be bidder i�s surplus in a �rst-price auction, given bidder i�s

6

Page 8: Linear Programming for Mechanism Design: An Application to Bidder

value vi and bid bi and the opponent�s bid b�i. That is,

ui (bi; b�i; vi) �

8><>:vi � bi; if bi > b�i0; if bi < b�i(vi � bi) =2; otherwise:

All bidders are eligible to participate in a cartel. The assumption of an all-inclusive

cartel is common in the literature, particularly because the study of non-all-inclusive

cartels at �rst-price auctions is made di¢ cult by the lack of analytic bid functions (see

Marshall et al. (1994) and Gayle and Richard (2005) for related numerical techniques).

The cartel mechanism operates as follows: Each cartel member makes a report to

a �center,�which is a standard Myerson (1983) incentiveless mechanism agent. Based

on these reports, the center recommends a bid to be made by each cartel member and

requires payments from the cartel members. Cartel members observe only their own

bid recommendations and required payments. We require that the center�s budget

be balanced in expectation.

We focus on incentive compatible collusive mechanisms, which in our environment

has two dimensions: truth-telling and obedience. First, it must be incentive compati-

ble for cartel members to truthfully report their values. Second, it must be incentive

compatible each cartel member to follow the bid recommended by the center. In

addition, we require ex-ante individual rationality, so that bidders�expected payo¤s

from participation in the cartel are at least as great as their expected payo¤s from

noncooperative play. We assume the cartel can compel its members to make their

required payments, but that it cannot prevent cartel members from participating in

the auction.

The assumption of ex-ante individual rationality can be viewed as an assumption

that cartel members must commit to participation in the cartel prior to learning their

values and that the failure of any bidder to join results in the complete dissolution of

the cartel. One might consider the alternative assumption that refusal by one poten-

tial ring member to join the ring implies that the remaining potential ring members

form a ring, leaving one bidder outside the ring, but this alternative assumption

complicates the veri�cation of individual rationality for �rst-price auctions because a

potential ring member may prefer to be outside a ring of n � 1 bidders rather thaninside a ring of n bidders.

Note that in the environment we consider, a cartel at a second-price or ascending-

7

Page 9: Linear Programming for Mechanism Design: An Application to Bidder

bid auction extracts all the surplus from the seller. The cartel�s surplus is equal

to the highest value among the bidders and the seller receives zero (or the reserve

price in the case of a positive reserve price). See Marshall and Marx (2007) for the

speci�cation of the collusive mechanism.

3.2 Mechanism design problem

By the revelation principle, we restrict attention (without loss of generality) to the

class of all incentive compatible and individually rational direct revelation mecha-

nisms. Any incentive compatible and individually rational direct revelation mecha-

nism speci�es for each bidder i 2 f1; 2g and each pair of reports (v1; v2) 2 V ; (i) aprobability distribution over all feasible bid pairs pi (� j vi; v�i) 2 4B�B, where 4B�B

represents the probability simplex with each pair of bids as the vertex; and (ii) a

monetary transfer mi (vi; v�i).

The center�s problem can be written as follows (the notation below parallels that

of Myerson (1985)):

maxp1;p2;m1;m2

Xi2f1;2g;(v1;v2)2V;b12B;b22B

pi(bi; b�i j vi; v�i)ui(bi; b�i; vi)fi(vi)f�i(v�i); (1)

subject to pi representing a probability distribution, 8i 2 f1; 2g; 8(v1; v2) 2 V ;

pi (� j vi; v�i) 2 4B�B and p1 (b1; b2 j v1; v2) = p2 (b2; b1 j v2; v1) ; (2)

ex-ante budget balance, Xi2f1;2g;(v1;v2)2V

mi (vi; vi) fi(vi)f�i(v�i) = 0; (3)

and incentive compatibility, 8i 2 f1; 2g; 8vi; v0i 2 Vi; 8�i : B ! B;

U�i (pi; �i; v0i j vi)� Ui (pi j vi) � 0; (4)

8

Page 10: Linear Programming for Mechanism Design: An Application to Bidder

where Ui (pi j vi) is bidder i�s expected surplus under truthtelling and obedience,

Ui (pi j vi) �P

v�i2V�i;bi2B;b�i2Bpi(bi; b�i j vi; v�i)ui(bi; b�i; vi)f�i(v�i)

�P

v�i2V�imi (vi; v�i) f�i(v�i);

(5)

and U�i (pi; �i; v0i j vi) is bidder i�s expected surplus when bidder i�s value is vi; it

reports v0i; and it bids according to a deviation function �i (bi) that depends on the

center�s recommendation bi,

U�i (pi; �i; v0i j vi) �

Xv�i2V�i;bi2B;b�i2B

pi(bi; b�i j v0i; v�i)ui(�i(bi); b�i; vi)f�i(v�i)

�X

v�i2V�i

mi (v0i; v�i) f�i(v�i): (6)

The above formulation allows bidder i�s payment to depend on its opponent�s

report, but it does not allow an inference by bidder i regarding the type of its rival

from its required payment. Given the result of Myerson (1982, Proposition 2), this is

without loss of generality. One can see this from the fact that only bidder i�s expected

payment given its own report enters the problem above.

The incentive compatibility constraint in (4) considers all possible deviation func-

tions �i that map the recommended bid from the center to the actual bid. Such a set

of deviation functions is large (exponential to the number of feasible bids). In order

to formulate the problem as a tractable linear program, we introduce the following

new optimization model which involves the function Ji(vi; v0i; bi), which gives bidder

i�s expected surplus if it has type vi, reports v0i, receives recommendation bi from the

center, and bids optimally; multiplied by Pr(bi j v0i). We are able to simplify fur-ther by noting that it is su¢ cient to consider the expected payment function Mi(vi),

instead of mi(vi; v�i).

Lemma 1 The center�s problem can be written as follows:

max�;M1;M2;J1;J2

2Xi=1

X(v1;v2)2V;b12B;b22B

�(b1; b2; v1; v2)ui (bi; b�i; vi) f1(v1)f2(v2) (7)

subject to � representing a conditional probability distribution, 8(v1; v2) 2 V ; 8b1 2 B;

9

Page 11: Linear Programming for Mechanism Design: An Application to Bidder

8b2 2 B;�(b1; b2; v1; v2) � 0; (8)

and 8(v1; v2) 2 V ; Xb12B;b22B

�(b1; b2; v1; v2) = 1; (9)

ex-ante budget balance,X(v1;v2)2V

(M1(v1) +M2(v2)) f1(v1)f2(v2) = 0; (10)

incentive compatibility, 8v1 2 V1; 8v01 2 V1;Xv22V2;b12B;b22B

�(b1; b2; v1; v2)u1(b1; b2; v1)f2(v2)�M1 (v1)

�Xb12B

J1(v1; v01; b1)�M1(v

01) ; (11)

and 8v2 2 V2; 8v02 2 V2;Xv12V1;b12B;b22B

�(b1; b2; v1; v2)u2(b2; b1; v2)f1(v1)�M2 (v2)

�Xb22B

J2(v2; v02; b2)�M2(v

02) ; (12)

and the de�nition of J , 8v1 2 V1; 8v01 2 V1; 8b1 2 B; 8b01 2 B;

J1 (v1; v01; b1) �

Xv22V2;b22B

�(b1; b2; v01; v2)u1 (b

01; b2; v1) f2 (v2) ; (13)

8v2 2 V2; v02 2 V2; b2 2 B; b02 2 B;

J2 (v2; v02; b2) �

Xv12V1;b12B

�(b1; b2; v1; v02)u2 (b

02; b1; v2) f1 (v1) : (14)

Proof. See Appendix A.

Using Lemma 1, we can apply linear programming techniques to analyze the

optimal collusive mechanism in the �rst-price auction. In Section 4 we focus on

10

Page 12: Linear Programming for Mechanism Design: An Application to Bidder

symmetric bidders, and in Section 5 we consider the extension to asymmetric bidders.

4 Results for symmetric bidders

In this section, we show that pro�table collusion is not possible when bidders are

symmetric. Speci�cally, we consider an environment with discrete bids and show

that as the bid increment approaches zero, bidder surplus from the optimal collusive

mechanism approaches that from noncooperative bidding. Thus, although discrete

bids may create an environment in which bidders can pro�tably collude at a �rst-price

auction, the bene�t from such collusion vanishes as the bid increment approaches zero.

Even without the use of transfer payments, a cartel could achieve any correlated

equilibrium (in the sense of Forge�s (2006) communication equilibria for games with

incomplete information). Thus, our result implies that in our environment the best

correlated equilibrium from the perspective of the cartel is a Nash equilibrium (see

Nau, Canovas, and Hansen (2003) on the relation between correlated and Nash equi-

libria).

In this section we assume symmetry, which means that V1 = V2 and that forany value v 2 Vi and bids bi; b�i 2 B, we have f1(v) = f2 (v) and u1(b1; b2; v) =

u2 (b2; b1; v). Therefore, in this section we suppress the subscripts on fi and ui.

The proof of the main result of this section relies on the assumption that each

bidder has two possible values, h and l, h > l > 0. As discussed in Section 6, our

numerical investigations suggest our results continue to hold when this assumption is

relaxed.

4.1 Noncooperative benchmark

For the two-type case, the following proposition describes the surplus from a nonco-

operative equilibrium.

Proposition 1 Assume two bidders, each having value l with probability f (l) andvalue h with probability f (h) = 1 � f (l), where 0 < l < h. The noncooperative

equilibrium of the �rst-price auction game is as follows: a bidder with value l bids l;

11

Page 13: Linear Programming for Mechanism Design: An Application to Bidder

a bidder with value h bids according to the following cumulative distribution

F (b) =

8><>:0; if b < lf(l)(b�l)f(h)(h�b) ; if b 2 [l;�b]1; otherwise,

where �b � lf (l) + hf (h) :

Proof. See Appendix C.

Using Proposition 1, we can characterize the noncooperative equilibrium as fol-

lows.

Corollary 1 In the environment of Proposition 1, the noncooperative equilibriumoutcome is e¢ cient, expected bidder surplus is 2 (h� l) f (h) f (l) ; and expected sellerrevenue is f (l) (1 + f (h)) l + f (h)2 h:

With this noncooperative outcome as a benchmark, we can consider collusive

outcomes.

4.2 Collusion

The results that follow assume discrete bid increments. We model the bid increment

in the following way. For any positive integer B, the bid increment is de�ned to be

� � �b�l2B. The set of feasible bids can be expressed as

BB � fbj j bj = l +�j for j 2 f0; 1; : : : ; nBgg;

in which n is a su¢ ciently large integer. Therefore, b0 = l and b2B = �b, and the

interval�l; �b�contains 2B + 1 feasible bids. We also allow bids arbitrarily higher

than �b by having n > 2. As the integer B approaches in�nity, the bidding increment

� approaches zero. When it is clear in the context, we omit the subscript B from

BB.We consider the lowest feasible bid to be l, which can be enforced by the seller

setting a reservation price l. Such an assumption is without loss of generality, as

demonstrated by the following lemma, which states that for any given arbitrarily

12

Page 14: Linear Programming for Mechanism Design: An Application to Bidder

small bid increment �; it is not incentive compatible for the collusive mechanism to

recommend any bid below l � 2�:

Lemma 2 The lowest incentive compatible bid recommended by the center with pos-itive probability, blow, is l � 2�.

Proof. See Appendix C.

To take advantage of the assumption of symmetry, it is helpful to simplify the

linear program for the optimal collusive mechanism given in (7)�(14). In particular,

as shown in Lemma 3, we can work with the following formulation:

max�;M;J

Xv;�v2fl;hg

Xbj ;b�j2B

�u(bj; b�j; v) + u(b�j; bj; �v)

��(bj; b�j; v; �v)f(v)f(�v) (15)

subject to � representing a conditional probability distribution, 8v; �v 2 fl; hg ; 8bj; b�j 2B;

�(bj; b�j; v; �v) � 0; (16)

and 8v; �v 2 fl; hg, Xbj ;b�j2B

�(bj; b�j; v; �v) = 1; (17)

ex-ante budget balance, Xv2fl;hg

M(v)f(v) = 0; (18)

incentive compatibility, 8v; bv 2 fl; hg ;P

�v2fl;hg

Pbj ;b�j2B

��(bj; b�j; v; �v) + �(b�j; bj; �v; v)

�u(bj; b�j; v)f(�v)�M(v)

�Pbj02B

J(v; bv; bj0)�M(bv); (19)

and the de�nition of J; 8v; bv 2 fl; hg ; 8bbj; bj0 2 B;J(v; bv; bbj) � X

�v2fl;hg

Xb�j2B

��(bbj; b�j; bv; �v) + �(b�j; bbj; �v; bv)� f(�v)u(bj0 ; b�j; v): (20)

Lemma 3 below establishes that it is su¢ cient for us to work with the linear

program (15)�(20).

13

Page 15: Linear Programming for Mechanism Design: An Application to Bidder

Lemma 3 The value of the objective function at the optimum is the same in (15)�

(20) and in (7)�(14).

Proof. See Appendix C.

Clearly, for any discrete bidding set BB, the noncooperative equilibrium is a fea-

sible collusive mechanism, and therefore a feasible solution to the linear program

(15)�(20). Consider the dual formulation of the linear program (15)�(20). Fol-

lowing weak duality, the dual objective value from any dual feasible solution is an

upper bound to any primal feasible objective value, in particular the surplus from the

noncooperative equilibrium. In order to prove our result, we construct a sequence

of dual feasible solutions with surplus D(B). We also construct a sequence of lower

bound, NC(B), for the noncooperative equilibrium surplus. Then we show that both

D(B) and NC(B) converge to the surplus from the continuous bid noncooperative

equilibrium given in Corollary 1.

To this end, we �rst present the dual formulation of the linear program (15)�(20):

min�;�;�;�

Xv;�v2fl;hg

�(v; �v)f(v)f(�v) (21)

subject to 8v; v0 2 fl; hg ; 8j 2 f�mB; : : : ; 0; 1; : : : ; nBg ;

f(v0)2BXj0=0

�(v0; v; j; j0) = f(v)�(v; v0); (22)

8v; �v 2 fl; hg ; 8j; �j 2 f�mB; : : : ; 0; 1; : : : ; nBg ;

�(v; �v)�P

v02fl;hg�(v; v0)u(bj; b�j; v)�

Pv02fl;hg

�(�v; v0)u(b�j; bj; �v)

+P

v02fl;hg

2BPj0=0

�(v; v0; j; j0)u(bj0 ; b�j; v0) +

Pv02fl;hg

2BPj0=0

�(�v; v0; b�j; bj0)u(bj0 ; bj; v0)

� u(bj; b�j; v) + u(b�j; bj; �v);

(23)

8v 2 fl; hg ;�f(v) = f (v)

Xv02fl;hg

�(v; v0)�X

v02fl;hg

f (v0)�(v0; v) (24)

14

Page 16: Linear Programming for Mechanism Design: An Application to Bidder

and 8v; v0 2 fl; hg ; 8j; j0 2 f�mB; : : : ; 0; 1; : : : ; nBg ;

�(v; v0; bj; bj0) � 0 and �(v; v0) � 0: (25)

The following lemma gives properties of a feasible solution to (21)�(25).

Lemma 4 There exists���; ��; ��; ��

�that is feasible in the linear program (21)�(25)

and that generates dual objective value D(B) = (h � l)f (h) f (l)�2 + f(h)2(1+f(l))

2Bf(l)2

�;

where limB!1D(B) = 2(h� l)f (h) f (l) :

Proof. See Appendix B.

As can be seen in Appendix B, the proof of Lemma 4 is quite technical. Indeed,

the linear program (21)�(25) is highly degenerate and has multiple solutions for a

given �nite B. Therefore characterizing its optimal solution is challenging and not

necessary. We are able to construct its feasible solution following insights obtained

from observing the dual optimal solution numerically. Furthermore, the sequence of

dual feasible solutions as constructed in our proof does not converge as B approaches

in�nity. It remains an open question whether one can show the result by directly

working on the in�nite dimensional linear program representing the continuous bid

case.

As shown in Lemma 4, in the limit as the bid increment shrinks to zero (or the

number of bids in the relevant interval increases to in�nity), the dual objective value

associated with our feasible solution converges to 2(h � l)f (h) f (l). For example,with a uniform distribution with f(h) = f(l) = 1

2, this would be (h� l) =2.

The next lemma provides a lower bound for a noncooperative equilibrium surplus.

Lemma 5 For any given integer B and the corresponding discrete feasible bidding

set BB, there exists a symmetric equilibrium such that the total surplus is at least

NC(B) = 2f (h) f (l) (h� l ��) :

Proof. See Appendix C.

Lemmas 4 and 5 imply our main result.

Proposition 2 If bidders are symmetric, n = 2; and bidders have two possible values,in the limit as the bid increment converges to zero, the bidder surplus from the optimal

collusive mechanism converges to the bidder surplus under noncooperative bidding.

15

Page 17: Linear Programming for Mechanism Design: An Application to Bidder

Proof. The result follows from the fact that D(B) and NC(B) are upper and lower

bounds, respectively, of the optimal collusive bidder surplus for all B, and from

Lemmas 4 and 5 which imply limB!1NC (B) = limB!1D (B). Q.E.D.

Proposition 2 implies that when bidders are symmetric, at least for environments

with two bidders and two possible values, if the bid increment is su¢ ciently small,

pro�table collusion is not possible� a cartel can do no better than to bid noncoopera-

tively. This suggests that when bidders are symmetric, a �rst-price auction is robust

to collusion.

4.3 Symmetric examples

In this section we provide two examples with symmetric bidders and use linear pro-

gramming techniques to solve for the optimal collusive mechanism. The �rst example

illustrates the two-type case. We compare the expected bidder surplus and expected

seller revenue in the optimal collusive mechanism with that of the noncooperative

equilibrium, which is characterized in Proposition 1. By varying the bid increments

we also demonstrate the speed of convergence.

In the second example, we consider n > 2 types. We can construct a feasible

bid set with n bids such that each type of bidder bids a corresponding bid in the

set. We then numerically con�rm that the optimal collusive mechanism coincides

the noncooperative equilibrium. This example suggests that the result that is proved

in the previous section holds more generally in other symmetric bidder settings.

4.3.1 Two types

Assume two symmetric bidders, each with value 40 or 80 with equal probability.

Thus, in the notation above, l = 40; h = 80; f(l) = f(h) = 1=2. With continuous

bids, in the noncooperative equilibrium a bidder with value l bids l and a bidder with

value h bids according to the distribution

F (b) =

8><>:0; if b < lb�lh�b ; if b 2 [l;

h+l2]

1; otherwise.

16

Page 18: Linear Programming for Mechanism Design: An Application to Bidder

Following Corollary 1, the noncooperative expected bidder surplus with continuous

bids is 20.

Figure 1 shows the lower bound of the noncooperative equilibrium surplus, as

well as the optimal collusive surplus from the linear program (15)�(20) and its upper

bound following Lemma 4. The �gure shows that the optimal collusive surplus, as

well as its upper and lower bounds, approach the noncooperative surplus as the bid

increment approaches zero.

0 5 10 15 20 25 3017

18

19

20

21

22

23

24

B

$

Symmetric Two Type Case

OptSolLowerBoundUpperBoundNonCoop

Figure 1: The optimal collusive bidder surplus (�OptSol�), the upper bound D(B)(�UpperBound�), the lower bound NC(B) (�LowerBound�), and the noncooperativeequilibrium surplus in the continuous bid case (�NonCoop�) as a function of B, whichis inversely related to the bid increment.

Note that in this example, if the auction used a second-price or ascending-bid

format instead of a �rst-price auction, the expected bidder surplus under noncooper-

ative bidding would be 20 just as in the case of a �rst-price auction, but the optimal

collusive surplus would be 70, which is the expected value of the highest of the two

bidders�values. Under noncooperative bidding, the seller�s expected revenue is 50.

When the bidders do not collude, the seller is indi¤erent between the various auction

formats, but when the bidders do collude, the seller�s expected revenue is 50 with

a �rst-price auction versus zero with a second-price or ascending-bid auction. This

contrast is illustrated in Table 1.

17

Page 19: Linear Programming for Mechanism Design: An Application to Bidder

Table 1: Comparison of Auction Formats

Noncooperative Bidding Collusive Bidding

First-Price Second-Price First-Price Second-Price

expected bidder surplus 20 20 20 70

expected seller revenue 50 50 50 0

expected total surplus 70 70 70 70

4.3.2 More than 2 types

Now consider two symmetric bidders each with a discrete uniform bid type dis-

tribution with support f1; 2; : : : ; ng. Consider the bid set fb1; b2; : : : ; bng, wherebj =

j(j�1)2j�1 . In this environment, one can show the following result.

Proposition 3 There exists a noncooperative equilibrium in which a type j bidder

bids bj.

Proof. Omitted.

Numerical calculations of the linear program with n = 2; 3; : : : ; 14 show that, in

each case, the noncooperative equilibrium bidding strategy coincides with the bids in

the optimal collusive mechanism. This suggests that as the type support approaches

the continuum, our impossibility result continues to hold. We leave the formal proof

of such a result to later research.

5 Extension to asymmetric bidders

In this section, we demonstrate using simple examples that the results of Section

4 continue to hold in some asymmetric environments, although the assumption of

symmetric helps to simplify the proof. For asymmetric environments, we numerically

solve linear programs with two-type bidders to verify that as bidding increments

approach 0, the collusive surplus converges to the noncooperative equilibrium surplus.

Speci�cally, we focus on asymmetric environments with two bidders, where bidder

i has value li with probability pi = fi (li) and value hi with probability 1 � pi. Weassume l1 � h1 and l2 � h2. Without loss of generality, assume l1 � l2. De�ne

�b � min f(1� p1)h2 + p1l1; (1� p2)h1 + p2l1g

18

Page 20: Linear Programming for Mechanism Design: An Application to Bidder

and assume the following regularity condition L2 <��b� p1l1

�= (1� p1) ; which is

automatically satis�ed when �b = (1� p1)h2 + p1l1.As in the case of our symmetric example, our benchmark is the noncooperative

equilibrium with continuous bids, which is characterized in the following proposition.

Proposition 4 Assume two bidders, where bidder i has value li with probability piand value hi with probability 1� pi, where 0 � l1 < h1, 0 � l2 < h2. Without loss ofgenerality, let l1 � l2. Assume regularity condition

l2 <�b� l1f1 (l)f2 (h)

; (26)

where �b � min f(1� p1)h2 + p1l1; (1� p2)h1 + p2l1g. The noncooperative equilib-

rium of the �rst-price auction game is as follows: bidder 1 with value l1 mixes aggres-

sively just below l1 (see Hirshleifer and Riley (1993, p.374) for the conditions that must

be satis�ed by the aggressive mixing distribution) bidder 2 with value l2 bids l1; and bid-

der i with value hi mixes on (l1;�b] according to distribution Fi(b) = 11�pi

�h�i��bh�i�b � pi

�;

and mixes aggressively just above l1 with a probability atom 11�pi

�h�i��bh�i�l1 � pi

�if

(1� p�i)hi + p�il1 < (1� pi)h�i + pil1.

Proof. See Appendix C.

Using Proposition 4, in the noncooperative equilibrium, expected total bidder

surplus is �h1 � �b

�(1� p1) +

�h2 � �b

�(1� p2) + (l2 � l1) p1p2 : (27)

We tested a number of cases with various choices of l1; l2; h1; h2; p1 and p2 satisfying

the regularity condition (26). When the bid increment becomes small, we always

observe the optimal collusive surplus being very close to the benchmark (27). We

illustrate the typical �ndings in the computation using the following example.

Consider the following types. l1 = l2 = 4, h1 = 100, and h2 = 50. The

probabilities p1 = p2 = 0:5. In this case the noncooperative equilibrium involves the

low type bidding 4 and the high types randomizing on (l1;�b], or, (4; 27]; with an atom

for bidder 2 with type h2 = 50 on a bid of 4. The expected bidder surplus is 48.

Similar to before, we de�ne the bid increment � to be��b� l1

�= (2B) for some

integer B. In Figure 2, we plot the optimal collusive surplus as a function of B. It

19

Page 21: Linear Programming for Mechanism Design: An Application to Bidder

depicts the typical behavior of the optimal collusive surplus approaching the noncoop-

erative surplus in all the cases that we tested. Interestingly, in this particular �gure,

the approaching takes place from below. This is because in this example, the nonco-

operative bidder surplus for the discrete-bid case also approaches the continuous-bid

surplus from below.

0 5 10 15 20 25 3046

46.5

47

47.5

48

48.5

49

B

$Asymmetric Two Type Case

OptSolNonCoop

Figure 2: Asymmetric bidder surplus (�OptSol�) as a function of B. The dashedline at 48 (�NonCoop�) is the noncooperative surplus for the continuous bid case.

Note that the pro�tability of collusion at a second-price or ascending-bid auction

is not a¤ected by asymmetries among the bidders. Thus, as in the symmetric example

above, the cartel can extract all of the surplus from the seller if the auction format is

second-price or ascending-bid. So once again, when bidders collude, we have a stark

contrast between the seller�s expected revenue at a �rst-price auction, which is equal

to its noncooperative value, and the seller�s revenue at a second-price or ascending-bid

auction, which is zero.

6 Conclusion

In this paper, we consider �rst-price collusive mechanisms that cannot directly control

the cartel members�bids at the auction, but rather can only coordinate cartel mem-

bers�bids through non-binding recommendations. Thus, the collusive mechanisms we

20

Page 22: Linear Programming for Mechanism Design: An Application to Bidder

consider di¤er from those of McAfee and McMillan (1992), who assume the cartel can

prevent all but one designated cartel member from bidding at the auction. Focusing

on this type of collusive mechanism, we show that for an environment with two sym-

metric bidders each with two possible values and su¢ ciently small bid increments,

bidders cannot pro�tably collude. Any mechanism that recommends bids that are

less than the noncooperative bids is subject to cheating by ring members. Numerical

calculations suggest that the result extends to more general symmetric environments

and at least some asymmetric environments. This is in stark contrast to the results

for second-price and ascending-bid auctions, where Marshall and Marx (2007) show

that a cartel can achieve the �rst-best collusive outcome, extracting all the surplus

from the seller. Thus, this research strongly supports the recommendation that sellers

that are concerned about bidder collusion should use a �rst-price auction format.

We are able to construct the dual feasible solution (given in Lemma 4) by observing

linear programming computations. In our case, numerical computations were invalu-

able for proving our analytical results. These same linear programming techniques are

potentially useful in developing answers to a number of open questions. For example,

Lopomo, Marshall, and Marx (2005) show that the optimal collusive mechanism for

an ascending-bid auction with post-auction knockout is ine¢ cient (for examples of

this type of mechanism, see U.S. v. Ronald Pook, U.S. v. Seville Industrial Machin-

ery, and District of Columbia v. George Basiliko, et al.), but they do not characterize

or construct an optimal mechanism, so the nature and extent of the ine¢ ciency is

unclear. The collusive mechanisms for second-price auctions studied by Graham and

Marshall (1987) and Mailath and Zemsky (1991) do not work if the cartel can only

collect a transfer from a cartel member if that cartel member wins the auction (for

example if transfers are arranged through subcontracting). Although Marshall and

Marx (2008) provide some results for environments when transfers can only be re-

quired from winning cartel members, a full characterization of what is possible in

this environment remains an open question. The results of McAfee and McMillan

(1992) suggest that for �rst-price auctions, the assumption of an all-inclusive cartel

is important for the existence of a pro�table cartel mechanism that is ex-post budget

balanced, and it remains an open question whether this is possible when the cartel is

not all-inclusive. The issue of individual rationality for cartels at �rst-price auctions

receives some attention in McAfee and McMillan (1992) and in Marshall and Marx

(2007), but open questions remain there as well.

21

Page 23: Linear Programming for Mechanism Design: An Application to Bidder

A Proof of Lemma 1

First, consider a feasible solution (p1; p2;m1;m2) of linear program (1)�(6). We con-

struct a solution (�;M1;M2; J1; J2) to the linear program (7)�(14) and then show

that it is feasible with the same objective function value. Let � (b1; b2; v1; v2) =

p1 (b1; b2 j v1; v2) ; for i 2 f1; 2g; let Mi(vi) =P

v�i2V�imi (vi; v�i) f�i(v�i); and for

i 2 f1; 2g; let

Ji (vi; v0i; bi) = max

b0i2B

Xv�i2V�i;b�i2B

pi(bi; b�i j v0i; v�i)ui (b0i; b�i; vi) f�i (v�i) :

It is straightforward to show that constraints (9), (10), (13) and (14) are satis�ed.

Furthermore, for i 2 f1; 2g; consider the deviation function ��i (bi) de�ned by

Ji (vi; v0i; bi) =

Xv�i2V�i;b�i2B

pi(bi; b�i j v0i; v�i)ui (��i (bi); b�i; vi) f�i (v�i) ;

Constraint (4) implies that for i 2 f1; 2g;

Ui (pi j vi) � U�i (pi; ��i ; v0i j vi) =Xbi2B

Ji (vi; v0i; bi)�Mi(v

0i) :

Therefore, (11) and (12) are satis�ed. It can be veri�ed that the corresponding

objective values are the same.

Second, consider a feasible solution (�;M1;M2; J1; J2) to (7)-(14). Letting

p1 (b1; b2 j v1; v2) = p2 (b2; b1 j v2; v1) = � (b1; b2; v1; v2; )

and for i 2 f1; 2g; mi (vi; v�i) = Mi (vi) ; then (p1; p2;m1;m2) is a feasible solution

to (1)�(6) and has the same objective function value. It is obvious that constraints

(2) and (3) are satis�ed. To see that the incentive compatibility constraints are also

satis�ed, note that for any vi 2 Vi; v0i 2 Vi; bi 2 B; and �i(bi) 2 B, (13) and (14)imply

Ji (vi; v0i; bi) �

Xv�i2V�i;b�i2B

pi(bi; b�i j v0i; v�i)ui (�i(bi); b�i; vi) f�i (v�i) :

Furthermore, (11) and (12) imply (4). Q.E.D.

22

Page 24: Linear Programming for Mechanism Design: An Application to Bidder

B Proof of Lemma 4

We show that���; ��; ��; ��

�de�ned as follows is feasible to the dual linear program

(21)�(25):

��(h; h; j; j0) =

8>>>>>>><>>>>>>>:

2f(h)f(l); if j0 > j and j0 2 f1; 3; : : : ; 2B � 1g

j f(h)f(l); if j = j0 2 f0; 1; 2; : : : ; 2Bg

f(h)f(l); if j0 = j + 1 2 f2; 4; : : : ; 2Bg

2B f(h)f(l); if j = j0 > 2B

0; otherwise

; ��(h; h) = 2Bf (h)

f (l)

��(l; h; j; j0) =

8>>>>>>>>><>>>>>>>>>:

2f(h)f(l); if j0 > j and j0 2 f3; : : : ; 2B � 1g

(j � 1)f(h)f(l); if j = j0 2 f2; 4; : : : ; 2Bg

j f(h)f(l); if j = j0 2 f3; 5; : : : ; 2B � 1g

f(h)f(l); if j 2 f0; 1g and j0 = 2

(2B � 1) f(h)f(l); if j = j0 > 2B

0; otherwise

; ��(h; l) = 2B�1

��(h; l; j; j0) =

(2B � 1; if j0 = 00; otherwise

; ��(l; h) =f (h)

f (l)(2B � 1)

��(l; l; j; j0) =

(2Bf(l); if j0 = 0

0; otherwise; ��(l; l) =

2B

f (l)

��(h; h) = ��(h; l) = ��(l; h) = (h� l) 2Bf (l) +

f (h)2

2Bf (l)

!

��(l; l) = 2 (h� l) fhfl(B (fh � 2) + 1)

�� = 0

It is easy to verify that���; ��; ��; ��

�is feasible to constraints (22), (24), and (25).

23

Page 25: Linear Programming for Mechanism Design: An Application to Bidder

We focus on (23), or � (v; �v) � �(v; �v; j; �j); where

�(v; �v; j; �j) � u(bj; b�j; v) + u(b�j; bj; �v)

�Xv0

Xj02B

�(v; v0; j; j0)u(bj0 ; b�j; v0)�

Xv0

Xj02B

�(�v; v0; �j; j0)u(bj0 ; bj; v0)

+Xv0

�(v; v0)u(bj; b�j; v) +Xv0

�(�v; v0)u(b�j; bj; �v):

We do this by considering each one of the four possible combinations of v and �v:

First consider v = �v = h. Without loss of generality, we only need to consider

cases when j � �j.1. 2B � j > �j + 1 and j is an even number.

�(h; h; j; �j) = u(bj; b�j; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))� �(h; h; �j; j)u(bj; bj; h)�Xj0:j0>j

�(h; h; j; j0)u(bj0 ; b�j; h)�Xj0:j0>j

�(h; h; �j; j0)u(bj0 ; bj; h)

= (h� l)

0@�1� f (h)2B

j

��2B

f (l)� f (h)f (l)

j

�� 4f (h)

f (l)

B�1Xk=j=2

�1� 2k + 1

2Bf (h)

�1A= 2(h� l)Bf (l) < � (h; h) :

2. j = �j + 1 � 2B and j is an even number.

�(h; h; j; j � 1) = u(bj; bj�1; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))� �(h; h; j � 1; j)u(bj; bj; h)�Xj0:j0>j

�(h; h; j; j0)u(bj0 ; bj�1; h)�Xj0:j0>j

�(h; h; j � 1; j0)u(bj0 ; bj; h)

��(h; h; j; j � 1)u(bj�1; bj�1; h)

= (h� l)�2Bf (l)� 1

2

�1� f (l)

2Bj

�f (h)

f (l)

�< � (h; h) :

24

Page 26: Linear Programming for Mechanism Design: An Application to Bidder

3. j = �j � 2B and j is an even number.

�(h; h; j; j) = 2u(bj; bj; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))�2

Xj0:j0>j

�(h; h; j; j0)u(bj0 ; bj; h)

= (h� l)

0@�1� f (h)2B

j

��2B

f (l)� f (h)f (l)

j

�� 4f (h)

f (l)

B�1Xk=j=2

�1� 2k + 1

2Bf (h)

�1A= 2(h� l)Bf (l) < � (h; h) :

4. 2B > j > �j and j is an odd number.

�(h; h; j; �j) = u(bj; b�j; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))� �(h; h; �j; j)u(bj; bj; h)�

Xj0:j0>j+1

�(h; h; j; j0)u(bj0 ; b�j; v0)�

Xj0:j0>j+1

�(h; h; �j; j0)u(bj0 ; bj; h)

��(h; h; j; j + 1)u(bj+1; b�j; v0)

= (h� l)��1� f (h)

2Bj

��2B

f (l)� (j + 1) f (h)

f (l)

�4f (h)f (l)

B�1Xk=(j+1)=2

�1� 2k + 1

2Bf (h)

���1� (j + 1) f (h)

2B

�f (h)

f (l)

35= (h� l)2Bf (l) < � (h; h) :

5. j = �j < 2B and j is an odd number.

�(h; h; j; j) = 2u(bj; bj; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))�2

Xj0:j0>j+1

�(h; h; j; j0)u(bj0 ; bj; h)� 2�(h; h; j; j + 1)u(bj+1; bj; h)

= (h� l) 2Bf (l) +

f (h)2

2Bf (l)

!= � (h; h) :

6. j > 2B and j > �j:

�(h; h; j; �j) = u(bj; b�j; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))= u(bj; b�j; h) (1 + �(h; l))

= (h� l) (2B � jfh) < 2B (h� l) fl < � (h; h) :

25

Page 27: Linear Programming for Mechanism Design: An Application to Bidder

7. j = �j > 2B:

�(h; h; j; j) = 2u(bj; bj; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))= (h� l) (2B � jfh) < 2B (h� l) fl < � (h; h) :

Now consider v = h and �v = l.

1. 2B � j > �j, j > 0 and j is an even number.

�(h; l; j; �j) = u(bj; b�j; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))�Xj0:j0>j

�(h; h; j; j0)u(bj0 ; b�j; h)�Xj0:j0>j

�(l; h; �j; j0)u(bj0 ; bj; h)

= (h� l)

0@�1� f (h)2B

j

��2B

f (l)� f (h)f (l)

j

�� 4f (h)

f (l)

B�1Xk=j=2

�1� 2k + 1

2Bf (h)

�1A= 2 (h� l)Bf (l) < � (h; l) :

2. 2B > j > �j, j � 3 and j is an odd number.

�(h; l; j; �j) = u(bj; b�j; h) (1 + � (h; h) + � (h; l)� �(h; h; j; j))�

Xj0:j0>j+1

�(h; h; j; j0)u(bj0 ; b�j; h)�X

j0:j0>j+1

�(l; h; �j; j0)u(bj0 ; bj; h)

��(l; h; �j; j)u(bj; bj; h)� �(h; h; j; j + 1)u(bj+1; b�j; h)

= (h� l)��1� f (h)

2Bj

��2B

f (l)� f (h)f (l)

(j + 1)

�4f (h)f (l)

B�1Xk=(j+1)=2

�1� 2k + 1

2Bf (h)

���1� f (h)

2B(j + 1)

�f (h)

f (l)

35= 2 (h� l)Bf (l) < � (h; l) :

3. j = 1 and �j = 0:

�(h; l; 1; 0) = (h� l) 2Bf (l) +

f (h)2

2Bf (l)

!= � (h; l) :

26

Page 28: Linear Programming for Mechanism Design: An Application to Bidder

4. 2B � j = �j � 2 and j is an even number.

�(h; l; j; j) = u(bj; bj; h) (2 + � (h; h) + � (h; l)� �(h; h; j; j)� �(l; h; j; j))�Xj0:j0>j

�(h; h; j; j0)u(bj0 ; bj; h)�Xj0:j0>j

�(l; h; j; j0)u(bj0 ; bj; h)

+u(bj; bj; l) (� (l; l) + � (l; h))

= (h� l)��1� f (h)

2Bj

��B

f (l)+1

2� f (h)f (l)

�j � 1

2

��

�4f (h)f (l)

B�1Xk=j=2

�1� 2k + 1

2Bf (h)

���2B

f (l)+f (h)

f (l)(2B � 1)

�j

4Bf (h)

35= (h� l)

�2Bf (l)� 1

2f (l)

�2B � 1 + jf (h)2

�� 1

4Bjf (h)

�< � (h; l) :

5. 2B > j = �j � 3 and j is an odd number.

�(h; l; j; j) = u(bj; bj; h) (2 + � (h; h) + � (h; l)� �(h; h; j; j)� �(l; h; j; j))�Xj0:j0>j

�(h; h; j; j0)u(bj0 ; bj; h)�Xj0:j0>j

�(l; h; j; j0)u(bj0 ; bj; h)

+u(bj; bj; l) (� (l; l) + � (l; h))� �(h; h; j; j + 1)u(bj+1; bj; h)

= (h� l)��1� f (h)

2Bj

��B

f (l)+1

2� f (h)f (l)

j

���1� f (h)

2B(j + 1)

�f (h)

f (l)

�4f (h)f (l)

B�1Xk=(j+1)=2

�1� 2k + 1

2Bf (h)

���2B

f (l)+f (h)

f (l)(2B � 1)

�j

4Bf (h)

35= (h� l)

�2Bf (l)� f (h)

4Bf (l)j � 2B + jf

2 � f � 12f (l)

�< � (h; l) :

27

Page 29: Linear Programming for Mechanism Design: An Application to Bidder

6. j = �j = 0.

�(h; l; 0; 0) = u(b0; b0; h) (2 + � (h; h) + � (h; l))� �(l; h; 0; 2)u(b2; b0; h)�Xj0:j0>1

�(h; h; 0; j0)u(bj0 ; b0; h)�Xj0:j0>3

�(l; h; 0; j0)u(bj0 ; b0; h)

= (h� l)"�

B

f (l)+1

2

�� 4f (h)

f (l)

B�1Xk=1

�1� 2k + 1

2Bf (h)

��2f (h)f (l)

�1� 1

2Bf (h)

�� f (h)f (l)

�1� 2

2Bf (h)

��= (h� l)

�2Bf (l)� 2B � f (h)� 1

2f (l)

�< �(h; l):

7. j = �j = 1.

�(h; l; 1; 1) = u(b1; b1; h) (2 + � (h; h) + � (h; l))� �(l; h; 1; 2)u(b2; b0; h)�Xj0:j0>1

�(h; h; 1; j0)u(bj0 ; b1; h)�Xj0:j0>3

�(l; h; 1; j0)u(bj0 ; b1; h)

= (h� l)"�1� 1

2Bf (h)

��B

f (l)+1

2

�� 4f (h)

f (l)

B�1Xk=1

�1� 2k + 1

2Bf (h)

��2f (h)f (l)

�1� 1

2Bf (h)

�� f (h)f (l)

�1� 2

2Bf (h)

��= (h� l)

�2Bf (l)� 4B

2 � 2B + f (h) f (l)4Bf (l)

�< �(h; l):

8. j > 2B and j > �j:

�(h; l; j; �j) = u(bj; b�j; h) (1 + �(h; h) + �(h; l)� �(h; h; j; j))

= (h� l)�1� f (h)

2Bj

��2B

f (l)� f (h)f (l)

2B

�= (h� l) 2B

�f (l)� j � 2B

2Bf (h)

�< � (h; l) :

28

Page 30: Linear Programming for Mechanism Design: An Application to Bidder

9. j = �j > 2B:

�(h; l; j; j) = u(bj; bj; h) (2 + �(h; h) + �(h; l)� �(h; h; j; j)� �(l; h; j; j))+u(bj; bj; l) (� (l; l) + � (l; h))

= (h� l)��1� f (h)

2Bj

��B

f (l)+1

2� f (h)f (l)

�2B � 1

2

����2B

f (l)+f (h)

f (l)(2B � 1)

�j

4Bf (h)

�=

1

4B (1� f)��8B2f + 4B2 + 2B + jf (2Bf � 4B + f � 1)

�<

1

4B (1� f)��8B2f + 4B2 + 2B + 2Bf (2Bf � 4B + f � 1)

�= (h� l)

"2Bf (l)�

(2B � 1)�1 + f (h)2

�+ f (h)

2f (l)

#< (h� l) 2Bf (l) < � (h; l) :

10. j < �j:

�(h; l; j; �j) = u(b�j; bj; l) (1 + �(l; h) + �(l; l))� �(h; h; j; �j)u(b�j; b�j; h)�Xj0:j0>�j

�(h; h; j; j0)u(bj0 ; b�j; h)�Xj0:j0>�j

�(l; h; �j; j0)u(bj0 ; bj; h)

< 0 < �(h; l):

Finally, consider v = �v = l. Without loss of generality, we only consider j � �j.1. 2B > j > �j, j > 2 and j is an even number.

�(l; l; j; �j) = u(bj; b�j; l)(1 + �(l; l) + �(l; h))�Xj0:j0>j

�(l; h; j; j0)u(bj0 ; b�j; h)

�Xj0:j0>j

�(l; h; �j; j0)u(bj0 ; bj; h)� �(l; h; j; j)u(bj; b�j; h)

= (h� l)

0@�f (h)2B

j

�1 +

f (h)

f (l)(2B � 1) + 2B

f (l)

�� 4f (h)

f (l)

B�1Xk=j=2

�1� 2k + 1

2Bf (h)

�1A� (h� l)

�1� f (h)

2Bj

�(j � 1) f (h)

f (l)

= (h� l)�f (h)

f (l)

�2B (f (h)� 2) + 2�

�1 + f (h) j +

j

2Bf (l)

���< �(l; l):

29

Page 31: Linear Programming for Mechanism Design: An Application to Bidder

2. j = 2 > �j

�(l; l; 2; �j) = u(b2; b�j; l)(1 + �(l; l) + �(l; h))�Xj0:j0>2

�(l; h; 2; j0)u(bj0 ; b�j; h)

�Xj0:j0>2

�(l; h; �j; j0)u(bj0 ; b2; h)� �(l; h; 2; 2)u(b2; b�j; h)� �(l; h; �j; 2)u(b2; b2; h)

< �(l; l; j; �j) for j in case 1.

< �(l; l):

3. 2B > j > �j and j � 3 is an odd number.

�(l; l; j; �j) = u(bj; b�j; l)(1 + �(l; l) + �(l; h))�Xj0:j0>j

�(l; h; j; j0)u(bj0 ; b�j; h)

�Xj0:j0>j

�(l; h; �j; j0)u(bj0 ; bj; h)� �(l; h; j; j)u(bj; b�j; h)� �(l; h; �j; j)u(bj; bj; h)

= � (h� l) f (h)2B

j

�1 +

f (h)

f (l)(2B � 1) + 2B

f (l)

� (h� l) f (h)f (l)

0@4 B�1Xk=(j+1)=2

�1� 2k + 1

2Bf (h)

�+

�1� f (h)

2Bj

�(j + 1)

1A= (h� l)

�f (h)

f (l)

�2B (f (h)� 2) + 2�

�1 + f (h) j +

f (l) j + f (h)

2B

���< �(l; l):

4. 2B � j = �j � 2, and j is an even number.

�(l; l; j; j) = 2u(bj; bj; l)(1 + �(l; l) + �(l; h))� 2Xj0:j0>j

�(l; h; j; j0)u(bj0 ; bj; h)

�2�(l; h; j; j)u(bj; bj; h)

= (h� l)�f (h)

f (l)

�2B (f (h)� 2) + 2�

�1 + f (h) j +

j

2Bf (l)

���< �(l; l):

30

Page 32: Linear Programming for Mechanism Design: An Application to Bidder

5. 2B > j = �j � 3 and j is an odd number.

�(l; l; j; j) = 2u(bj; bj; l)(1 + �(l; l) + �(l; h))� 2X

j0:j0�j+2

�(l; h; j; j0)u(bj0 ; bj; h)

�2�(l; h; j; j)u(bj; bj; h)

= � (h� l) f (h)2B

j

�1 +

f (h)

f (l)(2B � 1) + 2B

f (l)

� (h� l) f (h)f (l)

0@4 B�1Xk=(j+1)=2

�1� 2k + 1

2Bf (h)

�+

�1� f (h)

2Bj

�(j + 1)

1A= (h� l)

�f (h)

f (l)

�2B (f (h)� 2) + 2�

�1 + f (h) j +

f (l) j + f (h)

2B

���< �(l; l):

6. j = �j = 1:

�(l; l; j; j) = 2u(bj; bj; l)(1 + �(l; l) + �(l; h))� 2X

j0:j0�j+2

�(l; h; j; j0)u(bj0 ; bj; h)

�2�(l; h; j; j)u(bj; bj; h)� 2�(l; h; j; 2)u(b2; bj; h)< �(l; l; j; �j) for j in case 5.

< �(l; l):

7. j = �j = 0:

�(l; l; 0; 0) = �2Xj0:j0�3

�(l; h; 0; j0)u(bj0 ; b0; h)� 2�(l; h; 0; 2)u(b2; b0; h)

= � (h� l) f (h)f (l)

4B�1Xk=1

�1� 2k + 1

2Bf (h)

�+ 2

�1� f (h)

2B2

�!

= (h� l)�f (h)

f (l)(2B (f (h)� 2) + 2)

�= �(l; l):

31

Page 33: Linear Programming for Mechanism Design: An Application to Bidder

8. j > 2B and j > �j:

�(l; l; j; �j) = u(bj; b�j; l)(1 + �(l; l) + �(l; h))� �(l; h; j; j)u(bj; b�j; h)

= (h� l)��f (h)2B

j

�1 +

f (h)

f (l)(2B � 1) + 2B

f (l)

��� (h� l)

�1� f (h)

2Bj

�(2B � 1) f (h)

f (l)

= (h� l)�f (h)

f (l)

�2B (f (h)� 2) + 2�

�1 + j � 2Bf (l) + jf (l)

2B

���< �(l; l):

9. j = �j > 2B.

�(l; l; j; �j) = 2u(bj; bj; l)(1 + �(l; l) + �(l; h))� 2�(l; h; j; j)u(bj; bj; h)

= (h� l)�f (h)

f (l)

�2B (f (h)� 2) + 2�

�1 + j � 2Bf (l) + jf (l)

2B

���< �(l; l):

This completes the demonstration that � (v; �v) � �(v; �v; j; �j) and proves that���; ��; ��; ��

�is feasible in the linear program (21)�(25). Substituting

���; ��; ��; ��

�into

the dual objective function gives D(B) = (h� l)f (h) f (l)�2 + f(h)2(1+f(l))

2Bf(l)2

�. Q.E.D.

C Online Appendix �Additional proofs

Proof of Lemma 1. It is clear that a bidder with value l can do not better than tobid l. If bidder i has value h; its expected payo¤ from bid bi 2 [l;�b] is

�i = (1� p)Z bi

l

(h� bi)dF (b�i) + p(h� bi) = p(h� l);

which is constant for all bi 2 [l;�b]. A bid below l has expected payo¤ of zero, and abid bi > �b has expected payo¤ of h� bi < h� �b = p(h� l). So the bidding strategygiven in the proposition is a best reply. Q.E.D.

Proof of Lemma 2. It is only incentive compatible such that a bidder receivingblow to have a chance to win the object by a tie. Assume a bidder with type l has

probability plow to win by tie, and therefore receive surplus (l � blow) plow=2. Supposeblow = l�t� < l�2� for some t > 2. Whenever the bidder receives the recommended

32

Page 34: Linear Programming for Mechanism Design: An Application to Bidder

bid blow = l � t� from the center, by bidding l � (t� 1)� instead, she wins with

probability at least plow, which generates surplus (t� 1)�plow, which is higher thant�plow=2 = (l � blow) plow=2, which is the surplus from following the recommended

bid blow. Similar logic indicates that a type h bidder also has no incentive to bid

below l � 2�. Q.E.D.

Proof of Lemma 3. For any feasible solution (�;M1;M2; J1; J2) to the linear

program (7)�(14), we can construct a feasible solution (~�; J;M) to the linear pro-

gram (15)�(20) with the same objective function value as follows: ~�(b;�b; v; �v) =12

��(b;�b; v; �v) + �(�b; b; �v; v)

�; M = M1 + M2; and J = J1 + J2. Similarly, for any

feasible solution (~�;M; J) to the linear program (15)�(20), we can construct a feasi-

ble solution (�; J1; J2;M1;M2) to (7)�(14) with the same objective function value as

follows: �(b;�b; v; �v) = �(�b; b; �v; v) = 12

�~�(b;�b; v; �v) + ~�(�b; b; �v; v)

�; M1 =M2 =

M2; and

J1 = J2 =J2. Q.E.D.

Proof of Lemma 5. Let the type l bidder bid l and the type h bidder mix on bidsabove l. Type l bidder has surplus 0 and no incentive to deviate from l. Given the

type l bidder�s strategy, one can show that a symmetric mixed strategy equilibrium

exists. Now focus on the bid b1 = l+�. The high type�s surplus from bidding b1 must

be no less than f(l)(h�b1) because if he bids b1, his surplus is at least f(l)(h�b1). Ifbid b1 is not in an equilibrium bid, the surplus can only be higher than f(l)(h� b1).Therefore, for each bidder, f(h)f(l)(h�b1) is a lower bound for the expected surplus.Q.E.D.

Proof of Proposition 4. One can show that F1(b) and F2(b) are well de�ned CDFswith support (l1;�b]. If bidder 1 has value h1; its expected payo¤ from bid b 2 (l1;�b] is

u1 (h1; b) = (h1 � b) (p2 + (1� p2)F2(b)) = h1 � �b;

which is a constant with respect to b. Similarly, if bidder 2 has value h2; its expected

payo¤ from bid b 2 (l1;�b] is

u2 (h2; b) = (h2 � b) (p1 + (1� p1)F1(b)) = h2 � �b;

which is also a constant with respect to b. Now we consider bidder 2 with type l2. It

33

Page 35: Linear Programming for Mechanism Design: An Application to Bidder

has no incentive to bid below l1. If it bids b 2 (l1;min��b; l2], the expected surplus

is

u2 (l2; b) = (l2 � b) (p1 + (1� p1)F1 (b))

= (l2 � b)�h2 � �bh2 � b

�=

�h2 � �b

��1� h2 � l2

h2 � b

�;

which is a decreasing function of b, taking maximum value at l1. Thus, when l2 � �b,it has no incentive to bid above l1. If �b < l2; the surplus from bidding b 2 (�b; l2] is

u2 (l2; b) = l2 � b< p1l2 + (1� p1) l2 � �b

< p1l2 + (1� p1)�b� l1p11� p1

� �b

= p1 (l2 � l1) = u2 (l2; l1) ;

where the second inequality uses the regularity condition l2 <�b�l1p11�p1 . Thus, when

�b < l2 there is again no incentive to bid above L1. Q.E.D.

34

Page 36: Linear Programming for Mechanism Design: An Application to Bidder

References

Aoyagi, Masaki (2003), �Bid Rotation and Collusion in Repeated Auctions,�Journal

of Economic Theory 112, 79�105.

Bajari, Patrick (2001), �Comparing Competition and Collusion: A Numerical Ap-

proach,�Economic Theory 18, 187�205.

Beil, Damien and Lawrence M. Wein (2003), �An Inverse-Optimization-Based Auc-

tion Mechanism to Support a Multiattribute RFQ Process,�Management Sci-

ence 49, 1529�1545.

Blume, Andreas and Paul Heidhues (2006), �Private Monitoring in Auctions,�Jour-

nal of Economic Theory 131, 179�211.

Cramton, Peter, Yoav Shoham and Richard Steinberg, editors (2006), Combinatorial

Auctions, The MIT Press, Cambridge, Massachusetts.

District of Columbia, ex rel. John Payton, Corporation Counsel v. George Basiliko,

et al., No. 91-2518, 1992 U.S. Dist. LEXIS 1260 (D.C. February 10, 1992).

Eatwell, John, Murray Milgate, and Peter Newman (1989), Allocation, Information

and Markets, W. W. Norton & Co., New York.

Forge, Françoise (2006), �Correlated Equilibrium in Games with Incomplete Infor-

mation Revisited,�CORE Discussion Paper 2006/41, CEREMADE.

Gallien, Jérémie and Lawrence M. Wein (2005), �A Smart Market for Industrial

Procurement with Capacity Constraints,�Management Science 51, 76�91.

Gayle, Wayne-Roy and Jean-Francois Richard (2005), �Numerical Solutions of Asym-

metric First Price Independent Private Value Auctions,�Working Paper, Uni-

versity of Pittsburgh.

Graham, Daniel A. and Robert C. Marshall (1987), �Collusive Bidder Behavior at

Single-Object Second Price and English Auctions,�Journal of Political Econ-

omy 95, 1217�1239.

Hirshleifer, Jack, and John G. Riley (1993), The Analytics of Uncertainty and In-

formation, Cambridge: Cambridge University Press.

35

Page 37: Linear Programming for Mechanism Design: An Application to Bidder

Hurwicz, Leo (1973), �The Design of Mechanisms for Resource Allocation,�Ameri-

can Economic Review Papers and Proceedings 63, 1�30.

Jamison, Julian S. and J. Hörner (2008), �CollusionWith (Almost) No Information,�

forthcoming in RAND Journal of Economics.

Kovacic, William E., Robert C. Marshall, Leslie M. Marx, and Matthew E. Rai¤

(2006), �Bidding Rings and the Design of Anti-Collusion Measures for Auctions

and Procurements,�in Handbook of Procurement, edited by N. Dimitri, G. Piga

and G. Spagnolo, Cambridge University Press, Chapter 15, 381�411.

Ledyard, John O. (1989), �Incentive Compatibility,�in John Eatwell, Murray Mil-

gate, and Peter Newman, editors, Allocation, Information and Markets, W. W.

Norton & Co., New York.

Lopomo, Giuseppe, Robert C. Marshall, and Leslie M. Marx (2005), �Ine¢ ciency of

Collusion at English Auctions,�Contributions in Theoretical Economics 5 (1),

Article 4.

Mailath, George, and Peter Zemsky (1991), �Collusion in Second Price Auctions

with Heterogeneous Bidders,�Games and Economic Behavior 3, 467�486.

Marshall, Robert C. and Leslie M. Marx (2007), �Bidder Collusion,� Journal of

Economic Theory 133, 374�402.

Marshall, Robert C. and Leslie M. Marx (2008), �The Vulnerability of Auctions to

Bidder Collusion,�Working Paper, Duke University.

Marshall, Robert C. and Michael J. Meurer, (2004), �Bidder Collusion and Antitrust

Law: Re�ning the Analysis of Price Fixing to Account for the Special Features

of Auction Markets,�Antitrust Law Journal 72, 83�118.

Marshall, Robert C., Michael J. Meurer, Jean-Francois Richard, andWalter Stromquist

(1994), �Numerical Analysis of Asymmetric First Price Auctions,�Games and

Economic Behavior 7, 193�220.

Mas-Colell, Andreu, Michael D. Whinston, and Jerry R. Green (1995), Microeco-

nomic Theory, Oxford University Press, New York.

36

Page 38: Linear Programming for Mechanism Design: An Application to Bidder

McAfee, R. Preston and John McMillan (1992), �Bidding Rings,�American Eco-

nomic Review 82, 579�599.

McMillan, John McMillan (1994), �Selling Spectrum Rights,�Journal of Economic

Perspectives 8(3), 145�162.

Milgrom, Paul (1985), �Auction Theory,� in Truman Bewley, editor, Advances in

Economic Theory, Fifth World Congress, pages 1�32, Cambridge University

Press, 1985.

Milgrom, Paul (1989), �Auctions and Bidding: A Primer,� Journal of Economic

Perspectives 3(3), 3�22.

Myerson, Roger B. (1982), �Optimal CoordinationMechanisms in Generalized Principal-

Agent Problems,�Journal of Mathematical Economics 10, 67�81.

Myerson, Roger B. (1983), �Mechanism Design by an Informed Principal,�Econo-

metrica 51, 1767�97.

Myerson, Roger B. (1985), �Bayesian Equilibrium and Incentive Compatibility,�in

Social Goals and Social Organization, edited by L. Hurwicz, D. Schmeidler, and

H. Sonnenschein, Cambridge University Press, 229�259.

Myerson, Roger B. (1989), �Mechanism Design,�in John Eatwell, Murray Milgate,

and Peter Newman, editors, Allocation, Information and Markets, W.W. Nor-

ton & Co., New York.

Nau, Robert, Sabrina Gomez Canovas, and Pierre Hansen (2003), �On the Geometry

of Nash Equilibria and Correlated Equilibria,� International Journal of Game

Theory 32, 443�453.

Oren, Shmuel S. and Michael H. Rothkopf (1975), �Optimal Bidding in Sequential

Auctions,�Operations Research 23(6), 1080�1090.

Robinson, Marc S. (1985), �Collusion and the Choice of Auction,�RAND Journal

of Economics 16, 141�145.

Rosenschein, Je¤rey S. and Gilad Zlotkin (1994). Rules of Encounter, MIT Press,

Cambridge, MA.

37

Page 39: Linear Programming for Mechanism Design: An Application to Bidder

Roth, Alvin E. and Marilda A. Oliviera Sotomayor (1990), Two-Sided Matching,

Cambridge University Press, Cambridge, England.

Skrzypacz, Andrzej and Hugo Hopenhayn (2004), Tacit Collusion in Repeated Auc-

tions, Journal of Economic Theory 114, 153�169.

U.S. v. A-A-A Elec. Co., Inc., 788 F.2d 242 (4th Cir. 1986).

U.S. v. Addyston Pipe & Steel Co. et al., 1897 LEXIS 2499 (E.D. Tenn. Feb. 5,

1897).

U.S. v. Raymond J. Lyons, No. 81-1287, 1982 U.S. App. LEXIS 22194 (Feb. 1, 1982).

U.S. v. Ronald Pook, No. 87-274, 1988 U.S. Dist. LEXIS 3398 (E.D. Pa. April 18,

1988).

U.S. v. Seville Industrial Machinery Corp., 696 F.Supp. 986 (D.N.J. 1988).

U.S. v. W.F. Brinkley & Son Construction Company, Inc., 783 F.2d 1157 (4th Cir.

1986).

Varian, Hal R. (1989), �Price Discrimination,�in Richard Schmalensee and Robert

Willig, editors, Handbook of Industrial Organization, North-Holland Press, Am-

sterdam.

Varian, Hal R. (2000), �Economic Mechanism Design for Computerized Agents,�

Working Paper, University of California at Berkeley.

Vulcano, Gustavo, Garrett van Ryzin and Costis Maglaras (2002), �Optimal Dy-

namic Auctions for Renvenue Management,�Management Science 48, 1388�

1407.

Wilson, Robert (1987), �Auction Theory,� in J. Eatwell, M. Milgate, and P. New-

man, editors, The New Palgrave, MacMillan, London.

38