Bargaining Over Perfect Complements Owned Separately: With Experimental Test Ning Yu ∗ , Department of Economics, W. P. Carey School of Business, Arizona State University, University Drive and Mill Avenue, Tempe, AZ, 85212, U.S.A

Thorsten Chmura, Thomas Pitz, Nottingham University Business School China, 199 Taikang East Road, Ningbo, 315100, China University of Bonn, BonnEconLab - Laboratory of Experimental Economics, Adenauerallee 24-42, 53113 Bonn, Germany

Ning Sun School of Economics, Shanghai University of Finance and Economics, 111 Wuchuan Road, Shanghai, 200433, China

Abstract This paper considers the situation in which two perfect complements belong to different owners. We calculate the Bayesian-Nash equilibrium in the mechanism of k + 1-price bargaining with private value, and did experiment to test the theory. JEL Code: C78 C92 Key words: k + 1-price Bargaining/Auction, Perfect Complements, Experimental Economics

∗ Corresponding Author. Email addresses: [email protected] (Ning Yu), [email protected] (Thorsten Chmura), [email protected] (Thomas Pitz), [email protected] (Ning Sun).

4 January 2010

1

Introduction

Cramton et al. (1987) study partnership dissolving under incomplete information using the tool of mechanism design. We consider a similar but distinct situation in which one piece of perfect complement is useless for its owner. For example, one consumer owns 3 out of 4 volumes of a dictionary, and another accidentally has the other 1 volume. We focus on the mechanism of k + 1-price auction or bargaining, probably first introduced by Chatterjee and Samuelson (1983), and adopt the notation of Cramton et al. (1987) in which k ∈ [0, 1], and k = 0 and 1 represent the first-price and second-price sealed auctions respectively. We study Bayesian-Nash equilibrium in this scenario, and test whether players follow the predicted bidding strategy in reality.

2

The Model

We consider a 2-player (i = 1, 2) asymmetric incomplete information game that the well-established framework of Bayesian-Nash equilibrium is applicable. The signal vi of player i distributes according to the cumulative distribution function (c.d.f.) Fi (v) on the closed interval [v i , v i ], with a positive and twice continuously differentiable probability density function (p.d.f.) fi (v). This signals tell how much the players value the combination respectively. The distributions are common knowledge, but each one only receives her own signal. Player i owns a share θi ≥ 0 of the combination, and θ1 + θ2 = 1. By doing so, the seller-buyer bargaining model becomes a degenerate case of ours. The ownership structure is clear or pre-agreed, and how it is obtained is not of our concern. The mechanism determines the price of the combination of two perfect complements according to messages sent by two players, that is, (1 − k)b(1) + kb(2) , where b(i) stands for the i-th higher message sent by them. The higher bidder i gets the combination, and pays the other θj [(1 − k)b(1) + kb(2) ]. In conclusion, for an arbitrary bidder i, the ex post payoff is given by   vi − θj [(1 − k)bi + kbj ] 

πi =

− θj bi ) + θi [(1 − k)bj + kbi ]

1 (v 2 i

 

1 θb 2 i i

if bi > bj , if bi = bj , if bi < bj .

The equilibrium strategy consists of two bidding functions β1 (v) and β2 (v), guiding player i to submit a message or bid of bi = βi (v) when she receives a 1

signal v. They satisfy  Π (β (v), v) ≥ Π (b, v) 1 1 1 Π2 (β2 (v), v) ≥ Π2 (b, v)

for all v ∈ [v 1 , v 1 ] and b, for all v ∈ [v 2 , v 2 ] and b,

where Πi (βi (v), v) stands for the expected payoff given βj (v) and Fj (v). With a bidding function, it is easy to compute the corresponding c.d.f. of the player’s bid, and we set them to be G1 (b) and G2 (b). We now characterize the properties of certain bidding functions in equilibrium and corresponding c.d.f. of bids in the form of assumptions because the proofs of them are standardized in the auction literature and apply here with marginal modifications. The representative ones can be found in Amann and Leininger (1996), Persico and Persico (2000), and Maskin and Riley (2003). Assumption 1 (Common Extrema)  inf(b ) = inf(b ) = b, and 1 2 sup(b1 ) = sup(b2 ) = b.

Assumption 2 (Single Atoms at Extrema) If pi = P rob(bi = b) = Gi (b), and pi = P rob(bi = b) = 1 − limb→b− Gi (b), for i = 1, 2, then  min{p , p } = 0, and 1 2 min{p , p } = 0. 1 2

Assumption 3 (No Atoms In Between) For i = 1, 2, Gi (b) is continuously differentiable on (b, b). Assumption 4 (Monotonicity) For i = 1, 2, βi (v) ≥ βi (v ′ ) if v > v ′ . We can imply from these assumptions that there exist wi and wi that satisfy Fi (wi ) = pi and 1 − Fi (wi ) = pi . It is obvious that if pi = 0, then wi = v i , and that if pi = 0, wi = v i . The first derivative of Gi (b) is gi (b), and we know ∫b g (t)dt = Gi (b) − pi . We can assume further that the monotonicity property b i of bidding functions holds strictly on [wi , wi ], and βi (v) is differentiable. The next task is looking for this unique equilibrium. We first focus on the straightforward part. For vi ∈ [wi , wi ], the bidding function is strictly increasing, so an inverse bidding function ϕi (b) exists. The expected payoff of player 2

i after she receives a signal v and bids b is Πi (b, v) = pj {v − θj [(1 − k)b + kb]} + ∫

b

+ Πi (b, v) = (1 − θi )k

b



b b



b

b

{v − θj [(1 − k)b + kt]}gj (t)dt+

θi [(1 − k)t + kb]gj (t)dt + pj θi [(1 − k)b + kb]

Gj (t)dt − θi (1 − k)

∫ b

b

Gj (t)dt + (v − b)Gj (b)+ + θi kb + θi (1 − k)b,

where



Gj (b) = pj +

b b

gj (t)dt = Fj (ϕj(b) ),

and gj (b) = fj (ϕj(b) )ϕ′j (b). The first order condition is then ∂Πi (b, v) = (v − b)gj (b) − [1 + 2θi k − θi − k]Gj (b) + θi k = 0. ∂b Easy substitution and rearrangement give ϕ′j (b) =

[1 + 2θi k − θi − k]Fj (ϕj(b) ) − θi k . (v − b)fj (ϕj(b) )

(1)

Conducting the same computation for player j can give us another ordinary differential equation (ODE) like equation 1. Then we can compute βi (v) as the inverse function of ϕi (b). On other intervals, the strategy becomes apparent, for the bidding functions are continuous and Assumptions 1 and 2 are restrictive. Specifically, βi (v) = βi (wi ) for v ∈ [v i , wi ], and βi (v) = βi (wi ) for v ∈ [wi , v i ].

3

The Uniform Case

In this section, we study the behavior of players with symmetric uniform distribution. We assume vi ∼ U (0, 1) for i = 1, 2, and get the bidding function of player i on the interval [wi , wi ] with parameters θi and k, that is, βi (v; θi , k) =

v + 12 k(1 + 2θi k − k) . 2 + 2θi k − θi − k 3

(2)

Figure 1. Bidding Functions 1 0.9 0.8

Bidding Function of Player 1

0.7

b

0.6 0.5 0.4 0.3

Bidding Function of Player 2

0.2 0.1 0

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

v

Figure 1 shows the bidding functions when θ1 = 23 and k = 14 . Actually, it can be easily shown from Equation 2 that if only θ1 ≥ θ2 , β1 (v) ≥ β2 (v), that is, the one with the larger share always bids more aggressively than her competitor. From now on, we let θ1 ≥ θ2 , i.e., θ1 ≥ 21 for convenience, and study the efficiency of k + 1-bargaining by measuring the ex ante probability of inefficient allocations (IA). Tedious computation gives us 2 − θ1 + (θ1 − 12 )k(1 − k) 1 Prob(IA) = − . 2 2(1 + θ1 + k − 2θ1 k)(2 + 2θ1 k − θ1 − k) Observe that if θ1 = 12 , Prob(IA) = 0, and we has an efficient mechanism, no matter which value k takes. This result is a special case in Cramton et al. (1987). If θ1 ̸= 12 , Prob(IA) > 0. We compute the first order condition of an optimal k as [2 − θ1 + (θ1 − 12 )k(1 − k)][(θ1 − 2)2 + 2(θ1 − 12 )2 k(1 − k)] ∂Prob(IA) = · ∂k (1 + θ1 + k − 2θ1 k)2 (2 + 2θ1 k − θ1 − k)2 1 · (θ1 − )(2k − 1). (3) 2 On the left of Equation 3, the first two terms are both positive, and it is obvious that when k < 12 , Prob(IA) is decreasing in k, and that when k > 12 , Prob(IA) is increasing in k. So k = 12 minimizes our measure of inefficiency. This is consistent with previous seller-buyer bargaining models, for instance, in Chatterjee and Samuelson (1983). Myerson and Satterthwaite (1983) also show that in the symmetric uniform case, the split-the-difference bargaining (k = 12 ) is the optimal mechanism that maximizes expected total gains from trade when the object belongs to one of two players. Although first-price and 4

second-price auctions are popular in practice, they generally make an efficient trade least possible.

4

Experimental Evidence

4.1 Experiment Setup

We conducted experiments for understanding the behavioral side of the model above. Our experiments were conducted at the University of Bonn. Participants were recruited from the campus canteen and had no previous training in economics or game theory. Each participant played only one game and had to make exactly one decision. The subject was told, that she owned b ∈ {0, 1, 2, 3, 4} books of a 4-volumed dictionary and she would interact with another player, who owned the remaining 4 − b books of the same dictionary. Each participant was informed about her private value v for the whole dictionary, which was drawn from an uniform distribution from 0 to 10 Thalers. She was also informed, that the opponent private value followed the same uniform distribution. The participants were told that only, if she owned the complete dictionary she could realize this value v. The subject had to give an offer (sealed bid) how much she would like to pay for the 4 volumes. The payoff was calculated according to a first price (respectively second price auction): If the amount the opponent was willing to pay was higher than the subject’s bid, then the subject had to hand her volumes, and received a compensation of b/4, of the opponent’s bid in the case of the first price auction (her bid in the case of second price auction). In this case the subjects payoff was the compensation she got from its opponent in Thalers. If the subject’s bid was higher than the opponent’s bid, her payoff was the value v of the books minus the compensation she had to pay to her opponent. If both players bid the same price, the participant who got the complete dictionary would be drawn randomly with probability 1/2, which never happened during the experiment. Each subject got 0.5 EURO show-up fee. The conversion rate was 0.5 EURO per Thaler. We summarize the observations taken in Table 1. Table 1. Number of Observations For each Category 1

1

Arguments of the #() functions represents the category order.

5

We did not test categories 1 and 4, because rationally bidders would have just bid their own values, which sheds little light on the validity of our theory. Owing to the symmetric distribution of books in some cases, we cut observations into half. Overall, we had 160 participants, 20 for each of 8 tested types.

4.2 Experiment Result For each participant, we calculates the quadratic distances (bi −e(i,T ) )2 between her bid bi and the prediction e(i,T ) of the theory T . The theory set includes 9 different bidding behaviors for 12 categories. For each of the 8 types observed, we test whether their bids follows the right bidding behaviors against alternative ones. Table 2 shows that the results. Economics works! Table 2. Test of Fitness of Prediction 2

First result: except for category 2 and 3, our predictions are consistent enough to be better or no worse than alternatives in a statistical sense. There are only 4 players in category 2 bidding their own values, and only 1 bidding higher, implying that bad predictions in this categories are at large because players did not shed enough their bids from their values. For category 3, the prediction is that these owners set reserve prices higher than their private values, and 14 of them did so, and 5 others bid their own value. We do not have plausible explanation for this phenomenon. 2

***, **, or * denotes the significance level of 1%, 5%, or 10% respectively, to reject the Null hypothesis, that the alternative theory produces quadratic distances smaller or equal as those of our prediction with an one-sided Mann-Whitney U test. ˆˆˆ, ˆˆ, or ˆ denotes the contrary. - denotes, that the tests yield no significant result.

6

Second result: generally speaking, a theory for a first price category can easily reject alternative predictions from a second price category and vice versa. Moreover, the larger the book difference from the setting of the alternative theory to the right one, the easier the rejection, which is most evident for category 10. Third result: we are not able to legitimize the kinks like those in Figure 1. Kinks show up in theoretical predictions for category 10 and 11. With kinks, the mean squared distances are 1.45 and 4.21 respectively as in Table 1, but if we allow the bidding functions to straighten up, the squared distances drop to 0.68 and 1.54, sharp decreases if we take into account that the private values requiring kinks are exceptions rather than the rule. A tentative explanation is that the kinking behavior requires the players to reason that their opponents must not bid higher or lower than certain extreme values, which often fails as recorded by numerous experiments involving several levels of second guessing.

5

Discussion

While the two-player scenario is the most common, n-person cases are also worth considering. More importantly, it is interesting if players with zero shares enter the mechanism. The Internet may facilitate combining complementary goods. A consumer holding one piece can submit the information to certain websites, and wait for someone with its complement. Our model suggests split-the-difference bargaining as an optimal mechanism, but there is an alternative–the open auction among share-holders and pure buyers.

References Amann, E. and Leininger, W., Asymmetric all-pay auctions with incomplete information: the two-player case, Games and Ecnonomic Behavior 14(1996), 1-18. Chatterjee, K. and Samuelson, W., Bargaining under incomplete information, Operations Research, Vol. 31, No. 5(1983), 835-851. Cramton, P., Gibbons, R., and Klemperer, P., Dissolving a partnership efficiently, Econometrica 55(1987), 615-632. Lizzeri, A. and Persico, N., Uniqueness and existence of in equilibrium with a reserve price, Games and Economics Behavior 30(2000), 83-114. Maskin, E. and Riley, J., Uniqueness of equilibrium in sealed high-bid auctions, Games and Ecnonomic Behavior 45(2003), 395-409. Myerson, R.B. and Satterthwaite, M., Efficient mechanisms for bilateral trading, Economic Theory 158(1983), 265-281.

7

Google Sites Preprint

Jan 4, 2010 - bidding function, it is easy to compute the corresponding c.d.f. of the player's bid, and .... We assume vi ∼ U(0,1) for i = 1,2, and get the bidding function of player i .... certain websites, and wait for someone with its complement.

122KB Sizes 2 Downloads 183 Views

Recommend Documents

Author preprint
This effect is known as the shine-through effect, because the vernier seems to .... dominance, and a performance of 50% that both the vernier and the anti-vernier ..... A. Illustration of the sequences of vernier, anti-vernier and surround used in ..

Author preprint
Each participant was seated at a distance of 2 meters from the display. ... At SOAs outside the interval between -60 ..... The data show that only the baseline.

preprint - Mhbateni.com
He is also with Center for Computational Intractability, Princeton, NJ 08540. ..... For simplicity, we call vertices of V that belong to B(x,2∆1) “red”, and vertices of V ..... hicle routing problems, in Approximation, Randomization, and Combin

preprint
This is a preprint of a chapter for the book Reinforcement Learning: State of the ... understanding of psychology and neuroscience can inspire research in RL and machine learning in ... For example, the tone is presented briefly (500 ms).

Author preprint
was controlled by a PC via fast 16-bit DA converters. Line el- ..... The data show that only the baseline ..... Target recovery in metacontrast: The effect of contrast.

preprint - Mhbateni.com
∗Department of. Computer. Science,. Princeton. University,. Princeton,. NJ .... the k-Stroll problem is summarized in the following theorem: ..... vertex equals its out-degree, while the set (2) of constraints requires each subset U ⊂ V of vertic

Preprint - Catrin Campbell-Moore
revision theories for concepts that are concerned with real numbers, but also ..... We will call the associated revision sequences Closed Properties Revision Se- ...... to the organisers and participants at a number of conferences including:.

Preprint - Catrin Campbell-Moore
The proposal is only legitimate if the topology has certain properties, which are outlined in Section 2.1; that section is separated as some readers may wish to ...

Preprint
Oct 24, 2016 - study of social networks and in computer science, respectively. .... function I of a family of increasing trees defined by the degree function φ.

14-665 Chew (preprint).pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 14-665 Chew ...

Preprint - Catrin Campbell-Moore
Apr 21, 2015 - According to Caie's Accuracy Criterion June is rationally required to be in state c. Proof. U(Cr) = (. 1 − BS(w¬γ, Cr) if Crρ(γ)>0.5. 1 − BS(wγ, Cr).

Guida et al EJCP preprint
math problems in education (e.g., Cordova & Lepper, 1996; Davis-Dorsey, Ross, ...... Educational Technology Research and Development, 48, 49–59. Lopez ...

14-665 Chew (preprint).pdf
player (or singer) to be received by a human listener. Performing music. serves as one of the most visceral and direct forms of transmitting information. (knowledge, perceptions, needs, and desires) and eliciting emotion. responses, unencumbered by t

1 NOTE: This preprint is made available because the ... - CiteSeerX
Since the expressions for (16) are lengthy but easy to compute, we have ...... computationally intensive bootstrap to quantify uncertainty, see Jones [53]. It is.

PREPRINT – IN PRESS AT FRONTIERS: A JOURNAL ...
and maintain diversity in the College of Engineering. ... research to increase diversity within their college of engineering. ..... CA: AltaMira Press, 2005). 4.

1 NOTE: This preprint is made available because the ... - CiteSeerX
Building 13, Room 3W16,. 13 South Drive ... Index Terms — Diffusion tensor imaging, error propagation, covariance structures, diffusion tensor ..... be constructed analytically, is well defined only when the diffusion tensor contained within γ is 

This paper is a preprint (IEEE “accepted” status).
weight optimization leads to a strictly convex (and thus, good-natured) optimization problem. Finally, an .... of weight optimization and propose a corresponding optimization method. In Section 4 we focus on ..... changes in compression, when the ste

This paper is a preprint (IEEE “accepted” status).
made more or less accidentally due to limited calculation precision, which lead to a periodic rescaling of ..... heavy impact on processing speed and memory requirements. We now describe the outline of our approach .... the Broyden-Fletcher-Goldfab-S

March 9, 2012 16:44 Preprint submitted to IJCGA ... - GIPSA-lab
Mar 9, 2012 - Flag(G) \ K. We call these minimal simplices blockers. We prove ..... order 0 blocker. Fig. 3. Hasse diagram of K. a b c d e f abc abd acd bcd cdf ..... Write B(x, r) for the closed ball with center x and radius r and let U ⊂ RD. An Î

This is a preprint of a review article published in Human Genomics 1 ...
Email: [email protected]. There is now a wide .... With the availability of Java, HTML and TCL as cross-platform languages for GUI development, it is.

This is a preprint of a review article published in Human Genomics 1 ...
Methods for this type of data are usually termed “parametric” because an explicit ... A disadvantage of this position is that any new program will aspire to improve ...

archaeological sites
the debate, initiated in this journal, on local community participation [3]. A thorough analysis is made of this .... In the past ten years, overall knowledge of the World. Heritage Convention has increased among States Parties, ...... El texto se or

Google Sites
k 3 we have a nondegenerate bilinear form, given by (v, w). 3 ...... irreducible over L. Let E = L[X]/x;~(X), a degree three tieId extension of. L. Then L1/L;~ ~-+ ...

Web Sites You Can Trust
“Web Sites You Can Trust.” American Libraries, Aug. 2006: 36. Scale is for relative comparison. Don't use for health care decisions. Edited 19 Oct. 2008.) ... Science journals, newspapers. 4.52. 6. Author is associated with a reputable org? Googl