IITDelhi Notes
IITDelhi Notes
Example of work at J.P. Morgan - There were regulatory fines on J.P. Morgan was imposed
by the federal reserve to block trade with a few firms, which it failed to achieve. One of the
major impediments that the company faced was it was unable to recognise the Client’s
identity at the ground level. The application that we use is called party central to filter all the
client’s data and our complete data is stored in RDM (Reference Data Mart). I first sorted
both datasets alphabetically.
I used Levenshtein distance to recognise the client’s identity. The words were broken into
single character tokens to do so. Then I matched both the lists. The Levenshtein distance
between two words is the minimum number of single-character edits like insertions, deletions
or substitutions required to change one word into another. The lower the distance, the better
the match. After performing the UAT testing I concluded that the threshold should be 3 or
below to consider it as a match, which was a feature pushed into production.
Pursuing a PhD in Computational Social Choice Theory will provide me better professional
opportunities, especially at an Investment Bank. Additionally, a PhD is much more difficult
than other courses like pursuing FRM and CFA which makes a person with a PhD much
more competitive than those courses, as the number of PhDs is likely to remain low.
Blockchain protocols such as Bitcoin and Ethereum have finite processing power, so when
demand for transaction processing exceeds the available supply, a strict subset of the
submitted transactions must be chosen for processing. To encourage the selection of the
“most valuable” transactions, the transactions chosen for processing are typically charged a
transaction fee. The component of a blockchain protocol responsible for choosing the
transactions to process and what to charge for them is called its transaction fee mechanism
(TFM).
Maximal Extractable Value (MEV): It is the maximum value that can be extracted from block
production in excess of the transaction fee.
I worked on a research project at J.P. Morgan where our team experimented on the
Ethereum mainnet. The objective of the study was to understand constraints of MEV. The
team made few observations in the study. In the case of MEV extraction, no non-trivial
transaction fee mechanism can be simultaneously incentive compatible for both users and
active block producers.
Building upon this understanding, I will work on a model of block production, distinguishing
between ”searchers” and ”proposers.” Searchers actively identify opportunities for value
extraction from the application layer, acting as an ”MEV oracle” for transaction fee
mechanisms.
Definitions
Mechanism design is the study of setting rules of the game given the desired
objects/outcomes.
The private preference over the set of possible outcomes is called the type of agent
Social choice theory is the field of scientific inquiry that studies the aggregation of individual
preferences toward a collective choice.
Efficiency implies that the total value of agents is maximised in all the states.
Passive block producers: Block producers who do not extract MEV. Active block producers:
Block producers who extract MEV
Private Value Model: The preference of each agent i.e. type is his preference over the set of
possible outcomes for the agent, which is completely known to him and private information
to her. This is called the private values model in mechanism design.
Non-trivial - Users must at least in some cases pay a nonzero amount for transaction
inclusion.
Incentive Compatible for users: Dominant Strategy Incentive Compatible (DSIC) - A direct
mechanism is dominant strategy incentive compatible (DSIC) if for every agent, the
truth-telling strategy is a dominant strategy.
Trusted hardware and cryptographic techniques means to detect the tampering of block data
and flagging it or to flag MEV detection.
Revelation principle is a central result in mechanism design. One of its implications is that if
we wish to find out what social choice functions can be implemented in dominant strategies,
we can restrict attention to direct mechanisms. This is because, if some non-direct
mechanism implements a social choice function in dominant strategies, the revelation
principle says that the corresponding direct mechanism is also DSIC.
MEV Oracle is a system designed to capture value created by block specific situations on a
blockchain.
Normal Distribution
Continuous means that the random variable can take on any value within a certain range.
Symmetrical means that the left half of the normal curve is a mirror image of the right half.
Unimodal means only one peak or point of maximum frequency that points in the middle of
the curve.
The curve is asymptotic. Asymptotic means that the tails of the distribution never intersect
with the X axis. It is Important because it means that it is possible for even very extreme
values to occur by chance, at least in theory. It signifies that extreme values become
increasingly unlikely as we move away from the mean, but they are never impossible
according to the normal distribution. This property makes the normal curve particularly useful
for modelling phenomena where extreme events are possible but rare.
The Central Limit Theorem states that the sum of the independent random variables tends
toward a normal distribution, regardless of the distribution of the original variables.