Bottleneck Routing Games on Grids. Costas Busch Rajgopal Kannan Alfred Samman Department of Computer Science Louisiana State University
|
|
- Joshua Hoover
- 6 years ago
- Views:
Transcription
1 Bottleneck Routing Games on Grids ostas Busch Rajgopal Kannan Alfred Samman Department of omputer Science Louisiana State University 1
2 Talk Outline Introduction Basic Game hannel Game xtensions 2
3 2-d Grid: n n n nodes n Used in: Multiprocessor architectures Wireless mesh networks can be extended to d-dimensions 3
4 ach player corresponds to a pair of source-destination dge ongestion ( e 1 ) 3 ( e 2 ) 2 Bottleneck ongestion: max ( e) 3 e 4
5 A player may selfishly choose an alternative path with better congestion Player ongestion i 3 i i i i Player ongestion: Maximum edge congestion along its path 5
6 Routing p is a collection of paths one path for each player Utility function for player : i pc ( p) i i congestion of selected path Social cost for routing : p S ( p) bottleneck congestion 6
7 We are interested in Nash quilibriums where every player is locally optimal p Metrics of equilibrium quality: Price of Stability S( p) min p S( p * ) Price of Anarchy S( p) max p S( p * ) * p is optimal coordinated routing with smallest social cost
8 Bends : number of dimension changes plus source and destination 6 8
9 Basic congestion games on grids Price of Stability: O(1) Price of Anarchy: (n) even with constant bends O(1) 9
10 Better bounds with bends hannel games: Path segments are separated according to length range Price of anarchy: O log n Optimal solution uses at most bends 10
11 There is a (non-game) routing algorithm with Olog n approximation ratio bends and Olog n Optimal solution uses arbitrary number of bends Final price of anarchy: O log 3 n 11
12 Solution without channels: Split Games channels are implemented implicitly in space Similar poly-log price of anarchy bounds 12
13 Some related work: Price of Anarchy Definition Koutsoupias Papadimitriou [STAS 99] Price of Anarchy O 1 for sum of congestion utilities [JAM 02] Arbitrary Bottleneck games [INFOOM 06] [TS 09]: Price of Anarchy NP-hardness O 13
14 Talk Outline Introduction Basic Game hannel Game xtensions 14
15 Stability is proven through a potential function defined over routing vectors: M( p) [ m m m m 1 2 k N ] number of players with congestion i k 15
16 In best response dynamics a player move improves lexicographically the routing vector Player ongestion 3 i i 1 [ ] [ ] M ( p) M ( p) 16
17 17 ] [ ) ( 1 1 N k k k m m m m m p M Before greedy move i k ] [ ) ( 1 1 N k k k m m m m m p M After greedy move i i k k ) ( ) ( p M p M
18 xistence of Nash quilibriums Greedy moves give lower order routings ventually a local minimum for every player is reached which is a Nash quilibrium 18
19 Price of Stability p min Lowest order routing : Is a Nash quilibrium Achieves optimal social cost S( p min ) S( p * ) S( p ) Price of Stability min S( p * ) 1 19
20 Price of Anarchy Optimal solution Nash quilibrium * 1 n / 2 Price of anarchy: n / 2 ( n) * High! 20
21 Talk Outline Introduction Basic Game hannel Game xtensions 21
22 log n channels hannel A j of length in range: holds path segments [2 j 2 j1 1] Row: A 3 A 2 A A 1 0 [23] [11] [47] [815] 22
23 different channels e 1 same channel 2 e ongestion occurs only with path segments in same channel 23
24 onsider an arbitrary Nash quilibrium p Path of player i i maximum congestion in path 24
25 In optimal routing p * : S ( p * ) * Optimal path of player must have a special edge with congestion i i 1 i Since otherwise: pc i ( p *) pc ( p) i i i 25
26 In Nash quilibrium social cost is: S( p) : dges of ongestion : Players that use edges 0 26
27 First expansion Special dges in optimal paths of 0 27
28 First expansion :Special dges of ongestion at least 1 1 : Players that use edges 1 28
29 Second expansion Special dges in optimal paths of 1 29
30 Second expansion :Special dges of ongestion at least : Players that use edges
31 31 In a similar way we can define: j j j j Players that use edges : at least ongestion of dges :Special We obtain expansion sequences:
32 Redefine expansion: j :Special dges of ongestion at least j which are the majority in some channel r and edges are sufficiently far in r : 2 r-1 1 j : Players that use edges j 32
33 33 * 1 a j j * 1 ) ( a j j j ) ( j j j
34 ( j j 1 j) * a If ( * log n) then k j1 j constant k n 2 ontradiction 34
35 Therefore: O( * log n) Price of anarchy: O( log n) O( log n) * 35
36 Tightness of Price of Anarchy Nash quilibrium ( n 2 ) ( ) Optimal solution * 1 Price of anarchy: ( n 2 ) ( ) * 36
37 Talk Outline Introduction Basic Game hannel Game xtensions 37
38 Split game A 0 A 1 A 2 A 3 A 0 A 1 A 2 A 3 2 n Price of anarchy: O( log ) 38
39 d-dimensional grid hannel game Price of anarchy: O d log n Split game Price of anarchy: O d 2 log 2 n 39
Bottleneck Routing Games on Grids
Bottleneck Routing Games on Grids Costas Busch, Rajgopal Kannan, and Alfred Samman Department of Computer Science, Louisiana State University, Baton Rouge, LA 70803, USA {busch,rkannan,samman}@csc.lsu.edu
More informationSelfish Caching in Distributed Systems: A Game-Theoretic Analysis
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,
More informationAlgorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy.
Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami games and the internet Basic idea: The internet is a huge experiment
More informationHow Bad is Selfish Routing?
How Bad is Selfish Routing? Tim Roughgarden and Éva Tardos Presented by Brighten Godfrey 1 Game Theory Two or more players For each player, a set of strategies For each combination of played strategies,
More informationAlgorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy
Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami warning, again 1 In the few remaining lectures, we will briefly
More informationGames in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University
Games in Networks: the price of anarchy, stability and learning Éva Tardos Cornell University Why care about Games? Users with a multitude of diverse economic interests sharing a Network (Internet) browsers
More informationNetwork games. Brighten Godfrey CS 538 September slides by Brighten Godfrey unless otherwise noted
Network games Brighten Godfrey CS 538 September 27 2011 slides 2010-2011 by Brighten Godfrey unless otherwise noted Demo Game theory basics Games & networks: a natural fit Game theory Studies strategic
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game
More informationNash equilibria in Voronoi Games on Graphs
Nash equilibria in Voronoi Games on Graphs Christoph Dürr, Nguyễn Kim Thắng (Ecole Polytechnique) ESA, Eilat October 07 Plan Motivation : Study the interaction between selfish agents on Internet k players,
More informationDynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing
Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing Stefan Schmid Distributed Computing Group Oberseminar TU München, Germany December 2007 Networks Neuron Networks DISTRIBUTED
More informationA Game-Theoretic Framework for Congestion Control in General Topology Networks
A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control
More informationTopics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks
Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks Sebastian Streg December 10, 2005 1 Introduction Efficiency in networks with lots of traffic is a serious problem
More informationDirect Routing: Algorithms and Complexity
Direct Routing: Algorithms and Complexity Costas Busch, RPI Malik Magdon-Ismail, RPI Marios Mavronicolas, Univ. Cyprus Paul Spirakis, Univ. Patras 1 Outline 1. Direct Routing. 2. Direct Routing is Hard.
More informationHow Bad is Selfish Traffic Routing
How Bad is Selfish Traffic Routing Malik Magdon-Ismail magdon@cs.rpi.edu (Joint Work with Costas Busch) July 6, 2006. Disclaimer: Theoretical talk; no theorems proved. Huge Numbers Many people believe,
More informationConstant Price of Anarchy in Network Creation Games via Public Service Advertising
Constant Price of Anarchy in Network Creation Games via Public Service Advertising Erik D. Demaine and Morteza Zadimoghaddam MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA 02139,
More informationApproximation Algorithms
Chapter 8 Approximation Algorithms Algorithm Theory WS 2016/17 Fabian Kuhn Approximation Algorithms Optimization appears everywhere in computer science We have seen many examples, e.g.: scheduling jobs
More informationNash Equilibrium Load Balancing
Nash Equilibrium Load Balancing Computer Science Department Collaborators: A. Kothari, C. Toth, Y. Zhou Load Balancing A set of m servers or machines. A set of n clients or jobs. Each job can be run only
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 29 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/7/2016 Approximation
More informationLoad Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes
More informationUnderstanding the Internet Graph. Christos H. Papadimitriou
Understanding the Internet Graph Christos H. Papadimitriou www.cs.berkeley.edu/~christos Goals To understand the Internet topology using tools from graph and game theory To contribute to the rigorous foundations
More informationAn Efficient Transformation for Klee s Measure Problem in the Streaming Model
An Efficient Transformation for Klee s Measure Problem in the Streaming Model Gokarna Sharma, Costas Busch, Ramachandran Vaidyanathan, Suresh Rai, and Jerry Trahan Louisiana State University Outline of
More informationDirect Routing: Algorithms and Complexity
Direct Routing: Algorithms and Complexity Costas Busch Malik Magdon-Ismail Marios Mavronicolas Paul Spirakis December 13, 2004 Abstract Direct routing is the special case of bufferless routing where N
More informationComputing Pure Nash Equilibria in Symmetric Action Graph Games
Computing Pure Nash Equilibria in Symmetric Action Graph Games Albert Xin Jiang Kevin Leyton-Brown Department of Computer Science University of British Columbia {jiang;kevinlb}@cs.ubc.ca July 26, 2007
More informationTowards Load Balanced Distributed Transactional Memory
Towards Load Balanced Distributed Transactional Memory Gokarna Sharma and Costas Busch Louisiana State University Euro-Par 12, August 31, 2012 Distributed Transactional Memory (DTM) Transactions run on
More informationLecture Notes on Congestion Games
Lecture Notes on Department of Computer Science RWTH Aachen SS 2005 Definition and Classification Description of n agents share a set of resources E strategy space of player i is S i 2 E latency for resource
More informationStrategic Network Formation
Strategic Network Formation Zhongjing Yu, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming What s meaning of Strategic Network Formation? Node : a individual.
More informationAlgorithmic Game Theory - Introduction, Complexity, Nash
Algorithmic Game Theory - Introduction, Complexity, Nash Branislav Bošanský Czech Technical University in Prague branislav.bosansky@agents.fel.cvut.cz February 25, 2018 About This Course main topics of
More informationConvergence Issues in Competitive Games
Convergence Issues in Competitive Games Vahab S Mirrokni 1, Adrian Vetta 2 and A Sidoropoulous 3 1 Computer Science and Artificial Intelligence Laboratory (CSAIL), MIT mail: mirrokni@theorylcsmitedu 2
More informationComplexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games
Algorithmic Game Theory Complexity of pure Nash equilibria We investigate the complexity of finding Nash equilibria in different kinds of congestion games. Our study is restricted to congestion games with
More informationFast Convergence of Regularized Learning in Games
Fast Convergence of Regularized Learning in Games Vasilis Syrgkanis Alekh Agarwal Haipeng Luo Robert Schapire Microsoft Research NYC Microsoft Research NYC Princeton University Microsoft Research NYC Strategic
More informationStrong Equilibrium in Cost Sharing Connection Games
Strong Equilibrium in Cost Sharing Connection Games Amir Epstein School of Computer Science Tel-Aviv University Tel-Aviv, 69978, Israel amirep@tau.ac.il Michal Feldman School of Computer Science The Hebrew
More informationApproximation-stability and proxy objectives
Harnessing implicit assumptions in problem formulations: Approximation-stability and proxy objectives Avrim Blum Carnegie Mellon University Based on work joint with Pranjal Awasthi, Nina Balcan, Anupam
More informationA Game Theoretic Analysis of Network Design with Socially-Aware Users
A Game Theoretic Analysis of Network Design with Socially-Aware Users Jocelyne Elias, Fabio Martignon, Konstantin Avrachenkov, Giovanni Neglia Abstract In many scenarios network design is not enforced
More informationThe Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2349 The Price of Selfishness in Network Coding Jason R. Marden, Member, IEEE, and Michelle Effros, Fellow, IEEE Abstract A game-theoretic
More informationThe Price of Anarchy in Network Creation Games
The Price of Anarchy in Network Creation Games ERIK D. DEMAINE MIT, Cambridge, Massachusetts MOHAMMADTAGHI HAJIAGHAYI 1 AT&T Labs Research, Florham Park, New Jersey HAMID MAHINI Sharif University of Technology,
More informationMechanisms for Internet Routing: A Study 1
Mechanisms for Internet Routing: A Study 1 Aditya Akella Shuchi Chawla 3 Srini Seshan 4 July, 00 CMU-CS-0-163 School of Computer Science Carnegie Mellon University Pittsburgh, PA 1513 Abstract In this
More informationNetwork Topology and Equilibrium Existence in Weighted Network Congestion Games
Network Topology and Equilibrium Existence in Weighted Network Congestion Games Igal Milchtaich, Bar-Ilan University August 2010 Abstract. Every finite noncooperative game can be presented as a weighted
More informationOptimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram and Saurabh Bagchi School of Electrical and Computer Engineering
More informationIntroduction to algorithmic mechanism design
Introduction to algorithmic mechanism design Elias Koutsoupias Department of Computer Science University of Oxford EWSCS 2014 March 5-7, 2014 Part I Game Theory and Computer Science Why Game Theory and
More informationTHE PRICE OF STABILITY FOR NETWORK DESIGN WITH FAIR COST ALLOCATION
THE PRICE OF STABILITY FOR NETWORK DESIGN WITH FAIR COST ALLOCATION ELLIOT ANSHELEVICH, ANIRBAN DASGUPTA, JON KLEINBERG, ÉVA TARDOS, TOM WEXLER, AND TIM ROUGHGARDEN Abstract. Network design is a fundamental
More informationDifferent Optimal Solutions in Shared Path Graphs
Different Optimal Solutions in Shared Path Graphs Kira Goldner Oberlin College Oberlin, OH 44074 (610) 324-3931 ksgoldner@gmail.com ABSTRACT We examine an expansion upon the basic shortest path in graphs
More informationHedonic Clustering Games
Hedonic Clustering Games [Extended Abstract] Moran Feldman CS Dept., Technion Haifa, Israel moranfe@cs.technion.ac.il Liane Lewin-Eytan IBM Haifa Research Lab. Haifa, Israel lianel@il.ibm.com Joseph (Seffi)
More informationMinimizing the Diameter of a Network using Shortcut Edges
Minimizing the Diameter of a Network using Shortcut Edges Erik D. Demaine and Morteza Zadimoghaddam MIT Computer Science and Artificial Intelligence Laboratory 32 Vassar St., Cambridge, MA 02139, USA {edemaine,morteza}@mit.edu
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch, Member, IEEE, Malik Magdon-Ismail, Member, IEEE, Jing Xi 1 Abstract In the oblivious path selection problem, each packet in the network independently
More informationWelcome to the course Algorithm Design
Welcome to the course Algorithm Design Summer Term 2011 Friedhelm Meyer auf der Heide Lecture 13, 15.7.2011 Friedhelm Meyer auf der Heide 1 Topics - Divide & conquer - Dynamic programming - Greedy Algorithms
More informationDesigning Network Protocols for Good Equilibria
Designing Network Protocols for Good Equilibria Ho-Lin Chen Tim Roughgarden Gregory Valiant May 25, 2009 Abstract Designing and deploying a network protocol determines the rules by which end users interact
More informationGIAN Course on Distributed Network Algorithms. Network Topologies and Interconnects
GIAN Course on Distributed Network Algorithms Network Topologies and Interconnects Stefan Schmid @ T-Labs, 2011 The Many Faces and Flavors of Network Topologies Gnutella P2P. Social Networks. Internet.
More informationThe Query Complexity of Correlated Equilibria
The Query Complexity of Correlated Equilibria Sergiu Hart September 2015 SERGIU HART c 2015 p. 1 The Query Complexity of Correlated Equilibria Sergiu Hart Center for the Study of Rationality Dept of Mathematics
More informationThe Complexity of Computing the Solution Obtained by a Specifi
The Complexity of Computing the Solution Obtained by a Specific Algorithm Paul W. Department of Computer Science University of Oxford, U. K. LSE Oct 2013 Starting-point It is PSPACE-complete to find any
More informationCooperation in Multi-Organization Scheduling
Cooperation in Multi-Organization Scheduling Fanny Pascual ½, Krzysztof Rzadca, Denis Trystram ½ INRIA Rhône-Alpes, France LIG Grenoble University, France Polish-Japanese Institute of Information Technology,
More informationTHE PRICE OF ANARCHY IN COOPERATIVE NETWORK CREATION GAMES
Symposium on Theoretical Aspects of Computer Science 2009 (Freiberg, Germany), pp. to appear www.stacs-conf.org THE PRICE OF ANARCHY IN COOPERATIVE NETWORK CREATION GAMES ERIK D. DEMAINE 1 AND MOHAMMADTAGHI
More informationCompetitive Routing over Time
Competitive Routing over Time Martin Hoefer Vahab S. Mirrokni Heiko Röglin Shang-Hua Teng June 7, 2011 Abstract Congestion games are a fundamental and widely studied model for selfish allocation problems
More informationCooperative Computing for Autonomous Data Centers
Cooperative Computing for Autonomous Data Centers Jared Saia (U. New Mexico) Joint with: Jon Berry, Cindy Phillips (Sandia Labs), Aaron Kearns (U. New Mexico) Outline 1) Bounding clustering coefficients
More informationHighway Dimension and Provably Efficient Shortest Paths Algorithms
Highway Dimension and Provably Efficient Shortest Paths Algorithms Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Joint with Ittai Abraham, Amos Fiat, and Renato
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationApproximation Algorithms for NP-Hard Clustering Problems
Approximation Algorithms for NP-Hard Clustering Problems Ramgopal R. Mettu Dissertation Advisor: Greg Plaxton Department of Computer Science University of Texas at Austin What Is Clustering? The goal of
More informationTolls for heterogeneous selfish users in multicommodity networks and generalized congestion games
Tolls for heterogeneous selfish users in multicommodity networks and generalized congestion games Lisa Fleischer Kamal Jain Mohammad Mahdian Abstract We prove the existence of tolls to induce multicommodity,
More informationROUTING PROTOCOLS WITH SMALLEST MAXIMAL LATENCY
PERIODICA POLYTECHNICA SER. EL. ENG. VOL. 49, NO. 3 4, PP. 209 221 (2005) ROUTING PROTOCOLS WITH SMALLEST MAXIMAL LATENCY Gábor KURUC and Krisztina LÓJA Vodafone Hungary Co. e-mail: gabor.kuruc@vodafone.com
More informationGIAN Course on Distributed Network Algorithms. Network Topologies and Local Routing
GIAN Course on Distributed Network Algorithms Network Topologies and Local Routing Stefan Schmid @ T-Labs, 2011 GIAN Course on Distributed Network Algorithms Network Topologies and Local Routing If you
More informationHierarchical Network Formation Games
Hierarchical Network Formation Games Orna Kupferman 1 and Tami Tamir 2 1 School of Engineering and Computer Science, Hebrew University, Jerusalem, Israel. 2 School of Computer Science, The Interdisciplinary
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 15, 2011 SURVEY: MAC Layer Misbehavior Announcements I'd like to talk with each project team in the next week to get a quick progress update
More informationTechnical University of Denmark
Technical University of Denmark Written examination, May 7, 27. Course name: Algorithms and Data Structures Course number: 2326 Aids: Written aids. It is not permitted to bring a calculator. Duration:
More informationApplications. Oversampled 3D scan data. ~150k triangles ~80k triangles
Mesh Simplification Applications Oversampled 3D scan data ~150k triangles ~80k triangles 2 Applications Overtessellation: E.g. iso-surface extraction 3 Applications Multi-resolution hierarchies for efficient
More informationDATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007
DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS A Thesis by Hoang Dang Bachelor of Arts, Lakeland College, 2007 Submitted to the Department of Electrical Engineering and Computer Science
More informationNetwork Formation Among Selfish Energy-Constrained Wireless Devices
Network Formation Among Selfish Energy-Constrained Wireless Devices Hithesh Nama, Narayan Mandayam, Roy Yates WINLAB, Rutgers University 671 Route 1 South, North Brunswick, NJ 08902 Email: {hithesh, narayan,
More informationApproximation Algorithms
Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.
More informationKey question: how to set CongestionWindow which, in turn, affects ARQ s sending rate? linear increase/exponential decrease AIMD
TCP congestion control Recall: EffectiveWindow = MaxWindow (LastByteSent LastByteAcked) where MaxWindow = min{ AdvertisedWindow, CongestionWindow } Key question: how to set CongestionWindow which, in turn,
More information6. Tabu Search. 6.3 Minimum k-tree Problem. Fall 2010 Instructor: Dr. Masoud Yaghini
6. Tabu Search 6.3 Minimum k-tree Problem Fall 2010 Instructor: Dr. Masoud Yaghini Outline Definition Initial Solution Neighborhood Structure and Move Mechanism Tabu Structure Illustrative Tabu Structure
More informationIntroduction to Parallel Computing
Introduction to Parallel Computing George Karypis Sorting Outline Background Sorting Networks Quicksort Bucket-Sort & Sample-Sort Background Input Specification Each processor has n/p elements A ordering
More informationOnline algorithms for clustering problems
University of Szeged Department of Computer Algorithms and Artificial Intelligence Online algorithms for clustering problems Ph.D. Thesis Gabriella Divéki Supervisor: Dr. Csanád Imreh University of Szeged
More informationAnarchy is free in network creation
Anarchy is free in network creation Ronald Graham Linus Hamilton Ariel Levavi Po-Shen Loh Abstract The Internet has emerged as perhaps the most important network in modern computing, but rather miraculously,
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationAnarchy is Free in Network Creation
Anarchy is Free in Network Creation Ronald Graham 1, Linus Hamilton 2, Ariel Levavi 1, and Po-Shen Loh 2 1 Department of Computer Science and Engineering, University of California, San Diego, La Jolla,
More informationCoordination Mechanisms
Coordination Mechanisms George Christodoulou Elias Koutsoupias Akash Nanavati Abstract We introduce the notion of coordination mechanisms to improve the performance in systems with independent selfish
More informationProject: A survey and Critique on Algorithmic Mechanism Design
Project: A survey and Critique on Algorithmic Mechanism Design 1 Motivation One can think of many systems where agents act according to their self interest. Therefore, when we are in the process of designing
More informationNP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]
NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Dealing with NP-Complete Problems Dealing with NP-Completeness Suppose the problem you need to solve is NP-complete. What
More informationICS 161 Algorithms Winter 1998 Final Exam. 1: out of 15. 2: out of 15. 3: out of 20. 4: out of 15. 5: out of 20. 6: out of 15.
ICS 161 Algorithms Winter 1998 Final Exam Name: ID: 1: out of 15 2: out of 15 3: out of 20 4: out of 15 5: out of 20 6: out of 15 total: out of 100 1. Solve the following recurrences. (Just give the solutions;
More informationÕ(Congestion + Dilation) Hot-Potato Routing on Leveled Networks. Costas Busch. Rensselaer Polytechnic Institute
Õ(Congestion + Dilation) Hot-Potato Routing on Leveled Networks Costas Busch Rensselaer Polytechnic Institute 1 Talk Outline Leveled Networks Congestion + Dilation Hot-Potato Routing Our Algorithm Future
More informationDetection and Mitigation of Cyber-Attacks using Game Theory
Detection and Mitigation of Cyber-Attacks using Game Theory João P. Hespanha Kyriakos G. Vamvoudakis Correlation Engine COAs Data Data Data Data Cyber Situation Awareness Framework Mission Cyber-Assets
More informationIP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing
IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure
More informationPerformance-oriented Congestion Control
Performance-oriented Congestion Control Mo Dong, Qingxi Li, Doron Zarchy*, P. Brighten Godfrey and Michael Schapira* University of Illinois at Urbana Champaign *Hebrew University of Jerusalem Qingxi Li
More informationCOMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section (CLRS)
COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section 35.1-35.2(CLRS) 1 Coping with NP-Completeness Brute-force search: This is usually only a viable option for small
More informationApproximation Algorithms
18.433 Combinatorial Optimization Approximation Algorithms November 20,25 Lecturer: Santosh Vempala 1 Approximation Algorithms Any known algorithm that finds the solution to an NP-hard optimization problem
More informationNetworks: A Deterministic Approach with Constant Overhead
Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette
More informationOver-contribution in discretionary databases
Over-contribution in discretionary databases Mike Klaas klaas@cs.ubc.ca Faculty of Computer Science University of British Columbia Outline Over-contribution in discretionary databases p.1/1 Outline Social
More informationCS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness
CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's
More informationGraph Theoretic Models for Ad hoc Wireless Networks
Graph Theoretic Models for Ad hoc Wireless Networks Prof. Srikrishnan Divakaran DA-IICT 10/4/2009 DA-IICT 1 Talk Outline Overview of Ad hoc Networks Design Issues in Modeling Ad hoc Networks Graph Theoretic
More informationMIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns
MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.
More information15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015
15-451/651: Design & Analysis of Algorithms November 4, 2015 Lecture #18 last changed: November 22, 2015 While we have good algorithms for many optimization problems, the previous lecture showed that many
More informationSDSU CS 662 Theory of Parallel Algorithms Networks part 2
SDSU CS 662 Theory of Parallel Algorithms Networks part 2 ---------- [To Lecture Notes Index] San Diego State University -- This page last updated April 16, 1996 Contents of Networks part 2 Lecture 1.
More informationNetwork Improvement for Equilibrium Routing
Network Improvement for Equilibrium Routing UMANG BHASKAR University of Waterloo and KATRINA LIGETT California Institute of Technology Routing games are frequently used to model the behavior of traffic
More informationCS270 Combinatorial Algorithms & Data Structures Spring Lecture 19:
CS270 Combinatorial Algorithms & Data Structures Spring 2003 Lecture 19: 4.1.03 Lecturer: Satish Rao Scribes: Kevin Lacker and Bill Kramer Disclaimer: These notes have not been subjected to the usual scrutiny
More informationResource Allocation Polytope Games: Uniqueness of Equilibrium, Price of Stability, and Price of Anarchy
Resource Allocation Polytope Games: Uniqueness of Equilibrium, Price of Stability, and Price of Anarchy Swapnil Dhamal, Walid Ben-Ameur, Tijani Chahed, Eitan Altman To cite this version: Swapnil Dhamal,
More informationSpanning Tree. Lecture19: Graph III. Minimum Spanning Tree (MSP)
Spanning Tree (015) Lecture1: Graph III ohyung Han S, POSTH bhhan@postech.ac.kr efinition and property Subgraph that contains all vertices of the original graph and is a tree Often, a graph has many different
More informationImproved Equilibria via Public Service Advertising
Carnegie Mellon University Research Showcase @ CMU Computer Science Department School of Computer Science 1-2009 Improved Equilibria via Public Service Advertising Maria-Florina Balcan Carnegie Mellon
More informationLocal and Global Stability of Symmetric Heterogeneously- Delayed Control Systems
Local and Global Stability of Symmetric Heterogeneously- Delayed Control Systems Yueping Zhang and Dmitri Loguinov Department of Computer Science Texas A&M University College Station, TX 77843 1 Outline
More informationThe Simplex Algorithm for LP, and an Open Problem
The Simplex Algorithm for LP, and an Open Problem Linear Programming: General Formulation Inputs: real-valued m x n matrix A, and vectors c in R n and b in R m Output: n-dimensional vector x There is one
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule
More information