Internet Routing Games

Size: px
Start display at page:

Download "Internet Routing Games"

Transcription

1 CS498: UnderGraduate Project Internet Routing Games Submitted by: Pranay Borkar Roll no.: Mentored by: Prof. Sunil Simon Dept. of Computer Science and Engineering Indian Institute of Technology,Kanpur

2 Abstract Weakly acyclic games consist of classes of games in which certain global update dynamics guarantee to converge to Nash Equilibrium. We study in detail a subclass of weakly acyclic games - routing games introduced by Fabrikant, Papadimitriou(1) and Levin et al.(2) which explains the important aspects of routing on internet. In synchronous setting, we propose a scheduler that selects a set of players to deviate to their better response strategies such that we get a Nash Equilibrium in. We also design a distributed algorithm that follows the proposed scheduler using multiple token passing between the nodes. 1 Introduction In Game theory, convergence of a game to pure strategy Nash equilibrium is the most important objective. This objective is achieved by various simple and obvious dynamics like better response dynamics or best response dynamics. In these dynamics, at each step, a single player deviates from current strategy to new strategy that increases its utility. The convergence of games to Nash equilibrium under such dynamics is much studied in game theory. In the better or best response dynamics, weakly acyclic games is a class of games in which, for every strategy profile, there exist a improvement path to the Nash equilibrium. Potential games are weakly acyclic games in which the best response or better response dynamics guarantee to converge to a pure Nash equilibrium irrespective of the starting strategy profile. There is a lot of research on potential games. The class of weakly acyclic games is much broader than potential games. There are very few classes of games known that are weakly acyclic and not potential. One such famous class is of Rosenthal s congestion games in which player utilities are player specific. Our focus mainly is on a different kind of environment: routing on Internet. The Border Gateway Protocol(BGP) is protocol used to establish routes between different users on the internet. There have been advances in BGP obtained through game theoretic analyses. Fabrikant and Papadimitriou and, indepently Levin et al. stated that the BGP is a best response dynamics in routing games and the Pure Nash equilibrium in such games corresponds to stable routing in the network. In game theoretic framework, players are the source nodes that lie on a graphical network which aim to s their traffic to a unique destination on the Graph. Every node s neighbors is the strategy space of the player. 1

3 2 Model (This section contains definitions from (3)) In this class of games, the players are source nodes on a network G = (V, E). The players wish to s traffic to a unique destination node d. Each source node(player) i s strategy is to select an outgoing edge e i E(G) to forward the traffic or empty set φ(not forwarding the traffic). Therefore S i = {(u, v) φ (u, v) E and u = i} The strategy profiles s S in this game will be a directed subgraph (G s ) of the original graph G with each source node having a out-degree of at most one. For a given strategy profile s S induced route of a source node i, R s i is defined as the unique simple route to destination d in the subgraph if it exists or otherwise. Define the set of all possible paths from a source node i to the destination d as P i i.e. P i = s S Rs i. Each source node i has a routing policy with following two components:- ranking function π i that maps elements of P i to integers such that π i ( ) = 0 and π i (R) > 0 for R P i export policy that, for each neighboring node j V (G), specifies the set of routes R ij P i that a player i is willing to make available to j. To simplify notations, denote π i (R) < π i (Q) by R < i Q. A route R P i is permitted if each node on R is willing to export its sub-routes predecessor on R. Now, for a strategy profile s,the utility function is defined as :- π i (Ri s ) If Rs i is permitted and Rs i is not u i (s) = 0 If s i = φ 1 Otherwise We consider export all policy for the following discussions. Consider a general case of Internet Routing case in which every player deviates simultaneously to a better strategy(local update). For this case we show that even if there exist a Nash Equilibrium in the game, the simultaneous local update mechanism does not converge to Nash Equilibrium. Consider a game shown by following Graph. 2

4 A B D C The Player in this Graph are source nodes A,B,C and D is the destination node. Consider export all policy for this game and the ranking function for individual nodes as ffollows: For player A: ABD > A AD For player B: For player C: BCAD > A CABD > A BD CAD The Nash Equilibriums in this Game are s 1 = (AB,BD,CA) and s 2 = (AD,BC,CA). Consider the current strategy profile is (AD,BD,CA). The possible simultaneous deviations by the players A and B are to strategies AB and BC respectively, which makes strategy profile to be (AB,BC,CA). Again the simultaneous deviations of A and B lead to strategy profile (AB,BD,CA). This is the profile where we started. Thus, this process won t converge and will continue forever. Now, define policy consistency for the ranking of paths by every individual player. Definition 2.1. Policy Consistency: Let i and j be two adjacent source nodes in G. The source node i is said to be policy consistent with j iff for every two routes Q, R P j such that i / Q, R, if R < j Q, then (i, j)r < i (i, j)q. If all the nodes are policy consistent with its neighbors and export all policy is followed, we say that policy consistency holds. Theorem 2.1. Consider synchronous setting for policy consistent Internet Routing Game. Consider a process of choosing a subset of players from a given strategy profile (s) to deviate to their better response strategy to get strategy profile (s ) such that, 3

5 any of the player connected to the destination in (s) is also connected to destination in the (s ), This process will converge to some Nash Equilibrium Proof. Consider the sum of utilities of all the players in a strategy profile as the progress function i.e. N φ(s) = u i (s) i=1 Now, consider we are in strategy profile s and we choose players that deviate as per our conditions to get strategy profile s. Choose any player i from the set of players. We have two cases: Case 1: i did not deviate its strategy in s. In the path from node to destination, Rs, i say no node deviated to any other strategy. Thus, Rs i = Ri s which implies u i (s ) = u i (s). On the other hand say that some node j on the Rs i deviated. Therefore for that player j, we have Rs j < j R j s. Also, i / R j s (or it will form a cycle and will disconnect j from destination), so by policy consistency, Rs i > i Rs i which implies u i (s ) > u i (s). Similarly, argument can be exted when more than one player on R ( s) i deviated which implies u i (s ) > u i (s). Thus, for this case u i (s ) u i (s). Case 2: i deviated its strategy in s. In this case say only player i deviated from its strategy to get path P i thus, Rs i < i P i. Say some other nodes on this path P i also deviated to get a path Rs i. Thus, by the argument given in case 1, Rs i > i Rs i which implies u i (s ) > u i (s). From case 1 and 2, utility function of any player either increases or remains same therefore, φ(s ) φ(s). φ(s ) will be equal to φ(s) when no player has deviated(nash equilibrium). Therefore, for other strategy profiles φ(s ) > φ(s). Also, as the game is finite and utilities of players have upperbound, φ(s) has a upperbound of argmax N s i=1 u i(s). Hence the process will converge to some Nash Equilibrium. 3 Scheduler The concept of scheduler was first introduced in (4). We define a scheduler function F : S A {A N}. For a strategy profile s only players i A will deviate to some of their better response strategies such that no player - connected to the destination in current strategy profile(s) - is disconnected from the destination in 4

6 the following strategy profile(s ). Theorem 3.1. For any strategy profile (s S) which is not a Nash Equilibrium, the set A is non empty. Proof. For strategy profiles in which every player is not connected to the destination, the set A will always have players not connected to the destination. In the case when every player is connected to destination, there will be at least 1 player(say i) who wants to deviate to some better response strategy as the strategy profile is not Nash Equilibrium. If player i wants to deviate to some other strategy such that its path to destination changes from Rs i to P then, i / P otherwise it will disconnect the player i. Say only player i deviates in strategy profile(s) to get strategy profile (s ). Now for any player j, if i / Rs j then, R j s = Rs, j thus j is still connected to the destination. For players j, if i Rs j then, j is connected to destination as the route from j to i is not changed and i is connected to the destination. Thus, for any strategy profile which is not a NE, the set A will have atleast 1 element. This implies that for any strategy profile, the scheduler will always be able to give a non empty set of players as output. 4 Distributed Algorithm following Scheduler In the network, we have N+1 nodes(n players and 1 destination) and N edges(1 strategy of each player). Assume that out of N, k players are connected to the destination. Consider G to be the subgraph of these k players and destination. Subgraph G has k+1 nodes and k edges(minimum this subgraph can have to be connected). If some of these k nodes are disconnected from the destination, it should be the case that the disconnected nodes form a cycle as the number of nodes and edges remain same. So, while designing a distributed algorithm we have to be sure that a cycle is never formed in the graph. 4.1 Initialization: First we start with a graph where every node is connected to the destination. To do so, run the following algorithm on every node i with connected as boolean variable: 5

7 Algorithm 1: Initial algorithm at every node while connected==false do for j in neighbor(i) do if j.connected == true then currstrat = j; connected = true; 4.2 Algorithm We need to do updates such that no node gets disconnected from the destination in the strategy profile that follows Variables and methods At every node we maintain some variables as follows:- visited : boolean variable to check if the node is visited in current traversal. active : boolean variable to check if the node is currenty active. ancestors : list of all node that have path to destination going through this node. curr strat : it stores the current strategy of the player dev strat : it stores the strategy that player want to deviate to or, value of curr strat if it does not want to deviate. Also, the player has knowledge about its neighbors and state of the game. Assume procedures that can be called from any node as follows: 1. changeneighborvar() : It takes three arguments- node, variable and value. For a neighboring node node, it sets variable to value. 2. get() : It takes two arguments node, variable and returns the value of the variable of the node. 6

8 4.2.2 Token initialization Assume that all the selected players deviate their strategy at clock ticks t 1, t 2, t 3,... such that difference between t n and t n+1 is constant tdiff. Token initialization is done every time on the clock tick once the players have finished updating their strategies. For initializing token, we maintain a underlying cyclic graph structure and every-time select next node which wants to deviate. This can be viewed as Queue with every node going from front to back. Assume procedure next node(), that sets the active bit for the node that initializes the token propogation according to the above mentioned underlying graph. Algorithm 2: Algorithm at every node at clock ticks if time-prevtick = tdiff then if deviationpermitted then curr strat = dev strat; deviationpermitted = false; active = false; visited = false; next node(); Token passing Currently active node passes token to its current strategy as well as the strategy it wants to deviate to. Also the ancestor list of the nodes is updated accordingly. The variable visited is maintained to restrict the number of tokens visiting a particular node to 1. In case two different tokens visits a node, there may be a case that node gets disconnected from the destination. 7

9 Algorithm 3: Algorithm at every node when there is no clock tick if active then visited = true; if dev strat not in ancestors and get(dev strat,visited)== false then changeneighbor(dev strat,active,true); changeneighbor(dev strat,ancestor,ancestor+curr node); changeneighbor(curr strat,active,true); changeneighbor(curr strat,ancestor,ancestor+curr node); /* note here that the third argument will be list of ancestors of the current node plus the current node */ deviationpermitted = true; active = false; 4.3 Proof of Algorithm In this algorithm a cycle is never formed, as a node never deviates to a node that has a path or will have path in next strategy profile to destination that goes through current node. Thus a node connected to destination is never disconnected. Also at every clock tick atleast one node deviates to the better response thus the set A as defined in the section 3 while defining scheduler is never empty. Thus the proposed algorithm follows the scheduler defined. 5 Conclusion: We looked closely at various sub-classes of weakly acyclic games. Internet routing games was studied in detail. With some observation about the simultaneous deviations of the players, we proposed a scheduler that selects subset of players to deviate at a time such that we reach Nash Equilibrium. A distributed algorithm was then designed to follow the proposed scheduler with help of token passing. The algorithm uses a underlying cycle to initialize the token. This algorithm can be further improved so that it does not dep on this underlying graph for token initialization. 8

10 References [1] Alex Fabrikant and Christos H. Papadimitriou The complexity of game dynamics: BGP oscillations, sink equilibria, and beyond. In Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms (SODA 08). Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, [2] Hagay Levin, Michael Schapira, and Aviv Zohar Interdomain routing and games. In Proceedings of the fortieth annual ACM symposium on Theory of computing (STOC 08). ACM, New York, NY, USA, DOI: [3] Engelberg R., Schapira M. (2011) Weakly-Acyclic (Internet) Routing Games. In: Persiano G. (eds) Algorithmic Game Theory. SAGT Lecture Notes in Computer Science, vol Springer, Berlin, Heidelberg [4] S. Simon and K. R. Apt. Choosing products in social networks. In Proc. 8th International Workshop on Internet and Network Economics (WINE), volume 7695 of Lecture Notes in Computer Science, pages Springer,

Lecture Notes on Congestion Games

Lecture Notes on Congestion Games Lecture Notes on Department of Computer Science RWTH Aachen SS 2005 Definition and Classification Description of n agents share a set of resources E strategy space of player i is S i 2 E latency for resource

More information

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy.

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy. Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami games and the internet Basic idea: The internet is a huge experiment

More information

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami warning, again 1 In the few remaining lectures, we will briefly

More information

Complexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games

Complexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games Algorithmic Game Theory Complexity of pure Nash equilibria We investigate the complexity of finding Nash equilibria in different kinds of congestion games. Our study is restricted to congestion games with

More information

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix

More information

Network games. Brighten Godfrey CS 538 September slides by Brighten Godfrey unless otherwise noted

Network games. Brighten Godfrey CS 538 September slides by Brighten Godfrey unless otherwise noted Network games Brighten Godfrey CS 538 September 27 2011 slides 2010-2011 by Brighten Godfrey unless otherwise noted Demo Game theory basics Games & networks: a natural fit Game theory Studies strategic

More information

Anarchy is free in network creation

Anarchy is free in network creation Anarchy is free in network creation Ronald Graham Linus Hamilton Ariel Levavi Po-Shen Loh Abstract The Internet has emerged as perhaps the most important network in modern computing, but rather miraculously,

More information

Anarchy is Free in Network Creation

Anarchy is Free in Network Creation Anarchy is Free in Network Creation Ronald Graham 1, Linus Hamilton 2, Ariel Levavi 1, and Po-Shen Loh 2 1 Department of Computer Science and Engineering, University of California, San Diego, La Jolla,

More information

How Bad is Selfish Routing?

How Bad is Selfish Routing? How Bad is Selfish Routing? Tim Roughgarden and Éva Tardos Presented by Brighten Godfrey 1 Game Theory Two or more players For each player, a set of strategies For each combination of played strategies,

More information

Algorithmic Game Theory - Introduction, Complexity, Nash

Algorithmic Game Theory - Introduction, Complexity, Nash Algorithmic Game Theory - Introduction, Complexity, Nash Branislav Bošanský Czech Technical University in Prague branislav.bosansky@agents.fel.cvut.cz February 25, 2018 About This Course main topics of

More information

arxiv: v2 [cs.ds] 25 Jan 2017

arxiv: v2 [cs.ds] 25 Jan 2017 d-hop Dominating Set for Directed Graph with in-degree Bounded by One arxiv:1404.6890v2 [cs.ds] 25 Jan 2017 Joydeep Banerjee, Arun Das, and Arunabha Sen School of Computing, Informatics and Decision System

More information

A Network Coloring Game

A Network Coloring Game A Network Coloring Game Kamalika Chaudhuri, Fan Chung 2, and Mohammad Shoaib Jamall 2 Information Theory and Applications Center, UC San Diego kamalika@soe.ucsd.edu 2 Department of Mathematics, UC San

More information

On the Structure of Weakly Acyclic Games

On the Structure of Weakly Acyclic Games 1 On the Structure of Weakly Acyclic Games Alex Fabrikant (Princeton CS Google Research) Aaron D. Jaggard (DIMACS, Rutgers Colgate University) Michael Schapira (Yale CS & Berkeley CS Princeton CS) 2 Best-

More information

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time

More information

Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling

Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling Aaron D. Jaggard DIMACS Rutgers University Joint work with Vijay Ramachandran (Colgate) and Rebecca

More information

doi: /j.ipl

doi: /j.ipl doi: 101016/jipl201110015 A comment on pure-strategy Nash equilibria in competitive diffusion games Reiko Takehara a, Masahiro Hachimori a, Maiko Shigeno a,1, a Graduate School of Systems and Information

More information

A Game-Theoretic Framework for Congestion Control in General Topology Networks

A Game-Theoretic Framework for Congestion Control in General Topology Networks A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control

More information

Computing Pure Nash Equilibria in Symmetric Action Graph Games

Computing Pure Nash Equilibria in Symmetric Action Graph Games Computing Pure Nash Equilibria in Symmetric Action Graph Games Albert Xin Jiang Kevin Leyton-Brown Department of Computer Science University of British Columbia {jiang;kevinlb}@cs.ubc.ca July 26, 2007

More information

Constant Price of Anarchy in Network Creation Games via Public Service Advertising

Constant Price of Anarchy in Network Creation Games via Public Service Advertising Constant Price of Anarchy in Network Creation Games via Public Service Advertising Erik D. Demaine and Morteza Zadimoghaddam MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA 02139,

More information

Games in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University

Games in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University Games in Networks: the price of anarchy, stability and learning Éva Tardos Cornell University Why care about Games? Users with a multitude of diverse economic interests sharing a Network (Internet) browsers

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

Interdomain Routing and Games

Interdomain Routing and Games Interdomain Routing and Games Hagay Levin The Department of Economics The Hebrew University Jerusalem, Israel hagayl@mscc.huji.ac.il Michael Schapira The School of Engineering and Computer Science The

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

6.896 Topics in Algorithmic Game Theory March 1, Lecture 8

6.896 Topics in Algorithmic Game Theory March 1, Lecture 8 6.896 Topics in Algorithmic Game Theory March 1, 2010 Lecture 8 Lecturer: Constantinos Daskalakis Scribe: Alan Deckelbaum, Anthony Kim NOTE: The content of these notes has not been formally reviewed by

More information

Hardness of Subgraph and Supergraph Problems in c-tournaments

Hardness of Subgraph and Supergraph Problems in c-tournaments Hardness of Subgraph and Supergraph Problems in c-tournaments Kanthi K Sarpatwar 1 and N.S. Narayanaswamy 1 Department of Computer Science and Engineering, IIT madras, Chennai 600036, India kanthik@gmail.com,swamy@cse.iitm.ac.in

More information

A BGP-Based Mechanism for Lowest-Cost Routing

A BGP-Based Mechanism for Lowest-Cost Routing A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang Theoretical Motivation Internet is comprised of separate administrative

More information

Bichromatic Line Segment Intersection Counting in O(n log n) Time

Bichromatic Line Segment Intersection Counting in O(n log n) Time Bichromatic Line Segment Intersection Counting in O(n log n) Time Timothy M. Chan Bryan T. Wilkinson Abstract We give an algorithm for bichromatic line segment intersection counting that runs in O(n log

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

arxiv: v1 [cs.dm] 21 Dec 2015

arxiv: v1 [cs.dm] 21 Dec 2015 The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey

More information

The Strategic Justification for BGP

The Strategic Justification for BGP MPRA Munich Personal RePEc Archive The Strategic Justification for BGP Hagay Levin and Michael Schapira and Aviv Zohar The Hebrew University of Jerusalem 20. November 2006 Online at http://mpra.ub.uni-muenchen.de/2110/

More information

The Strategic Justification for BGP

The Strategic Justification for BGP The Strategic Justification for BGP Hagay Levin Michael Schapira Aviv Zohar Abstract The Internet consists of many administrative domains, or Autonomous Systems (ASes), each owned by an economic entity

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Game Theory & Networks

Game Theory & Networks Game Theory & Networks (an incredibly brief overview) ndrew Smith ECS 253/ME 289 May 10th, 2016 Game theory can help us answer important questions for scenarios where: players/agents (nodes) are autonomous

More information

An Anonymous Self-Stabilizing Algorithm For 1-Maximal Matching in Trees

An Anonymous Self-Stabilizing Algorithm For 1-Maximal Matching in Trees An Anonymous Self-Stabilizing Algorithm For 1-Maximal Matching in Trees Wayne Goddard, Stephen T. Hedetniemi Department of Computer Science, Clemson University {goddard,hedet}@cs.clemson.edu Zhengnan Shi

More information

The NP-Completeness of Some Edge-Partition Problems

The NP-Completeness of Some Edge-Partition Problems The NP-Completeness of Some Edge-Partition Problems Ian Holyer y SIAM J. COMPUT, Vol. 10, No. 4, November 1981 (pp. 713-717) c1981 Society for Industrial and Applied Mathematics 0097-5397/81/1004-0006

More information

Binding Number of Some Special Classes of Trees

Binding Number of Some Special Classes of Trees International J.Math. Combin. Vol.(206), 76-8 Binding Number of Some Special Classes of Trees B.Chaluvaraju, H.S.Boregowda 2 and S.Kumbinarsaiah 3 Department of Mathematics, Bangalore University, Janana

More information

Robust Path-Vector Routing Despite Inconsistent Route Preferences

Robust Path-Vector Routing Despite Inconsistent Route Preferences Robust Path-Vector Routing Despite Inconsistent Route Preferences Aaron D. Jaggard Department of Mathematics Tulane University New Orleans, LA USA adj@math.tulane.edu Vijay Ramachandran Department of Computer

More information

A Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs

A Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs Applied Mathematics E-Notes, 15(015), 9-37 c ISSN 1607-510 Available free at mirror sites of http://www.math.nthu.edu.tw/ amen/ A Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs Naduvath

More information

A PARADOX OF CONGESTION IN A QUEUING NETWORK

A PARADOX OF CONGESTION IN A QUEUING NETWORK J. Appl. Prob. 27, 730-734 (1990) Printed in Israel

More information

CS200: Graphs. Prichard Ch. 14 Rosen Ch. 10. CS200 - Graphs 1

CS200: Graphs. Prichard Ch. 14 Rosen Ch. 10. CS200 - Graphs 1 CS200: Graphs Prichard Ch. 14 Rosen Ch. 10 CS200 - Graphs 1 Graphs A collection of nodes and edges What can this represent? n A computer network n Abstraction of a map n Social network CS200 - Graphs 2

More information

Chordal Graphs: Theory and Algorithms

Chordal Graphs: Theory and Algorithms Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also

More information

Representation of Finite Games as Network Congestion Games

Representation of Finite Games as Network Congestion Games Representation of Finite Games as Network Congestion Games Igal Milchtaich To cite this version: Igal Milchtaich. Representation of Finite Games as Network Congestion Games. Roberto Cominetti and Sylvain

More information

Finding Gale Strings

Finding Gale Strings Electronic Notes in Discrete Mathematics 36 (2010) 1065 1072 Finding Gale Strings Marta M. Casetti, Julian Merschen, Bernhard von Stengel Dept. of Mathematics, London School of Economics, London WC2A 2AE,

More information

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,

More information

Efficient Algorithms for Solving Shortest Paths on Nearly Acyclic Directed Graphs

Efficient Algorithms for Solving Shortest Paths on Nearly Acyclic Directed Graphs Efficient Algorithms for Solving Shortest Paths on Nearly Acyclic Directed Graphs Shane Saunders Tadao Takaoka Department of Computer Science and Software Engineering, University of Canterbury, Christchurch,

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information

Progress Towards the Total Domination Game 3 4 -Conjecture

Progress Towards the Total Domination Game 3 4 -Conjecture Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa

More information

A Graph-Theoretic Network Security Game

A Graph-Theoretic Network Security Game A Graph-Theoretic Network Security Game Marios Mavronicolas Vicky Papadopoulou Anna Philippou Paul Spirakis May 16, 2008 A preliminary version of this work appeared in the Proceedings of the 1st International

More information

Multicasting in the Hypercube, Chord and Binomial Graphs

Multicasting in the Hypercube, Chord and Binomial Graphs Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez Department of Computer Science University of California, Santa Barbara, CA, 93106 E-mail: {ccc,teo}@cs.ucsb.edu

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

A Generalization of the Nim and Wythoff games

A Generalization of the Nim and Wythoff games A Generalization of the Nim and Wythoff games S. Heubach 1 M. Dufour 2 1 Dept. of Mathematics, California State University Los Angeles 2 Dept. of Mathematics, Université du Québec à Montréal March 10,

More information

Characterization of Networks Supporting Multi-dimensional Linear Interval Routing Scheme

Characterization of Networks Supporting Multi-dimensional Linear Interval Routing Scheme Characterization of Networks Supporting Multi-dimensional Linear Interval Routing Scheme YASHAR GANJALI Department of Computer Science University of Waterloo Canada Abstract An Interval routing scheme

More information

TREE NASH EQUILIBRIA IN THE NETWORK CREATION GAME

TREE NASH EQUILIBRIA IN THE NETWORK CREATION GAME Internet Mathematics, 11:472 486, 2015 Copyright Taylor & Francis Group, LLC ISSN: 1542-7951 print/1944-9488 online DOI: 10.1080/15427951.2014.1016248 TREE NASH EQUILIBRIA IN THE NETWORK CREATION GAME

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

Int. J. of Advanced Networking and Applications 597 Volume: 02, Issue: 02, Pages: (2010)

Int. J. of Advanced Networking and Applications 597 Volume: 02, Issue: 02, Pages: (2010) Int. J. of Advanced Networking and Applications 597 Algorithm to Find All Cliques in a Graph A. Ashok Kumar Department of Computer Science, St. Xavier s College (Autonomous), Palayamkottai - 627 002. E-mail:

More information

Convergence Issues in Competitive Games

Convergence Issues in Competitive Games Convergence Issues in Competitive Games Vahab S Mirrokni 1, Adrian Vetta 2 and A Sidoropoulous 3 1 Computer Science and Artificial Intelligence Laboratory (CSAIL), MIT mail: mirrokni@theorylcsmitedu 2

More information

Robert Cowen and Stephen H. Hechler. Received June 4, 2003; revised June 18, 2003

Robert Cowen and Stephen H. Hechler. Received June 4, 2003; revised June 18, 2003 Scientiae Mathematicae Japonicae Online, Vol. 9, (2003), 9 15 9 G-FREE COLORABILITY AND THE BOOLEAN PRIME IDEAL THEOREM Robert Cowen and Stephen H. Hechler Received June 4, 2003; revised June 18, 2003

More information

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V -93-11. Graph Theory Example: V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V b e f V={a, b, c, d, e, f, g} a c d f E={(a,b), (b,c), (c,a),... } Note: (a,

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Lecture 19. Broadcast routing

Lecture 19. Broadcast routing Lecture 9 Broadcast routing Slide Broadcast Routing Route a packet from a source to all nodes in the network Possible solutions: Flooding: Each node sends packet on all outgoing links Discard packets received

More information

Yale University Department of Computer Science

Yale University Department of Computer Science Yale University Department of Computer Science Incentive-Compatible Interdomain Routing Joan Feigenbaum Vijay Ramachandran Michael Schapira YALEU/DCS/TR-1342 May 2006 This work is supported in part by

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

A COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS. and. and

A COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS. and. and Parallel Processing Letters c World Scientific Publishing Company A COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS DANNY KRIZANC Department of Computer Science, University of Rochester

More information

Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1

Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1 Edge-disjoint Spanning Trees in Triangulated Graphs on Surfaces and application to node labeling 1 Arnaud Labourel a a LaBRI - Universite Bordeaux 1, France Abstract In 1974, Kundu [4] has shown that triangulated

More information

Parallel Evaluation of Hopfield Neural Networks

Parallel Evaluation of Hopfield Neural Networks Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE

More information

Reconstruction Conjecture for Graphs Isomorphic to Cube of a Tree

Reconstruction Conjecture for Graphs Isomorphic to Cube of a Tree Reconstruction Conjecture for Graphs Isomorphic to Cube of a Tree S. K. Gupta Akash Khandelwal arxiv:1207.1875v1 [cs.dm] 8 Jul 2012 July 10, 2012 Abstract This paper proves the reconstruction conjecture

More information

N P-hardness of pure Nash equilibrium in Scheduling and Connection Games

N P-hardness of pure Nash equilibrium in Scheduling and Connection Games N P-hardness of pure Nash equilibrium in Scheduling and Connection Games Nguyen Kim Thang Department of Computer Science, University of Aarhus, Denmark. Abstract We introduce a framework to settle the

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Constrained Pure Nash Equilibria in Polymatrix Games

Constrained Pure Nash Equilibria in Polymatrix Games Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17) Constrained Pure Nash Equilibria in Polymatrix Games Sunil Simon IIT Kanpur Kanpur, India Dominik Wojtczak University

More information

Proper Helly Circular-Arc Graphs

Proper Helly Circular-Arc Graphs Proper Helly Circular-Arc Graphs Min Chih Lin 1, Francisco J. Soulignac 1 and Jayme L. Szwarcfiter 2 1 Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Departamento de Computación,

More information

Some Strong Connectivity Concepts in Weighted Graphs

Some Strong Connectivity Concepts in Weighted Graphs Annals of Pure and Applied Mathematics Vol. 16, No. 1, 2018, 37-46 ISSN: 2279-087X (P), 2279-0888(online) Published on 1 January 2018 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v16n1a5

More information

Smarandache Directionally n-signed Graphs A Survey

Smarandache Directionally n-signed Graphs A Survey International J.Math. Combin. Vol.2(2013), 34-43 Smarandache Directionally n-signed Graphs A Survey P.Siva Kota Reddy (Department of Mathematics, Acharya Institute of Technology, Soladevanahalli, Bangalore-560

More information

Generating edge covers of path graphs

Generating edge covers of path graphs Generating edge covers of path graphs J. Raymundo Marcial-Romero, J. A. Hernández, Vianney Muñoz-Jiménez and Héctor A. Montes-Venegas Facultad de Ingeniería, Universidad Autónoma del Estado de México,

More information

Clearly there is a close relation between the radius R and the diameter D of a graph, such as R D 2R.

Clearly there is a close relation between the radius R and the diameter D of a graph, such as R D 2R. Chapter 2 Tree Algorithms In this chapter we learn a few basic algorithms on trees, and how to construct trees in the first place so that we can run these (and other) algorithms. The good news is that

More information

arxiv: v2 [cs.dm] 3 Dec 2014

arxiv: v2 [cs.dm] 3 Dec 2014 The Student/Project Allocation problem with group projects Aswhin Arulselvan, Ágnes Cseh, and Jannik Matuschke arxiv:4.035v [cs.dm] 3 Dec 04 Department of Management Science, University of Strathclyde,

More information

The Price of Selfishness in Network Coding

The Price of Selfishness in Network Coding The Price of Selfishness in Network Coding Jason R. Marden and Michelle Effros Abstract We introduce a game theoretic framework for studying a restricted form of network coding in a general wireless network.

More information

arxiv: v1 [math.co] 7 Dec 2018

arxiv: v1 [math.co] 7 Dec 2018 SEQUENTIALLY EMBEDDABLE GRAPHS JACKSON AUTRY AND CHRISTOPHER O NEILL arxiv:1812.02904v1 [math.co] 7 Dec 2018 Abstract. We call a (not necessarily planar) embedding of a graph G in the plane sequential

More information

9/19/12. Why Study Discrete Math? What is discrete? Sets (Rosen, Chapter 2) can be described by discrete math TOPICS

9/19/12. Why Study Discrete Math? What is discrete? Sets (Rosen, Chapter 2) can be described by discrete math TOPICS What is discrete? Sets (Rosen, Chapter 2) TOPICS Discrete math Set Definition Set Operations Tuples Consisting of distinct or unconnected elements, not continuous (calculus) Helps us in Computer Science

More information

A note on self complementary brittle and self complementary quasi chordal graphs

A note on self complementary brittle and self complementary quasi chordal graphs Applied and Computational Mathematics 2013; 2(3): 86-91 Published online July 20, 2013 (http://www.sciencepublishinggroup.com/j/acm) doi: 10.11648/j.acm.20130203.13 A note on self complementary brittle

More information

Bottleneck Routing Games on Grids

Bottleneck Routing Games on Grids Bottleneck Routing Games on Grids Costas Busch, Rajgopal Kannan, and Alfred Samman Department of Computer Science, Louisiana State University, Baton Rouge, LA 70803, USA {busch,rkannan,samman}@csc.lsu.edu

More information

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,

More information

On a Network Generalization of the Minmax Theorem

On a Network Generalization of the Minmax Theorem On a Network Generalization of the Minmax Theorem Constantinos Daskalakis Christos H. Papadimitriou {costis, christos}@cs.berkeley.edu February 10, 2009 Abstract We consider graphical games in which edges

More information

Ma/CS 6b Class 5: Graph Connectivity

Ma/CS 6b Class 5: Graph Connectivity Ma/CS 6b Class 5: Graph Connectivity By Adam Sheffer Communications Network We are given a set of routers and wish to connect pairs of them to obtain a connected communications network. The network should

More information

2. CONNECTIVITY Connectivity

2. CONNECTIVITY Connectivity 2. CONNECTIVITY 70 2. Connectivity 2.1. Connectivity. Definition 2.1.1. (1) A path in a graph G = (V, E) is a sequence of vertices v 0, v 1, v 2,..., v n such that {v i 1, v i } is an edge of G for i =

More information

SIGN DOMINATING SWITCHED INVARIANTS OF A GRAPH

SIGN DOMINATING SWITCHED INVARIANTS OF A GRAPH BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN (p) 0-87, ISSN (o) 0-955 www.imvibl.org /JOURNALS / BULLETIN Vol. 7(017), 5-6 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS BANJA LUKA

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Strong Equilibrium in Cost Sharing Connection Games

Strong Equilibrium in Cost Sharing Connection Games Strong Equilibrium in Cost Sharing Connection Games Amir Epstein School of Computer Science Tel-Aviv University Tel-Aviv, 69978, Israel amirep@tau.ac.il Michal Feldman School of Computer Science The Hebrew

More information

Introduction to Graphs

Introduction to Graphs Graphs Introduction to Graphs Graph Terminology Directed Graphs Special Graphs Graph Coloring Representing Graphs Connected Graphs Connected Component Reading (Epp s textbook) 10.1-10.3 1 Introduction

More information

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3

More information

Chordal graphs and the characteristic polynomial

Chordal graphs and the characteristic polynomial Discrete Mathematics 262 (2003) 211 219 www.elsevier.com/locate/disc Chordal graphs and the characteristic polynomial Elizabeth W. McMahon ;1, Beth A. Shimkus 2, Jessica A. Wolfson 3 Department of Mathematics,

More information

PAPER Constructing the Suffix Tree of a Tree with a Large Alphabet

PAPER Constructing the Suffix Tree of a Tree with a Large Alphabet IEICE TRANS. FUNDAMENTALS, VOL.E8??, NO. JANUARY 999 PAPER Constructing the Suffix Tree of a Tree with a Large Alphabet Tetsuo SHIBUYA, SUMMARY The problem of constructing the suffix tree of a tree is

More information

Winning Positions in Simplicial Nim

Winning Positions in Simplicial Nim Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:

More information

Deadlock-free Packet Switching

Deadlock-free Packet Switching Deadlock-free Packet Switching CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Store and forward deadlock s t u v Buffer-size = 5 Node

More information

The Fibonacci hypercube

The Fibonacci hypercube AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven

More information

Assignment 4 Solutions of graph problems

Assignment 4 Solutions of graph problems Assignment 4 Solutions of graph problems 1. Let us assume that G is not a cycle. Consider the maximal path in the graph. Let the end points of the path be denoted as v 1, v k respectively. If either of

More information

Spanners of Complete k-partite Geometric Graphs

Spanners of Complete k-partite Geometric Graphs Spanners of Complete k-partite Geometric Graphs Prosenjit Bose Paz Carmi Mathieu Couture Anil Maheshwari Pat Morin Michiel Smid May 30, 008 Abstract We address the following problem: Given a complete k-partite

More information

Testing Isomorphism of Strongly Regular Graphs

Testing Isomorphism of Strongly Regular Graphs Spectral Graph Theory Lecture 9 Testing Isomorphism of Strongly Regular Graphs Daniel A. Spielman September 26, 2018 9.1 Introduction In the last lecture we saw how to test isomorphism of graphs in which

More information

Routing Network Flow Among Selfish Agents

Routing Network Flow Among Selfish Agents Routing Network Flow Among Selfish Agents Aaron Johnson May 14, 2004 Abstract We consider the problems posed by routing flow in a network populated by self-interested agents. Standard node-cost and edge-cost

More information

On the Structure of Equilibria in Basic Network Formation

On the Structure of Equilibria in Basic Network Formation On the Structure of Equilibria in Basic Network Formation S. Nikoletseas 3,4, P. Panagopoulou 4, C. Raptopoulos 1,4, and P. G. Spirakis,3,4 1 Computer Science Department, University of Geneva, Switzerland

More information