Over-contribution in discretionary databases

Size: px
Start display at page:

Download "Over-contribution in discretionary databases"

Transcription

1 Over-contribution in discretionary databases Mike Klaas Faculty of Computer Science University of British Columbia

2 Outline Over-contribution in discretionary databases p.1/1

3 Outline Social dilemmas in discretionary databases Over-contribution in discretionary databases p.1/1

4 Outline Social dilemmas in discretionary databases Utility model Over-contribution in discretionary databases p.1/1

5 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Over-contribution in discretionary databases p.1/1

6 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Over-contribution in discretionary databases p.1/1

7 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Value of an item Over-contribution in discretionary databases p.1/1

8 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Value of an item Global resource allocation Over-contribution in discretionary databases p.1/1

9 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Value of an item Global resource allocation Conclusion Over-contribution in discretionary databases p.1/1

10 Discretionary Databases Over-contribution in discretionary databases p.2/1

11 Discretionary Databases Social dilemma: self interest collective interest Over-contribution in discretionary databases p.2/1

12 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Over-contribution in discretionary databases p.2/1

13 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Game-theoretic approaches (Golle et al. 2001) (Buragohain et al. 2003) emphasizing P2P and free-ridership Over-contribution in discretionary databases p.2/1

14 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Game-theoretic approaches (Golle et al. 2001) (Buragohain et al. 2003) emphasizing P2P and free-ridership Performance models (Fuqua et al. 2003) (Mfeldman et al. 2003) still use incentive models Over-contribution in discretionary databases p.2/1

15 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Game-theoretic approaches (Golle et al. 2001) (Buragohain et al. 2003) emphasizing P2P and free-ridership Performance models (Fuqua et al. 2003) (Mfeldman et al. 2003) still use incentive models Our goal: analyze over-contribution; reputation Over-contribution in discretionary databases p.2/1

16 Usenet Overview Over-contribution in discretionary databases p.3/1

17 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Over-contribution in discretionary databases p.3/1

18 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Over-contribution in discretionary databases p.3/1

19 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: Over-contribution in discretionary databases p.3/1

20 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell Over-contribution in discretionary databases p.3/1

21 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources Over-contribution in discretionary databases p.3/1

22 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources community spirit & feedback Over-contribution in discretionary databases p.3/1

23 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources community spirit & feedback more significant sharing disincentives Over-contribution in discretionary databases p.3/1

24 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources community spirit & feedback more significant sharing disincentives over-contribution Over-contribution in discretionary databases p.3/1

25 Model overview Over-contribution in discretionary databases p.4/1

26 Model overview Bayesian game with I = {a 1,a 2,...,a n } Over-contribution in discretionary databases p.4/1

27 Model overview Bayesian game with I = {a 1,a 2,...,a n } Consuming actions eg., downloading a file u DN i a i s consumption utility Over-contribution in discretionary databases p.4/1

28 Model overview Bayesian game with I = {a 1,a 2,...,a n } Consuming actions eg., downloading a file u DN i a i s consumption utility Contributing actions eg., uploading a file u UP i a i s contributory utility Over-contribution in discretionary databases p.4/1

29 Model overview Bayesian game with I = {a 1,a 2,...,a n } Consuming actions eg., downloading a file u DN i a i s consumption utility Contributing actions eg., uploading a file u UP i a i s contributory utility Total utility u i u UP i + u DN i Over-contribution in discretionary databases p.4/1

30 Consumption utility (u DN i ) Over-contribution in discretionary databases p.5/1

31 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Over-contribution in discretionary databases p.5/1

32 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Over-contribution in discretionary databases p.5/1

33 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Over-contribution in discretionary databases p.5/1

34 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Over-contribution in discretionary databases p.5/1

35 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Models: Let Q be all content, C Q Over-contribution in discretionary databases p.5/1

36 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Models: Let Q be all content, C Q previously, mostly linear: u DN i (C) size(c) Over-contribution in discretionary databases p.5/1

37 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Models: Let Q be all content, C Q previously, mostly linear: u DN i (C) size(c) problems: doesn t model variety or interest size isn t linear (cd-image 2 29 vs picture 2 18 ) Over-contribution in discretionary databases p.5/1

38 Consumption utility (framework) Over-contribution in discretionary databases p.6/1

39 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Over-contribution in discretionary databases p.6/1

40 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Over-contribution in discretionary databases p.6/1

41 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Class utility function θ i ex. x, log(1 + x) Over-contribution in discretionary databases p.6/1

42 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Class utility function θ i ex. x, log(1 + x) Cost function cost DN i Over-contribution in discretionary databases p.6/1

43 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Class utility function θ i ex. x, log(1 + x) Cost function cost DN i Through the combination of these, we can model virtually any cost function u DN i (C) = cost DN i (C) + m j=1 w ijθ i (size(c j )) Over-contribution in discretionary databases p.6/1

44 Contribution utility (u UP i ) Over-contribution in discretionary databases p.7/1

45 Contribution utility (u UP i ) Factors: Model: Over-contribution in discretionary databases p.7/1

46 Contribution utility (u UP i ) Factors: Inherent Cost Model: cost function cost UP i Over-contribution in discretionary databases p.7/1

47 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Model: cost function cost UP i benefit function gain UP i Over-contribution in discretionary databases p.7/1

48 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Explicit Reward Model: cost function cost UP i benefit function gain UP i Over-contribution in discretionary databases p.7/1

49 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Explicit Reward Reputation / Feedback Model: cost function cost UP i benefit function gain UP i sum of utility provided to other agents: n j i v j(a i ) Over-contribution in discretionary databases p.7/1

50 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Explicit Reward Reputation / Feedback Model: cost function cost UP i benefit function gain UP i sum of utility provided to other agents: n j i v j(a i ) E(u UP i ) = gain UP i (C) cost UP i (C) + n j i v j(a i ) Over-contribution in discretionary databases p.7/1

51 Usenet utility model Over-contribution in discretionary databases p.8/1

52 Usenet utility model Assumptions: Formulæ: Consumption: = cost DN i u DN i Contribution: u UP i = gain UP i (C) + m j=1 w ijθ i (size(c j )) (C) cost UP i (C) + n j i v j(a i ) Over-contribution in discretionary databases p.8/1

53 Usenet utility model Assumptions: linearity of cost and inherent gain Formulæ: Consumption: u DN i = m j=1 (w ijθ i (size(c j )) γ i size(c j )) Contribution: u UP i = (λ i γ i )size(c) + n j i v j(a i ) Over-contribution in discretionary databases p.8/1

54 Usenet utility model Assumptions: linearity of cost and inherent gain symmetry of θ i Formulæ: Consumption: u DN i = m j=1 (w ijθ(size(c j )) γ i size(c j )) Contribution: u UP i = (λ i γ i )size(c) + n j i v j(a i ) Over-contribution in discretionary databases p.8/1

55 Usenet utility model Assumptions: linearity of cost and inherent gain symmetry of θ i per-user partitioning of Q Formulæ: Consumption: u DN i = n j=1 (b ijθ(c j ) γ i c j ) Contribution: u UP i = (λ i γ i )c i + n j i v j(a i ) Over-contribution in discretionary databases p.8/1

56 Usenet utility model Assumptions: linearity of cost and inherent gain symmetry of θ i per-user partitioning of Q feedback is simply utility derived from the agent Formulæ: Consumption: u DN i = n j=1 ˆvDN ij, ˆv DN ij = (b ij θ(c j ) γ i c j ) Contribution: u UP i = (λ i γ i )c i + n j i ˆvDN ij Over-contribution in discretionary databases p.8/1

57 Reputation un-motivated agents Over-contribution in discretionary databases p.9/1

58 Reputation un-motivated agents Assume that a i has a bound on contribution k i Over-contribution in discretionary databases p.9/1

59 Reputation un-motivated agents Assume that a i has a bound on contribution k i Then is an equilibrium. i, c i = { k i if λ i > γ i 0 otherwise Over-contribution in discretionary databases p.9/1

60 Reputation motivated agents Over-contribution in discretionary databases p.10/1

61 Reputation motivated agents For reputation-motivated agents: There exist fixed c i such that i, c i = min {c i,k i} is a unique Nash equilibrium. Given θ there exists a threshold τ such that if n b ij τ n γ k (2) j i k then c i > 0. Otherwise, c i = 0. Over-contribution in discretionary databases p.10/1

62 Reputation motivated agents For reputation-motivated agents: There exist fixed c i such that i, c i = min {c i,k i} is a unique Nash equilibrium. Given θ there exists a threshold τ such that if n b ij τ n γ k (3) j i k then c i > 0. Otherwise, c i = 0. Feedback in a group of users can regulate individual action to maximize collective welfare. Over-contribution in discretionary databases p.10/1

63 Congestion Over-contribution in discretionary databases p.11/1

64 Resource competition game Over-contribution in discretionary databases p.12/1

65 Resource competition game Benefit matrix B has structure B = Over-contribution in discretionary databases p.12/1

66 Resource competition game Benefit matrix B has structure B = Collective action breaks down over entire system Over-contribution in discretionary databases p.12/1

67 Resource competition game Benefit matrix B has structure B = Collective action breaks down over entire system Assume we have some finite resource with limit κ: if sum of content less than κ, no change otherwise, drop content until sum is less than κ Over-contribution in discretionary databases p.12/1

68 Resource competition (cont) Over-contribution in discretionary databases p.13/1

69 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Over-contribution in discretionary databases p.13/1

70 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Assume content is dropped uniformly: u i κc i j c j Over-contribution in discretionary databases p.13/1

71 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Assume content is dropped uniformly: u i κc i j c j {k 1,k 2,...,k n } is a Bayes-Nash equilibrium... regardless of κ Over-contribution in discretionary databases p.13/1

72 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Assume content is dropped uniformly: u i κc i j c j {k 1,k 2,...,k n } is a Bayes-Nash equilibrium... regardless of κ Significant problem currently for Usenet servers Over-contribution in discretionary databases p.13/1

73 Contribution valuation Over-contribution in discretionary databases p.14/1

74 Contribution valuation Difficult to quantify eg., how to measure w ij?, partitioning {Q i }? Over-contribution in discretionary databases p.14/1

75 Contribution valuation Difficult to quantify eg., how to measure w ij?, partitioning {Q i }? What can be measured? contributions: f up consumptions: f down size: f size Over-contribution in discretionary databases p.14/1

76 Contribution valuation Difficult to quantify eg., how to measure w ij?, partitioning {Q i }? What can be measured? contributions: f up consumptions: f down size: f size All contributions of f are in the same class, so v(f) = f down f up θ(f size )dt Over-contribution in discretionary databases p.14/1

77 Global resource allocation Over-contribution in discretionary databases p.15/1

78 Global resource allocation Usenet: Bandwidth, retention Over-contribution in discretionary databases p.15/1

79 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Over-contribution in discretionary databases p.15/1

80 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Micro-economic vs. differential service Over-contribution in discretionary databases p.15/1

81 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Micro-economic vs. differential service Current: manually per-group; volume-based Over-contribution in discretionary databases p.15/1

82 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Micro-economic vs. differential service Current: manually per-group; volume-based Proposed: value over size v(f)/f size Over-contribution in discretionary databases p.15/1

83 Conclusions Over-contribution in discretionary databases p.16/1

84 Conclusions We have found that: Future directions: Over-contribution in discretionary databases p.16/1

85 Conclusions We have found that: reputation can mitigate the effects of social dilemmas Future directions: Over-contribution in discretionary databases p.16/1

86 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Future directions: Over-contribution in discretionary databases p.16/1

87 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Explicit methods based on item value Future directions: Over-contribution in discretionary databases p.16/1

88 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Explicit methods based on item value Future directions: analysis of mix of reputation-sensitivity Over-contribution in discretionary databases p.16/1

89 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Explicit methods based on item value Future directions: analysis of mix of reputation-sensitivity non-stationary repeated setting Over-contribution in discretionary databases p.16/1

90 Questions? Over-contribution in discretionary databases p.17/1

Bayesian Action-Graph Games

Bayesian Action-Graph Games Bayesian Action-Graph Games Albert Xin Jiang and Kevin Leyton-Brown Department of Computer Science University of British Columbia November 13, 2011 Equilibrium Computation in Bayesian Games Equilibrium

More information

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana-Champaign CSL, UIUC p.1/22 Introduction

More information

A Game-Theoretic Framework for Congestion Control in General Topology Networks

A Game-Theoretic Framework for Congestion Control in General Topology Networks A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control

More information

A BGP-Based Mechanism for Lowest-Cost Routing

A BGP-Based Mechanism for Lowest-Cost Routing A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang Theoretical Motivation Internet is comprised of separate administrative

More information

Nash equilibria in Voronoi Games on Graphs

Nash equilibria in Voronoi Games on Graphs Nash equilibria in Voronoi Games on Graphs Christoph Dürr, Nguyễn Kim Thắng (Ecole Polytechnique) ESA, Eilat October 07 Plan Motivation : Study the interaction between selfish agents on Internet k players,

More information

End-to-end QoS negotiation in network federations

End-to-end QoS negotiation in network federations End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation

More information

Introduction to algorithmic mechanism design

Introduction to algorithmic mechanism design Introduction to algorithmic mechanism design Elias Koutsoupias Department of Computer Science University of Oxford EWSCS 2014 March 5-7, 2014 Part I Game Theory and Computer Science Why Game Theory and

More information

Cost-allocation Models in Electricity Systems

Cost-allocation Models in Electricity Systems 8 Cost-allocation Models in Electricity Systems Presented by Athena Wu Supervisor: Andy Philpott Co-supervisor: Golbon Zakeri Cost Recovery Problem Extract payments for shared resource Public utility cost

More information

Impact of Clustering on Epidemics in Random Networks

Impact of Clustering on Epidemics in Random Networks Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction

More information

Games in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University

Games in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University Games in Networks: the price of anarchy, stability and learning Éva Tardos Cornell University Why care about Games? Users with a multitude of diverse economic interests sharing a Network (Internet) browsers

More information

One More Bit Is Enough

One More Bit Is Enough One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay

More information

A Novel Security Protocol for P2P Incentive Schemes

A Novel Security Protocol for P2P Incentive Schemes A Novel Security Protocol for P2P Incentive Schemes Eludiora Safiriyu I. Department of Computer Science & Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria. safiriyue@yahoo.com Ayanda Dauda Kenneth

More information

Sufficiently Secure Peer-to-Peer Networks

Sufficiently Secure Peer-to-Peer Networks Rupert Gatti 1 Stephen Lewis 2 Andy Ozment 2 Thierry Rayna 1 Andrei Serjantov 2 1 Faculty of Economics and Politics University of Cambridge 2 Computer Laboratory University of Cambridge The Third Annual

More information

Mechanism Design in Large Congestion Games

Mechanism Design in Large Congestion Games Mechanism Design in Large Congestion Games Ryan Rogers, Aaron Roth, Jonathan Ullman, and Steven Wu July 22, 2015 Routing Game l e (y) Routing Game Routing Game A routing game G is defined by Routing Game

More information

Vertical Handover Decision Strategies A double-sided auction approach

Vertical Handover Decision Strategies A double-sided auction approach Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous

More information

How Bad is Selfish Routing?

How Bad is Selfish Routing? How Bad is Selfish Routing? Tim Roughgarden and Éva Tardos Presented by Brighten Godfrey 1 Game Theory Two or more players For each player, a set of strategies For each combination of played strategies,

More information

978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006

978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006 978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006 Incentive and Service Dferentiation in P2P Networks: A Game Theoretic Approach Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, Senior

More information

Fast Convergence of Regularized Learning in Games

Fast Convergence of Regularized Learning in Games Fast Convergence of Regularized Learning in Games Vasilis Syrgkanis Alekh Agarwal Haipeng Luo Robert Schapire Microsoft Research NYC Microsoft Research NYC Princeton University Microsoft Research NYC Strategic

More information

Bandwidth Trading in Unstructured P2P Content Distribution Networks

Bandwidth Trading in Unstructured P2P Content Distribution Networks Bandwidth Trading in Unstructured P2P Content Distribution Networks Kolja Eger and Ulrich Killat Department of Communication Networks Hamburg University of Technology (TUHH) {eger, killat}@tu-harburg.de

More information

Modelling competition in demand-based optimization models

Modelling competition in demand-based optimization models Modelling competition in demand-based optimization models Stefano Bortolomiol Virginie Lurkin Michel Bierlaire Transport and Mobility Laboratory (TRANSP-OR) École Polytechnique Fédérale de Lausanne Workshop

More information

COALITION FORMATION IN P2P FILE SHARING SYSTEMS

COALITION FORMATION IN P2P FILE SHARING SYSTEMS COALITION FORMATION IN P2P FILE SHARING SYSTEMS M.V.Belmonte, M. Díaz, J.L. Pérez-de-la-Cruz, R. Conejo E.T.S.I. Informática. Bulevar Louis Pasteur, Nº 35.Universidad de Málaga Málaga (SPAIN) {mavi,mdr,perez,conejo}@lcc.uma.es

More information

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability

A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability Professor Anna Nagurney Department of Operations and Information Management Isenberg School of Management

More information

Introduction to Dynamic Traffic Assignment

Introduction to Dynamic Traffic Assignment Introduction to Dynamic Traffic Assignment CE 392D January 22, 2018 WHAT IS EQUILIBRIUM? Transportation systems involve interactions among multiple agents. The basic facts are: Although travel choices

More information

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy.

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy. Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami games and the internet Basic idea: The internet is a huge experiment

More information

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy

Algorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami warning, again 1 In the few remaining lectures, we will briefly

More information

Clustering: Classic Methods and Modern Views

Clustering: Classic Methods and Modern Views Clustering: Classic Methods and Modern Views Marina Meilă University of Washington mmp@stat.washington.edu June 22, 2015 Lorentz Center Workshop on Clusters, Games and Axioms Outline Paradigms for clustering

More information

Design Space Analysis for Modeling Incentives in Distributed Systems

Design Space Analysis for Modeling Incentives in Distributed Systems Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information

A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks

A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks A Game Theoretic Approach to Provide Incentive and Service Differentiation in PP Networks Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui Dept of Computer Science & Engineering, The Chinese University

More information

A Network Coloring Game

A Network Coloring Game A Network Coloring Game Kamalika Chaudhuri, Fan Chung 2, and Mohammad Shoaib Jamall 2 Information Theory and Applications Center, UC San Diego kamalika@soe.ucsd.edu 2 Department of Mathematics, UC San

More information

The Design Trade-offs of BitTorrent-like File Sharing Protocols

The Design Trade-offs of BitTorrent-like File Sharing Protocols The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and

More information

The production of peer-to-peer video-streaming networks

The production of peer-to-peer video-streaming networks The production of peer-to-peer video-streaming networks Dafu Lou Yongyi Mao Tet H. Yeap SITE, University of Ottawa, Canada SIGCOMM 07 P2P-TV, August 31, 2007, Kyoto, Japan. Outline Problem 1 Problem Dynamics

More information

The Implication of Overlay Routing on ISPs Connecting Strategies

The Implication of Overlay Routing on ISPs Connecting Strategies The Implication of Overlay Routing on ISPs Connecting Strategies Graduate School of Information Science and Technology, Osaka University Xun Shao, Go Hasegawa, Yoshiaki Taniguchi, and Hirotaka Nakano IP

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

Communication Complexity of Combinatorial Auctions with Submodular Valuations

Communication Complexity of Combinatorial Auctions with Submodular Valuations Communication Complexity of Combinatorial Auctions with Submodular Valuations Shahar Dobzinski Weizmann Institute of Science Jan Vondrák IBM Almaden Research ACM-SIAM SODA 2013, New Orleans Dobzinski-Vondrák

More information

Extensive Games with Imperfect Information

Extensive Games with Imperfect Information Extensive Games with Imperfect Information Definition (Os 314.1): An extensive game with imperfect information consists of a set of players N a set of terminal histories H; no sequence is a proper subhistory

More information

A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks

A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks A ame Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks Richard T.. Ma, Sam C. M. Lee, John C. S. Lui Dept of Computer Science Engineering, The Chinese University of Hong

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

How do networks form? Strategic network formation

How do networks form? Strategic network formation How do networks form? Strategic network formation Mihaela van der Schaar University of California, Los Angeles Acknowledgement: ONR 1 Social networks Friendship networks Work networks Scientific networks

More information

Incentive Design Bidderand Market Evolution Bidder of Mobile

Incentive Design Bidderand Market Evolution Bidder of Mobile Allocation rule Allocation rule Incentive Design Bidderand Market Evolution Bidder of Mobile Disclore all private Signaling his private User-Provided information Networks information Mohammad Mahdi Khalili,

More information

CAP 5993/CAP 4993 Game Theory. Instructor: Sam Ganzfried

CAP 5993/CAP 4993 Game Theory. Instructor: Sam Ganzfried CAP 5993/CAP 4993 Game Theory Instructor: Sam Ganzfried sganzfri@cis.fiu.edu 1 Announcements HW 1 due today HW 2 out this week (2/2), due 2/14 2 Definition: A two-player game is a zero-sum game if for

More information

EC422 Mathematical Economics 2

EC422 Mathematical Economics 2 EC422 Mathematical Economics 2 Chaiyuth Punyasavatsut Chaiyuth Punyasavatust 1 Course materials and evaluation Texts: Dixit, A.K ; Sydsaeter et al. Grading: 40,30,30. OK or not. Resources: ftp://econ.tu.ac.th/class/archan/c

More information

Net Neutrality and Inflation of Traffic

Net Neutrality and Inflation of Traffic Introduction Net Neutrality and Inflation of Traffic Martin Peitz (MaCCI, University of Mannheim and CERRE) Florian Schuett (TILEC, CentER, Tilburg University) Symposium in Honor of Jean Tirole The Hague,

More information

An Agent-based Model for the Evolution of the Internet Ecosystem

An Agent-based Model for the Evolution of the Internet Ecosystem An Agent-based Model for the Evolution of the Internet Ecosystem Amogh Dhamdhere Constantine Dovrolis Georgia Tech The Internet Ecosystem 27,000 autonomous networks independently operated and managed The

More information

Multiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1

Multiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Multiple Agents Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Assumptions Assumptions Definitions Partially bservable Each agent can act autonomously.

More information

Today s lecture. Competitive Matrix Games. Competitive Matrix Games. Modeling games as hybrid systems. EECE 571M/491M, Spring 2007 Lecture 17

Today s lecture. Competitive Matrix Games. Competitive Matrix Games. Modeling games as hybrid systems. EECE 571M/491M, Spring 2007 Lecture 17 EECE 57M/49M, Spring 007 Lecture 7 Modeling games as hybrid systems oday s lecture Background Matrix games Nash Competitive Equilibrium Nash Bargaining Solution Strategy dynamics: he need for hybrid models

More information

Statistics 202: Data Mining. c Jonathan Taylor. Outliers Based in part on slides from textbook, slides of Susan Holmes.

Statistics 202: Data Mining. c Jonathan Taylor. Outliers Based in part on slides from textbook, slides of Susan Holmes. Outliers Based in part on slides from textbook, slides of Susan Holmes December 2, 2012 1 / 1 Concepts What is an outlier? The set of data points that are considerably different than the remainder of the

More information

Challenging Applications of Stochastic Programming

Challenging Applications of Stochastic Programming Challenging Applications of Stochastic Programming Anton J. School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia, USA Stochastic Programming SPXII Conference Halifax

More information

Mixture Models and the EM Algorithm

Mixture Models and the EM Algorithm Mixture Models and the EM Algorithm Padhraic Smyth, Department of Computer Science University of California, Irvine c 2017 1 Finite Mixture Models Say we have a data set D = {x 1,..., x N } where x i is

More information

SALSA: Super-Peer Assisted Live Streaming Architecture

SALSA: Super-Peer Assisted Live Streaming Architecture SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University

More information

IMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING

IMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING DOI: http://dx.doi.org/10.26483/ijarcs.v9i1.5389 ISSN No. 0976 5697 Volume 9, No. 1, January-February 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Strategic Network Formation

Strategic Network Formation Strategic Network Formation Zhongjing Yu, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming What s meaning of Strategic Network Formation? Node : a individual.

More information

Do incentives build robustness in BitTorrent?

Do incentives build robustness in BitTorrent? Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN

More information

Bootstrapping the Long Tail in Peer to Peer Systems

Bootstrapping the Long Tail in Peer to Peer Systems Bootstrapping the Long Tail in Peer to Peer Systems Bernardo A. Huberman and Fang Wu HP Labs, Palo Alto, CA 94304 May 4, 2006 Abstract We describe an efficient incentive mechanism for P2P systems that

More information

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

Cumulative Reputation Systems for Peer-to-Peer Content Distribution Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1 Outline P2P CDNs

More information

On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection

On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection CPSR-SG 2016 CPS Week 2016 April 12, 2016 Vienna, Austria Outline CPS Security

More information

Implementing stable TCP variants

Implementing stable TCP variants Implementing stable TCP variants IPAM Workshop on Large Scale Communications Networks April 2002 Tom Kelly ctk21@cam.ac.uk Laboratory for Communication Engineering University of Cambridge Implementing

More information

Graph Theory and Network Measurment

Graph Theory and Network Measurment Graph Theory and Network Measurment Social and Economic Networks MohammadAmin Fazli Social and Economic Networks 1 ToC Network Representation Basic Graph Theory Definitions (SE) Network Statistics and

More information

Complexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games

Complexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games Algorithmic Game Theory Complexity of pure Nash equilibria We investigate the complexity of finding Nash equilibria in different kinds of congestion games. Our study is restricted to congestion games with

More information

Falloc: Fair Network Bandwidth Allocation in IaaS Datacenters via a Bargaining Game Approach

Falloc: Fair Network Bandwidth Allocation in IaaS Datacenters via a Bargaining Game Approach Falloc: Fair Network Bandwidth Allocation in IaaS Datacenters via a Bargaining Game Approach Jian Guo 1 Fangming Liu 1 Haowen Tang 1 Yingnan Lian 1 Hai Jin 1 John C.S. Lui 2 1 Key Laboratory of Services

More information

Nash Equilibrium Load Balancing

Nash Equilibrium Load Balancing Nash Equilibrium Load Balancing Computer Science Department Collaborators: A. Kothari, C. Toth, Y. Zhou Load Balancing A set of m servers or machines. A set of n clients or jobs. Each job can be run only

More information

Correlated Equilibria in Sender-Receiver Games

Correlated Equilibria in Sender-Receiver Games Correlated Equilibria in Sender-Receiver Games Andreas Blume Department of Economics University of Pittsburgh Pittsburgh, PA 15260 May, 2010 Abstract It is shown that the efficiency bound for communication

More information

Organic Self-organizing Bus-based Communication Systems

Organic Self-organizing Bus-based Communication Systems Organic Self-organizing Bus-based Communication Systems, Stefan Wildermann, Jürgen Teich Hardware-Software-Co-Design Universität Erlangen-Nürnberg tobias.ziermann@informatik.uni-erlangen.de 15.09.2011

More information

Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks

Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks Sebastian Streg December 10, 2005 1 Introduction Efficiency in networks with lots of traffic is a serious problem

More information

Computing Pure Nash Equilibria in Symmetric Action Graph Games

Computing Pure Nash Equilibria in Symmetric Action Graph Games Computing Pure Nash Equilibria in Symmetric Action Graph Games Albert Xin Jiang Kevin Leyton-Brown Department of Computer Science University of British Columbia {jiang;kevinlb}@cs.ubc.ca July 26, 2007

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

PARDA: Proportional Allocation of Resources for Distributed Storage Access

PARDA: Proportional Allocation of Resources for Distributed Storage Access PARDA: Proportional Allocation of Resources for Distributed Storage Access Ajay Gulati, Irfan Ahmad, Carl Waldspurger Resource Management Team VMware Inc. USENIX FAST 09 Conference February 26, 2009 The

More information

CS Transport. Outline. Window Flow Control. Window Flow Control

CS Transport. Outline. Window Flow Control. Window Flow Control CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005

More information

Maximizing the Spread of Influence through a Social Network

Maximizing the Spread of Influence through a Social Network Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams Social Networks Infectious disease networks Viral Marketing Viral Marketing Example:

More information

DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007

DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007 DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS A Thesis by Hoang Dang Bachelor of Arts, Lakeland College, 2007 Submitted to the Department of Electrical Engineering and Computer Science

More information

Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach

Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach SUBMITTED TO IEEE/ACM TRANSACTIONS ON NETWORKING 1 Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach Jian Guo, Fangming Liu, Member, IEEE, John C.S. Lui, Fellow, IEEE,

More information

Resource Management in Computer Networks -- Mapping from engineering problems to mathematical formulations

Resource Management in Computer Networks -- Mapping from engineering problems to mathematical formulations Resource Management in Computer Networks -- Mapping from engineering problems to mathematical formulations Rong Zheng COSC 7388 2 Two Types of Real-world Problems Make something work E.g. build a car on

More information

How Cheap Talk Enhances Efficiency in Public Goods Games

How Cheap Talk Enhances Efficiency in Public Goods Games How Cheap Talk Enhances Efficiency in Public Goods Games Thomas Palfrey Howard Rosenthal Nilanjan Roy January 12, 215 Abstract This paper uses a Bayesian mechanism design approach to investigate the effects

More information

1.1 What is Microeconomics?

1.1 What is Microeconomics? 1.1 What is Microeconomics? Economics is the study of allocating limited resources to satisfy unlimited wants. Such a tension implies tradeoffs among competing goals. The analysis can be carried out at

More information

SLANG Session 4. Jason Quinley Roland Mühlenbernd Seminar für Sprachwissenschaft University of Tübingen

SLANG Session 4. Jason Quinley Roland Mühlenbernd Seminar für Sprachwissenschaft University of Tübingen SLANG Session 4 Jason Quinley Roland Mühlenbernd Seminar für Sprachwissenschaft University of Tübingen Overview Network properties Degree Density and Distribution Clustering and Connections Network formation

More information

Game Theory & Networks

Game Theory & Networks Game Theory & Networks (an incredibly brief overview) ndrew Smith ECS 253/ME 289 May 10th, 2016 Game theory can help us answer important questions for scenarios where: players/agents (nodes) are autonomous

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis

Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,

More information

Algorithmic Game Theory - Introduction, Complexity, Nash

Algorithmic Game Theory - Introduction, Complexity, Nash Algorithmic Game Theory - Introduction, Complexity, Nash Branislav Bošanský Czech Technical University in Prague branislav.bosansky@agents.fel.cvut.cz February 25, 2018 About This Course main topics of

More information

Hedonic Clustering Games

Hedonic Clustering Games Hedonic Clustering Games [Extended Abstract] Moran Feldman CS Dept., Technion Haifa, Israel moranfe@cs.technion.ac.il Liane Lewin-Eytan IBM Haifa Research Lab. Haifa, Israel lianel@il.ibm.com Joseph (Seffi)

More information

New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants

New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants Haiying Shen and Zhuozhao Li Dept. of Electrical and Computer Engineering Clemson University, SC,

More information

Bipartite Edge Prediction via Transductive Learning over Product Graphs

Bipartite Edge Prediction via Transductive Learning over Product Graphs Bipartite Edge Prediction via Transductive Learning over Product Graphs Hanxiao Liu, Yiming Yang School of Computer Science, Carnegie Mellon University July 8, 2015 ICML 2015 Bipartite Edge Prediction

More information

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II ECS 289 / MAE 298, Lecture 15 Mar 2, 2011 Diffusion, Cascades and Influence, Part II Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic

More information

Bootstrapping the Long Tail in Peer to Peer Systems

Bootstrapping the Long Tail in Peer to Peer Systems Bootstrapping the Long Tail in Peer to Peer Systems Bernardo A. Huberman and Fang Wu HP Labs, Palo Alto, CA 94304 December 7, 2005 Abstract We describe an efficient incentive mechanism for P2P systems

More information

On Wireless Social Community Network Routers The Design and Cost-Sharing Problem for Better Deployment

On Wireless Social Community Network Routers The Design and Cost-Sharing Problem for Better Deployment On Wireless Social Community Network Routers The Design and Cost-Sharing Problem for Better Deployment Ranjan Pal University of Southern California, Princeton University Email: rpal@usc.edu, rpal@princeton.edu

More information

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.

More information

Part I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a

Part I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a Week 9 Based in part on slides from textbook, slides of Susan Holmes Part I December 2, 2012 Hierarchical Clustering 1 / 1 Produces a set of nested clusters organized as a Hierarchical hierarchical clustering

More information

Prices and Auctions in Markets with Complex Constraints

Prices and Auctions in Markets with Complex Constraints Conference on Frontiers of Economics and Computer Science Becker-Friedman Institute Prices and Auctions in Markets with Complex Constraints Paul Milgrom Stanford University & Auctionomics August 2016 1

More information

Datacenter Simulation Methodologies Case Studies

Datacenter Simulation Methodologies Case Studies This work is supported by NSF grants CCF-1149252, CCF-1337215, and STARnet, a Semiconductor Research Corporation Program, sponsored by MARCO and DARPA. Datacenter Simulation Methodologies Case Studies

More information

Solutions of Stochastic Coalitional Games

Solutions of Stochastic Coalitional Games Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8443-8450 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410881 Solutions of Stochastic Coalitional Games Xeniya Grigorieva St.Petersburg

More information

Conditional Random Fields - A probabilistic graphical model. Yen-Chin Lee 指導老師 : 鮑興國

Conditional Random Fields - A probabilistic graphical model. Yen-Chin Lee 指導老師 : 鮑興國 Conditional Random Fields - A probabilistic graphical model Yen-Chin Lee 指導老師 : 鮑興國 Outline Labeling sequence data problem Introduction conditional random field (CRF) Different views on building a conditional

More information

Strategyproof Mechanisms towards Evolutionary Topology Formation in Autonomous Networks

Strategyproof Mechanisms towards Evolutionary Topology Formation in Autonomous Networks 1 Strategyproof Mechanisms towards Evolutionary Topology Formation in Autonomous Networks Selwyn Yuen, Baochun Li Department of Electrical and Computer Engineering University of Toronto {swsyuen,bli}@eecg.toronto.edu

More information

Analysis and Modeling

Analysis and Modeling Guillaume Guérard A Complex System Approach for SMART GRID Analysis and Modeling KES 12 September 2012 1 Problematic Thesis: Optimization in complex networks. Problem: Optimization of the energy distribution

More information

On-Line Social Systems with Long-Range Goals

On-Line Social Systems with Long-Range Goals On-Line Social Systems with Long-Range Goals Jon Kleinberg Cornell University Including joint work with Ashton Anderson, Dan Huttenlocher, Jure Leskovec, and Sigal Oren. Long-Range Planning Growth in on-line

More information

Dynamic Resource Allocation in Heterogeneous Wireless Networks

Dynamic Resource Allocation in Heterogeneous Wireless Networks Dynamic Resource Allocation in Heterogeneous Wireless Networks Jayant Thatte [jayantt@stanford.edu] 1 Introduction As the wireless technology and standards continue to evolve, wireless communication systems

More information

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming

More information

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei

More information

OASIS: Self-tuning Storage for Applications

OASIS: Self-tuning Storage for Applications OASIS: Self-tuning Storage for Applications Kostas Magoutis, Prasenjit Sarkar, Gauri Shah 14 th NASA Goddard- 23 rd IEEE Mass Storage Systems Technologies, College Park, MD, May 17, 2006 Outline Motivation

More information