Over-contribution in discretionary databases
|
|
- Juliana Lucas
- 5 years ago
- Views:
Transcription
1 Over-contribution in discretionary databases Mike Klaas Faculty of Computer Science University of British Columbia
2 Outline Over-contribution in discretionary databases p.1/1
3 Outline Social dilemmas in discretionary databases Over-contribution in discretionary databases p.1/1
4 Outline Social dilemmas in discretionary databases Utility model Over-contribution in discretionary databases p.1/1
5 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Over-contribution in discretionary databases p.1/1
6 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Over-contribution in discretionary databases p.1/1
7 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Value of an item Over-contribution in discretionary databases p.1/1
8 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Value of an item Global resource allocation Over-contribution in discretionary databases p.1/1
9 Outline Social dilemmas in discretionary databases Utility model Agent behaviour in Usenet Group behaviour in Usenet Value of an item Global resource allocation Conclusion Over-contribution in discretionary databases p.1/1
10 Discretionary Databases Over-contribution in discretionary databases p.2/1
11 Discretionary Databases Social dilemma: self interest collective interest Over-contribution in discretionary databases p.2/1
12 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Over-contribution in discretionary databases p.2/1
13 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Game-theoretic approaches (Golle et al. 2001) (Buragohain et al. 2003) emphasizing P2P and free-ridership Over-contribution in discretionary databases p.2/1
14 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Game-theoretic approaches (Golle et al. 2001) (Buragohain et al. 2003) emphasizing P2P and free-ridership Performance models (Fuqua et al. 2003) (Mfeldman et al. 2003) still use incentive models Over-contribution in discretionary databases p.2/1
15 Discretionary Databases Social dilemma: self interest collective interest ex. the notorious free-rider problem (Sweeney 1973) Game-theoretic approaches (Golle et al. 2001) (Buragohain et al. 2003) emphasizing P2P and free-ridership Performance models (Fuqua et al. 2003) (Mfeldman et al. 2003) still use incentive models Our goal: analyze over-contribution; reputation Over-contribution in discretionary databases p.2/1
16 Usenet Overview Over-contribution in discretionary databases p.3/1
17 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Over-contribution in discretionary databases p.3/1
18 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Over-contribution in discretionary databases p.3/1
19 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: Over-contribution in discretionary databases p.3/1
20 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell Over-contribution in discretionary databases p.3/1
21 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources Over-contribution in discretionary databases p.3/1
22 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources community spirit & feedback Over-contribution in discretionary databases p.3/1
23 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources community spirit & feedback more significant sharing disincentives Over-contribution in discretionary databases p.3/1
24 Usenet Overview 1970 = little text traffic 2004 = 1TB/day binary data contributed Self-organized distributed file-sharing system Differences from P2P: free-riding not death-knell shared files always consume resources community spirit & feedback more significant sharing disincentives over-contribution Over-contribution in discretionary databases p.3/1
25 Model overview Over-contribution in discretionary databases p.4/1
26 Model overview Bayesian game with I = {a 1,a 2,...,a n } Over-contribution in discretionary databases p.4/1
27 Model overview Bayesian game with I = {a 1,a 2,...,a n } Consuming actions eg., downloading a file u DN i a i s consumption utility Over-contribution in discretionary databases p.4/1
28 Model overview Bayesian game with I = {a 1,a 2,...,a n } Consuming actions eg., downloading a file u DN i a i s consumption utility Contributing actions eg., uploading a file u UP i a i s contributory utility Over-contribution in discretionary databases p.4/1
29 Model overview Bayesian game with I = {a 1,a 2,...,a n } Consuming actions eg., downloading a file u DN i a i s consumption utility Contributing actions eg., uploading a file u UP i a i s contributory utility Total utility u i u UP i + u DN i Over-contribution in discretionary databases p.4/1
30 Consumption utility (u DN i ) Over-contribution in discretionary databases p.5/1
31 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Over-contribution in discretionary databases p.5/1
32 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Over-contribution in discretionary databases p.5/1
33 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Over-contribution in discretionary databases p.5/1
34 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Over-contribution in discretionary databases p.5/1
35 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Models: Let Q be all content, C Q Over-contribution in discretionary databases p.5/1
36 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Models: Let Q be all content, C Q previously, mostly linear: u DN i (C) size(c) Over-contribution in discretionary databases p.5/1
37 Consumption utility (u DN i ) Factors: Content Retrieved possibly capped Variety Heterogeneity Implicit/Explicit Cost Models: Let Q be all content, C Q previously, mostly linear: u DN i (C) size(c) problems: doesn t model variety or interest size isn t linear (cd-image 2 29 vs picture 2 18 ) Over-contribution in discretionary databases p.5/1
38 Consumption utility (framework) Over-contribution in discretionary databases p.6/1
39 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Over-contribution in discretionary databases p.6/1
40 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Over-contribution in discretionary databases p.6/1
41 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Class utility function θ i ex. x, log(1 + x) Over-contribution in discretionary databases p.6/1
42 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Class utility function θ i ex. x, log(1 + x) Cost function cost DN i Over-contribution in discretionary databases p.6/1
43 Consumption utility (framework) Partition Q into {Q i }, pick C i Q i variety through substitutability Interest matrix W w ij is a i s interest in C j Class utility function θ i ex. x, log(1 + x) Cost function cost DN i Through the combination of these, we can model virtually any cost function u DN i (C) = cost DN i (C) + m j=1 w ijθ i (size(c j )) Over-contribution in discretionary databases p.6/1
44 Contribution utility (u UP i ) Over-contribution in discretionary databases p.7/1
45 Contribution utility (u UP i ) Factors: Model: Over-contribution in discretionary databases p.7/1
46 Contribution utility (u UP i ) Factors: Inherent Cost Model: cost function cost UP i Over-contribution in discretionary databases p.7/1
47 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Model: cost function cost UP i benefit function gain UP i Over-contribution in discretionary databases p.7/1
48 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Explicit Reward Model: cost function cost UP i benefit function gain UP i Over-contribution in discretionary databases p.7/1
49 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Explicit Reward Reputation / Feedback Model: cost function cost UP i benefit function gain UP i sum of utility provided to other agents: n j i v j(a i ) Over-contribution in discretionary databases p.7/1
50 Contribution utility (u UP i ) Factors: Inherent Cost Inherent Contribution Preference Explicit Reward Reputation / Feedback Model: cost function cost UP i benefit function gain UP i sum of utility provided to other agents: n j i v j(a i ) E(u UP i ) = gain UP i (C) cost UP i (C) + n j i v j(a i ) Over-contribution in discretionary databases p.7/1
51 Usenet utility model Over-contribution in discretionary databases p.8/1
52 Usenet utility model Assumptions: Formulæ: Consumption: = cost DN i u DN i Contribution: u UP i = gain UP i (C) + m j=1 w ijθ i (size(c j )) (C) cost UP i (C) + n j i v j(a i ) Over-contribution in discretionary databases p.8/1
53 Usenet utility model Assumptions: linearity of cost and inherent gain Formulæ: Consumption: u DN i = m j=1 (w ijθ i (size(c j )) γ i size(c j )) Contribution: u UP i = (λ i γ i )size(c) + n j i v j(a i ) Over-contribution in discretionary databases p.8/1
54 Usenet utility model Assumptions: linearity of cost and inherent gain symmetry of θ i Formulæ: Consumption: u DN i = m j=1 (w ijθ(size(c j )) γ i size(c j )) Contribution: u UP i = (λ i γ i )size(c) + n j i v j(a i ) Over-contribution in discretionary databases p.8/1
55 Usenet utility model Assumptions: linearity of cost and inherent gain symmetry of θ i per-user partitioning of Q Formulæ: Consumption: u DN i = n j=1 (b ijθ(c j ) γ i c j ) Contribution: u UP i = (λ i γ i )c i + n j i v j(a i ) Over-contribution in discretionary databases p.8/1
56 Usenet utility model Assumptions: linearity of cost and inherent gain symmetry of θ i per-user partitioning of Q feedback is simply utility derived from the agent Formulæ: Consumption: u DN i = n j=1 ˆvDN ij, ˆv DN ij = (b ij θ(c j ) γ i c j ) Contribution: u UP i = (λ i γ i )c i + n j i ˆvDN ij Over-contribution in discretionary databases p.8/1
57 Reputation un-motivated agents Over-contribution in discretionary databases p.9/1
58 Reputation un-motivated agents Assume that a i has a bound on contribution k i Over-contribution in discretionary databases p.9/1
59 Reputation un-motivated agents Assume that a i has a bound on contribution k i Then is an equilibrium. i, c i = { k i if λ i > γ i 0 otherwise Over-contribution in discretionary databases p.9/1
60 Reputation motivated agents Over-contribution in discretionary databases p.10/1
61 Reputation motivated agents For reputation-motivated agents: There exist fixed c i such that i, c i = min {c i,k i} is a unique Nash equilibrium. Given θ there exists a threshold τ such that if n b ij τ n γ k (2) j i k then c i > 0. Otherwise, c i = 0. Over-contribution in discretionary databases p.10/1
62 Reputation motivated agents For reputation-motivated agents: There exist fixed c i such that i, c i = min {c i,k i} is a unique Nash equilibrium. Given θ there exists a threshold τ such that if n b ij τ n γ k (3) j i k then c i > 0. Otherwise, c i = 0. Feedback in a group of users can regulate individual action to maximize collective welfare. Over-contribution in discretionary databases p.10/1
63 Congestion Over-contribution in discretionary databases p.11/1
64 Resource competition game Over-contribution in discretionary databases p.12/1
65 Resource competition game Benefit matrix B has structure B = Over-contribution in discretionary databases p.12/1
66 Resource competition game Benefit matrix B has structure B = Collective action breaks down over entire system Over-contribution in discretionary databases p.12/1
67 Resource competition game Benefit matrix B has structure B = Collective action breaks down over entire system Assume we have some finite resource with limit κ: if sum of content less than κ, no change otherwise, drop content until sum is less than κ Over-contribution in discretionary databases p.12/1
68 Resource competition (cont) Over-contribution in discretionary databases p.13/1
69 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Over-contribution in discretionary databases p.13/1
70 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Assume content is dropped uniformly: u i κc i j c j Over-contribution in discretionary databases p.13/1
71 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Assume content is dropped uniformly: u i κc i j c j {k 1,k 2,...,k n } is a Bayes-Nash equilibrium... regardless of κ Over-contribution in discretionary databases p.13/1
72 Resource competition (cont) Consider groups as players action: upload c i [0,k i ] of content utility: proportional to non-dropped content Assume content is dropped uniformly: u i κc i j c j {k 1,k 2,...,k n } is a Bayes-Nash equilibrium... regardless of κ Significant problem currently for Usenet servers Over-contribution in discretionary databases p.13/1
73 Contribution valuation Over-contribution in discretionary databases p.14/1
74 Contribution valuation Difficult to quantify eg., how to measure w ij?, partitioning {Q i }? Over-contribution in discretionary databases p.14/1
75 Contribution valuation Difficult to quantify eg., how to measure w ij?, partitioning {Q i }? What can be measured? contributions: f up consumptions: f down size: f size Over-contribution in discretionary databases p.14/1
76 Contribution valuation Difficult to quantify eg., how to measure w ij?, partitioning {Q i }? What can be measured? contributions: f up consumptions: f down size: f size All contributions of f are in the same class, so v(f) = f down f up θ(f size )dt Over-contribution in discretionary databases p.14/1
77 Global resource allocation Over-contribution in discretionary databases p.15/1
78 Global resource allocation Usenet: Bandwidth, retention Over-contribution in discretionary databases p.15/1
79 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Over-contribution in discretionary databases p.15/1
80 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Micro-economic vs. differential service Over-contribution in discretionary databases p.15/1
81 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Micro-economic vs. differential service Current: manually per-group; volume-based Over-contribution in discretionary databases p.15/1
82 Global resource allocation Usenet: Bandwidth, retention Utility model for retention: sub-linear Micro-economic vs. differential service Current: manually per-group; volume-based Proposed: value over size v(f)/f size Over-contribution in discretionary databases p.15/1
83 Conclusions Over-contribution in discretionary databases p.16/1
84 Conclusions We have found that: Future directions: Over-contribution in discretionary databases p.16/1
85 Conclusions We have found that: reputation can mitigate the effects of social dilemmas Future directions: Over-contribution in discretionary databases p.16/1
86 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Future directions: Over-contribution in discretionary databases p.16/1
87 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Explicit methods based on item value Future directions: Over-contribution in discretionary databases p.16/1
88 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Explicit methods based on item value Future directions: analysis of mix of reputation-sensitivity Over-contribution in discretionary databases p.16/1
89 Conclusions We have found that: reputation can mitigate the effects of social dilemmas reputation is inadequate globally Explicit methods based on item value Future directions: analysis of mix of reputation-sensitivity non-stationary repeated setting Over-contribution in discretionary databases p.16/1
90 Questions? Over-contribution in discretionary databases p.17/1
Bayesian Action-Graph Games
Bayesian Action-Graph Games Albert Xin Jiang and Kevin Leyton-Brown Department of Computer Science University of British Columbia November 13, 2011 Equilibrium Computation in Bayesian Games Equilibrium
More informationModeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks
Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana-Champaign CSL, UIUC p.1/22 Introduction
More informationA Game-Theoretic Framework for Congestion Control in General Topology Networks
A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control
More informationA BGP-Based Mechanism for Lowest-Cost Routing
A BGP-Based Mechanism for Lowest-Cost Routing Joan Feigenbaum, Christos Papadimitriou, Rahul Sami, Scott Shenker Presented by: Tony Z.C Huang Theoretical Motivation Internet is comprised of separate administrative
More informationNash equilibria in Voronoi Games on Graphs
Nash equilibria in Voronoi Games on Graphs Christoph Dürr, Nguyễn Kim Thắng (Ecole Polytechnique) ESA, Eilat October 07 Plan Motivation : Study the interaction between selfish agents on Internet k players,
More informationEnd-to-end QoS negotiation in network federations
End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation
More informationIntroduction to algorithmic mechanism design
Introduction to algorithmic mechanism design Elias Koutsoupias Department of Computer Science University of Oxford EWSCS 2014 March 5-7, 2014 Part I Game Theory and Computer Science Why Game Theory and
More informationCost-allocation Models in Electricity Systems
8 Cost-allocation Models in Electricity Systems Presented by Athena Wu Supervisor: Andy Philpott Co-supervisor: Golbon Zakeri Cost Recovery Problem Extract payments for shared resource Public utility cost
More informationImpact of Clustering on Epidemics in Random Networks
Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction
More informationGames in Networks: the price of anarchy, stability and learning. Éva Tardos Cornell University
Games in Networks: the price of anarchy, stability and learning Éva Tardos Cornell University Why care about Games? Users with a multitude of diverse economic interests sharing a Network (Internet) browsers
More informationOne More Bit Is Enough
One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay
More informationA Novel Security Protocol for P2P Incentive Schemes
A Novel Security Protocol for P2P Incentive Schemes Eludiora Safiriyu I. Department of Computer Science & Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria. safiriyue@yahoo.com Ayanda Dauda Kenneth
More informationSufficiently Secure Peer-to-Peer Networks
Rupert Gatti 1 Stephen Lewis 2 Andy Ozment 2 Thierry Rayna 1 Andrei Serjantov 2 1 Faculty of Economics and Politics University of Cambridge 2 Computer Laboratory University of Cambridge The Third Annual
More informationMechanism Design in Large Congestion Games
Mechanism Design in Large Congestion Games Ryan Rogers, Aaron Roth, Jonathan Ullman, and Steven Wu July 22, 2015 Routing Game l e (y) Routing Game Routing Game A routing game G is defined by Routing Game
More informationVertical Handover Decision Strategies A double-sided auction approach
Vertical Handover Decision Strategies A double-sided auction approach Working paper Hoang-Hai TRAN Ph.d student DIONYSOS Team INRIA Rennes - Bretagne Atlantique 1 Content Introduction Handover in heterogeneous
More informationHow Bad is Selfish Routing?
How Bad is Selfish Routing? Tim Roughgarden and Éva Tardos Presented by Brighten Godfrey 1 Game Theory Two or more players For each player, a set of strategies For each combination of played strategies,
More information978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006
978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 5, OCTOBER 2006 Incentive and Service Dferentiation in P2P Networks: A Game Theoretic Approach Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, Senior
More informationFast Convergence of Regularized Learning in Games
Fast Convergence of Regularized Learning in Games Vasilis Syrgkanis Alekh Agarwal Haipeng Luo Robert Schapire Microsoft Research NYC Microsoft Research NYC Princeton University Microsoft Research NYC Strategic
More informationBandwidth Trading in Unstructured P2P Content Distribution Networks
Bandwidth Trading in Unstructured P2P Content Distribution Networks Kolja Eger and Ulrich Killat Department of Communication Networks Hamburg University of Technology (TUHH) {eger, killat}@tu-harburg.de
More informationModelling competition in demand-based optimization models
Modelling competition in demand-based optimization models Stefano Bortolomiol Virginie Lurkin Michel Bierlaire Transport and Mobility Laboratory (TRANSP-OR) École Polytechnique Fédérale de Lausanne Workshop
More informationCOALITION FORMATION IN P2P FILE SHARING SYSTEMS
COALITION FORMATION IN P2P FILE SHARING SYSTEMS M.V.Belmonte, M. Díaz, J.L. Pérez-de-la-Cruz, R. Conejo E.T.S.I. Informática. Bulevar Louis Pasteur, Nº 35.Universidad de Málaga Málaga (SPAIN) {mavi,mdr,perez,conejo}@lcc.uma.es
More informationA Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability Professor Anna Nagurney Department of Operations and Information Management Isenberg School of Management
More informationIntroduction to Dynamic Traffic Assignment
Introduction to Dynamic Traffic Assignment CE 392D January 22, 2018 WHAT IS EQUILIBRIUM? Transportation systems involve interactions among multiple agents. The basic facts are: Although travel choices
More informationAlgorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy.
Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami games and the internet Basic idea: The internet is a huge experiment
More informationAlgorithmic Game Theory and Applications. Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy
Algorithmic Game Theory and Applications Lecture 16: Selfish Network Routing, Congestion Games, and the Price of Anarchy Kousha Etessami warning, again 1 In the few remaining lectures, we will briefly
More informationClustering: Classic Methods and Modern Views
Clustering: Classic Methods and Modern Views Marina Meilă University of Washington mmp@stat.washington.edu June 22, 2015 Lorentz Center Workshop on Clusters, Games and Axioms Outline Paradigms for clustering
More informationDesign Space Analysis for Modeling Incentives in Distributed Systems
Design Space Analysis for Modeling Incentives in Distributed Systems by Rameez Rahman, Tamas Vinko, David Hales, Johan Pouwelse, and Henk Sips Delft University of Technology 1 Incentives in Distributed
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game
More informationA Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks
A Game Theoretic Approach to Provide Incentive and Service Differentiation in PP Networks Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui Dept of Computer Science & Engineering, The Chinese University
More informationA Network Coloring Game
A Network Coloring Game Kamalika Chaudhuri, Fan Chung 2, and Mohammad Shoaib Jamall 2 Information Theory and Applications Center, UC San Diego kamalika@soe.ucsd.edu 2 Department of Mathematics, UC San
More informationThe Design Trade-offs of BitTorrent-like File Sharing Protocols
The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent BT file sharing protocol is very popular due to its scalability property and
More informationThe production of peer-to-peer video-streaming networks
The production of peer-to-peer video-streaming networks Dafu Lou Yongyi Mao Tet H. Yeap SITE, University of Ottawa, Canada SIGCOMM 07 P2P-TV, August 31, 2007, Kyoto, Japan. Outline Problem 1 Problem Dynamics
More informationThe Implication of Overlay Routing on ISPs Connecting Strategies
The Implication of Overlay Routing on ISPs Connecting Strategies Graduate School of Information Science and Technology, Osaka University Xun Shao, Go Hasegawa, Yoshiaki Taniguchi, and Hirotaka Nakano IP
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationCommunication Complexity of Combinatorial Auctions with Submodular Valuations
Communication Complexity of Combinatorial Auctions with Submodular Valuations Shahar Dobzinski Weizmann Institute of Science Jan Vondrák IBM Almaden Research ACM-SIAM SODA 2013, New Orleans Dobzinski-Vondrák
More informationExtensive Games with Imperfect Information
Extensive Games with Imperfect Information Definition (Os 314.1): An extensive game with imperfect information consists of a set of players N a set of terminal histories H; no sequence is a proper subhistory
More informationA Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks
A ame Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks Richard T.. Ma, Sam C. M. Lee, John C. S. Lui Dept of Computer Science Engineering, The Chinese University of Hong
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationHow do networks form? Strategic network formation
How do networks form? Strategic network formation Mihaela van der Schaar University of California, Los Angeles Acknowledgement: ONR 1 Social networks Friendship networks Work networks Scientific networks
More informationIncentive Design Bidderand Market Evolution Bidder of Mobile
Allocation rule Allocation rule Incentive Design Bidderand Market Evolution Bidder of Mobile Disclore all private Signaling his private User-Provided information Networks information Mohammad Mahdi Khalili,
More informationCAP 5993/CAP 4993 Game Theory. Instructor: Sam Ganzfried
CAP 5993/CAP 4993 Game Theory Instructor: Sam Ganzfried sganzfri@cis.fiu.edu 1 Announcements HW 1 due today HW 2 out this week (2/2), due 2/14 2 Definition: A two-player game is a zero-sum game if for
More informationEC422 Mathematical Economics 2
EC422 Mathematical Economics 2 Chaiyuth Punyasavatsut Chaiyuth Punyasavatust 1 Course materials and evaluation Texts: Dixit, A.K ; Sydsaeter et al. Grading: 40,30,30. OK or not. Resources: ftp://econ.tu.ac.th/class/archan/c
More informationNet Neutrality and Inflation of Traffic
Introduction Net Neutrality and Inflation of Traffic Martin Peitz (MaCCI, University of Mannheim and CERRE) Florian Schuett (TILEC, CentER, Tilburg University) Symposium in Honor of Jean Tirole The Hague,
More informationAn Agent-based Model for the Evolution of the Internet Ecosystem
An Agent-based Model for the Evolution of the Internet Ecosystem Amogh Dhamdhere Constantine Dovrolis Georgia Tech The Internet Ecosystem 27,000 autonomous networks independently operated and managed The
More informationMultiple Agents. Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1
Multiple Agents Why can t we all just get along? (Rodney King) CS 3793/5233 Artificial Intelligence Multiple Agents 1 Assumptions Assumptions Definitions Partially bservable Each agent can act autonomously.
More informationToday s lecture. Competitive Matrix Games. Competitive Matrix Games. Modeling games as hybrid systems. EECE 571M/491M, Spring 2007 Lecture 17
EECE 57M/49M, Spring 007 Lecture 7 Modeling games as hybrid systems oday s lecture Background Matrix games Nash Competitive Equilibrium Nash Bargaining Solution Strategy dynamics: he need for hybrid models
More informationStatistics 202: Data Mining. c Jonathan Taylor. Outliers Based in part on slides from textbook, slides of Susan Holmes.
Outliers Based in part on slides from textbook, slides of Susan Holmes December 2, 2012 1 / 1 Concepts What is an outlier? The set of data points that are considerably different than the remainder of the
More informationChallenging Applications of Stochastic Programming
Challenging Applications of Stochastic Programming Anton J. School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia, USA Stochastic Programming SPXII Conference Halifax
More informationMixture Models and the EM Algorithm
Mixture Models and the EM Algorithm Padhraic Smyth, Department of Computer Science University of California, Irvine c 2017 1 Finite Mixture Models Say we have a data set D = {x 1,..., x N } where x i is
More informationSALSA: Super-Peer Assisted Live Streaming Architecture
SALSA: Super-Peer Assisted Live Streaming Architecture Jongtack Kim School of EECS, INMC Seoul National University Email: jkim@netlab.snu.ac.kr Yugyung Lee School of Computing and Engineering University
More informationIMPLEMENTING TASK AND RESOURCE ALLOCATION ALGORITHM BASED ON NON-COOPERATIVE GAME THEORY IN CLOUD COMPUTING
DOI: http://dx.doi.org/10.26483/ijarcs.v9i1.5389 ISSN No. 0976 5697 Volume 9, No. 1, January-February 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online
More informationCongestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem
Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality
More informationStrategic Network Formation
Strategic Network Formation Zhongjing Yu, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming What s meaning of Strategic Network Formation? Node : a individual.
More informationDo incentives build robustness in BitTorrent?
Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN
More informationBootstrapping the Long Tail in Peer to Peer Systems
Bootstrapping the Long Tail in Peer to Peer Systems Bernardo A. Huberman and Fang Wu HP Labs, Palo Alto, CA 94304 May 4, 2006 Abstract We describe an efficient incentive mechanism for P2P systems that
More informationCumulative Reputation Systems for Peer-to-Peer Content Distribution
Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1 Outline P2P CDNs
More informationOn Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection
On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection CPSR-SG 2016 CPS Week 2016 April 12, 2016 Vienna, Austria Outline CPS Security
More informationImplementing stable TCP variants
Implementing stable TCP variants IPAM Workshop on Large Scale Communications Networks April 2002 Tom Kelly ctk21@cam.ac.uk Laboratory for Communication Engineering University of Cambridge Implementing
More informationGraph Theory and Network Measurment
Graph Theory and Network Measurment Social and Economic Networks MohammadAmin Fazli Social and Economic Networks 1 ToC Network Representation Basic Graph Theory Definitions (SE) Network Statistics and
More informationComplexity. Congestion Games. Algorithmic Game Theory. Alexander Skopalik Algorithmic Game Theory 2013 Congestion Games
Algorithmic Game Theory Complexity of pure Nash equilibria We investigate the complexity of finding Nash equilibria in different kinds of congestion games. Our study is restricted to congestion games with
More informationFalloc: Fair Network Bandwidth Allocation in IaaS Datacenters via a Bargaining Game Approach
Falloc: Fair Network Bandwidth Allocation in IaaS Datacenters via a Bargaining Game Approach Jian Guo 1 Fangming Liu 1 Haowen Tang 1 Yingnan Lian 1 Hai Jin 1 John C.S. Lui 2 1 Key Laboratory of Services
More informationNash Equilibrium Load Balancing
Nash Equilibrium Load Balancing Computer Science Department Collaborators: A. Kothari, C. Toth, Y. Zhou Load Balancing A set of m servers or machines. A set of n clients or jobs. Each job can be run only
More informationCorrelated Equilibria in Sender-Receiver Games
Correlated Equilibria in Sender-Receiver Games Andreas Blume Department of Economics University of Pittsburgh Pittsburgh, PA 15260 May, 2010 Abstract It is shown that the efficiency bound for communication
More informationOrganic Self-organizing Bus-based Communication Systems
Organic Self-organizing Bus-based Communication Systems, Stefan Wildermann, Jürgen Teich Hardware-Software-Co-Design Universität Erlangen-Nürnberg tobias.ziermann@informatik.uni-erlangen.de 15.09.2011
More informationTopics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks
Topics in Artificial Intelligence: Multiagent Systems Selfish Routing in Computer Networks Sebastian Streg December 10, 2005 1 Introduction Efficiency in networks with lots of traffic is a serious problem
More informationComputing Pure Nash Equilibria in Symmetric Action Graph Games
Computing Pure Nash Equilibria in Symmetric Action Graph Games Albert Xin Jiang Kevin Leyton-Brown Department of Computer Science University of British Columbia {jiang;kevinlb}@cs.ubc.ca July 26, 2007
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationPARDA: Proportional Allocation of Resources for Distributed Storage Access
PARDA: Proportional Allocation of Resources for Distributed Storage Access Ajay Gulati, Irfan Ahmad, Carl Waldspurger Resource Management Team VMware Inc. USENIX FAST 09 Conference February 26, 2009 The
More informationCS Transport. Outline. Window Flow Control. Window Flow Control
CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005
More informationMaximizing the Spread of Influence through a Social Network
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams Social Networks Infectious disease networks Viral Marketing Viral Marketing Example:
More informationDATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS. A Thesis by. Hoang Dang. Bachelor of Arts, Lakeland College, 2007
DATA CACHING IN AD HOC NETWORKS USING GAME-THEORETIC ANALYSIS A Thesis by Hoang Dang Bachelor of Arts, Lakeland College, 2007 Submitted to the Department of Electrical Engineering and Computer Science
More informationFair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach
SUBMITTED TO IEEE/ACM TRANSACTIONS ON NETWORKING 1 Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach Jian Guo, Fangming Liu, Member, IEEE, John C.S. Lui, Fellow, IEEE,
More informationResource Management in Computer Networks -- Mapping from engineering problems to mathematical formulations
Resource Management in Computer Networks -- Mapping from engineering problems to mathematical formulations Rong Zheng COSC 7388 2 Two Types of Real-world Problems Make something work E.g. build a car on
More informationHow Cheap Talk Enhances Efficiency in Public Goods Games
How Cheap Talk Enhances Efficiency in Public Goods Games Thomas Palfrey Howard Rosenthal Nilanjan Roy January 12, 215 Abstract This paper uses a Bayesian mechanism design approach to investigate the effects
More information1.1 What is Microeconomics?
1.1 What is Microeconomics? Economics is the study of allocating limited resources to satisfy unlimited wants. Such a tension implies tradeoffs among competing goals. The analysis can be carried out at
More informationSLANG Session 4. Jason Quinley Roland Mühlenbernd Seminar für Sprachwissenschaft University of Tübingen
SLANG Session 4 Jason Quinley Roland Mühlenbernd Seminar für Sprachwissenschaft University of Tübingen Overview Network properties Degree Density and Distribution Clustering and Connections Network formation
More informationGame Theory & Networks
Game Theory & Networks (an incredibly brief overview) ndrew Smith ECS 253/ME 289 May 10th, 2016 Game theory can help us answer important questions for scenarios where: players/agents (nodes) are autonomous
More informationCongestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it
More informationSelfish Caching in Distributed Systems: A Game-Theoretic Analysis
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Symposium on Principles of Distributed Computing July 5, 4 Byung-Gon Chun, Kamalika Chaudhuri, Hoeteck Wee, Marco Barreno, Christos Papadimitriou,
More informationAlgorithmic Game Theory - Introduction, Complexity, Nash
Algorithmic Game Theory - Introduction, Complexity, Nash Branislav Bošanský Czech Technical University in Prague branislav.bosansky@agents.fel.cvut.cz February 25, 2018 About This Course main topics of
More informationHedonic Clustering Games
Hedonic Clustering Games [Extended Abstract] Moran Feldman CS Dept., Technion Haifa, Israel moranfe@cs.technion.ac.il Liane Lewin-Eytan IBM Haifa Research Lab. Haifa, Israel lianel@il.ibm.com Joseph (Seffi)
More informationNew Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants
New Bandwidth Sharing and Pricing Policies to Achieve a Win-Win Situation for Cloud Provider and Tenants Haiying Shen and Zhuozhao Li Dept. of Electrical and Computer Engineering Clemson University, SC,
More informationBipartite Edge Prediction via Transductive Learning over Product Graphs
Bipartite Edge Prediction via Transductive Learning over Product Graphs Hanxiao Liu, Yiming Yang School of Computer Science, Carnegie Mellon University July 8, 2015 ICML 2015 Bipartite Edge Prediction
More informationECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II
ECS 289 / MAE 298, Lecture 15 Mar 2, 2011 Diffusion, Cascades and Influence, Part II Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic
More informationBootstrapping the Long Tail in Peer to Peer Systems
Bootstrapping the Long Tail in Peer to Peer Systems Bernardo A. Huberman and Fang Wu HP Labs, Palo Alto, CA 94304 December 7, 2005 Abstract We describe an efficient incentive mechanism for P2P systems
More informationOn Wireless Social Community Network Routers The Design and Cost-Sharing Problem for Better Deployment
On Wireless Social Community Network Routers The Design and Cost-Sharing Problem for Better Deployment Ranjan Pal University of Southern California, Princeton University Email: rpal@usc.edu, rpal@princeton.edu
More informationMIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns
MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.
More informationPart I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a
Week 9 Based in part on slides from textbook, slides of Susan Holmes Part I December 2, 2012 Hierarchical Clustering 1 / 1 Produces a set of nested clusters organized as a Hierarchical hierarchical clustering
More informationPrices and Auctions in Markets with Complex Constraints
Conference on Frontiers of Economics and Computer Science Becker-Friedman Institute Prices and Auctions in Markets with Complex Constraints Paul Milgrom Stanford University & Auctionomics August 2016 1
More informationDatacenter Simulation Methodologies Case Studies
This work is supported by NSF grants CCF-1149252, CCF-1337215, and STARnet, a Semiconductor Research Corporation Program, sponsored by MARCO and DARPA. Datacenter Simulation Methodologies Case Studies
More informationSolutions of Stochastic Coalitional Games
Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8443-8450 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410881 Solutions of Stochastic Coalitional Games Xeniya Grigorieva St.Petersburg
More informationConditional Random Fields - A probabilistic graphical model. Yen-Chin Lee 指導老師 : 鮑興國
Conditional Random Fields - A probabilistic graphical model Yen-Chin Lee 指導老師 : 鮑興國 Outline Labeling sequence data problem Introduction conditional random field (CRF) Different views on building a conditional
More informationStrategyproof Mechanisms towards Evolutionary Topology Formation in Autonomous Networks
1 Strategyproof Mechanisms towards Evolutionary Topology Formation in Autonomous Networks Selwyn Yuen, Baochun Li Department of Electrical and Computer Engineering University of Toronto {swsyuen,bli}@eecg.toronto.edu
More informationAnalysis and Modeling
Guillaume Guérard A Complex System Approach for SMART GRID Analysis and Modeling KES 12 September 2012 1 Problematic Thesis: Optimization in complex networks. Problem: Optimization of the energy distribution
More informationOn-Line Social Systems with Long-Range Goals
On-Line Social Systems with Long-Range Goals Jon Kleinberg Cornell University Including joint work with Ashton Anderson, Dan Huttenlocher, Jure Leskovec, and Sigal Oren. Long-Range Planning Growth in on-line
More informationDynamic Resource Allocation in Heterogeneous Wireless Networks
Dynamic Resource Allocation in Heterogeneous Wireless Networks Jayant Thatte [jayantt@stanford.edu] 1 Introduction As the wireless technology and standards continue to evolve, wireless communication systems
More information15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018
15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming
More informationOptimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game
2012 7th International ICST Conference on Communications and Networking in China (CHINACOM) Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game Yuhua Xu, Zhan Gao and Wei
More informationOASIS: Self-tuning Storage for Applications
OASIS: Self-tuning Storage for Applications Kostas Magoutis, Prasenjit Sarkar, Gauri Shah 14 th NASA Goddard- 23 rd IEEE Mass Storage Systems Technologies, College Park, MD, May 17, 2006 Outline Motivation
More information