Cooperative Computing for Autonomous Data Centers

Similar documents
Distribution-Free Models of Social and Information Networks

Limits of Local Algorithms in Random Graphs

Approximation Algorithms

Constant Price of Anarchy in Network Creation Games via Public Service Advertising

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE

Subdivided graphs have linear Ramsey numbers

2 The Fractional Chromatic Gap

arxiv: v1 [math.co] 28 Sep 2010

Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior

On Covering a Graph Optimally with Induced Subgraphs

On the Approximability of Modularity Clustering

How Hard Is Inference for Structured Prediction?

Math 575 Exam 3. (t). What is the chromatic number of G?

Vertex Cover Approximations on Random Graphs.

Extremal Graph Theory. Ajit A. Diwan Department of Computer Science and Engineering, I. I. T. Bombay.

Graph Theory and Network Measurment

Overlay (and P2P) Networks

Finding a -regular Supergraph of Minimum Order

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov

Judicious bisections

Geometric Inhomogeneous Random Graphs (GIRGs)

Extremal results for Berge-hypergraphs

The k-in-a-path problem for claw-free graphs

HAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS

Problem Set 2 Solutions

On a Network Generalization of the Minmax Theorem

HW Graph Theory SOLUTIONS (hbovik) - Q

Hardness of Subgraph and Supergraph Problems in c-tournaments

Interleaving Schemes on Circulant Graphs with Two Offsets

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.

Lecture and notes by: Nate Chenette, Brent Myers, Hari Prasad November 8, Property Testing

Rumour spreading in the spatial preferential attachment model

Chordal Graphs: Theory and Algorithms

Algorithmic Game Theory. Alexander Skopalik

Lecture 5. Figure 1: The colored edges indicate the member edges of several maximal matchings of the given graph.

Monochromatic loose-cycle partitions in hypergraphs

Mathematics of networks. Artem S. Novozhilov

The universal triangle-free graph has finite big Ramsey degrees

A Game-Theoretic Approach for Minimizing Delays in Autonomous Intersections

doi: /j.ipl

A random triadic process

CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES

6.856 Randomized Algorithms

On Approximating Minimum Vertex Cover for Graphs with Perfect Matching

Exact Algorithms Lecture 7: FPT Hardness and the ETH

Bayesian Networks, Winter Yoav Haimovitch & Ariel Raviv

Vertex-Colouring Edge-Weightings

Discharging and reducible configurations

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns

The strong chromatic number of a graph

Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs

THE PRICE OF ANARCHY IN COOPERATIVE NETWORK CREATION GAMES

Progress Towards the Total Domination Game 3 4 -Conjecture

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns

Streaming verification of graph problems

The Ordered Covering Problem

On the Min-Max 2-Cluster Editing Problem

Chapter 8 DOMINATING SETS

MAXIMAL PLANAR SUBGRAPHS OF FIXED GIRTH IN RANDOM GRAPHS

Graphs and Discrete Structures

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms For Inference Fall 2014

Chapter 8 DOMINATING SETS

Multiple Vertex Coverings by Cliques

Packing Edge-Disjoint Triangles in Given Graphs

1 Minimal Examples and Extremal Problems

How Bad is Selfish Routing?

Comparing the strength of query types in property testing: The case of testing k-colorability

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games


Erdös-Rényi Graphs, Part 2

A Survey of Correlation Clustering

An expected polynomial time algorithm for coloring 2-colorable 3-graphs

Distributed Coloring in. Kishore Kothapalli Department of Computer Science Johns Hopkins University Baltimore, MD USA

Truth, Lies, and Random Bits

Disjoint cycles intersecting a set of vertices

Algorithmic Game Theory - Introduction, Complexity, Nash

Simulations of the quadrilateral-based localization

Michał Dębski. Uniwersytet Warszawski. On a topological relaxation of a conjecture of Erdős and Nešetřil

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns

Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu

Matchings, Ramsey Theory, And Other Graph Fun

Online Coloring Known Graphs

Dynamics, Non-Cooperation, and Other Algorithmic Challenges in Peer-to-Peer Computing

An Introduction to Chromatic Polynomials

Combinatorial Gems. Po-Shen Loh. June 2009

Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling

COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section (CLRS)

Streaming Algorithms for Matching Size in Sparse Graphs

Disjoint directed cycles

On the finite big Ramsey degrees for the universal triangle-free graph: A progress report

Computing Pure Nash Equilibria in Symmetric Action Graph Games

In this paper we consider probabilistic algorithms for that task. Each processor is equipped with a perfect source of randomness, and the processor's

Clustering Using Graph Connectivity

A Game-Theoretic Framework for Congestion Control in General Topology Networks

Choosing a Random Peer

Independent dominating sets in graphs of girth five via the semi-random method

Nash Equilibrium Load Balancing

Network Theory: Social, Mythological and Fictional Networks. Math 485, Spring 2018 (Midterm Report) Christina West, Taylor Martins, Yihe Hao

Lecture 22 - Oblivious Transfer (OT) and Private Information Retrieval (PIR)

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Transcription:

Cooperative Computing for Autonomous Data Centers Jared Saia (U. New Mexico) Joint with: Jon Berry, Cindy Phillips (Sandia Labs), Aaron Kearns (U. New Mexico)

Outline 1) Bounding clustering coefficients in social networks 2) An application: Cooperative Computing

Power Law Bounded (PLB) Assumption [Brach, et al. 16] The PLB assumption holds for a network if, for some α > 1: The number of vertices with degree k is O(n k 1 - α )

Power Law Bounded Neighborhood (PLBN) Assumption [Brach, et al. 15] The PLBN Assumption holds for a network if for some α, 2 < α < 3: For every vertex v, of degree d, the number of neighbors of v of degree d is: O(d 3 - α )

Edge Weights Consider an edge (u,v) Let dᵤ, dᵥ be the degrees of u, v Let t be the number of triangles containing (u,v) Edge Weight: 2t / (dᵤ + dᵥ - 2)

Bounded Weighted Degree (BWD) Assumption For any human node, the sum of the weights of edges on that node is c, where c is a universal constant Inspired by Dunbar-like argument

Weighted Degrees Probability Density Extremely Unlikely any vertex has weighted degree above 40 Weighted Degree

Edge Weights Revisited Let dᵤ, dᵥ be the degrees of u, v Let t be the number of triangles containing (u,v) Edge Weight 1: 2t / (dᵤ + dᵥ - 2) Edge Weight 2: t / (dᵤ + dᵥ - t) Both of these greater than: t / (dᵤ + dᵥ)

O(d 4-α ) triangle bound Assume: PLBN: Number of neighbors of v with degree d is O(d 3 - α ) BWD: Sum of edge weights touching v is O(1) Then: Number of triangles v is in is O(d 4 - α )

Proof Sketch (1) Neighbors with degree d Each is in O(d) triangles with v O(d 3 - α ) of them (by PLBN) Contribute O(d 4 - α ) triangles

Proof Sketch (2) Neighbors with degree < d Let x = # of triangles these nodes contribute Claim: Sum of edge weights is minimized when x is evenly distributed Then, sum of edge weights is: Ω(d((x/d)/d)) = Ω(x/d) By the BWD Assumption, this sum is O(1). Thus x = O(d)

Clustering Coefficient Consider a node v, with degree d Clustering coefficient of v: # of triangles containing v / (d choose 2) Prediction: clustering coefficient is O(d 2-α )

Cleaning Networks

Removing Non-human Nodes Can buy 500 followers for $5 on Twitter Non-human nodes can be densely connected Our goal: remove non-human nodes

Removing Non-human Nodes Our approach (sketch): Remove nodes based on significant deviation from average weighted degree Cross-validate with human labelling and labelling based on non-topological features Cleaning removes few human nodes, among those we checked by hand J. Berry, A. Kearns, C. Phillips, J. Saia. Finding Non-human Nodes in Electronic Social Networks Using Only Topological Data Under Submission, 2016.

Does our Bound on Clustering Coefficients Hold on Cleaned Networks?

Youtube and Twitter

1e+06 Power Law Bounds on Degree Distributions 100000 Frequency 10000 1000 100 10 1 Youtube (cleaned 6-σ) Twitter (cleaned 6-σ) α = 2.2 α = 2.2 1 10 100 1000 Degree 1 Clustering Coefficients Clustering Coefficient 0.1 0.01 Youtube Twitter α' = 0.8 0.001 1 10 100 1000 Degree

LiveJournal and Friendster

1e+06 Power Law Bounds on Degree Distributions 100000 Frequency 10000 1000 100 10 1 LiveJournal Frienster α = 2.5 α = 2.666 1 10 100 1000 Degree 1 Clustering Coefficients Clustering Coefficient 0.1 0.01 0.001 LiveJournal (cleaned 6-σ) Frienster α' = 0.5 α' = 0.333 1 10 100 1000 Degree

The Takeaway Preliminary experiments suggest clustering coefficient is O(d 2-α ) Hidden constant seems fairly small Not necessarily tight Only holds after cleaning

Outline 1) Bounding clustering coefficients in social networks 2) An application: Cooperative Computing

Cooperative Computing

Cooperative Computing Alice and Bob (or more) have graphs G A and G B Share the name space for nodes Cooperate to solve problems on G A G B Goal: limit total communication s

Previous Work: Algorithms for s-t connectivity Assumes social network structure: giant component O(log² n) communication cost Can ensure players get no information beyond the output in honest-but-curious model J. Berry, J, M. Collins, A. Kearns, C. Phillips, J. Saia, and R. Smith. "Cooperative Computing for Autonomous Data Centers." IEEE Parallel and Distributed Processing Symposium (IPDPS), 2015.

CCR Finding a clique in G A G B Start with a social network O(log n) nodes chosen randomly to form a clique Adversary assigns edges to Alice and Bob Goal: Find the clique with little communication Blue edges to Alice Red edges to Bob

CCR Assumptions 1) PLB: for some α > 2, the number of vertices with degree k is O(n k 1 - α ) 2) PLBN + BWD: for some α > 2, any degree d nodes is in O(d 4 - α ) triangles Idea: Use these assumptions to bound the number of triangles outside the clique Blue edges to Alice Red edges to Bob

CCR Step 1: Ramsey Theory Plant a clique of size x, and split the edges arbitrarily between Alice and Bob Ramsey theory: either Alice or Bob has θ(x³) of the triangles Blue edges to Alice Red edges to Bob

Step 2: Find Maximum Triangle Dense Subgraph Goal: Find a subgraph that maximizes triangle density: # triangles in subgraph / # nodes in subgraph Triangle density is: 7/5 Can solve in polynomial time using Linear Programming Greedy 3-approximation (from Charikar s 2- approximation result for maximizing edge density)

Step 3: Communicate WLOG, assume Alice is the one who has θ(log³ n) triangles from the planted clique Lemma: Alice s maximum triangle dense subgraph contains only nodes in the planted clique, S Lemma: Whp, any nodes not in S have O(1) edges into S

Algorithm 1.Alice finds max triangle-density subgraph, H, and nodes (W A ) adjacent to at least half of H. Sends H and W A to Bob. 2.Bob finds nodes (W B ) adjacent to at least half of H, and sends all induced edges (between H, W A and W B ) 3.Alice finds clique (polynomial-time since O(log n)) H W A Alice s MTDS H W A W B W B

Main Result Can cooperatively find a O(log n) size clique planted in a social network Requires only polylogarithmic communication Key Assumptions: Power law network Bounded weighted degree

Questions?

Extra Slides

Planted Clique Problem Find a clique that has been artificially added to a graph O(log n) nodes chosen randomly and build a clique Can we find a clique that s a little larger than native clique size? For Erdos-Renyi, native is log n, can find (Deshpande and Montanari 2013, Alon, Krivelevich, Sudakov, 1998) A form of anomaly detection As a hardness assumption, hardness bounds for Finding a Nash equilibrium in a 2-party game (Hazan & Krauthgamer (2011)) Finding sparse principal components (Berthet and Rigollet (2013)) Testing whether distribution is k-wise independent (Alon et al 2007) NYC Theory Day April 15, 2016 35

References Edge Weight 1: [J. Berry, B. Hendrickson, R. LaViolette, and C. Phillips, Tolerating the community detection resolution limit with edge weighting, Physical Review E, Vol. 83, No. 5, 2011.] Edge Weight 2: [Easley, David, and Jon Kleinberg. Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University Press, 2010.]

References PLB and PLBN Assumption: [Brach, P., Cygan, M., Łącki, J. and Sankowski, P., Algorithmic Complexity of Power Law Networks, Symposium on Discrete Algorithms (SODA), 2016.]