Algorithms, Games, and Networks March 28, Lecture 18

Similar documents
Truth, Justice, and Cake Cutting

Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, Ion Stoica. University of California, Berkeley nsdi 11

Towards More Expressive Cake Cutting

Multidimensional Scheduling (Polytope Scheduling Problem) Competitive Algorithms from Competitive Equilibria

SPERNER S LEMMA MOOR XU

SPERNER S LEMMA, BROUWER S FIXED-POINT THEOREM, AND THE SUBDIVISION OF SQUARES INTO TRIANGLES

Combinatorial Gems. Po-Shen Loh. June 2009

Beyond Beyond Dominant Resource Fairness : Indivisible Resource Allocation In Clusters

The Probabilistic Method

Fair Multi-Resource Allocation with External Resource for Mobile Edge Computing

Algorithms, Games, and Networks February 21, Lecture 12

(67686) Mathematical Foundations of AI July 30, Lecture 11

Beyond Beyond Dominant Resource Fairness : Indivisible Resource Allocation In Clusters

Cake Cutting Algorithms

Sperner and Tucker s lemma

TWO-PLAYER ENVY-FREE MULTI-CAKE DIVISION

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

arxiv: v1 [math.co] 2 Sep 2009

How to Cut a Cake Before the Party Ends

Rental Harmony: Sperner's Lemma in Fair Division

6.842 Randomness and Computation September 25-27, Lecture 6 & 7. Definition 1 Interactive Proof Systems (IPS) [Goldwasser, Micali, Rackoff]

Lecture 20 : Trees DRAFT

arxiv: v1 [math.lo] 9 Mar 2011

Ma/CS 6b Class 26: Art Galleries and Politicians

12.1 Formulation of General Perfect Matching

Graph Algorithms Matching

Algorithms for Euclidean TSP

1 Better Approximation of the Traveling Salesman

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)

Professor: Padraic Bartlett. Lecture 9: Trees and Art Galleries. Week 10 UCSB 2015

Lecture 7: Asymmetric K-Center

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees

Balancing Fairness and Efficiency in Tiered Storage Systems with Bottleneck-Aware Allocation

Pebble Sets in Convex Polygons

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Graph theory. Po-Shen Loh. June We begin by collecting some basic facts which can be proved via bare-hands techniques.

Lecture 1: Sperner, Brouwer, Nash. Philippe Bich, PSE and University Paris 1 Pantheon-Sorbonne, France. Lecture 1: Sperner, Brouwer, Nash

Jessica Su (some parts copied from CLRS / last quarter s notes)

An Introduction to Graph Theory

Approximation Algorithms for Item Pricing

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

Key aspects of cloud computing. Towards fuller utilization. Two main sources of resource demand. Cluster Scheduling

BROUWER S FIXED POINT THEOREM. Contents

FairRide: Near-Optimal Fair Cache Sharing

1 Matching in Non-Bipartite Graphs

Algorithmic Game Theory. Alexander Skopalik

Lecture 4: Trees and Art Galleries

Theory of Computing. Lecture 10 MAS 714 Hartmut Klauck

Shannon Switching Game

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem

Lecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

6 Randomized rounding of semidefinite programs

Week 2 Polygon Triangulation

Graph Theory. 1 Introduction to Graphs. Martin Stynes Department of Mathematics, UCC January 26, 2011

The Game of Hex and Brouwer s Fixed-Point Theorem. Michael Cao

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn

6.896 Topics in Algorithmic Game Theory March 1, Lecture 8

Integral Geometry and the Polynomial Hirsch Conjecture

1 Variations of the Traveling Salesman Problem

Lecture 6: Spectral Graph Theory I

Lecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs

The angle measure at for example the vertex A is denoted by m A, or m BAC.

5. THE ISOPERIMETRIC PROBLEM

Algorithmic Game Theory and Applications. Lecture 6: The Simplex Algorithm

Allocating Indivisible Goods

The Art Gallery Problem: An Overview and Extension to Chromatic Coloring and Mobile Guards

HW Graph Theory SOLUTIONS (hbovik) - Q

Lecture 11: Maximum flow and minimum cut

Lecture 14: Linear Programming II

1 Linear programming relaxation

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016

11.1 Facility Location

1 The Traveling Salesperson Problem (TSP)

Leximin Allocations in the Real World

Today s Papers. Composability is Essential. The Future is Parallel Software. EECS 262a Advanced Topics in Computer Systems Lecture 13

2017 SOLUTIONS (PRELIMINARY VERSION)

Lecture 19 Thursday, March 29. Examples of isomorphic, and non-isomorphic graphs will be given in class.

CHAPTER 8. Copyright Cengage Learning. All rights reserved.

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Chapter 16. Greedy Algorithms

Mix and Match: A Strategyproof Mechanism for Multi-Hospital Kidney Exchange

Discrete mathematics , Fall Instructor: prof. János Pach

Polar Duality and Farkas Lemma

Key aspects of cloud computing. Towards fuller utilization. Two main sources of resource demand. Cluster Scheduling

Approximation Algorithms

V1.0: Seth Gilbert, V1.1: Steven Halim August 30, Abstract. d(e), and we assume that the distance function is non-negative (i.e., d(x, y) 0).

Copyright 2000, Kevin Wayne 1

A Constructive Proof of Ky Fan's Generalization of Tucker's Lemma

Approximation Algorithms: The Primal-Dual Method. My T. Thai

Discrete Mathematics and Probability Theory Fall 2013 Midterm #2

Mesos: Mul)programing for Datacenters

Group Strategyproof Mechanisms via Primal-Dual Algorithms. Key Points to Discuss

Quadratic and cubic b-splines by generalizing higher-order voronoi diagrams

Lecture 8 Sept 25, 2014

princeton univ. F 15 cos 521: Advanced Algorithm Design Lecture 2: Karger s Min Cut Algorithm

Multiagent Graph Coloring: Pareto Efficiency, Fairness and Individual Rationality By Yaad Blum, Jeffrey S. Rosenchein

5 Graphs

CS270 Combinatorial Algorithms & Data Structures Spring Lecture 19:

Simplicial Hyperbolic Surfaces

Transcription:

Algorithms, Games, and Networks March 28, 2013 Lecturer: Ariel Procaccia Lecture 18 Scribe: Hanzhang Hu 1 Strategyproof Cake Cutting All cake cutting algorithms we have discussed in previous lectures are not strategyproof. For example, in the case that we use cut and choose in the two player case, the first player (the cutter), knowing the second player s valuation, can possibly manipulate by not cutting the cake into two equal value pieces with his own valuation: let position a be the position to cut the cake into equal value pieces by valuation of the first player and b be that of the second player. Then as long as a b, player 1 can cut between a and b. Then player 2 would choose the piece not containing b, and player 1 get a piece more than 1/2, which is what he is supposed to get with cut-and-choose algorithm. In the case of Dubins-Spanier, a player can potentially gain by shouting later. For the next result, we make the following assumption: Assumption 1 Agents report their full valuation functions, which are assumed to be concisely representable. Although determinsitic algorithms that are strategyproof (SP) and envy-free (EF) exists in some special cases, they are quite involved [Chen et al. 2010]. 2 A Randomized Algorithm Definition 2 Cake pieces X 1,..., X n is a perfect partition if they partition the cake such that V i (X j ) = 1/n for all i, j. Consider the following randomized algorithm for cake cutting: 1. Compute a perfect partition for the agents. 2. Draw a permutaion π S n uniformly at random. 3. Allocate agent i the piece X π(i). 18-1

Theorem 3 (Chen et al. 2010; Mossel and Tamuz 2010) The randomized cake cutting algorithm above is strategy-proof in expectation and always procduces and envy-free allocation. Proof: (EF) By definition of a perfect partition, the allocation is envy-free since every agent receives a cake of value 1/n. (SP) For each agent i, regardless the valuation function i reports, the expected utility gain of i by the algorithm is 1 n V i(x j) = 1 V i (X n j) = 1 n j [n] where X j are the pieces based on the valuation i reports. So in expectation, strategy doesn t increase gains. j [n] Here are some intuitions (thus not proofs, theorems, etc.) for what we did here and why we want it in general: We can relax the strategy-proofness (make SP happen in expectation); but we need to keep envy-free determinstic. In particular, envy-free in expectation is not very useful, because, for example, the simple algorithm randomly give the whole cake away to an agent is envy-free in expectation. To make the algorithm more intuitively sound, we want EF to always hold, especially after the allocation is made; but since strategy-proofness only matters before the decision time, strategy-proofness in expectation is preventing manipulation at some level (though you could have different variance and so on). In order for the randomized cake-cutting algorithm to work, we must have an algorithm to find a perfect partition. A theorem proves its existence, and further showed only a polynomial cuts are required, but this theorem is not constructive so it doesn t readily provide a cutting algorithm. Theorem 4 (Alon, 1986) A perfect partition always exists, needs polynomially many cuts However, if the valuation functions satisfy some special property, a perfect partition can be found. One example of the special cases is that the valuation function is a step function (i.e. a piecewise-constant function as demonstrated in Figure 1). The algorithm described as the following: (1) Mark the beginning and end of each constant piece for each agent, then we have t 0 = 0 < t 1 <... < t k = 1 such that on each [t j, t j+1 ], the valuation function is constant for all agent. Let X j be piece [t j, t j+1 ] (2) For each X j, we equally (in length) partition it into n pieces, and label them with 1, 2,..., n. Let the union all pieces labeled with the same number l to be the piece l. Note that the length of the each piece l is 1/n. Note that each agent i values each piece l as k j=0 V i(x j )/n = 1 n, since each [t j, t j+1 ] chunk contibutes 1/n its length thus V i (X j )/n value to piece l. 18-2

Figure 1: Step function example 3 Fair Rent Division (FRD) We use Sperner s Lemma to prove existence of fair rent division, a simple setting of which is the following: Assume there are three agents, A,B,C, and three rooms 1, 2, 3. The Goal is to divide the rent so that each person wants a different room. Sum of the prices for the three agents must be the total rent 1. Sperner s Labeling: Let T be a triangle partioned into elementary triangles(e.g. shown in Figure 2a). A Sperner labeling is a vertex labeling of all the elementary triangles such that (1) the three vertices of T are labeled differently, (2) vertices on edge of T must be labeled the same as one of the end point of this edge. (a) Sperner Label (b) Doors and Rooms Figure 2: Sperner Labeling (c) Walks Lemma 5 (Sperner s Lemma) Any Sperner labeling contains at least one fully labeled elementary triangle (a triangle of label (1,2,3)). Proof: Let Doors be (1,2) edges (edges of label (1,2)). Let Rooms be elementary triangles. These are demonstrated in Figure 2b 1. Number of doors on the boundary of T must be odd, because (i) they have to be on 18-3

(1, 2) edge of T ; (ii) walking along the edge of T from 1 to 2, then there must be odd number of switches (doors) between 1 to 2 or 2 to 1. 2. Every room has at most 2 doors (easily checked). 3. A room has one door iff the room is (1,2,3)-labeled. 4. If we walk into the triangle through a door, and keep going into the next room if there is another door (we are not allowed to use the same door more than once). If we exit the triangle, we enter with a door never used if it exists. If we get stuck we have found a (1,2,3) room or out of the boundary and every door is used. The walks are demonstrated in Figure 2c 5. It is easy to show that we do not visit the same room twice. 6. Since there are odd number of doors on the boundary, we cannot get stuck outside, thus we must end in some (1,2,3) elementary triangle. As a side note, Sperner s Lemma is closely connected to Brouwer fixed-point theorem, as the former can be used to prove the latter. We now use Sperner s Lemma to prove existence of fair rent division for three agents. We represent the possible rent share space as a triangle shown in Figure 3a. (a) Rent Representation (b) Partition (c) approximation Figure 3: Fair Rent Sharing Any point in the triangle is a convex combination of its three vertices. Let (x, y, z) be the ratios for the convex combination and the rent for each room is x, y, z, respectively. To approximate a fair rent division, we 1. Triangulate the big triangle T into small elementary triangles, such that each elementary triangle is labeled with ABC, as an example shown in Figure 3b 2. Ask the owner of each vertex (of elementary triangles) to tell its preference of room, assuming 0 rent is always the prefered. Label the vertices with the given room preference 1, 2, or 3. 18-4

3. By an augmented Sperner s lemma (since each vertex of T is of form (1 or 2), (2 or 3) or (3 or 1) instead of 1, 2, or 3), there exists an (1,2,3)-labeled elementary triangle. Then any rent share p represented within this elementary triangle is an approximation since each agent prefers a different room for some rent shares close to p. This approximation is shown in Figure 3c. Some remarks: (1) Such a triangle is nothing but an approximately envy free allocation. (2) By making the triangulation finer, we can increase accuracy. (3) In the limit we obtain a completely envy free allocation. (4) Same techniques generalize to more agents [Su, 1999] 4 Dominant Resource Fairness (DRF) We study the following setting: Allocating mutiple homogeneous resources to agents with different requirements. A typical real world running example is cloud computing, in which an agent may have requirement such as (2 CPU, 1 RAM) for each copy of its tasks, and the agent values the allocation based on the number of tasks he can run. So for example, with the above demands the agent is indifferent between allocation of (4 CPU,2 RAM ) and (5 CPU,2 RAM), since in both case, we can run exactly 2 copies of the task. The state-of-the-art systems employ a single resource abstraction (bundling fixed amounts of each resource together). Here we study the case such that: Assumption 6 Agents have proportional demands for their resources We use the following mathematical model: 1. Set of agents N = {1,.., n} and set of resources R, R = m. 2. Demands of agent i is d i = (d i1,..., d im ), d ir [0, 1], such that there exists r, d ir = 1. 3. Allocation A i = (A i1,..., A im ), where A ir is the fraction of resource r that is allocated to i. 4. Utility is induced by the number of copies (fraction allowed) of tasks we can run with the given allocation, which is u i ( A i ) = min r R A ir/d ir We say the dominant resource of i is r, if d ir = 1; and the dominant share of i is A ir, if r is the dominant resource of i. Mecahnism/Key-Idea: allocate proportionally to demands and equalize dominant shares. Formally, we seek the maximum x such that we can allocate to agent i an xd ir fraction of resource r: max xs.t. r R, xd ir 1 i N 18-5

This can be reduced to x = 1 max r R i N d ir Example: m = 2, N = 2, d 11 = 1/2, d 12 = 1, d 21 = 1, d 22 = 1/6, then x = 1 1 = 2/3. +1 Axiomatic properties of DRF, 1. Pareto optimality (PO): no one can be made better off without making at least one individual worse off. 2. Envy-freeness (EF): u i ( A i ) u i ( A j ) for all i, j N. (Note that in cake cutting: EF Proportionality, but here it doesn t) 3. Proportionality (or sharing incentives, individual rationality): For all i N, u i ( (A i )) u i (( 1 n,..., 1 n )) 2 4. Strategyproofness (SP): Faking d i results in A i, then u i( A i ) u i ( A i ). Definition 7 An allocation A i is non-wasteful if there exists x such that A ir = xd ir for all r. Intuitively, non-wasteful means no resources are given to i but not used to create tasks. By definition it is easy to see: if A i is non-wasteful and u i ( A i ) < u i ( A i ) then A ir < A ir for all r. Theorem 8 (Ghodsi et al., 2011) : DRF is PO, EF, proportional, and SP Proof: 1. PO: By definition of DRF, we increase x until we cannot do so any more, thus if any agent i increases utility, then his the dominant resource r must be overused (the total usage is more than 1, which is forbidden), unless someone decreases his utility. 2. EF: Let r be the dominant resource of i, then A ir = x = xd ir xd jr, so switching is guaranteed to not do better. 3. Proportionality: For every resource r, d ir n Thus we have i N max r R d ir n i N 18-6

So that x = 1 max r R i N d ir 1 n 4. SP: Let i manipulate, resulting in allocations A j = x d jr. (Assume everyone but i reports the same d ir as before for each i, r). Case 1: x x, then i receives a smaller dominant share. Case 2: x > x, Let r be the resource that is saturated by A, which means xd jr = 1 j N A ir = 1 i j A jr = 1 i j xd jr > 1 i j x d jr = 1 i j A jr A ir References [1] A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica. Dominant resource fairness: Fair allocation of multiple resource types. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI), pages 24 37, 2011. [2] F. E. Su. Rental harmony: Sperner s lemma in fair division. American Mathematical Monthly, 106(10):930 942, 1999. 18-7