Online Budgeted Matching in Random Input Models with applications to Adwords
|
|
- Egbert Walton
- 8 years ago
- Views:
Transcription
1 Online Budgeted Matching in Random Inut Model with alication to Adword Gagan Goel Aranyak Mehta Abtract We tudy an online aignment roblem, motivated by Adword Allocation, in which querie are to be aigned to bidder with budget contraint. We analyze the erformance of the Greedy algorithm (which aign each query to the highet bidder) in a randomized inut model with querie arriving in a random ermutation. Our main reult i a tight analyi of Greedy in thi model howing that it ha a cometitive ratio of 1 1/e for maximizing the value of the aignment. We alo conider the more tandard i.i.d. model of inut, and how that our analyi hold there a well. Thi i to be contrated with the wort cae analyi of [MSVV05] which how that Greedy ha a ratio of 1/2, and that the otimal algorithm reented there ha a ratio of 1 1/e. The analyi of Greedy i imortant in the Adword etting becaue it i the natural allocation algorithm for an auction-tyle roce. From a theoretical erective, our reult imlifie and generalize the claic algorithm of Kar, Vazirani and Vazirani for online biartite matching. Our reult include a new roof to how that the Ranking algorithm of [KVV90] ha a ratio of 1 1/e in the wort cae. It ha been recently dicovered [KV07] (indeendent of our reult) that one of the crucial lemma in [KVV90], related to a certain reduction, i incorrect. Our roof i direct, in that it doe not go via uch a reduction, which alo enable u to generalize the analyi to our online aignment roblem. 1 Introduction In thi aer we tudy an online aignment roblem in which there i a random tream of item (or querie) arriving online, and each item, a it arrive, ha to be allocated to one of everal bin (or bidder). Each bin ha a different value for the item, and alo ha a caacity (or budget). The goal i to maximize the total value of the allocation. The motivation for thi roblem i keyword baed ad auction. In uch an auction, advertier reort to the earch engine their bid for different keyword (how much they are willing to ay for each click on their ad if it i laced next to the earch reult for that keyword). Beide ubmitting bid for different keyword, an advertier alo reort a global daily budget, over all keyword. When a uer ubmit a query (coniting of keyword), he i returned, next to the earch reult, a mall lit of advertiement relevant to the keyword. The earch engine job i to decide which ad to return with each query in the query equence. The Adword auction, being crucial for the multi-billion dollar market they uort, call for theoretical invetigation and there are everal different iue that have been tudied (e.g., the tudy of game theoretic aect of ingle query auction [AGM06, EOS07, Var06] and otimization from advertier erective [RW06, FMPS07]). Arguably, one major iue i that of deigning allocation algorithm to maximize revenue (ee [MSVV05, LPSV07]). An allocation algorithm ha to determine for each query, a it arrive, which bidder win the query, i.e., whoe ad hould be dilayed. A natural algorithm for uch an auction tyle roce i Greedy : Select the highet bidder for each query. It can be hown that the Greedy algorithm ha a cometitive ratio of 1/2 in the tandard online wort-cae cometitive analyi model. In [MSVV05] a determinitic algorithm with a cometitive ratio of 1 1/e 0.63 wa reented, which wa roved to be otimal, even over randomized algorithm 1. College of Comuting, Georgia Intitute of Technology, Atlanta GA, gagang@cc.gatech.edu Google, Inc., Mountain View, CA, aranyak@google.com (Work done while the author wa at the IBM Almaden Reearch Center, San Joe, CA.) 1 In earch auction, winner are uually charged the next highet bid. Furthermore, each bid can be normalized by quality factor.
2 In ite of the elegance and otimal cometitive ratio of thi algorithm, there remain ome diatifaction with the ue of wort cae analyi in that we are unlikely to ee a wort-cae equence of querie a inut. In thi aer we make a more ditributional aumtion about the query equence: the querie arrive in a random ermutation, i.e. the et of querie i till arbitrary, but the order of querie i random. Thi lead u to formulate the following combinatorial roblem (we aume, for imlicity, that there i exactly one ad returned er query): There are m bidder. Bidder i ha a budget of B i. There i a (unknown) et Q of n querie. For q Q, and i [m], bid iq i the bid of bidder i for query q. The querie arrive online one at a time, in a random ermutation of Q. The algorithm ha to allocate each query, a it arrive, to a bidder. Let Q i be the et of querie allocated to bidder i at the end of the inut equence. The revenue of the algorithm i defined a m i=1 min{b i, q Q i bid iq }. The goal of the algorithm i to maximize it revenue. We alo tudy thi aignment roblem in the more tandard i.i.d. inut model, in which there i an unknown ditribution on querie, and the next query in the equence i icked indeendently from thi ditribution. Undertanding the Adword allocation roblem in ditributional model i imortant, and wa an oen quetion in [MSVV05] and in [LPSV07] (ee alo a different aroach in [MNS07]). The random ermutation model ha been tudied, e.g., in the claic ecretary roblem [Dyn63], recent work in auction [BIK07] and in data tream [GM06] with the motivation that an adverary may have control over the et of inut, but not have control over the order of the inut, which may follow ome random roce. In the roblem above, we will aume that for each bidder i m: max q Q bid iq i very mall comared to B i. Thi i a reaonable aumtion for the Adword motivation, alo made in [MSVV05]. But in fact, our algorithm and analyi work for a larger cla, encomaing thi aumtion. We define thi cla formally in Section 3, but mention here that thi cla alo contain the roblem of biartite matching (all bid 0 or 1, all budget 1) and b-matching, for any oitive integer b (all bid 0 or 1, all budget b). The offline verion of thi roblem i NP-hard, with the bet known algorithm [AM04] (ee alo [FGMS06]) giving a factor of 1 1/e, even if the bid are not retricted to be mall comared to budget (when the bid are very mall comared to budget then LP rounding give a factor very cloe to 1). Finally, we note that indeendent of the Adword motivation, the roblem defined above i a general combinatorial allocation roblem, cloely related to claic matching roblem, and with oible alication beyond the current motivation. 1.1 Main Reult Our main reult i an analyi to how that Greedy ha cometitive ratio 1 1/e in the random ermutation inut model, a well a in the i.i.d. model. Thi i to be comared with the ratio in the wort cae inut model: 1/2 for Greedy and the otimal 1 1/e for the algorithm in [MSVV05]. We alo how that our analyi i tight by roviding examle in the two model for which Greedy ha ratio exactly 1 1/e. We alo how a lower bound that no determinitic algorithm can have a ratio better than 3/4 and no randomized algorithm can have a ratio better than 5/6 for the cae of biartite matching in the random ermutation model. Along the way, we rovide a direct roof for the RANKING algorithm of [KVV90] for the online biartite matching roblem (ee below for detail). 1.2 Technique From a technical erective our work can be een a imlifying and generalizing the claic work of Kar, Vazirani and Vazirani on online biartite matching (matching boy to girl) in the wort cae inut model [KVV90]. Their RANKING algorithm fixe beforehand a random ermutation of the boy, and matche each arriving girl to the highet available neighbor in the ermutation. They how a duality reult that the erformance of RANKING in the wort cae i the ame a the erformance of Greedy in the random ermutation model (boy arrive in a random ermutation). They how that thi cometitive ratio i 1 1/e, by analyzing a virtual algorithm called EARLY, which work identical to RANKING, but additionally, refue to match a boy if the correct girl ha already been matched off. They how that RANKING i trictly better than EARLY, and that EARLY ha a cometitive ratio of 1 1/e. For imlicity of reentation, we aume in our analyi that the bid are already normalized if neceary, and that we dilay only one ad er query and hence need to determine a ingle winner er query. We do not conider the iue of econd rice in our etting, and aume that a winning bidder ay hi own bid. We alo make a natural modeling aumtion (alo made in [MSVV05]) that all the bid of a bidder are very mall comared to hi budget.
3 On the way to roving our main reult on the general Adword roblem, we rovide a different roof for biartite matching. Thi roof ha the advantage that it i imler and direct, in that we do not conider any Refual algorithm (like EARLY) at all, but rove the factor of Greedy via direct argument. Thi imler analyi enable u to extend the coe of the algorithm and the analyi to our general aignment roblem in the randomized inut model. In fact, indeendent of our reult, it ha been dicovered [KV07] that the roof in [KVV90] ha a hole, in articular that one of the lemma (Lemma 6) related to the EARLY algorithm i incorrect. Thu, while RANKING indeed ha a ratio of 1 1/e (by our roof), the ratio of EARLY i unknown at thi oint. Our direct roof for the cae of matching follow the main idea from [KVV90], but alo introduce ome new idea. To rovide a direct roof for Greedy we ue a different claification of ermutation: For each boy, we claify the et of all ermutation into thoe in which remain unmatched and thoe in which get matched. We further claify the latter cla into two ubclae good and bad deending on the tructure of the match. We then bound the number of unmatched boy by howing that for every unmatched boy there i a certain fraction of bad matche, and for every bad match there i a certain fraction of good matche. Thi give u the factor of Greedy. The Tagging Procedure: In going from the cae of matching to the more general cae of Adword, we need to develo ome new technique to take care of the comlexity introduced in having different bid for the ame query. The main reaon i that in matching, ince all the bid are 0 or 1 (with a budget of 1), any match i a good a another, while thi i not the cae with different bid. Thi create everal different (but related) iue: In matching, if a boy get matched to a wrong girl then it can affect at mot one other boy, in the ene that at mot one other boy might not get matched. In the general roblem, if a query goe to a wrong bidder then it can affect everal other querie in many different way. To cature thi interaction we introduce a tagging rocedure which find an aroriate ma from a query to other querie. Thi i required in order to define notion of good and bad event. Another difference from matching i that a query may be tagged imultaneouly by any number of good and bad tag, while in matching the maing i alway either good or bad, from exactly one boy to another. On Monotonicity: One imortant roerty that we need in our analyi i that of monotonicity of the allocation algorithm: If you move a query to the front of the ermutation, then each bidder end at leat a much money now a before (ee Lemma 2.5 and 3.1 for detail). Thi roerty eem very ueful to get a handle on the analyi: Our roof in the matching cae exloit the fact that Greedy i monotonic, while the roof in [KVV90] ha a hole reciely becaue their EARLY algorithm i not monotonic. However, uon moving to the general Adword roblem, it turn out that Greedy i not monotonic a uch. Thi create an obtacle in the roof. We get around it by analyzing a variant of Greedy: In the cae that a bidder ha not yet exhauted hi budget, but hi bid for a query i larger than hi remaining budget, we do not truncate hi bid, but intead over-end hi budget. Each bidder will overend at mot once, and we will not count the overending a art of the revenue. Thi variant of Greedy can be hown to be monotonic, and therefore eaier to analyze. We then how that the revenue of Greedy i almot the ame a that of the variant, thu roving a bound for Greedy. Regarding our random ermutation model of inut, we note that it i not new, ued mot notably in the claic ecretary-tyle roblem [Dyn63] (ee alo [BIK07]), in which a random ermutation of a et of number arrive online and we have to ick the larget number when it arrive. Our roblem i concetually different, ince it involve artitioning the entire random equence into m art to maximize the um of the value of the art, rather than icking one element or tructure in the equence which i the larget. Likewie, the technique from ecretary-tyle roblem do not eem to aly here. The random ermutation model ha alo been ued recently in the data-tream literature [GM06]. We tructure the ret of thi aer a follow: We firt tudy the imler cae of biartite matching in Section 2, before analyzing the general roblem in Section 3 (the roof in the cae of matching i imler and hel undertand the general cae). We analyze the i.i.d. model in Section 4.2, and rovide the lower bound in the ermutation model in Section 4.3. We conclude with a general dicuion of thi and related roblem in Section 5.
4 2 The Cae of Online Biartite Matching In thi ection we conider the ecial cae of biartite matching (bid all 0 or 1, budget all 1). In thi roblem, there i a biartite grah (boy and girl). In the random ermutation model, only the girl are known to the algorithm in advance, while the boy arrive in a random ermutation. A a boy arrive, hi incident edge are revealed, and he can be matched off to ome girl. The Greedy algorithm matche each arriving boy to the firt neighboring girl who i till available (firt in ome re-determined arbitrary order). We roceed to analyze the erformance of Greedy in thi model. By a duality rincile hown in [KVV90], thi alo give a roof for RANKING in the online wort cae model. We label the boy and girl with number from 1 to n. We will ue, q [n] to denote boy and girl, and ue, t [n] to denote the oition in the ermutation. We alo ue the notion of time: time t will denote the event when Greedy trie to allocate the boy at oition t. We aume that there i an otimal matching of ize n, and that [n] it matche boy with the girl (thi aumtion i for imlicity of reentation, and can be removed later). Let Ω be the et of all ermutation of [n]. For a ermutation σ Ω, σ() will rereent the boy at oition, and σ 1 (), the oition of boy. 2.1 Intuition: Whether a boy get matched or not clearly deend on hi oition in the random ermutation. If he i high enough in the ermutation, then he will get matched, but if he come in low in the ermutation, then by the time he arrive, hi deirable girl may all have been matched off to other boy. Let u ay that boy remained unmatched in a articular ermutation σ. Note that thi could only have haened if girl wa already matched (ay, to boy ) when boy arrived. So we can aociate the mi of boy to the match of boy. Likewie, we can aociate every mi to a unique match. But notice that all thee matche that we conidered are of ecial kind: girl got matched to boy and boy arrived after boy. We will later define thee kind matche to be bad matche. Now let u conider the econd kind of match: i.e. girl got matched to boy and boy arrived before boy. We hall later define uch a match of boy to be a good match. Note that in a good match we are guaranteed that both boy and girl got matched (a well a boy ). Our goal i to rove that, on the average over all ermutation, there are many matche, in articular, many good matche. Clearly, every mi for boy i caued by a bad match for ome other boy q (who tole hi girl ). Thi immediately how a factor of 1/2 for Greedy (in fact for every ermutation). We will how omething tronger: On average over all ermutation, the mie reult in an even larger fraction of bad and good matche. 2.2 Proof Outline: For each σ Ω, [n] and [n], define: 1 if σ() = and boy remain mi σ (, ) = unmatched at the end of Greedy. 0 otherwie. 1 if girl q i matched to boy σ(), good σ (, q) = and σ 1 (boy q). 0 otherwie. 1 if girl q i matched to boy σ(), bad σ (, q) = and σ 1 (boy q) >, 0 otherwie. Define alo the following artition for every boy. Partition the et Ω into grou of ermutation.t. in each grou the relative order of all but boy i fixed. Let Ω be one uch grou. Let σ k Ω be the ermutation in which boy occur at oition k. We will rove three main relationhi between aggregate of thee variable. The firt inequality follow immediately from the definition (either the boy in oition t remain unmatched, or ome girl get matched to him). The other two require a detailed look at the relationhi between different ermutation, and their roof
5 are rovided immediately below in Section 2.3. Lemma 2.2 and 2.3 hold for every [n] and every grou Ω. Lemma 2.1. σ Ω, t [n] : good σ (t, ) + bad σ (t, ) + mi σ (t, ) = 1 Lemma 2.2. t [n] : mi σt (t, ) σ Ω :<t bad σ (, ) n Lemma 2.3. t [n 1] : bad σ (, ) n σ Ω t σ Ω : t+1 good σ (, ) The three lemma above contrain the variable mi, bad and good at the end of Greedy, for every inut. Note how Lemma 2.2 and 2.3 how that if there are many mie then there are many bad matche and therefore many good matche. Alo notice that the revenue of Greedy i given by: [ ] E [ σ Ω bad σ (, )] + E σ Ω [ good σ (, )] We minimize the revenue over the contrained region given by the inequalitie to get the wort erformance of the algorithm (on a random ermutation of the wort et Q). Thi rogram turn out to be linear, and we can olve the LP to how a factor of 1 1/e. Thi technique i known a a factor revealing LP and the detail are given in the Aendix A. Theorem 2.1. The cometitive ratio of Greedy in the random ermutation inut model (and hence of RANK- ING in the online model) i 1 1/e. 2.3 Some Baic Proertie of Greedy and Proof of the Inequalitie: We tart by decribing three baic roertie (Lemma 2.4, 2.5 and 2.6) of the Greedy algorithm and the variable defined above. Thee will hel u work toward our main lemma (Lemma 2.2 and 2.3). The firt lemma follow eaily from the definition. Lemma 2.4. [Prefix Proerty] For any two ermutation σ 1 and σ 2, and any t [n], if we have t : σ1 1 () = σ 1 2 (), then the run of Greedy on σ 1 and σ 2 are identical from time 1 to time t. The econd lemma decribe a crucial monotonicity roerty of the Greedy algorithm. Informally, it ay that if you move a boy u front in the ermutation, then the et of girl who ued to be matched by time t are now all matched by time t + 1. Formally, for [n], define G (t) to be the et of the girl matched during the time 1 to t by Greedy in the run on ermutation σ. Lemma 2.5. [Monotonicity], m [n], < m : (1) t [1, 1] : G m (t) = G (t) (2) t [ 1, m 1] : G m (t) G (t + 1) Proof. The firt art follow directly from Lemma 2.4. We will ue induction on t to rove the econd art. The bae cae i when t = 1, and follow eaily from the firt art itelf. Suoe the lemma hold for all t k,
6 where 1 k < m 1. We will how that the lemma hold for t = k + 1. By hyothei, G m (k) G (k + 1). Notice that the boy at oition k + 1 in σ m i ame a boy at oition k + 2 in σ. Let u denote thi boy by b. If b i unmatched in the run of Greedy on σ m, then the induction te hold trivially. So, intead, aume that b i matched to girl g in the run of Greedy on σ m. We hall how that g G (k + 2). Suoe not. Thi mean that girl g wa available when Greedy wa matching b in σ, but the boy b got matched to ome other girl g / G (k + 1). By the induction hyothei we have g / G m (k). Therefore both g and g were available at time k + 1 in the run on σ m, and Greedy hould have referred g over g in that run a well, a contradiction. Hence g G (k + 2) and the lemma hold by induction. From the definition, we know that for any ermutation σ, at mot one out of the 2n variable, {good σ (, ), bad σ (, )} [n] can be 1: (2.1) σ : (good σ (t, ) + bad σ (t, )) 1 t The third roerty tell u which variable i 1, for each ermutation σ x Ω : Lemma 2.6. [Partition] Fix, and a artition Ω. Conider the run of Greedy on the ermutation σ n. If girl get matched to the boy at oition t, for ome t [n], then: (1) x [1, t] : good σx (, ) = 1 : t+1 (2) x [t + 1, n] : bad σx (t, ) = 1 Proof. (2): By Lemma 2.4 (Prefix Proerty), we know that x [t + 1, n], in the run on σ x, girl i matched to the boy at oition t, and therefore bad σx (t, ) = 1. (1): By Lemma 2.5 (Monotonicity), we know that x [1, t], in the run on σ x, girl i matched to ome boy whoe oition lie in the range [x, t + 1], and therefore [x,t+1] good σ x (, ) = 1. Now we are ready to rove the main inequalitie (Lemma 2.2 and 2.3): Proof of Lemma 2.2 : If mi σt (t, ) equal 0, then lemma hold trivially. So aume that mi σt (t, ) = 1. Thi mean that in σ t, boy (who i in oition t) remain unmatched. Thi i oible only if girl i matched to ome boy whoe oition i ome t < t. Now by Lemma 2.6, [t + 1, n], bad σ (t, ) = 1. Thi give the following equence: (2.2) bad σ (, )/(n ) σ Ω :<t bad σ (t, )/(n t ) (t < t) σ Ω n bad σ (t, )/(n t ) =t +1 = 1 (Lemma 2.6) = mi σt (t, ) Proof of Lemma 2.3 : the run on σ n. We conider two different cae: whether girl get matched or remain unmatched in
7 Cae 1: Girl remain unmatched in σ n. Take any ermutation σ x Ω, x [n]. If girl i matched in σ x then, by Lemma 2.4 (Prefix Proerty), it could only be to a boy in ome oition greater than or equal to x. Hence, t : bad σx (t, ) = 0, and the lemma hold trivially. Cae 2: Girl i matched in σ n. Suoe he i matched to the boy in oition t. There are two ubcae: Cae 2.1: t < t. Lemma 2.6 and Lemma 2.1 tell u which of the variable are 1. We ee that for every σ Ω, and every < t, bad σ (, ) = 0. Hence in thi cae, the left hand ide i 0, and the lemma follow trivially. Cae 2.2: t t. Again uing Lemma 2.6 and Lemma 2.1 we get the following: σ Ω t bad σ (, ) n = bad σ (t t, ) n t σ Ω = t = σ Ω : t +1 = σ Ω : t+1 good σ (, ) good σ (, ) All the equalitie follow from Lemma 2.6 and Equation (2.1). The firt equality hold becaue t, σ Ω, bad σ (, ) = 0. The econd equality hold becaue bad σ (t, ) = 1 for reciely the lat n t of the σ Ω. Similarly, the lat two equalitie hold becaue : t +1 good σ(, ) = 1 for reciely the firt t of the σ in Ω, and the ret of the variable are 0. Thi rove the lemma in thi cae a well. 3 The General Problem In thi ection we tudy the general aignment roblem a defined in Section 1. A mentioned there, our analyi hold for a larger cla of inut which include biartite matching and the cae of mall bid. We decribe thi cla below: For each bidder i, conider an allocation of ome ubet of the querie to bidder i, ay (q 1, q 2,..., q k ), which k 1 traddle the budget in the following ene: j=1 bid ij < B i k j=1 bid ij. For every uch allocation we are guaranteed that the overending i mall comared to the budget, i.e., k j=1 bid ij B i B i. We will how that Greedy, which aign every query that arrive to the highet bidder with a non zero remaining budget, ha a cometitive ratio of (1 1/e) when the inut arrive in a random ermutation of the (unknown) query et (the cae of i.i.d. inut i conidered in Section 4.2). Note that OPT i an offline otimum algorithm and will have ame allocation for any uch inut ermutation. Our analyi of Greedy in the matching cae involved a maing between a boy and the boy to whom girl got matched. In the more general cae of Adword allocation with different bid thi kind of aociation become non trivial. For every query there i a correonding bidder i to whom OPT allocated query. But now Greedy could aign everal querie with different bid value to thi bidder and the maing between query and thee querie i not traightforward. Our tagging rocedure take care of thi difficulty: For a ermutation σ Ω, σ() will rereent the query at oition, and σ 1 (), the oition of query. The Tagging Procedure: Fix an otimal allocation OP T and alo fix, for each bidder, an arbitrary ordering of the querie aigned to it in OPT. Now conider any query q and the bidder i to whom OPT aigned q. In the fixed ordering, when OPT aigned q to i, uoe that the money ent by i increaed from x to y. Then we will call [x, y] i, the Ot-Interval of the query q: i.e., define Ot-Interval(q) = [x, y] i. Greedy, run on ome ermutation σ, make it own allocation, leading to a imilar Alg-Interval σ (q) for each query q. For a query q, the money in Ot-Interval(q) i ent by Greedy on ome other querie, ay, e.g., q 1, q 2, q 3. We ay that q 1, q 2 and q 3 tag the Ot-Interval of q. We define taget σ (q 1, q) a the et Ot-Interval(q) Alg-Interval σ (q 1 ). The ame et i alo called goodet σ (q 1, q) or badet σ (q 1, q), deending on whether σ 1 (q) σ 1 (q 1 ) or σ 1 (q) > σ 1 (q 1 ).
8 q5=5 q4=5 OPT q3=2 q2=4 q1=2 Greedy Figure 1: How bidder i money i ent in OPT and in the run of Greedy on the ermutation (q 1, q 2, q 4, q 5, q 3). The dotted line highlight goodet σ(q 3, q 5) = taget σ(q 3, q 5) Examle: For illutration uroe, conider the following cenario. Focu on five ecial querie q 1, q 2, q 3, q 4, q 5, and a bidder i who ha a budget of 10. Fix an OPT which aign q 4 and q 5 to bidder i in that order (ee Fig 1). Conider a ermutation σ in which the relative oition of thee querie i (q 1, q 2, q 4, q 5, q 3 ), and uoe that Greedy aign q 1, q 2, q 3 to bidder i (in that order). The bid of the different querie are hown in the figure. Then we have the following taget: taget σ (q 1, q 4 ) = [0, 2] i, taget σ (q 2, q 4 ) = [2, 5] i, taget σ (q 1, q 5 ) =, taget σ (q 2, q 5 ) = [5, 6] i, taget σ (q 3, q 4 ) =, taget σ (q 3, q 5 ) = [6, 8] i. The firt four are badet and the lat two are goodet (ince q 3 i after q 4 and q 5 in the ermutation). Note alo that the ubinterval [8, 10] i of Ot-Interval(q 5 ) i not tagged. Thi contribute toward the lo of Greedy, and we will define it later a a mi of q 5. Note how a query Ot-Interval can be tagged imultaneouly by any number of other querie, and imultaneouly with good and bad tag (unlike in the cae of matching, in which the tag were one-to-one). Alo, if a bidder end more money in Greedy comared to in OPT then ome art of Alg-Interval σ (q) may not even be ued to tag any Ot-Interval. Define extra σ (q) = Alg-Interval σ (q) \ Ot-Interval(). Define [x, y] i = y x. Alo, for any query q, we define ot(q) = Ot Interval(q) and alg σ (q) = Alg Interval σ (q). By convention, = The Main Proertie of Greedy and the Analyi Recall from Section 2 that in the cae of matching, Greedy ha three roertie (namely Prefix, Monotonicity and Partition) which we exloited in roving the relationhi between the variable mi, bad and good. In the general cae, a we aw above, Greedy behave in a much le controlled manner becaue of the different bid. However, we manage to rove that the correonding roertie till hold, in ite of thi different behavior 2. Thi i ufficient to rove our main lemma (Lemma 3.4, 3.5 and 3.6), and rove a factor of 1 1/e. We rove the three roertie in thi Section, and defer the roof of Lemma 3.4, 3.5 and 3.6 to the aendix B. Let u firt exlicitly ell out a very baic roerty of Greedy (which we took for granted in matching): Conitent Tie-Breaking: Conider a query q, and any two ermutation σ, σ. Define highet σ (q) a the et of bidder who have the highet bid for q among all bidder with non-zero remaining budget, when q arrive during the run on σ. Define highet σ (q) imilarly. Suoe that highet σ (q) highet σ (q), and uoe that in the run on σ, q i allocated to bidder i highet σ (q). Then it ha to be true that q i allocated to i, even in the run on σ. We now roceed to rove the monotonicity roerty. Fix a query Q. Partition the et of all ermutation Ω into ubet uch that for each ubet, all the ermutation within the ubet have the ame order on all querie, excet for query. For any ubet Ω of thi artition, let the ermutation be called σ 1,.., σ n, according to the oition of. Define alg σ (i, t) to be the amount of money that bidder i ha ent in the run of Greedy on the ermutation σ 3 u to (jut after) time t. We have the following verion of the monotonicity lemma: Lemma 3.1. [Monotonicity] For every, [1, n], <, for every t 1, and for every bidder i [1, n], we have one of the two condition: Either: alg σ (i, t + 1) alg σ (i, t) 2 A tated in the Introduction, Greedy a uch i not monotonic, but we modify Greedy o that it doe not truncate the bid by the remaining budget. Thi variant i the one we analyze here, and i monotonic. 3 Note that ince the algorithm may overend budget, alg σ(i, t) could be greater than B i (however it i at mot B i + ɛ i ).
9 Or: alg σ (i, t + 1) B i Proof. Fix < n and a bidder i. We will rove the lemma by induction on t going from 1 to 1. We are comaring the run of ALG on σ and on σ u to time t. Note, firtly, that the two ermutation are identical until oition 1, hence o are the two run (by the Prefix Proerty). So, in fact, t <, alg σ (i, t) = alg σ (i, t) and o alg σ (i, t+1) alg σ (i, t). Hence we may aume that the bae cae of the induction i t = 1. Suoe the tatement i true for ome t [ 1, 2]. We will how it i true for t + 1 a well. Thi would rove the lemma. Let q be the query σ (t + 1). Since t [ 1, 2], we know that σ (t + 2) = q a well. Suoe that in the run on σ, ALG allocate q to bidder j. We ak: where doe ALG allocate q in the run on σ? Define, for a ermutation π and a time τ, avail π (τ) a the et of bidder available with non-zero remaining budget in the run of ALG on π at (jut before) time τ. By the induction hyothei, avail σ (t + 2) avail σ (t + 1). Alo, we know that j avail σ (t + 1) and that j i the highet bidder among bidder in avail σ (t + 1). Now conider two cae: If j avail σ (t + 2) then, by the argument above, j i the highet bidder in avail σ (t + 2) a well, and (by the Conitent Tie-breaking Proerty), ALG will allocate q to j in σ. In the econd cae, when j avail σ (t + 2), then alg σ (j, t + 1) B j anyway. Hence, both action kee the induction tatement true for t + 1. The refix roerty hold a before, by the definition of Greedy: Lemma 3.2. [Prefix Proerty] For any two ermutation σ 1 and σ 2, and any t [n], if we have t : σ1 1 () = σ 1 2 (), then the run of Greedy on σ 1 and σ 2 are identical from time 1 to time t. For any oition, we will ue taget σ (, ) to mean taget σ (σ(), ). Similarly we define goodet σ (, ) and badet σ (, ). Alo define extra σ () = extra σ (σ()). We get the following verion of the artition lemma: Lemma 3.3. [Partition] Fix, and a artition Ω. (1) x [1, t] : :x t+1 goodet σx (, ) taget σn (t, ) (2) x [t + 1, n] : badet σx (t, ) = taget σn (t, ) Proof. (2): Follow directly from Lemma 3.2. (1): Suoe i be the bidder to which OPT allocated query. By the Prefix Proerty, alg σk (i, k 1) = alg σn (i, k 1), and by the monotonicity lemma either alg σk (i, +1) B i or alg σk (i, +1) alg σn (i, ). So either alg σk (i, + 1) alg σk (i, k 1) alg σn (i, ) alg σn (i, k 1), or alg σk (i, + 1) B i. In either cae, taget σn (, ) k +1 taget σ k (, ). But recall that taget σk (, ) contribute toward goodet σk (, ) for all.t. k. Thi rove the lemma. Define good σ (, ) = goodet σ (, ) and bad σ (, ) = badet σ (, ). Alo define: { max(0, ot() alg σ ()) if σ() = mi σ (, ) = 0 otherwie. Thee three baic roertie hown above (Lemma 3.1, 3.2 and 3.3) uffice to rove the required relationhi between good, bad and mi, and to rove the main theorem. We tate thee inequalitie below (Lemma 3.5 and 3.6 hold for every Q and every grou Ω ). Their roof are more involved than the correonding roof in the cae of matching, and are rovided in the Aendix B. Lemma 3.4. [n], σ Ω : bad σ (, ) + good σ (, ) + extra σ () + mi σ (, ) ot(σ())
10 Lemma 3.5. t [n] : mi σt (t, ) σ Ω <t bad(, ) n Lemma 3.6. t [n 1] : bad(, ) n σ Ω t good(, ) σ Ω t+1 Theorem 3.1. The factor of Greedy in the random-ermutation inut model i at leat (1 1/e). Sketch of Proof: Lemma 3.4, 3.5 and 3.6, rovide inequalitie bounding the variable mi, bad, good and extra. We ue the ame idea of factor revealing LP (a we ued in Section 2) by maximizing the lo of revenue over thee inequalitie. It turn out that after ome rearrangement, we get the ame LP (but with our new variable). The detail of thi roof are rovided in Aendix C. Recall, however, that we had modified Greedy to allow overending of budget. We can how (e.g., by induction) that the revenue of thi variant of Greedy i almot the ame a that of the ure Greedy, which truncate the bid by the remaining budget, when the bid are mall (each bidder ending may be different by at mot nɛ, where eilon i the larget bid). Thu we have roved the factor for both verion of Greedy. 4 Additional Reult 4.1 Tightne of the analyi We rove that our analyi i tight, by giving an examle in which Greedy doe no better that 1 1/e (detail are given in Aendix D): Theorem 4.1. The factor of Greedy in the random-ermutation inut model i no more than (1 1/e). 4.2 The i.i.d. randomized inut model In thi model there i a fixed (but unknown) ditribution on Q, and the next query in the equence i icked indeendently from thi ditribution. A imle reduction to our random ermutation etting how that: Theorem 4.2. The factor of Greedy in the indeendent ditribution inut model i at leat (1 1/e). Alo, there i an examle ditribution over which Greedy doe no better than 1 1/e. Proof. (Sketch) In thi model we have a amle ace coniting of the different query equence obtained by drawing n time from the given ditribution. We have to comare the exected erformance of Greedy with the exected erformance of OPT over thi amle ace 4. Divide the amle ace into clae.t. the et of querie i the ame for every equence in a cla. Clearly, each cla conit of all the ermutation of ome et, and furthermore, the robability of occurrence of each equence in a cla i the ame. Suoe Ω i one uch cla. Then, by Theorem 3.1 we get that E[GREEDY Ω ] (1 1/e)E[OPT Ω ]. Taking exectation over the different clae, we get the firt art of the theorem. For the econd art, a tight examle i rovided in Aendix D Lower Bound The roof of the following theorem ue a uniform ditribution on a et of imle 3 3 ize biartite matching examle, and can be found in Aendix E. Theorem 4.3. No determinitic algorithm can have a cometitive ratio better than 3/4, and no randomized algorithm can have a cometitive ratio better than 5/6, for the cae of biartite matching in the random ermutation model. 4 The reult alo hold for the average of the ratio of Greedy and OPT, and not only for the ratio of their average.
11 5 Further Dicuion Our motivation for tudying Greedy wa that it i a natural algorithm in an auction tyle roce. However, the quetion naturally arie: I Greedy otimal in our ditributional model? If we make the aumtion that there are n tye of keyword, and many querie of each tye, and that we know the length of the query equence, then there i an allocation algorithm with a ratio very cloe to 1: Samle the equence for an ɛ fraction of it length and learn the ditribution of querie. Now olve and round a revenue maximization Linear Program to get 1 ɛ ratio allocation. However, thi amling method will not work if all the querie are ditinct, and of coure, thi method could be arbitrarily bad in the wort cae. We do not know of any algorithm rovably better than Greedy in the random ermutation model, but we believe that the algorithm from [MSVV05] erform trictly better. Currently we can how that it cannot do better than a factor α Recall that in the cae of matching, it wa roved in [KVV90] that RANKING in the wort cae and Greedy in the random ermutation cae are dual of each other. The quetion naturally arie for the general aignment roblem: What i the dual algorithm to Greedy? It turn out that no uch duality reult eem to hold in the general cae. Furthermore any uch dual would have the bidder arriving in online, and hence would not aly to online aignment. Finally, it i imortant to invetigate the extent to which the RANKING algorithm of [KVV90] and it idea can be generalized, maybe even to offline algorithm. Our roblem can be conidered to be a ecial cae of the roblem of combinatorial auction with ubmodular utility bidder. In thi etting an imortant roblem i to find offline algorithm uing only value querie [LLN01]. There exit algorithm with factor 1 1/e [DS06, Fei06] (and even lightly better [FV06]) but uing the tronger demand querie, and there i a ga between the factor and the hardne in the value query model. Can the idea in our algorithm hel cloe thi ga? Even the cae of Adword with large bid i oen (recall that the bet known offline algorithm give factor 1 1/e [AM04]). The ame quetion can be aked for the 0-1-XOS utility model (alo known a the MCG roblem [CK04]). We believe that our technique may be ueful for ome of thee roblem. Reference [AGM06] Gagan Aggarwal, Ahih Goel, and Rajeev Motwani. Truthful auction for ricing earch keyword. In ACM Conference on Electronic Commerce, age 1 7, [AM04] N. Andelman and Y. Manour. Auction with budget contraint. In 9th Scandinavian Workho on Algorithm Theory (SWAT), age 26 38, [BIK07] M. Babaioff, N. Immorlica, and R. Kleinberg. Matroid, ecretary roblem, and online mechanim. In SODA, [CK04] C. Chekuri and A. Kumar. Maximum coverage roblem with grou budget contraint and alication. In APPROX, [DS06] Shahar Dobzinki and Michael Schaira. An imroved aroximation algorithm for combinatorial auction with ubmodular bidder. In SODA, [Dyn63] E. B. Dynkin. The otimum choice of the intant for toing a markov roce. Sov. Math. Dokl., 4, [EOS07] B. Edelman, M. Otrovky, and M. Schwarz. Internet advertiing and the generalized econd rice auction: Selling billion of dollar worth of keyword. American Economic Review, 97(1): , [Fei06] Uriel Feige. On maximizing welfare when utility function are ubadditive. In STOC, [FGMS06] Lia Fleicher, Michel X. Goeman, Vahab S. Mirrokni, and Maxim Sviridenko. Tight aroximation algorithm for maximum general aignment roblem. In SODA, age , [FMPS07] J. Feldman, S. Muthukrihnan, M. Pal, and C. Stein. Budget otimization in earch-baed advertiing auction. In ACM Conference on Electronic Commerce, [FV06] Uriel Feige and Jan Vondrak. Aroximation algorithm for allocation roblem: Imroving the factor of 1-1/e. In FOCS, [GM06] Sudito Guha and Andrew McGregor. Aroximate quantile and the order of the tream. In PODS, age , [KV07] Erik Krohn and Katuri Varadarajan. Private Communication, [KVV90] R.M. Kar, U.V. Vazirani, and V.V. Vazirani. An otimal algorithm for online biartite matching. In Proceeding of the 22nd Annual ACM Symoium on Theory of Comuting, [LLN01] B. Lehman, D. Lehman, and N. Nian. Combinatorial auction with decreaing marginal utilitie. In Proceeding of the 3rd ACM conference on Electronic Commerce, age 18 28, 2001.
12 [LPSV07] S. Lahaie, D. Pennock, A. Saberi, and R. Vohra. Algorithmic Game Theory (Nian et al. editor), chater Sonored Search [MNS07] M. Mahdian, H. Nazerzadeh, and A. Saberi. Allocating online advertiement ace with unreliable etimate. In ACM Conference on Electronic Commerce, [MSVV05] Aranyak Mehta, Amin Saberi, Umeh Vazirani, and Vijay Vazirani. Adword and generalized online matching. In FOCS, [RW06] P. Rumevichientong and D. P. Williamon. An adative algorithm for electing rofitable keyword for earchbaed advertiing ervice. In Seventh ACM Conference on Electronic Commerce, [Var06] H. Varian. Poition auction. International Journal of Indutrial Organization (To aear), [Yao77] A. C. Yao. Probabilitic comutation: toward a unified meaure of comlexity. FOCS, age , A Aggregating the inequalitie: A Factor Revealing LP Now we will aggregate the contraint in Lemma 2.2 and 2.3 over all the ermutation and girl. For that, we need to firt define the following: mi() = E σ Ω [ bad() = E σ Ω [ good() = E σ Ω [ mi σ (, )], bad σ (, )], good σ (, )] By umming the contraint in Lemma 2.2 over all ermutation clae Ω and all, we get t : bad σ (, )/(n ) σ Ω mi σ (t, ) σ Ω :<t Changing the order of ummation and dividing by Ω, we get, Corollary A.1. Similarly we can get, Corollary A.2. t : t : mi(t) bad()/(n ) :<t bad() n t good() : t+1 Proof of Theorem 2.1 : (1.3) From Lemma 2.1 and Corollarie A.1 and A.2 we have:.t.: t < n : t n : Min: [bad(t) + good(t)] t t+1 good() t good(t) + bad(t) + <t bad() n 0 bad() n 1 good(t), bad(t), mi(t) 0 Now change variable a follow: m t = good(t) + bad(t), v t = bad(t)/(n t) Min: t m t
13 .t.: m n v 0 t+1 t m t + v 1 <t m t, v t 0 It can be hown that droing the term m t+1 from the firt et of equation doe not affect the LP olution by much. A roof of a imilar tatement i in KVV, and o are the calculation. We rovide an LP baed calculation here, for comletene. We get the following rimal-dual air: Min: Max: α t.t.: t m n t t m t v 0.t.: t >t α n t β 0 m t + <t v 1 α t + t β 1 m t, v t 0 α t, β t 0 Both LP have the roerty that if we et all inequalitie tight, we get a feaible olution. Thi mean that thee olution are otimal. m t = α n+1 t = (1 1/n) i 1, v t = β n+1 t = 1 n (1 1/n)i 1 The otimal objective function um u to n(1 1/e) roving the theorem 5. B Proof of the Main Lemma from Section 3 Proof of Lemma 3.4 : (2.4) For every σ, and every [1, n], [bad σ (, ) + good σ (, )] = taget σ (σ(), ) = alg σ (σ()) extra σ () The firt equality i becaue of the fact that i either above or below in σ. The econd equality follow from the definition of extra σ (). Now, by definition, mi σ (, ) i oibly non-zero only for = σ(), in which cae it i equal to max{0, ot() alg σ ()}. Hence, mi σ (, ) = max{0, ot(σ()) alg σ (σ())} From (2.4), we get that { mi σ (, ) = max 0, ot(σ()) thu roving the lemma. bad σ (, ) good σ (, ) extra σ () } Proof of Lemma 3.5 : Define the quantity x := <t bad σ n (, ). By the definition of bad σn (, ), x ot(). In fact, we hall how the following inequality: 5 We aumed that the otimal matching i erfect, i.e. OPT = n. The cae of OPT < n can be taken care of with minor change in the roof.
14 (2.5) mi σt (t, ) x = We rove Equation (2.5) in a equence of two claim: Claim 1. mi σt (t, ) x σ Ω <t bad σ (, ) n Proof: Let i be the bidder to whom OPT allocated the query. We how the following ubclaim: Subclaim: Conider the run on the ermutation σ t. At time t (when ALG conider aigning query ), the remaining budget of i i at leat ot() x 0. Proof: Firt note that, by the Prefix Proerty, <t bad σ t (, ) = <t bad σ n (, ) =: x. Since in σ t, < t, bad σt (, ) = taget σt (σ t (), ), therefore <t taget σ t (σ t (), ) = x. But thi mean that at leat ot() x length of Ot-Interval() i untagged after time t 1 in the run on σ t. Of coure, thi mean that at leat ot() x amount of budget of i i till unent at thi time. Thi rove the ubclaim. If x < ot(), then uing the fact that the algorithm i greedy (and that we do not truncate the bid of bidder by their remaining non-zero budget), we ee that alg() ot(). If x = ot(), then alg() ot() x, trivially. Thi rove the claim. Claim 2. σ Ω <t bad σ(,) n = x Proof: Fix an < t, and conider the value of bad σ(,) σ Ω n. Note that, by the definition of bad σ (, ) and by the Prefix Proerty: { bad σn (, ) for k [ + 1, n] bad σk (, ) = 0 for k [1, ] σ Ω Hence badσ(,) n = bad σn (, ). Hence, bad σ(,) σ Ω <t n = <t bad σ n (, ) = x. Thi conclude the roof of Equation (2.5), and hence of the lemma. Proof of Lemma 3.6 : To do a tight counting for the roof of the lemma, we need to define a notion of weighted et. Given a univere U of element, a weighted et S w ha weight on all it element. In articular, an unweighted et S can be viewed a a weighted et with weight one on element which are reent in the et, and zero otherwie. We hall alo define two new oeration and on thee weighted et. Given a weighted et S, and a number x, we define new weighted et S = S x to mean that weight S (e) = weight S (e) x, e U. Alo given weighted et S 1 and S 2, we define S = S 1 S 2 to mean that weight S (e) = weight S1 (e) + weight S2 (e). S 1 w S 2 mean that weight S1 (e) weight S2 (e), e U. Define the meaure of weighted et S, µ(s) = U weight S(u)du. For the ret of the roof, the term et will mean a weighted et. We will conider et on the univere Ot Interval(), which, recall, i a interval of ize ot(), correonding to a query. Fix an t. Conider a ubet Ω.t. badet σn (, ). By the Prefix Proerty, badet σi (, ) = badet σn (, ), i [ + 1, n]. By Partition lemma, Lemma 3.3, we ee that for every k, l [ + 1, n]: badet σl (, ) +1 =kgoodet σk (, ), where the union i a dijoint union. Since the union i dijoint, thi i the ame a By averaging, we ee that: +1 k [1, ], l [ + 1, n] : badet σl (, ) w =k goodet σk (, ) : 1 n n l=+1 badet σl (, ) w 1 +1 k=1 =k goodet σk (, )
15 or, : n l=+1 badet σl (, ) n w +1 k=1 =k goodet σk (, ) But ince badet σi (, ) = φ, i [1, ] and < k : goodet σk (, ) = φ, we get: : n badet σl (, ) n w l=1 +1 goodet σk (, ) k=1 =1 And again, ince k >, : goodet σi (, ) = φ, we get : : n badet σl (, ) n w l=1 n +1 goodet σk (, ) k=1 =1 or, : badet σ (, ) n w σ Ω +1 goodet σ (, ) σ Ω =1 Alo, by definition, u, u, t: badet σn (, ) badet σn (u, ) =. Hence: badet σ (, ) n w t σ Ω goodet σ (, ) σ Ω t+1 Therefore, µ badet σ (, ) µ goodet σ (, ) n t σ Ω t+1 σ Ω µ(badet σ (, )) n t σ Ω bad σ (, ) n t σ Ω t+1 t+1 σ Ω µ(goodet σ (, )) σ Ω good σ (, ) C Proof of the Main Theorem - Theorem 3.1 We hall ue the ame definition of mi(), bad() and good() a defined in Aendix A. Let extra() = E σ Ω extra σ (). Uing the imilar aroach in Aendix A, we will get the following three corollarie from Lemma 3.4, 3.5 and 3.6. Corollary C.1. t : bad(t) + good(t) + extra(t) + mi(t) OPT/n Corollary C.2. Corollary C.3. t : t : mi(t) bad()/(n ) :<t bad() n t good() : t+1
16 Uing the above corollarie, we get the following LP: Min: [bad(t) + good(t) + extra(t)].t.: t < n : t n : t t+1 good() t good(t) + bad(t) + extra(t) + <t bad() n 0 bad() n good(t), bad(t), extra(t) 0 OPT/n Firt inequality can in fact be relaxed to t < n : t+1 (good() + extra()) t bad() n 0. Now ubtituting m t for good(t) + bad(t) + extra(t), v t for bad(t)/n t, and olving it imilar to Aendix A, we get that the value of objective function i at leat OPT(1 1/e). D A Tight Examle - Proof of Theorem 4.1 In thi ection we rovide an examle to how that the Greedy algorithm can do no better than 1 1/e in the random-ermutation inut model, and thu exhibit that our analyi i tight. The examle i imilar to the one ued in [MSVV05] to how a lower-bound on randomized algorithm in the online wort-cae model. In thi intance, there are N bidder, each with a budget of L (a large integer). The querie are groued into N grou, Q 1, Q 2,..., Q N. Each grou ha L identical querie. Each query in Q i get the following bid: Bidder 1 through i 1 bid 0; bidder i through N bid 1. Clearly, OPT = LN, by allocating, for all i, all the querie in Q i to bidder i. We will aume that Greedy break tie in the following way: when an query q arrive, it will be allocated to the highet numbered bidder who bid 1 and ha available budget. The aumtion about bad tie-breaking can be removed by a imle erturbation of the bid: for examle, for all i, relace all the 1-bid of bidder i by 1+ɛ i, where 0 < ɛ 1 < ɛ 2 < < ɛ N 1. The budget can be adjuted accordingly. Now conider the erformance of Greedy on the equence of thee querie arriving in a random ermutation σ. Clearly, the firt L querie in σ will all be allocated to bidder N (who bid for all querie). Among the next L querie in σ, all will be allocated to bidder N 1, excet for any querie from Q N, which are left unallocated. Now among the third L querie in σ, ome are allocated to N 1, mot to N 2 and ome are lot. Let u intead count in a different manner: It i clear that bidder N, by ymmetry, i allocated at mot L/N querie from Q j, in exectation, j. Similarly, bidder N 1, by ymmetry, i allocated at mot L/(N 1) querie from Q j, in exectation, j N 1. In thi manner one can ee that bidder i i allocated at mot L/i querie from Q j, in exectation, j i. L N j }. Counting differently, for i = 1,.., N, the number of querie in Q i that get allocated i min{l, j i Summing thi u, we can how that the exected amount of money ent by Greedy i LN(1 1/e) = (1 1/e)OPT. We note that thi analyi i very imilar to that in [MSVV05] for the lower bound in the wort cae online etting, the two being a form of dual of each other. The difference i that the role of bidder and query grou i revered here it i the lat N(1 1/e) bidder who finih mot of their budget, while in [MSVV05] it wa the firt N(1 1/e) query grou that get almot comletely allocated. D.1 Tight examle in the i.i.d. model Recall that in the i.i.d. model we have an unknown ditribution over keyword, and the next query in the equence i icked indeendently from thi ditribution. In our examle there are N bidder. Conider a uniform ditribution over N keyword, where the i th keyword get the following bid: Bidder 1 through i 1 bid 0; bidder i through N bid 1. We will ue the tie breaking rule a dicued in Aendix D. We will amle LN querie from the above ditribution. Now by the Chernoff bound, we can how that, for all δ, there i a large enough L o that w.h.. each keyword i amled at mot L + δ/n time. Now take the amle ace in which each keyword occur at leat L δ/n time, and divide it into familie.t. in each family, every equence ha a fixed et of querie. Uing argument imilar to the one in Aendix D, we can how that exected erformance of greedy, conditional over any uch family, i at mot LN(1 1/e) + δ. Now taking exectation over all uch familie we get that exected erformance of greedy i at mot LN(1 1/e) + δ.
17 E The Lower Bound - Proof of Theorem 4.3 (Sketch of Proof) For the bound on determinitic algorithm, conider a very imle 2 boy, 2 girl etting, where boy 1 could be matched to both the girl, but boy 2 can only be matched to one of the two girl. By looking at the code of the determinitic algorithm, we can decide which girl boy 2 can be matched to, o that in one of the two random ermutation of the boy, only one air can be matched. Thi how a factor of 3/4. For the lower bound on randomized algorithm, we will ue Yao Lemma [Yao77] to rove thi tatement. We tart with a ditribution on inut of the following form: Take an n n comlete uer triangular matrix with 0, 1 entrie. Thi i the incident matrix of the biartite grah, with the row being the girl and column being boy. We ue the uniform ditribution over different inut correonding to all ermutation of the row name. A according to the model, each inut ha the column arrive in a random ermutation. Thu the ditribution i eentially uniform ditribution on both row and column ermutation of the comlete uer triangular matrix. A ooed to the roof in [KVV90] for the wort cae inut model, it turn out to be difficult to characterize the erformance of any determinitic algorithm on thi inut ditribution. Thi i becaue a determinitic algorithm can (in thi model) be mart and ue a lot of information from the at (a a very imle examle, if it ee a column with n 1 1 and then a column with n 1 then it know that the extra row i the row with n 1 ). We have not been able to come u with a general analyi for n, but we can do a brute force analyi for n = 3, in which we can take care of how any determinitic algorithm may ue all uch information from the at. The brute force analyi how that the erformance of any determinitic algorithm over thi inut ditribution i no more than 5/6, thu roving a lower bound of 5/6 for randomized algorithm in the random ermutation model.
Partial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationThe main objective is to maximize the throughput of the traffic.
Chater 7 Flow Problem 7. Introduction and definition Problem related to tranort have been invetigated ince the early fiftie. The roblem i to route ome good, called commoditie, from roduction ite to conumtion
More informationOnline Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationRegulated Maximal Matching: A Distributed Scheduling Algorithm for Multi-Hop Wireless Networks With Node-Exclusive Spectrum Sharing
Proceeding of the 44th IEEE Conference on Deciion and Control, and the Euroean Control Conference 005 Seville, Sain, December 1-15, 005 WeB14.5 Regulated Maximal Matching: A Ditributed Scheduling Algorithm
More informationBidding for Representative Allocations for Display Advertising
Bidding for Rereentative Allocation for Dilay Advertiing Arita Ghoh Preton McAfee Kihore Paineni Sergei Vailvitkii Abtract Dilay advertiing ha traditionally been old via guaranteed contract a guaranteed
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More information! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model
Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationThe Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More informationOnline story scheduling in web advertising
Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationBidding for Representative Allocations for Display Advertising
Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay
More informationNumerical Simulation and Experimental Verification of Air Flow through a Heated Pipe
International Journal of Mechanical & Mechatronic Engineering IJMME-IJENS Vol:0 No:02 7 Numerical Simulation and Exerimental Verification of Air Flow through a Heated Pie Qaier Abba, M. Mahabat Khan, Rizwan
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationPoint Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
More informationMSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents
MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationv = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t
Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More information1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.
12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy
More informationChapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More informationSenior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow
Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie
More informationMBA 570x Homework 1 Due 9/24/2014 Solution
MA 570x Homework 1 Due 9/24/2014 olution Individual work: 1. Quetion related to Chapter 11, T Why do you think i a fund of fund market for hedge fund, but not for mutual fund? Anwer: Invetor can inexpenively
More informationAdwords Auctions with Decreasing Valuation Bids
Adwords Auctions with Decreasing Valuation Bids Aranyak Mehta Gagan Goel Abstract The choice of a bidding language is crucial in auction design in order to correctly capture bidder utilities. We propose
More informationPolarization resolved measurement of Rayleigh backscatter in fiber-optic components
1. Introduction Polarization reolved meaurement of Rayleigh backcatter in fiber-otic comonent B. J. Soller, M. Wolfe, M. E. Froggatt Luna Technologie Inc., 2020 Kraft Dr. Suite 2000, Blackburg, VA 24060
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationCongestion and price competition in the cloud
Congetion and rice cometition in the cloud Jonatha Anelmi, Danilo Ardagna, Adam Wierman 3 BCAM, Politecnico di Milano, 3 California Intitute of Technolog Abtract Thi aer rooe a model to tud the interaction
More informationNETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET
Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now
More informationAdvertisement Allocation for Generalized Second Pricing Schemes
Advertisement Allocation for Generalized Second Pricing Schemes Ashish Goel Mohammad Mahdian Hamid Nazerzadeh Amin Saberi Abstract Recently, there has been a surge of interest in algorithms that allocate
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More information6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks
6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In
More informationAuction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing
1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More informationMECH 2110 - Statics & Dynamics
Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationRedesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring
Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationAuction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing
1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing
More informationQueueing Models for Multiclass Call Centers with Real-Time Anticipated Delays
Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More information6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
More informationProfitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
More informationLECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS
LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS. Complete bipartite graph.. Kövari-Só-Turán theorem. When H i a bipartite graph, i.e., when χ(h) = 2, Erdő and Stone theorem aert that π H = 0. In other word,
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationA Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
More informationAdWords and Generalized On-line Matching
AdWords and Generalized On-line Matching Aranya Mehta Amin Saberi Umesh Vazirani Vijay Vazirani Abstract How does a search engine company decide what ads to display with each query so as to maximize its
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationA GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE
A GUIDE TO LUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE Content Pae No. Summary Interretin School Value Added Score 2 What i Value Added? 3 Calculatin Puil Value
More informationHow To Write A Powerline
The Stragegy for Fat I/O in Degrae Moe of RAID-5 *DONG-JAE, KANG *CHANG-SOO, KIM **BUM-JOO,SHIN *Comuter & Sytem Lab. ETRI 161 Gajeong-Dong, Yueong-Gu, Deajeon, 35-35 KOERA **125-1 Naei-Dong Miryang Gyeongnam
More informationA Duality Model of TCP and Queue Management Algorithms
A Duality Model of TCP and Queue Management Algorithm Steven H. Low CS and EE Department California Intitute of Technology Paadena, CA 95 low@caltech.edu May 4, Abtract We propoe a duality model of end-to-end
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationReview of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015
Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize
More informationDECISION SUPPORT SYSTEM IMPROVES SUPPLY CHAIN OPERATIONS
DECISION SUPPORT SYSTEM IMPROVES SUPPLY CHAIN OPERATIONS Ro Parga, Clemon Univerit, arga@clemon.edu Chri Jarvi, Clemon Univerit, cwjrv@clemon.edu J. Steve Davi, Clemon Univerit, davi@clemon.edu John C.
More informationMaximizing Acceptance Probability for Active Friending in Online Social Networks
Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,
More informationHealth Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,
Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationX How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationAllocating online advertisement space with unreliable estimates
Allocating online advertisement space with unreliable estimates Mohammad Mahdian Yahoo! Research mahdian@yahoo-inc.com Hamid Nazerzadeh Stanford University hamidnz@stanford.edu Amin Saberi Stanford University
More information1 Gambler s Ruin Problem
Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationA GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2013 SCHOOL PERFORMANCE TABLES & RAISEonline
A GUIDE TO LUE ADDED KEY STAGE 2 TO 4 IN 2013 SCHOOL PERFORMANCE TABLES & RAISEonline Content Summary Interretin School and Puil Grou Value Added Score Pae No. What i Value Added? 3 Calculatin Puil Value
More informationProgress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools
Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review
More informationThe Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More informationT-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D
The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from
More informationGlobal Imbalances or Bad Accounting? The Missing Dark Matter in the Wealth of Nations. Ricardo Hausmann and Federico Sturzenegger
Global Imbalance or Bad Accounting? The Miing Dark Matter in the Wealth of Nation Ricardo Haumann and Federico Sturzenegger CID Working Paper No. 124 January 2006 Copyright 2006 Ricardo Haumann, Federico
More informationAssigning Tasks for Efficiency in Hadoop
Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity
More informationMixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
More informationIncreasing the Operating Safety of the Machine-Tools by Using Hydro-pneumatic Accumulators. Modeling - Simulation
ISBN 978-1-8466-xxx-x Proceeding of 011 International Conference on Otimization of the Robot and Maniulator (OPTIROB 011) Sinaia, Romania, 6-8 Mai, 011,. xxx-xxx Increaing the Oerating Safety of the Machine-Tool
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More informationAlgorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
More informationHUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human
More informationLecture 15: Transformer Shunt Inductance. Tuned Transformers.
White, EE 3 ecture 15 Page 1 of 8 ecture 15: Tranforer Shunt nductance. Tuned Tranforer. n the lat lecture, we derived the tranforer equation V = V (6.1) and V jω (6.) where = agnetization current and
More informationLinear energy-preserving integrators for Poisson systems
BIT manucript No. (will be inerted by the editor Linear energy-preerving integrator for Poion ytem David Cohen Ernt Hairer Received: date / Accepted: date Abtract For Hamiltonian ytem with non-canonical
More informationSocially Optimal Pricing of Cloud Computing Resources
Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationOnline Matching and Ad Allocation. Contents
Foundations and Trends R in Theoretical Computer Science Vol. 8, No. 4 (2012) 265 368 c 2013 A. Mehta DOI: 10.1561/0400000057 Online Matching and Ad Allocation By Aranyak Mehta Contents 1 Introduction
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationPlease read the information that follows before beginning. Incomplete applications will delay the review and approval process.
Certified Manager Certification Application Intruction Completing the Application Congratulation on chooing to purue the Certified Manager (CM ) certification. The application i the tarting point toward
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationTurbulent Mixing and Chemical Reaction in Stirred Tanks
Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational
More information