The Index Coding Problem: A Game-Theoretical Perspective

Size: px
Start display at page:

Download "The Index Coding Problem: A Game-Theoretical Perspective"

Transcription

1 The Index Coding Problem: A Game-Theoretical Perspective Yu-Pin Hsu, I-Hong Hou, and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {yupinhsu, ihou, spalex}@tamu.edu Abstract Recently, the Index Coding problem has attracted a significant interest from the research community. In this problem, a server needs to deliver packets to a set of wireless clients over a noiseless broadcast channel. Each client needs to obtain a certain subset of packets and can take advantage of another subset available to it as side information. The objective is to satisfy the demands of all clients with the minimum number of transmissions. In this paper, we study the Index Coding problem from the game-theoretic perspective. We assume that each client is selfish and has a hidden private value for each packet it requests. The objective of server is to maximize the social welfare that captures the trade-off between the values of the received packets and the transmission cost incurred by the server. The transmission process is decided through an auction in which the clients are required to submit bids to the server. Each bid implies an obligation of a client to pay for the packets it can obtain from the channel. Our goal is to design a truthful auction scheme that provides an incentive for each client to bid the true value of the packets. We propose a truthful mechanism to achieve the maximum social welfare. The key component of our scheme is to determine the encoding functions of the transmitted packets, which is NP-hard. We present an efficient approximation algorithm that guarantees both the approximation ratio and the truthfulness properties. I. INTRODUCTION The Index Coding problem is one of the basic problems in wireless network coding. Recently, this problem has attracted a significant interest from the research community (see e.g., [4, 5]). An instance of the Index Coding problem includes a server, a set of wireless clients, and a set P = {p,...,p m } of m packets that need to be delivered to clients. Each client is interested in a certain subset of packets available at the server and has a (different) subset of packets available to it as side information. Server can transmit the packets or encoding thereof to clients via a noiseless broadcast channel. The goal is to find a transmission scheme that requires the minimum number of transmissions to satisfy the requests of all clients. Fig. depicts an instance of the Index Coding problem, where a server needs to deliver four packets P = {p,,p 4 } to four clients. It can be verified that the demands of all clients can be satisfied by broadcasting three packets: p +, +p 3, and p 4 (all operations are over GF (2)). Note that the traditional approach (without coding) requires the transmissions of all four packets p,,p 4. The prior works on the Index Coding problem have focused on developing algorithms, establishing rate bounds, and analyzing the computational complexity of the problem [6 ]. In contrast to the original Index Coding problem where the goal of the server is to satisfy the demands of all clients, we focus on settings where the server s decisions are driven by the values of the transmitted packets to the clients and by the transmission cost. This is a new problem in the intersection of the coding theory and game theory and belongs to the general framework of mechanism design with social choices [2]. Intuitively, since each transmission at server incurs a certain cost, the server may decide to transmit a packet only when the packet is important enough for the clients. Thus, our goal is to maximize the social welfare, i.e., the total value of the packets the clients are able to decode minus the total cost of transmitting the packets by the server. The social welfare reflects the positive externalities in terms of clients valuations of packets and the negative externalities related by the transmission costs of server. To calculate the social welfare, the server needs to know, for all clients in the system, the client valuation of the packet it requests. This information is usually private and selfish clients could not be expected to reveal this information to the server because the server might decide not to transmit packets with low valuation. Accordingly, we aim to design a tractable auction mechanism that provides an incentive for each client to reveal the true valuation of its packets. In the auction, the clients submit bids to the server, and the server decides whether to accept or reject the bid and charges clients accordingly. More specifically, the auction mechanism includes two main components, namely the coding algorithm and payment function. The coding algorithm determines which packets are transmitted over the channel and how they are encoded. The payment function determines the amount of money the client will pay to the server for each packet it is able to decode. Both coding algorithm and payment functions are known to the clients in advance. A classical solution for the problem of maximizing social welfare in the presence of selfish clients is to use the Vickery- Clarke-Groves (VCG) mechanism [ 3]. Such mechanism was shown to be truthful, i.e., in the sense that each client maximizes its own utility by bidding its true valuations of packets. However, the VCG mechanism cannot be used for our

2 v =0.2 b =0.8 v 3 =0.5 b 3 =0.5 v 2 =0.9 p desired packet b 2 =0.9 p 3 c c 2 Server p p 3 p 4 p c 3 c 4 p 3 p 4 p 4 side information p 3 v 4 =0.6 b 4 =0.6 Fig.. An instance of the Index Coding problem. Client c i,i =,...,4 requests packet p i. The side information sets of clients c,...,c 4 are {p 3 }, {p }, {,p 4 }, and {p 3 }, respectively; v i and b i denote the value and bid of packet p i, respectively. problem because it involves solving an NP-hard optimization problem. Accordingly, in this paper we design a novel auction mechanism. We prove that this mechanism is truthful, computationally efficient, and provides a provable approximation guarantee with the respect to the optimization function. Contributions. First, we present a truthful scheme, based on the Vickrey-Clarke-Groves (VCG) mechanism [ 3], that maximizes the social welfare of the system. It turns out that finding VCG based encoding functions for this scheme is an NP-hard optimization problem. Next, to mitigate the intractability of the this problem, we present an approximation algorithm with provable performance guarantees. We show, through a counter-example, that a VCG based algorithm that relies on an approximation solution is no longer truthful. Finally, we present a non-vcg based payment scheme that achieves the truthfulness property in the presence of the approximation solution for the problem. II. MODEL We begin with the definition of the Index Coding problem. The input to the problem includes a server S, a set of n wireless clients = {c,,c n }, and a noiseless wireless broadcast channel. The server has a set of m packets P = {p,,p m } that need to be distributed to clients in. We assume, without loss of generality, that each client requests a single packet in P and has access to a subset of packets in P as a side information. Indeed, a client that wants more than one packet can be substituted by multiple clients that share the same side information set. In particular, each client c i 2 is characterized by the ordered pair (w i,h i ), where w i 2 P is the packet requested by c i and H i P is the set of packets available to c i as a side information. We assume that each packet p i represents an element of the Galois field GF (q). We assume that each client c i 2 has the internal (private) value v i for the packet w i. The transmission process includes an auction, in which each client submits a bid b i for packet w i. We denote by V = {v,,v n } and B = {b,,b n } the arrays that include the internal valuations and bids of the clients. Based on the bid vectors, the server identifies linear combinations that will be transmitted over the channel. In this paper, we focus on the scalar-linear coding schemes in which each packet q i = P m j= g i,jp j transmitted by server at the iteration i, apple i apple, is a linear combination of packets in P. Here, is the total number of transmissions made by the server and g i = {g i,,,g i,m }2GF (q) m is the encoding vector for the iteration i. We denote by G =[g i ] the encoding matrix, rows of G correspond to encoding vectors of the packets transmitted over the channel. A sparse code is the general linear code in which each transmitted packet from the server is a linear combination of at most two packets in P. The transmission of a packet by the server incurs the cost C T. Without lost of generality, we assume that C T =, i.e., the total cost incurred by the server is equal to. The purpose of the server is to maximize the social welfare, defined as P n i= v i i, where i is the indicator function that specifies if client c i is able to decode the required packet w i. In particular, i = if there exists a linear decoding function r i such that w i = r i (q,,q,h i ); otherwise, i = 0. We denote by = {,, n } the vector of indicator functions. For example, in the setting depicted in Fig., the social welfare of broadcasting the solution to the Index Coding problem, i.e. {p + ; + p 3 ; p 4 }, is = 0.8, while the higher social welfare of the sequence consisting of a single combination {p 3 +p 4 } is equal to =0.. Thus, transmitting a single combination p 3 +p 4 would be more desirable than transmitting three packets {p + ; +p 3 ; p 4 } from the server s point of view. The payment function is an important part of the auction mechanism. Server determines the amount of payment i that each client needs to pay for the obtained packet. We denote by ={,, n} the payment vector for all clients. The value of i is a function of B and. The auction mechanism, including the algorithm for determining the encoding function and the payment function is known to all the parties. We assume that every client c i is selfish and chooses its best bidding policy b i that maximizes its utility defined by u i (B) = v i i i. We say that a mechanism (i.e., an encoding matrix associated with a payment function) is truthful if u i v i,b i u i ˆbi,B i for all ˆb i and B i, where B i = B \{b i }. That is, regardless of the bids submitted by other clients, the utility of client c i is maximized when b i = v i. In this paper, we design the encoding matrix and the payment function that satisfies the following two conditions: (i) every client is incentivized to report its true valuation of the desired packet (i.e., truthful property) and (ii) the social welfare is maximized. III. VCG-BASED MECHANISM DESIGN In this section, we propose a truthful scheme based on the celebrated Vickrey-Clarke-Groves (VCG) approach [ 3] to mechanism design. Note that the indicator functions and the number of transmissions are functions of the encoding matrix G. In particular, it is easy to determine and for a given

3 matrix G. We define the social welfare function w(b,g) as w(b,g) = P n i= b i i. Note that the social welfare function is defined similarly to the social welfare, with the value of bids B substituted by packet valuations V. In addition, we define w i (B,G) = P j6=i b j j. In our mechanism, we choose the encoding matrix that maximizes the the value of social welfare function for the given bids B. VCG-coding scheme: Choose the encoding matrix G that maximizes the value of w(b,g), i.e., G = arg max w(b,g). () G If there are multiple encoding functions that maximize the social welfare functions, we choose one that satisfies the larger number of clients. Note that without loss of generality, we can assume that v i 2 [0, ], since client c i is assured to get the desired packet when submitting the bid b i = C T =. Our scheme uses the following payment function i : VCG-payment function: The client c i is charged as follows. i = max G i w(b i,g i ) w i (B,G ). (2) Based on the property of the VCG mechanism [2], we conclude as follows. The following proposition follows from the basic properties of the VCG mechanism. Proposition. (i) The VCG-coding scheme associated with the VCG-payment function is a truthful mechanism, i.e. B = V. Moreover, the pricing function in (2) is non-negative, and the utilities of all clients are non-negative, i apple v i. (ii) The VCG-coding scheme associated with the VCG-payment function maximize the social welfare. Proof: The proof follows from the properties of the VCG mechanism [2]. The proof is omitted due to the space constraints. The problem of finding an optimal VCG encoding matrix G is an interesting combinatorial problem by itself. Unfortunately, this problem is computationally intractable. More specifically, for the instance of the problem in which the bid of each client b i is equal to one, the problem if maximizing the value of the social welfare function w(b,g) is equivalent to the problem of minimizing the required number of transmissions to satisfy all clients. Indeed, in this case there exists an optimal solution that satisfies all clients, since the client bid is equal to the cost of transmitting a single client. IV. APPROXIMATION ALGORITHM In this section, we present an approximation algorithm for the special case of multiple unicast. In the multiple unicast environment, every packet is required by exactly one client. This is in contrast to the multiple multicast scenario in which a packet can be required by multiple clients. We also considering a special case of sparse code, where each packet is a combination of at most two packets in P. With sparse c 0.5 c3 Fig. 2. Weight dependency graph for the instance of the multiple unicast problem in Fig. coding, both encoders and decoders can be implemented in a simpler manner which has a significant advantage for practical applications. Our scheme uses the notion of a weighted dependency graph described below. Definition 2. The weighted dependency graph is a directed graph G(V,A) defined as follows: For each client c i 2 C, there is a corresponding vertex v i in V. For any two clients c i and c j such that w i 2 H j, there is a directed arc (v i,v j ) 2 A. The weight of arc (v i,v j ) is i,j = b i. Fig. 2 illustrates the weight dependency graph corresponding to the instance of the social welfare minimization problem depicted in Fig.. For each vertex-disjoint cycle in the weight dependency graph, the server can save one transmission. That is, for a cycle C of length C, all of the clients that correspond to its nodes can be satisfied using C transmissions. The clients belonging to cycle C share the transmission cost C, resulting in the higher social welfare. Indeed, in Fig. 2 we have a cycle (c,c 2,c 3 ) that involves three clients. It is easy to verify that the three clients can be satisfied by two transmissions: p + and + p 3. Note that if there is no cycle in G(V,A) then sparse code can not improve the value of social welfare function. Given a cycle C =(c,c 2,,c k ), server encodes along cycle C means that server would transmit the sequence of k packets {p + ; ; p k + p k }.We first investigate the hardness of the VCG-coding scheme. Lemma 3. In multiple unicast scenario with the restriction to the sparse code, the social welfare minimization problem is NP-hard. Proof: This is shown via a reduction from the cycle packing problem in directed graphs. We propose the greedy-vcg-coding scheme in Alg. as an approximation algorithm for the PCIC problem in this setting. Next, we present a corresponding pricing scheme that motivates all clients to reveal the true value of the packets. P We define the weight of cycle C in G(V,A) as (C) = a2c a ( C ), where the first term is the sum of all bids along the cycle, and the second one is the total transmission cost of all packets that correspond to this cycle. Let C be a P set of vertex-disjoint cycles in G(V,A). Then w(b,g) = C2C (C), where server encodes along the cycles in C as the encoding matrix G c2 c4

4 Algorithm : Greedy-VCG-coding scheme input : Bids vector B and side information H i for all clients output: Encoding matrix G Create the weight dependency graph G(V,A); 2 Define the cost a of arc a 2 A by a = a; 3 By (C) = P a2c a, we define the cost of cycle C; 4 S, S 2 ;; // S, S 2 will include the clients that are served 5 while in G(V,A), there is a cycle with the cost less than or equal to one do 6 Find the cycle C in G(V,A) with the smallest cost; 7 Server encodes along cycle C; 8 S S [{c v : v 2 V,v 2 C} ; 9 G(V,A) G(V,A)\{vertices along C, edges along or incidnet to C}; 0 end for i to n do 2 if b i =but c i /2 S then 3 Server will transmit w i ; 4 S 2 S 2 [{c i }; 5 end 6 end The idea of the greedy-vcg-coding scheme is iteratively to identify the cycle of the maximum weight and then to remove it. However, this scheme cannot be implemented directly since it is NP-hard to find a maximum weight P cycle. We note that (C) can be revised as (C) = a2c ( a). Thus, in this case, a maximum weight cycle with respect to weight (C) corresponds to the minimum cost cycle with respect to cost P a2c ( a). Therefore, in lines 2 and 3 of Alg., we define the cost of arc a 2 A by a = a and the cost of cycle C by (C) = P a2c a. Then, the algorithm finds the minimum cost cycle in Line 6. To this end, we can use wellknown polynomial time algorithms such as Floyd-Warshall algorithm. After such a cycle is identified, it is removed from the graph in Line 9. The condition in Line 5 guarantees that the maximum weight cycle in the remaining graph G(V,A) (i.e., the minimum cost cycle) has a non-negative weight. In Line 3, the clients with the bids equal to the transmission cost are served. Such clients are then included in set S 2. In addition, set S contains the clients associated with the cycles chosen in Line 6. Note that all procedures in Alg. require a polynomial number of steps, hence Alg. can be executed in polynomial time. Unfortunately, Alg. cannot be used with the VCGpayment functions specified by (2) (i.e to replace G with the approximate solution). In particular, the following example shows that such combination might not have the truthfulness property. Example 4. Consider the instance of the problem depicted in Fig. 3. Given B fixed, we will show that client c has the potential to lie. Suppose that client c submits the bid b = 0.55 equal to its internal value of packet p. In this case, Alg. will identify the cycle (c 2,c 3 ) and output the corresponding solution + p 3. In this case, the utility u of c i is equal to zero. Now, suppose that c submits bid b =0.7. In this case, Alg. will transmit the sequence of packets {p + ; p 3 +p 4 } p c c 3 v =0.55 b =0.55 Server p c c 2 c 3 c 4 p 3 p 4 v 2 =0.6 b 2 =0.6 p p 3 c 2 c 4 p 3 v 3 =0.6 v 4 =0.55 p 4 p 4 b 3 =0.6 b 4 =0.55 p (a) 0.6 Fig. 3. (a) Counter-example of the truthful property for the greedy-vcgcoding scheme accompanied with the VCG-payment function (b) The weight dependency graph (b) that corresponds to cycles (c,c 2 ) and (c 3,c 4 ), respectively. According to (2), the payment of client c is equal to = ( ) ( ) = In this case, the utility of client c is equal to 0.25, which is bigger than the case in which the client is truthful. J Accordingly, we present the greedy-vcg-payment scheme implemented by Alg. 2 to charge the clients c i. This scheme results in a truthful auction Algorithm 2: Greedy-VCG-payment function input : Bids vector B and side information H i for all clients output: Payment i for client c i Clients that are not in S and S 2 do not be charged, return i =0; 2 The payment for the clients belonging to S 2 is, return i =; // Following deals with the clients in S 3 Create the weight dependency graph G(V,A); 4 The cost is defined as follows; for arc (i, j) 2 A, (i,j) = for arc a 6= (i, j), which is not outgoing from vertex i, a = a 5 By (C) = P a2c a, we define the cost of cycle C; 6 P ;; // set P will include the possible payments 8 while in G(V,A), there is a cycle of the cost less than or equal to one, as well as there exists a cycle that traverses vertex i do 9 Find the cycle C in G(V,A) with the smallest cost, say the cost ; 0 Find the cycle C 2 in G(V,A) that traverses vertex i and has the smallest cost among these that go through vertex i, say the cost ; if =0then 2 return i =0 3 end 4 else 5 P P[( ); 6 G(V,A) G(V,A)\{vertices along C, edges along or incident to C }; 7 end 8 end 9 Find the cycle C 2 in G(V,A) (if any) that traverses vertex i and has the smallest cost among these that go through vertex i, say the cost ; 20 P P[( ); 2 return i =minp

5 It can be easily verified that Alg. 2 has polynomial complexity. Note that in Line 4 of Alg. 2, the cost function of G(V,A) is different from that in Alg.. To compute the payment for client c i 2 S, we assign the unit cost for every outgoing arc (i, j) of vertex i (i.e. set i,j =0and b i =0). For each iteration of Line 8, we calculate the difference of the cost between the cycles C and C 2 in G(V,A), where C has the minimum global cost while C 2 is the local optimal cycle that traverses vertex i. We note that when the cycle C last containing vertex i is selected in the last iteration of Alg., the while loop in Alg. 2 might not capture C last because the cost of arc (i, j) is set to be one. Line 20 deals with this case. When client c i submits b i =, the weight of cycle C last in G(V,A) is ( )+( ) = 0, where the first term is the weight when b i =0while the second term is the increment when b i =. Therefore, the cost of C last is one, which satisfies the condition of Line 5 of Alg.. The set P includes the result of each iteration. If the difference is zero, client c i will not be charged; otherwise, it will be charged the value equal to the minimum of an element in set P. Given the bids of all clients, the coding algorithm determines the encoding matrix G, which, in turn, determines the indicator vector. We say that a coding algorithm is monotone if, for any B i, there exists a single critical value b i such that c i gets the desired packet (i.e. i =) when b i b i ; otherwise, c i can not. Theorem 5 (Theorem [3]). The mechanism is truthful if and only if the coding algorithm is monotone and the payment scheme is based on the critical value. Theorem 6. The Algorithms and 2 result in a truthful mechanism. Proof: According to Theorem 5, it is sufficient to show that Alg. is monotone, as well as Alg. 2 is based on the critical value. Suppose client c i is able to recover the desired packet. Then, a cycle containing vertex v i will be chosen by Alg.. Alg. prefers the cycle of the maximum weight (i.e., minimum cost) in weight dependency graph G(V,A). When c i increases the bid, so does the weight of the cycles that pass through vertex v i, and therefore a cycle containing vertex v i will be selected by Alg.. Hence, the greedy-vcg-coding scheme is monotone. Given B i, for each iteration in Alg. 2, we calculate the lowest bid b i for client c i such that a cycle containing vertex v i would be selected by Alg.. Since the minimum of these values are adopted as the payment for client c i 2 S, client c i 2 S is charged by the critical value. Other cases, i.e. client c i /2 S, follow immediately. Let OPT be the optimal solution of the VCG-coding scheme, i.e. OPT = w(b,g ). Assume G greedy is the encoding matrix from the greedy-vcg-coding scheme. We define the approximation ratio of Alg. by OP T/AP X, where AP X = w(b,g greedy ). b = b5 = b2 = b6 = p c c3 p3 p5 p5 p2 p p3 p6 p2 c5 c7 p7 p Server p7 p4 p3 p p8 p4 c5 c7 c c3 p2 p3 p4 p5 p6 p7 p8 b3 = b7 = b4 = b8 = (a) (b) Fig. 4. (a) Tight example of greedy-vcg-coding scheme (b) The weight dependency graph Theorem 7. The approximation ratio of Alg. scheme is equal to the maximum length of the cycle in the weight dependency graph. Proof: The optimal solution G in () corresponds to the maximum weight vertex-disjoint cycle packing, say C, in the weight dependency graph G(V,A). The total weight of these cycles in C is OPT, i.e. w(b,g )= P C2C (C) Given a cycle C in the weight dependency graph, let C \C be the set of the cycles in C that have a shared vertex with C. For each iteration k of Alg., we encode along the cycle C k of the minimum cost in G k (V,A), where G k (V,A) is the remaining graph in iteration k. Let C k be the set of cycles in C that belongs to G k (V,A). We define AP X k = (C k ) and OPT k = P C2(C k \C k ) (C). Because C k is the maximum weight cycle in this iteration, the weight of the cycles in C k \ C k is smaller than AP X k. Moreover, since there are C k vertices in cycle C k, there are at most C k cycles in C k \C k. Hence, OPT k apple AP X k C k, which results in the approximation ratio of the maximum cycle length in the weight dependency graph. In the next example, we show that the approximation ratio proven in Theorem 7 is tight. Example 8 (Tight example of Alg. ). Consider the setting depicted in Fig. 4(a). For this setting, Alg. results in the following transmissions p +, + p 3, and p 3 + p 4. Note that these transmissions correspond to cycle (c,c 2,c 3,c 4 ) in Fig. 4(b). In contrast, the optimal solutions is p +p 5, +p 6, p 3 + p 7, and p 4 + p 8. Therefore, the approximation ratio is 4( )/ for any >0. J c2 c4 V. CONCLUSION In this paper, we focus on an interesting problem that lies in the intersection of game theory and coding theory. Based p2 c2 c4 p4 c8 c6 p6 c6 c8 p8

6 on the Vickrey-Clarke-Groves (VCG) mechanism, we propose the VCG-coding scheme and the VCG-payment function that maximize the social welfare and provide incentives for the clients to submit truthful bids. It turns out that in many cases of practical interest it is intractable to implement the exact VCG-coding scheme. We rigorously prove the hardness of the related problems as well as their inapproximability. We propose an approximation algorithm with provable performance guarantees as well as the corresponding payment scheme that guarantee trustfulness. REFERENCES [] W. Vickrey, Counterspeculation, Auctions, and Competitive Sealed Tenders, The Journal of Finance, vol. 6, pp. 8 37, 96. [2] E. Clarke, Multipart Pricing of Public Goods, Public Choice, vol., pp. 7 33, 97. [3] T. Groves, Incentives in Teams, Econometrica, vol. 4, pp , 973. [4] Y. Birk and T. Kol, Coding on Demand by an Informed Source (ISCOD) for Efficient Broadcast of Different Supplemental Data to Caching Clients, IEEE Trans. Inf. Theory, vol. 52, pp , [5] Z. Bar-Yossef, Y. Birk, T. S. Jayram, and T. Kol, Index Coding with Side Information, IEEE Trans. Inf. Theory, vol. 57, pp , 20. [6] A. Blasiak, R. Kleinberg, and E. Lubetzky, Index coding via linear programming. [Online]. Available: [7] N. Alon, E. Lubetzky, U. Stav, A. Weinstein, and A. Hassidim, Broadcasting with Side Information, Prof. of IEEE FOCS, pp , [8] S. E. Rouayheb, A. Sprintson, and C. Georghiades, On the Index Coding Problem and Its Relation to Network Coding and Matroid Theory, IEEE Trans. Inf. Theory, vol. 56, pp , 200. [9] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, XORs in the Air: Practical Wireless Network Coding, IEEE/ACM Trans. Netw., vol. 6, pp , [0] M. A. R. Chaudhry and A. Sprintson, Efficient Algorithms for Index Cdoing, Proc. of IEEE INFOCOM Workshops, pp. 4, [] M. Langberg and A. Sprintson, On the Hardness of Approximating the Network Coding Capacity, IEEE Trans. Inf. Theory, vol. 57, pp , 20. [2] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic Game Theory. Cambridge University Press, [3] A. Mualem and N. Nisan, Truthful Approximation Mechanisms for Restricted Combinatorial Auctions, Games and Economic Behavior, vol. 64, pp , 2008.

Truthful and Non-Monetary Mechanism for Direct Data Exchange

Truthful and Non-Monetary Mechanism for Direct Data Exchange Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {ihou, yupinhsu, spalex}@tamu.edu

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: rurgaon@us.ibm.com Prithwish Basu and Saikat Guha

More information

Secure Network Coding for Wiretap Networks of Type II

Secure Network Coding for Wiretap Networks of Type II 1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

17.6.1 Introduction to Auction Design

17.6.1 Introduction to Auction Design CS787: Advanced Algorithms Topic: Sponsored Search Auction Design Presenter(s): Nilay, Srikrishna, Taedong 17.6.1 Introduction to Auction Design The Internet, which started of as a research project in

More information

Online Adwords Allocation

Online Adwords Allocation Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

A Simple Characterization for Truth-Revealing Single-Item Auctions

A Simple Characterization for Truth-Revealing Single-Item Auctions A Simple Characterization for Truth-Revealing Single-Item Auctions Kamal Jain 1, Aranyak Mehta 2, Kunal Talwar 3, and Vijay Vazirani 2 1 Microsoft Research, Redmond, WA 2 College of Computing, Georgia

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Chapter 3. Social Surplus and Tractability

Chapter 3. Social Surplus and Tractability Chapter 3 Social Surplus and Tractability In this chapter we discuss the objective of social surplus. As we will see, ignoring computational tractability, the economics of designing mechanisms to maximize

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Algorithmic Game Theory. Edited by Noam Nisan, Tim Roughgarden, Éva Tardos, and Vijay Vazirani

Algorithmic Game Theory. Edited by Noam Nisan, Tim Roughgarden, Éva Tardos, and Vijay Vazirani Algorithmic Game Theory Edited by Noam Nisan, Tim Roughgarden, Éva Tardos, and Vijay Vazirani Contents 1 Combinatorial Auctions L. Blumrosen and N. Nisan page 4 3 1 Combinatorial Auctions Liad Blumrosen

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

On Secure Communication over Wireless Erasure Networks

On Secure Communication over Wireless Erasure Networks On Secure Communication over Wireless Erasure Networks Andrew Mills Department of CS amills@cs.utexas.edu Brian Smith bsmith@ece.utexas.edu T. Charles Clancy University of Maryland College Park, MD 20472

More information

THIRD-GENERATION (3G) wide-area wireless networks

THIRD-GENERATION (3G) wide-area wireless networks 1020 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006 Market Sharing Games Applied to Content Distribution in Ad Hoc Networks Michel X. Goemans, Li (Erran) Li, Vahab S. Mirrokni,

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

Chapter 7. Sealed-bid Auctions

Chapter 7. Sealed-bid Auctions Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

More information

Linear Programming. March 14, 2014

Linear Programming. March 14, 2014 Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Codes for Network Switches

Codes for Network Switches Codes for Network Switches Zhiying Wang, Omer Shaked, Yuval Cassuto, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical Engineering

More information

Topology-based network security

Topology-based network security Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

Online Ad Auctions. By Hal R. Varian. Draft: February 16, 2009

Online Ad Auctions. By Hal R. Varian. Draft: February 16, 2009 Online Ad Auctions By Hal R. Varian Draft: February 16, 2009 I describe how search engines sell ad space using an auction. I analyze advertiser behavior in this context using elementary price theory and

More information

Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees

Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with

More information

Linear Algebra Notes

Linear Algebra Notes Linear Algebra Notes Chapter 19 KERNEL AND IMAGE OF A MATRIX Take an n m matrix a 11 a 12 a 1m a 21 a 22 a 2m a n1 a n2 a nm and think of it as a function A : R m R n The kernel of A is defined as Note

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

More information

IN CURRENT distributed systems such as computational

IN CURRENT distributed systems such as computational IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 34, NO. 1, FEBRUARY 2004 77 Algorithmic Mechanism Design for Load Balancing in Distributed Systems Daniel Grosu, Student Member,

More information

Similarity and Diagonalization. Similar Matrices

Similarity and Diagonalization. Similar Matrices MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that

More information

Multi-unit auctions with budget-constrained bidders

Multi-unit auctions with budget-constrained bidders Multi-unit auctions with budget-constrained bidders Christian Borgs Jennifer Chayes Nicole Immorlica Mohammad Mahdian Amin Saberi Abstract We study a multi-unit auction with multiple agents, each of whom

More information

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

Algorithmic Mechanism Design for Load Balancing in Distributed Systems

Algorithmic Mechanism Design for Load Balancing in Distributed Systems In Proc. of the 4th IEEE International Conference on Cluster Computing (CLUSTER 2002), September 24 26, 2002, Chicago, Illinois, USA, IEEE Computer Society Press, pp. 445 450. Algorithmic Mechanism Design

More information

Problem Set 7 Solutions

Problem Set 7 Solutions 8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in

More information

AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC

AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.

More information

Lecture 11: Sponsored search

Lecture 11: Sponsored search Computational Learning Theory Spring Semester, 2009/10 Lecture 11: Sponsored search Lecturer: Yishay Mansour Scribe: Ben Pere, Jonathan Heimann, Alon Levin 11.1 Sponsored Search 11.1.1 Introduction Search

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

SECRET sharing schemes were introduced by Blakley [5]

SECRET sharing schemes were introduced by Blakley [5] 206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has

More information

Cost of Conciseness in Sponsored Search Auctions

Cost of Conciseness in Sponsored Search Auctions Cost of Conciseness in Sponsored Search Auctions Zoë Abrams Yahoo!, Inc. Arpita Ghosh Yahoo! Research 2821 Mission College Blvd. Santa Clara, CA, USA {za,arpita,erikvee}@yahoo-inc.com Erik Vee Yahoo! Research

More information

Monotone multi-armed bandit allocations

Monotone multi-armed bandit allocations JMLR: Workshop and Conference Proceedings 19 (2011) 829 833 24th Annual Conference on Learning Theory Monotone multi-armed bandit allocations Aleksandrs Slivkins Microsoft Research Silicon Valley, Mountain

More information

Truthful Mechanisms for One-Parameter Agents

Truthful Mechanisms for One-Parameter Agents Truthful Mechanisms for One-Parameter Agents Aaron Archer Éva Tardos y Abstract In this paper, we show how to design truthful (dominant strategy) mechanisms for several combinatorial problems where each

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This

More information

Routing and Peering in a Competitive Internet

Routing and Peering in a Competitive Internet Routing and Peering in a Competitive Internet Ramesh Johari Stanford University rjohari@stanford.edu John N. Tsitsiklis MIT jnt@mit.edu Abstract Today s Internet is a loose federation of independent network

More information

A greedy algorithm for the DNA sequencing by hybridization with positive and negative errors and information about repetitions

A greedy algorithm for the DNA sequencing by hybridization with positive and negative errors and information about repetitions BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 59, No. 1, 2011 DOI: 10.2478/v10175-011-0015-0 Varia A greedy algorithm for the DNA sequencing by hybridization with positive and negative

More information

Linearly Independent Sets and Linearly Dependent Sets

Linearly Independent Sets and Linearly Dependent Sets These notes closely follow the presentation of the material given in David C. Lay s textbook Linear Algebra and its Applications (3rd edition). These notes are intended primarily for in-class presentation

More information

5.3 The Cross Product in R 3

5.3 The Cross Product in R 3 53 The Cross Product in R 3 Definition 531 Let u = [u 1, u 2, u 3 ] and v = [v 1, v 2, v 3 ] Then the vector given by [u 2 v 3 u 3 v 2, u 3 v 1 u 1 v 3, u 1 v 2 u 2 v 1 ] is called the cross product (or

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

Suk-Geun Hwang and Jin-Woo Park

Suk-Geun Hwang and Jin-Woo Park Bull. Korean Math. Soc. 43 (2006), No. 3, pp. 471 478 A NOTE ON PARTIAL SIGN-SOLVABILITY Suk-Geun Hwang and Jin-Woo Park Abstract. In this paper we prove that if Ax = b is a partial signsolvable linear

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Adaptive Linear Programming Decoding

Adaptive Linear Programming Decoding Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006

More information

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Email:

More information

How Much Can Taxes Help Selfish Routing?

How Much Can Taxes Help Selfish Routing? How Much Can Taxes Help Selfish Routing? Richard Cole Yevgeniy Dodis Tim Roughgarden July 28, 25 Abstract We study economic incentives for influencing selfish behavior in networks. We consider a model

More information

MOST error-correcting codes are designed for the equal

MOST error-correcting codes are designed for the equal IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,

More information

On the independence number of graphs with maximum degree 3

On the independence number of graphs with maximum degree 3 On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs

More information

Efficient Recovery of Secrets

Efficient Recovery of Secrets Efficient Recovery of Secrets Marcel Fernandez Miguel Soriano, IEEE Senior Member Department of Telematics Engineering. Universitat Politècnica de Catalunya. C/ Jordi Girona 1 i 3. Campus Nord, Mod C3,

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels

Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels Coding Schemes for a Class of eceiver Message Side Information in AWG Broadcast Channels Behzad Asadi Lawrence Ong and Sarah J. Johnson School of Electrical Engineering and Computer Science The University

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

Achievable Strategies for General Secure Network Coding

Achievable Strategies for General Secure Network Coding Achievable Strategies for General Secure Network Coding Tao Cui and Tracey Ho Department of Electrical Engineering California Institute of Technology Pasadena, CA 91125, USA Email: {taocui, tho}@caltech.edu

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

14.1 Rent-or-buy problem

14.1 Rent-or-buy problem CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms

More information

Mechanisms for Fair Attribution

Mechanisms for Fair Attribution Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is

More information

Cloud Computing. Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources

Cloud Computing. Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources Peter Key, Cloud Computing Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources How much is a task or resource worth Can we use to price

More information

I. INTRODUCTION. of the biometric measurements is stored in the database

I. INTRODUCTION. of the biometric measurements is stored in the database 122 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 6, NO 1, MARCH 2011 Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case Lifeng Lai, Member, IEEE, Siu-Wai

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

Prediction Markets. 1 Introduction. 1.1 What is a Prediction Market? Algorithms Seminar 12.02.2014

Prediction Markets. 1 Introduction. 1.1 What is a Prediction Market? Algorithms Seminar 12.02.2014 Algorithms Seminar 12.02.2014 Tawatchai Siripanya Prediction Markets Wolfgang Mulzer, Yannik Stein 1 Introduction 1.1 What is a Prediction Market? Prediction markets are defined as analytical markets that

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

Vector and Matrix Norms

Vector and Matrix Norms Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty

More information

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics

More information

Numerical Analysis Lecture Notes

Numerical Analysis Lecture Notes Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number

More information

n 2 + 4n + 3. The answer in decimal form (for the Blitz): 0, 75. Solution. (n + 1)(n + 3) = n + 3 2 lim m 2 1

n 2 + 4n + 3. The answer in decimal form (for the Blitz): 0, 75. Solution. (n + 1)(n + 3) = n + 3 2 lim m 2 1 . Calculate the sum of the series Answer: 3 4. n 2 + 4n + 3. The answer in decimal form (for the Blitz):, 75. Solution. n 2 + 4n + 3 = (n + )(n + 3) = (n + 3) (n + ) = 2 (n + )(n + 3) ( 2 n + ) = m ( n

More information

Impact Of Interference On Multi-hop Wireless Network Performance

Impact Of Interference On Multi-hop Wireless Network Performance Impact Of Interference On Multi-hop Wireless Network Performance Kamal Jain Jitendra Padhye Venkata N. Padmanabhan Lili Qiu Microsoft Research One Microsoft Way, Redmond, WA 98052. {kamalj, padhye, padmanab,

More information

Tight Bounds for Selfish and Greedy Load Balancing

Tight Bounds for Selfish and Greedy Load Balancing Tight Bounds for Selfish and Greedy Load Balancing Ioannis Caragiannis 1, Michele Flammini, Christos Kaklamanis 1, Panagiotis Kanellopoulos 1, and Luca Moscardelli 1 Research Academic Computer Technology

More information