The Index Coding Problem: A Game-Theoretical Perspective
|
|
- Alaina Howard
- 7 years ago
- Views:
Transcription
1 The Index Coding Problem: A Game-Theoretical Perspective Yu-Pin Hsu, I-Hong Hou, and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {yupinhsu, ihou, spalex}@tamu.edu Abstract Recently, the Index Coding problem has attracted a significant interest from the research community. In this problem, a server needs to deliver packets to a set of wireless clients over a noiseless broadcast channel. Each client needs to obtain a certain subset of packets and can take advantage of another subset available to it as side information. The objective is to satisfy the demands of all clients with the minimum number of transmissions. In this paper, we study the Index Coding problem from the game-theoretic perspective. We assume that each client is selfish and has a hidden private value for each packet it requests. The objective of server is to maximize the social welfare that captures the trade-off between the values of the received packets and the transmission cost incurred by the server. The transmission process is decided through an auction in which the clients are required to submit bids to the server. Each bid implies an obligation of a client to pay for the packets it can obtain from the channel. Our goal is to design a truthful auction scheme that provides an incentive for each client to bid the true value of the packets. We propose a truthful mechanism to achieve the maximum social welfare. The key component of our scheme is to determine the encoding functions of the transmitted packets, which is NP-hard. We present an efficient approximation algorithm that guarantees both the approximation ratio and the truthfulness properties. I. INTRODUCTION The Index Coding problem is one of the basic problems in wireless network coding. Recently, this problem has attracted a significant interest from the research community (see e.g., [4, 5]). An instance of the Index Coding problem includes a server, a set of wireless clients, and a set P = {p,...,p m } of m packets that need to be delivered to clients. Each client is interested in a certain subset of packets available at the server and has a (different) subset of packets available to it as side information. Server can transmit the packets or encoding thereof to clients via a noiseless broadcast channel. The goal is to find a transmission scheme that requires the minimum number of transmissions to satisfy the requests of all clients. Fig. depicts an instance of the Index Coding problem, where a server needs to deliver four packets P = {p,,p 4 } to four clients. It can be verified that the demands of all clients can be satisfied by broadcasting three packets: p +, +p 3, and p 4 (all operations are over GF (2)). Note that the traditional approach (without coding) requires the transmissions of all four packets p,,p 4. The prior works on the Index Coding problem have focused on developing algorithms, establishing rate bounds, and analyzing the computational complexity of the problem [6 ]. In contrast to the original Index Coding problem where the goal of the server is to satisfy the demands of all clients, we focus on settings where the server s decisions are driven by the values of the transmitted packets to the clients and by the transmission cost. This is a new problem in the intersection of the coding theory and game theory and belongs to the general framework of mechanism design with social choices [2]. Intuitively, since each transmission at server incurs a certain cost, the server may decide to transmit a packet only when the packet is important enough for the clients. Thus, our goal is to maximize the social welfare, i.e., the total value of the packets the clients are able to decode minus the total cost of transmitting the packets by the server. The social welfare reflects the positive externalities in terms of clients valuations of packets and the negative externalities related by the transmission costs of server. To calculate the social welfare, the server needs to know, for all clients in the system, the client valuation of the packet it requests. This information is usually private and selfish clients could not be expected to reveal this information to the server because the server might decide not to transmit packets with low valuation. Accordingly, we aim to design a tractable auction mechanism that provides an incentive for each client to reveal the true valuation of its packets. In the auction, the clients submit bids to the server, and the server decides whether to accept or reject the bid and charges clients accordingly. More specifically, the auction mechanism includes two main components, namely the coding algorithm and payment function. The coding algorithm determines which packets are transmitted over the channel and how they are encoded. The payment function determines the amount of money the client will pay to the server for each packet it is able to decode. Both coding algorithm and payment functions are known to the clients in advance. A classical solution for the problem of maximizing social welfare in the presence of selfish clients is to use the Vickery- Clarke-Groves (VCG) mechanism [ 3]. Such mechanism was shown to be truthful, i.e., in the sense that each client maximizes its own utility by bidding its true valuations of packets. However, the VCG mechanism cannot be used for our
2 v =0.2 b =0.8 v 3 =0.5 b 3 =0.5 v 2 =0.9 p desired packet b 2 =0.9 p 3 c c 2 Server p p 3 p 4 p c 3 c 4 p 3 p 4 p 4 side information p 3 v 4 =0.6 b 4 =0.6 Fig.. An instance of the Index Coding problem. Client c i,i =,...,4 requests packet p i. The side information sets of clients c,...,c 4 are {p 3 }, {p }, {,p 4 }, and {p 3 }, respectively; v i and b i denote the value and bid of packet p i, respectively. problem because it involves solving an NP-hard optimization problem. Accordingly, in this paper we design a novel auction mechanism. We prove that this mechanism is truthful, computationally efficient, and provides a provable approximation guarantee with the respect to the optimization function. Contributions. First, we present a truthful scheme, based on the Vickrey-Clarke-Groves (VCG) mechanism [ 3], that maximizes the social welfare of the system. It turns out that finding VCG based encoding functions for this scheme is an NP-hard optimization problem. Next, to mitigate the intractability of the this problem, we present an approximation algorithm with provable performance guarantees. We show, through a counter-example, that a VCG based algorithm that relies on an approximation solution is no longer truthful. Finally, we present a non-vcg based payment scheme that achieves the truthfulness property in the presence of the approximation solution for the problem. II. MODEL We begin with the definition of the Index Coding problem. The input to the problem includes a server S, a set of n wireless clients = {c,,c n }, and a noiseless wireless broadcast channel. The server has a set of m packets P = {p,,p m } that need to be distributed to clients in. We assume, without loss of generality, that each client requests a single packet in P and has access to a subset of packets in P as a side information. Indeed, a client that wants more than one packet can be substituted by multiple clients that share the same side information set. In particular, each client c i 2 is characterized by the ordered pair (w i,h i ), where w i 2 P is the packet requested by c i and H i P is the set of packets available to c i as a side information. We assume that each packet p i represents an element of the Galois field GF (q). We assume that each client c i 2 has the internal (private) value v i for the packet w i. The transmission process includes an auction, in which each client submits a bid b i for packet w i. We denote by V = {v,,v n } and B = {b,,b n } the arrays that include the internal valuations and bids of the clients. Based on the bid vectors, the server identifies linear combinations that will be transmitted over the channel. In this paper, we focus on the scalar-linear coding schemes in which each packet q i = P m j= g i,jp j transmitted by server at the iteration i, apple i apple, is a linear combination of packets in P. Here, is the total number of transmissions made by the server and g i = {g i,,,g i,m }2GF (q) m is the encoding vector for the iteration i. We denote by G =[g i ] the encoding matrix, rows of G correspond to encoding vectors of the packets transmitted over the channel. A sparse code is the general linear code in which each transmitted packet from the server is a linear combination of at most two packets in P. The transmission of a packet by the server incurs the cost C T. Without lost of generality, we assume that C T =, i.e., the total cost incurred by the server is equal to. The purpose of the server is to maximize the social welfare, defined as P n i= v i i, where i is the indicator function that specifies if client c i is able to decode the required packet w i. In particular, i = if there exists a linear decoding function r i such that w i = r i (q,,q,h i ); otherwise, i = 0. We denote by = {,, n } the vector of indicator functions. For example, in the setting depicted in Fig., the social welfare of broadcasting the solution to the Index Coding problem, i.e. {p + ; + p 3 ; p 4 }, is = 0.8, while the higher social welfare of the sequence consisting of a single combination {p 3 +p 4 } is equal to =0.. Thus, transmitting a single combination p 3 +p 4 would be more desirable than transmitting three packets {p + ; +p 3 ; p 4 } from the server s point of view. The payment function is an important part of the auction mechanism. Server determines the amount of payment i that each client needs to pay for the obtained packet. We denote by ={,, n} the payment vector for all clients. The value of i is a function of B and. The auction mechanism, including the algorithm for determining the encoding function and the payment function is known to all the parties. We assume that every client c i is selfish and chooses its best bidding policy b i that maximizes its utility defined by u i (B) = v i i i. We say that a mechanism (i.e., an encoding matrix associated with a payment function) is truthful if u i v i,b i u i ˆbi,B i for all ˆb i and B i, where B i = B \{b i }. That is, regardless of the bids submitted by other clients, the utility of client c i is maximized when b i = v i. In this paper, we design the encoding matrix and the payment function that satisfies the following two conditions: (i) every client is incentivized to report its true valuation of the desired packet (i.e., truthful property) and (ii) the social welfare is maximized. III. VCG-BASED MECHANISM DESIGN In this section, we propose a truthful scheme based on the celebrated Vickrey-Clarke-Groves (VCG) approach [ 3] to mechanism design. Note that the indicator functions and the number of transmissions are functions of the encoding matrix G. In particular, it is easy to determine and for a given
3 matrix G. We define the social welfare function w(b,g) as w(b,g) = P n i= b i i. Note that the social welfare function is defined similarly to the social welfare, with the value of bids B substituted by packet valuations V. In addition, we define w i (B,G) = P j6=i b j j. In our mechanism, we choose the encoding matrix that maximizes the the value of social welfare function for the given bids B. VCG-coding scheme: Choose the encoding matrix G that maximizes the value of w(b,g), i.e., G = arg max w(b,g). () G If there are multiple encoding functions that maximize the social welfare functions, we choose one that satisfies the larger number of clients. Note that without loss of generality, we can assume that v i 2 [0, ], since client c i is assured to get the desired packet when submitting the bid b i = C T =. Our scheme uses the following payment function i : VCG-payment function: The client c i is charged as follows. i = max G i w(b i,g i ) w i (B,G ). (2) Based on the property of the VCG mechanism [2], we conclude as follows. The following proposition follows from the basic properties of the VCG mechanism. Proposition. (i) The VCG-coding scheme associated with the VCG-payment function is a truthful mechanism, i.e. B = V. Moreover, the pricing function in (2) is non-negative, and the utilities of all clients are non-negative, i apple v i. (ii) The VCG-coding scheme associated with the VCG-payment function maximize the social welfare. Proof: The proof follows from the properties of the VCG mechanism [2]. The proof is omitted due to the space constraints. The problem of finding an optimal VCG encoding matrix G is an interesting combinatorial problem by itself. Unfortunately, this problem is computationally intractable. More specifically, for the instance of the problem in which the bid of each client b i is equal to one, the problem if maximizing the value of the social welfare function w(b,g) is equivalent to the problem of minimizing the required number of transmissions to satisfy all clients. Indeed, in this case there exists an optimal solution that satisfies all clients, since the client bid is equal to the cost of transmitting a single client. IV. APPROXIMATION ALGORITHM In this section, we present an approximation algorithm for the special case of multiple unicast. In the multiple unicast environment, every packet is required by exactly one client. This is in contrast to the multiple multicast scenario in which a packet can be required by multiple clients. We also considering a special case of sparse code, where each packet is a combination of at most two packets in P. With sparse c 0.5 c3 Fig. 2. Weight dependency graph for the instance of the multiple unicast problem in Fig. coding, both encoders and decoders can be implemented in a simpler manner which has a significant advantage for practical applications. Our scheme uses the notion of a weighted dependency graph described below. Definition 2. The weighted dependency graph is a directed graph G(V,A) defined as follows: For each client c i 2 C, there is a corresponding vertex v i in V. For any two clients c i and c j such that w i 2 H j, there is a directed arc (v i,v j ) 2 A. The weight of arc (v i,v j ) is i,j = b i. Fig. 2 illustrates the weight dependency graph corresponding to the instance of the social welfare minimization problem depicted in Fig.. For each vertex-disjoint cycle in the weight dependency graph, the server can save one transmission. That is, for a cycle C of length C, all of the clients that correspond to its nodes can be satisfied using C transmissions. The clients belonging to cycle C share the transmission cost C, resulting in the higher social welfare. Indeed, in Fig. 2 we have a cycle (c,c 2,c 3 ) that involves three clients. It is easy to verify that the three clients can be satisfied by two transmissions: p + and + p 3. Note that if there is no cycle in G(V,A) then sparse code can not improve the value of social welfare function. Given a cycle C =(c,c 2,,c k ), server encodes along cycle C means that server would transmit the sequence of k packets {p + ; ; p k + p k }.We first investigate the hardness of the VCG-coding scheme. Lemma 3. In multiple unicast scenario with the restriction to the sparse code, the social welfare minimization problem is NP-hard. Proof: This is shown via a reduction from the cycle packing problem in directed graphs. We propose the greedy-vcg-coding scheme in Alg. as an approximation algorithm for the PCIC problem in this setting. Next, we present a corresponding pricing scheme that motivates all clients to reveal the true value of the packets. P We define the weight of cycle C in G(V,A) as (C) = a2c a ( C ), where the first term is the sum of all bids along the cycle, and the second one is the total transmission cost of all packets that correspond to this cycle. Let C be a P set of vertex-disjoint cycles in G(V,A). Then w(b,g) = C2C (C), where server encodes along the cycles in C as the encoding matrix G c2 c4
4 Algorithm : Greedy-VCG-coding scheme input : Bids vector B and side information H i for all clients output: Encoding matrix G Create the weight dependency graph G(V,A); 2 Define the cost a of arc a 2 A by a = a; 3 By (C) = P a2c a, we define the cost of cycle C; 4 S, S 2 ;; // S, S 2 will include the clients that are served 5 while in G(V,A), there is a cycle with the cost less than or equal to one do 6 Find the cycle C in G(V,A) with the smallest cost; 7 Server encodes along cycle C; 8 S S [{c v : v 2 V,v 2 C} ; 9 G(V,A) G(V,A)\{vertices along C, edges along or incidnet to C}; 0 end for i to n do 2 if b i =but c i /2 S then 3 Server will transmit w i ; 4 S 2 S 2 [{c i }; 5 end 6 end The idea of the greedy-vcg-coding scheme is iteratively to identify the cycle of the maximum weight and then to remove it. However, this scheme cannot be implemented directly since it is NP-hard to find a maximum weight P cycle. We note that (C) can be revised as (C) = a2c ( a). Thus, in this case, a maximum weight cycle with respect to weight (C) corresponds to the minimum cost cycle with respect to cost P a2c ( a). Therefore, in lines 2 and 3 of Alg., we define the cost of arc a 2 A by a = a and the cost of cycle C by (C) = P a2c a. Then, the algorithm finds the minimum cost cycle in Line 6. To this end, we can use wellknown polynomial time algorithms such as Floyd-Warshall algorithm. After such a cycle is identified, it is removed from the graph in Line 9. The condition in Line 5 guarantees that the maximum weight cycle in the remaining graph G(V,A) (i.e., the minimum cost cycle) has a non-negative weight. In Line 3, the clients with the bids equal to the transmission cost are served. Such clients are then included in set S 2. In addition, set S contains the clients associated with the cycles chosen in Line 6. Note that all procedures in Alg. require a polynomial number of steps, hence Alg. can be executed in polynomial time. Unfortunately, Alg. cannot be used with the VCGpayment functions specified by (2) (i.e to replace G with the approximate solution). In particular, the following example shows that such combination might not have the truthfulness property. Example 4. Consider the instance of the problem depicted in Fig. 3. Given B fixed, we will show that client c has the potential to lie. Suppose that client c submits the bid b = 0.55 equal to its internal value of packet p. In this case, Alg. will identify the cycle (c 2,c 3 ) and output the corresponding solution + p 3. In this case, the utility u of c i is equal to zero. Now, suppose that c submits bid b =0.7. In this case, Alg. will transmit the sequence of packets {p + ; p 3 +p 4 } p c c 3 v =0.55 b =0.55 Server p c c 2 c 3 c 4 p 3 p 4 v 2 =0.6 b 2 =0.6 p p 3 c 2 c 4 p 3 v 3 =0.6 v 4 =0.55 p 4 p 4 b 3 =0.6 b 4 =0.55 p (a) 0.6 Fig. 3. (a) Counter-example of the truthful property for the greedy-vcgcoding scheme accompanied with the VCG-payment function (b) The weight dependency graph (b) that corresponds to cycles (c,c 2 ) and (c 3,c 4 ), respectively. According to (2), the payment of client c is equal to = ( ) ( ) = In this case, the utility of client c is equal to 0.25, which is bigger than the case in which the client is truthful. J Accordingly, we present the greedy-vcg-payment scheme implemented by Alg. 2 to charge the clients c i. This scheme results in a truthful auction Algorithm 2: Greedy-VCG-payment function input : Bids vector B and side information H i for all clients output: Payment i for client c i Clients that are not in S and S 2 do not be charged, return i =0; 2 The payment for the clients belonging to S 2 is, return i =; // Following deals with the clients in S 3 Create the weight dependency graph G(V,A); 4 The cost is defined as follows; for arc (i, j) 2 A, (i,j) = for arc a 6= (i, j), which is not outgoing from vertex i, a = a 5 By (C) = P a2c a, we define the cost of cycle C; 6 P ;; // set P will include the possible payments 8 while in G(V,A), there is a cycle of the cost less than or equal to one, as well as there exists a cycle that traverses vertex i do 9 Find the cycle C in G(V,A) with the smallest cost, say the cost ; 0 Find the cycle C 2 in G(V,A) that traverses vertex i and has the smallest cost among these that go through vertex i, say the cost ; if =0then 2 return i =0 3 end 4 else 5 P P[( ); 6 G(V,A) G(V,A)\{vertices along C, edges along or incident to C }; 7 end 8 end 9 Find the cycle C 2 in G(V,A) (if any) that traverses vertex i and has the smallest cost among these that go through vertex i, say the cost ; 20 P P[( ); 2 return i =minp
5 It can be easily verified that Alg. 2 has polynomial complexity. Note that in Line 4 of Alg. 2, the cost function of G(V,A) is different from that in Alg.. To compute the payment for client c i 2 S, we assign the unit cost for every outgoing arc (i, j) of vertex i (i.e. set i,j =0and b i =0). For each iteration of Line 8, we calculate the difference of the cost between the cycles C and C 2 in G(V,A), where C has the minimum global cost while C 2 is the local optimal cycle that traverses vertex i. We note that when the cycle C last containing vertex i is selected in the last iteration of Alg., the while loop in Alg. 2 might not capture C last because the cost of arc (i, j) is set to be one. Line 20 deals with this case. When client c i submits b i =, the weight of cycle C last in G(V,A) is ( )+( ) = 0, where the first term is the weight when b i =0while the second term is the increment when b i =. Therefore, the cost of C last is one, which satisfies the condition of Line 5 of Alg.. The set P includes the result of each iteration. If the difference is zero, client c i will not be charged; otherwise, it will be charged the value equal to the minimum of an element in set P. Given the bids of all clients, the coding algorithm determines the encoding matrix G, which, in turn, determines the indicator vector. We say that a coding algorithm is monotone if, for any B i, there exists a single critical value b i such that c i gets the desired packet (i.e. i =) when b i b i ; otherwise, c i can not. Theorem 5 (Theorem [3]). The mechanism is truthful if and only if the coding algorithm is monotone and the payment scheme is based on the critical value. Theorem 6. The Algorithms and 2 result in a truthful mechanism. Proof: According to Theorem 5, it is sufficient to show that Alg. is monotone, as well as Alg. 2 is based on the critical value. Suppose client c i is able to recover the desired packet. Then, a cycle containing vertex v i will be chosen by Alg.. Alg. prefers the cycle of the maximum weight (i.e., minimum cost) in weight dependency graph G(V,A). When c i increases the bid, so does the weight of the cycles that pass through vertex v i, and therefore a cycle containing vertex v i will be selected by Alg.. Hence, the greedy-vcg-coding scheme is monotone. Given B i, for each iteration in Alg. 2, we calculate the lowest bid b i for client c i such that a cycle containing vertex v i would be selected by Alg.. Since the minimum of these values are adopted as the payment for client c i 2 S, client c i 2 S is charged by the critical value. Other cases, i.e. client c i /2 S, follow immediately. Let OPT be the optimal solution of the VCG-coding scheme, i.e. OPT = w(b,g ). Assume G greedy is the encoding matrix from the greedy-vcg-coding scheme. We define the approximation ratio of Alg. by OP T/AP X, where AP X = w(b,g greedy ). b = b5 = b2 = b6 = p c c3 p3 p5 p5 p2 p p3 p6 p2 c5 c7 p7 p Server p7 p4 p3 p p8 p4 c5 c7 c c3 p2 p3 p4 p5 p6 p7 p8 b3 = b7 = b4 = b8 = (a) (b) Fig. 4. (a) Tight example of greedy-vcg-coding scheme (b) The weight dependency graph Theorem 7. The approximation ratio of Alg. scheme is equal to the maximum length of the cycle in the weight dependency graph. Proof: The optimal solution G in () corresponds to the maximum weight vertex-disjoint cycle packing, say C, in the weight dependency graph G(V,A). The total weight of these cycles in C is OPT, i.e. w(b,g )= P C2C (C) Given a cycle C in the weight dependency graph, let C \C be the set of the cycles in C that have a shared vertex with C. For each iteration k of Alg., we encode along the cycle C k of the minimum cost in G k (V,A), where G k (V,A) is the remaining graph in iteration k. Let C k be the set of cycles in C that belongs to G k (V,A). We define AP X k = (C k ) and OPT k = P C2(C k \C k ) (C). Because C k is the maximum weight cycle in this iteration, the weight of the cycles in C k \ C k is smaller than AP X k. Moreover, since there are C k vertices in cycle C k, there are at most C k cycles in C k \C k. Hence, OPT k apple AP X k C k, which results in the approximation ratio of the maximum cycle length in the weight dependency graph. In the next example, we show that the approximation ratio proven in Theorem 7 is tight. Example 8 (Tight example of Alg. ). Consider the setting depicted in Fig. 4(a). For this setting, Alg. results in the following transmissions p +, + p 3, and p 3 + p 4. Note that these transmissions correspond to cycle (c,c 2,c 3,c 4 ) in Fig. 4(b). In contrast, the optimal solutions is p +p 5, +p 6, p 3 + p 7, and p 4 + p 8. Therefore, the approximation ratio is 4( )/ for any >0. J c2 c4 V. CONCLUSION In this paper, we focus on an interesting problem that lies in the intersection of game theory and coding theory. Based p2 c2 c4 p4 c8 c6 p6 c6 c8 p8
6 on the Vickrey-Clarke-Groves (VCG) mechanism, we propose the VCG-coding scheme and the VCG-payment function that maximize the social welfare and provide incentives for the clients to submit truthful bids. It turns out that in many cases of practical interest it is intractable to implement the exact VCG-coding scheme. We rigorously prove the hardness of the related problems as well as their inapproximability. We propose an approximation algorithm with provable performance guarantees as well as the corresponding payment scheme that guarantee trustfulness. REFERENCES [] W. Vickrey, Counterspeculation, Auctions, and Competitive Sealed Tenders, The Journal of Finance, vol. 6, pp. 8 37, 96. [2] E. Clarke, Multipart Pricing of Public Goods, Public Choice, vol., pp. 7 33, 97. [3] T. Groves, Incentives in Teams, Econometrica, vol. 4, pp , 973. [4] Y. Birk and T. Kol, Coding on Demand by an Informed Source (ISCOD) for Efficient Broadcast of Different Supplemental Data to Caching Clients, IEEE Trans. Inf. Theory, vol. 52, pp , [5] Z. Bar-Yossef, Y. Birk, T. S. Jayram, and T. Kol, Index Coding with Side Information, IEEE Trans. Inf. Theory, vol. 57, pp , 20. [6] A. Blasiak, R. Kleinberg, and E. Lubetzky, Index coding via linear programming. [Online]. Available: [7] N. Alon, E. Lubetzky, U. Stav, A. Weinstein, and A. Hassidim, Broadcasting with Side Information, Prof. of IEEE FOCS, pp , [8] S. E. Rouayheb, A. Sprintson, and C. Georghiades, On the Index Coding Problem and Its Relation to Network Coding and Matroid Theory, IEEE Trans. Inf. Theory, vol. 56, pp , 200. [9] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, XORs in the Air: Practical Wireless Network Coding, IEEE/ACM Trans. Netw., vol. 6, pp , [0] M. A. R. Chaudhry and A. Sprintson, Efficient Algorithms for Index Cdoing, Proc. of IEEE INFOCOM Workshops, pp. 4, [] M. Langberg and A. Sprintson, On the Hardness of Approximating the Network Coding Capacity, IEEE Trans. Inf. Theory, vol. 57, pp , 20. [2] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic Game Theory. Cambridge University Press, [3] A. Mualem and N. Nisan, Truthful Approximation Mechanisms for Restricted Combinatorial Auctions, Games and Economic Behavior, vol. 64, pp , 2008.
Truthful and Non-Monetary Mechanism for Direct Data Exchange
Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {ihou, yupinhsu, spalex}@tamu.edu
More informationOptimal Index Codes for a Class of Multicast Networks with Receiver Side Information
Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net
More informationOn the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics
More informationA Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
More informationEnergy Benefit of Network Coding for Multiple Unicast in Wireless Networks
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber
More informationWeakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
More informationOptimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks
Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: rurgaon@us.ibm.com Prithwish Basu and Saikat Guha
More informationSecure Network Coding for Wiretap Networks of Type II
1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can
More informationFunctional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
More information17.6.1 Introduction to Auction Design
CS787: Advanced Algorithms Topic: Sponsored Search Auction Design Presenter(s): Nilay, Srikrishna, Taedong 17.6.1 Introduction to Auction Design The Internet, which started of as a research project in
More informationOnline Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
More informationThis article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
More informationA Simple Characterization for Truth-Revealing Single-Item Auctions
A Simple Characterization for Truth-Revealing Single-Item Auctions Kamal Jain 1, Aranyak Mehta 2, Kunal Talwar 3, and Vijay Vazirani 2 1 Microsoft Research, Redmond, WA 2 College of Computing, Georgia
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationChapter 3. Social Surplus and Tractability
Chapter 3 Social Surplus and Tractability In this chapter we discuss the objective of social surplus. As we will see, ignoring computational tractability, the economics of designing mechanisms to maximize
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationSHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More informationAlgorithmic Game Theory. Edited by Noam Nisan, Tim Roughgarden, Éva Tardos, and Vijay Vazirani
Algorithmic Game Theory Edited by Noam Nisan, Tim Roughgarden, Éva Tardos, and Vijay Vazirani Contents 1 Combinatorial Auctions L. Blumrosen and N. Nisan page 4 3 1 Combinatorial Auctions Liad Blumrosen
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationAnalysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More information1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
More informationApproximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
More informationFairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
More informationDefinition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
More informationBargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationOn Secure Communication over Wireless Erasure Networks
On Secure Communication over Wireless Erasure Networks Andrew Mills Department of CS amills@cs.utexas.edu Brian Smith bsmith@ece.utexas.edu T. Charles Clancy University of Maryland College Park, MD 20472
More informationTHIRD-GENERATION (3G) wide-area wireless networks
1020 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006 Market Sharing Games Applied to Content Distribution in Ad Hoc Networks Michel X. Goemans, Li (Erran) Li, Vahab S. Mirrokni,
More informationOn the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
More informationChapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
More informationHow To Find An Optimal Search Protocol For An Oblivious Cell
The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,
More informationA Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
More informationNP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics
NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer
More informationLinear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationCodes for Network Switches
Codes for Network Switches Zhiying Wang, Omer Shaked, Yuval Cassuto, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical Engineering
More informationTopology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More informationPermutation Betting Markets: Singleton Betting with Extra Information
Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu
More informationJUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
More informationOnline Ad Auctions. By Hal R. Varian. Draft: February 16, 2009
Online Ad Auctions By Hal R. Varian Draft: February 16, 2009 I describe how search engines sell ad space using an auction. I analyze advertiser behavior in this context using elementary price theory and
More informationDiscrete Applied Mathematics. The firefighter problem with more than one firefighter on trees
Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with
More informationLinear Algebra Notes
Linear Algebra Notes Chapter 19 KERNEL AND IMAGE OF A MATRIX Take an n m matrix a 11 a 12 a 1m a 21 a 22 a 2m a n1 a n2 a nm and think of it as a function A : R m R n The kernel of A is defined as Note
More informationMapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
More informationA Note on Maximum Independent Sets in Rectangle Intersection Graphs
A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,
More informationIN CURRENT distributed systems such as computational
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 34, NO. 1, FEBRUARY 2004 77 Algorithmic Mechanism Design for Load Balancing in Distributed Systems Daniel Grosu, Student Member,
More informationSimilarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
More informationMulti-unit auctions with budget-constrained bidders
Multi-unit auctions with budget-constrained bidders Christian Borgs Jennifer Chayes Nicole Immorlica Mohammad Mahdian Amin Saberi Abstract We study a multi-unit auction with multiple agents, each of whom
More informationBicolored Shortest Paths in Graphs with Applications to Network Overlay Design
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
More informationGenerating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
More informationAlgorithmic Mechanism Design for Load Balancing in Distributed Systems
In Proc. of the 4th IEEE International Conference on Cluster Computing (CLUSTER 2002), September 24 26, 2002, Chicago, Illinois, USA, IEEE Computer Society Press, pp. 445 450. Algorithmic Mechanism Design
More informationProblem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
More informationAN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
More informationLecture 11: Sponsored search
Computational Learning Theory Spring Semester, 2009/10 Lecture 11: Sponsored search Lecturer: Yishay Mansour Scribe: Ben Pere, Jonathan Heimann, Alon Levin 11.1 Sponsored Search 11.1.1 Introduction Search
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationDetermination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
More informationSECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
More informationCost of Conciseness in Sponsored Search Auctions
Cost of Conciseness in Sponsored Search Auctions Zoë Abrams Yahoo!, Inc. Arpita Ghosh Yahoo! Research 2821 Mission College Blvd. Santa Clara, CA, USA {za,arpita,erikvee}@yahoo-inc.com Erik Vee Yahoo! Research
More informationMonotone multi-armed bandit allocations
JMLR: Workshop and Conference Proceedings 19 (2011) 829 833 24th Annual Conference on Learning Theory Monotone multi-armed bandit allocations Aleksandrs Slivkins Microsoft Research Silicon Valley, Mountain
More informationTruthful Mechanisms for One-Parameter Agents
Truthful Mechanisms for One-Parameter Agents Aaron Archer Éva Tardos y Abstract In this paper, we show how to design truthful (dominant strategy) mechanisms for several combinatorial problems where each
More informationNOTES ON LINEAR TRANSFORMATIONS
NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all
More informationClass notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007
Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This
More informationRouting and Peering in a Competitive Internet
Routing and Peering in a Competitive Internet Ramesh Johari Stanford University rjohari@stanford.edu John N. Tsitsiklis MIT jnt@mit.edu Abstract Today s Internet is a loose federation of independent network
More informationA greedy algorithm for the DNA sequencing by hybridization with positive and negative errors and information about repetitions
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 59, No. 1, 2011 DOI: 10.2478/v10175-011-0015-0 Varia A greedy algorithm for the DNA sequencing by hybridization with positive and negative
More informationLinearly Independent Sets and Linearly Dependent Sets
These notes closely follow the presentation of the material given in David C. Lay s textbook Linear Algebra and its Applications (3rd edition). These notes are intended primarily for in-class presentation
More information5.3 The Cross Product in R 3
53 The Cross Product in R 3 Definition 531 Let u = [u 1, u 2, u 3 ] and v = [v 1, v 2, v 3 ] Then the vector given by [u 2 v 3 u 3 v 2, u 3 v 1 u 1 v 3, u 1 v 2 u 2 v 1 ] is called the cross product (or
More informationMathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
More informationOPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
More informationSuk-Geun Hwang and Jin-Woo Park
Bull. Korean Math. Soc. 43 (2006), No. 3, pp. 471 478 A NOTE ON PARTIAL SIGN-SOLVABILITY Suk-Geun Hwang and Jin-Woo Park Abstract. In this paper we prove that if Ax = b is a partial signsolvable linear
More informationGuessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationAdaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
More informationReliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points
Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Email:
More informationHow Much Can Taxes Help Selfish Routing?
How Much Can Taxes Help Selfish Routing? Richard Cole Yevgeniy Dodis Tim Roughgarden July 28, 25 Abstract We study economic incentives for influencing selfish behavior in networks. We consider a model
More informationMOST error-correcting codes are designed for the equal
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,
More informationOn the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
More informationEfficient Recovery of Secrets
Efficient Recovery of Secrets Marcel Fernandez Miguel Soriano, IEEE Senior Member Department of Telematics Engineering. Universitat Politècnica de Catalunya. C/ Jordi Girona 1 i 3. Campus Nord, Mod C3,
More informationPermutation Betting Markets: Singleton Betting with Extra Information
Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu
More informationCoding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels
Coding Schemes for a Class of eceiver Message Side Information in AWG Broadcast Channels Behzad Asadi Lawrence Ong and Sarah J. Johnson School of Electrical Engineering and Computer Science The University
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More informationAchievable Strategies for General Secure Network Coding
Achievable Strategies for General Secure Network Coding Tao Cui and Tracey Ho Department of Electrical Engineering California Institute of Technology Pasadena, CA 91125, USA Email: {taocui, tho}@caltech.edu
More informationLoad Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load
More information14.1 Rent-or-buy problem
CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms
More informationMechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
More informationCloud Computing. Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources
Peter Key, Cloud Computing Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources How much is a task or resource worth Can we use to price
More informationI. INTRODUCTION. of the biometric measurements is stored in the database
122 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 6, NO 1, MARCH 2011 Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case Lifeng Lai, Member, IEEE, Siu-Wai
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
More informationComplexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
More informationPrediction Markets. 1 Introduction. 1.1 What is a Prediction Market? Algorithms Seminar 12.02.2014
Algorithms Seminar 12.02.2014 Tawatchai Siripanya Prediction Markets Wolfgang Mulzer, Yannik Stein 1 Introduction 1.1 What is a Prediction Market? Prediction markets are defined as analytical markets that
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationVector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
More informationCOUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics
More informationNumerical Analysis Lecture Notes
Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number
More informationn 2 + 4n + 3. The answer in decimal form (for the Blitz): 0, 75. Solution. (n + 1)(n + 3) = n + 3 2 lim m 2 1
. Calculate the sum of the series Answer: 3 4. n 2 + 4n + 3. The answer in decimal form (for the Blitz):, 75. Solution. n 2 + 4n + 3 = (n + )(n + 3) = (n + 3) (n + ) = 2 (n + )(n + 3) ( 2 n + ) = m ( n
More informationImpact Of Interference On Multi-hop Wireless Network Performance
Impact Of Interference On Multi-hop Wireless Network Performance Kamal Jain Jitendra Padhye Venkata N. Padmanabhan Lili Qiu Microsoft Research One Microsoft Way, Redmond, WA 98052. {kamalj, padhye, padmanab,
More informationTight Bounds for Selfish and Greedy Load Balancing
Tight Bounds for Selfish and Greedy Load Balancing Ioannis Caragiannis 1, Michele Flammini, Christos Kaklamanis 1, Panagiotis Kanellopoulos 1, and Luca Moscardelli 1 Research Academic Computer Technology
More information