Computational Game Theory and Clustering

Size: px
Start display at page:

Download "Computational Game Theory and Clustering"

Transcription

1 Computational Game Theory and Clustering Martin Hoefer

2 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion

3 Computational Game Theory (Micro-)Economics Operations Research Computational Game Theory Applied Mathematics Computer Science

4 Nash equilibrium S G S G n players, strategy space S i for each i [n] State space S = S 1... S n, utility u i : S R s S is pure Nash equilibrium (PNE) if for every player i u i(s) max j S i u i(j, s i).

5 Nash equilibrium S G S G (S,S) and (G,G) are both PNE. n players, strategy space S i for each i [n] State space S = S 1... S n, utility u i : S R s S is pure Nash equilibrium (PNE) if for every player i u i(s) max j S i u i(j, s i).

6 Nash equilibrium H T H T No PNE. n players, strategy space S i for each i [n] State space S = S 1... S n, utility u i : S R s S is pure Nash equilibrium (PNE) if for every player i u i(s) max j S i u i(j, s i).

7 Main Questions Existence: Does a given game have an equilibrium? Recognition: Is a given state an equilibrium? Classic Decision Problems

8 Main Questions Existence: Does a given game have an equilibrium? Recognition: Is a given state an equilibrium? Classic Decision Problems Computation: How can we compute an equilibrium in polynomial time? Dynamics: How can players reach/learn equilibria (quickly)? Fixed-Point Computation, Local Search, etc.

9 Main Questions Existence: Does a given game have an equilibrium? Recognition: Is a given state an equilibrium? Classic Decision Problems Computation: How can we compute an equilibrium in polynomial time? Dynamics: How can players reach/learn equilibria (quickly)? Fixed-Point Computation, Local Search, etc. Inefficiency: How good are equilibrium states in terms of social and system objectives? Price of... -Results, Approximation

10 Main Questions Existence: Does a given game have an equilibrium? Recognition: Is a given state an equilibrium? Classic Decision Problems Computation: How can we compute an equilibrium in polynomial time? Dynamics: How can players reach/learn equilibria (quickly)? Fixed-Point Computation, Local Search, etc. Inefficiency: How good are equilibrium states in terms of social and system objectives? Price of... -Results, Approximation Mechanism Design: Design rules of a game to obtain (only) desirable equilibria Auctions, Social Choice, Voting, etc.

11 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion

12 Equilibrium Existence and Computation Concepts in Games: Pure Nash equilibrium Mixed Nash equilibrium Correlated equilibrium Coarse-correlated equilibrium Perfect equilibrium Pairwise/(k-)Strong equilibrium Core Shapley Value Nucleolus Market equilibrium Evolutionary Stable Strategies etc. Methods of Computation: Centralized Algorithms Oracle Models Tâtonnement Best-Response Dynamics Sequential Improvements Concurrent Improvements No-Regret Learning Logit-Response Dynamics etc.

13 Equilibrium Existence and Computation Concepts in Games: Pure Nash equilibrium Mixed Nash equilibrium Correlated equilibrium Coarse-correlated equilibrium Perfect equilibrium Pairwise/(k-)Strong equilibrium Core Shapley Value Nucleolus Market equilibrium Evolutionary Stable Strategies etc. Methods of Computation: Centralized Algorithms Oracle Models Tâtonnement Best-Response Dynamics Sequential Improvements Concurrent Improvements No-Regret Learning Logit-Response Dynamics etc.

14 Correlation Clustering Games n players, w ij = w ji {0, 1,..., W } Strategies are clusters, S i = [n] i Utility for i of partition s: u i(s) = w ij + (W w ij). j:s i =s j j:s i s j Maximize weight within clusters, minimize weight between clusters.

15 Correlation Clustering Games n players, w ij = w ji {0, 1,..., W } Strategies are clusters, S i = [n] i Utility for i of partition s: u i(s) = w ij + (W w ij). j:s i =s j j:s i s j Maximize weight within clusters, minimize weight between clusters. 2 4

16 Correlation Clustering Games n players, w ij = w ji {0, 1,..., W } Strategies are clusters, S i = [n] i Utility for i of partition s: u i(s) = w ij + (W w ij). j:s i =s j j:s i s j Maximize weight within clusters, minimize weight between clusters. 2 4

17 Correlation Clustering Games 2 1 They are potential games: u i(s i, s i) u i(s) = Φ(s i, s i) Φ(s) 1 with potential function Φ(s) = 1 u i(s). 2 i [n] Every profitable unilateral deviation of any player increases Φ. Every local optimum of Φ is PNE. [Monderer, Shapley 1996] 2 4

18 Correlation Clustering Games 2 2 They are potential games: u i(s i, s i) u i(s) = Φ(s i, s i) Φ(s) 2 with potential function Φ(s) = 1 u i(s). 2 i [n] Every profitable unilateral deviation of any player increases Φ. Every local optimum of Φ is PNE. [Monderer, Shapley 1996] 3 3

19 In a Nutshell: Complexity and Equilibria We represent every number in at most log W bits. Compact Representation: Correlation Clustering Game: O(n 2 log W ) In contrast, normal-form representation has size O(n n n log(nw )). Polynomial vs. Exponential All games studied here have a natural compact representation. It is exponentially smaller than the standard normal-form representation. We favor quick convergence and efficient algorithms. They should terminate in a polynomial number of steps in the size of the natural compact representation.

20 PLS What is the complexity of computing a pure Nash equilibrium? Non-Constructive Existence Argument: Potential Function Idea: Single players iteratively deviate until local maximum of Φ is reached. Potential function bounded by 0 Φ(s) < n 2 W Convergence in a number of steps polynomial in n, log W?

21 PLS What is the complexity of computing a pure Nash equilibrium? Non-Constructive Existence Argument: Potential Function Idea: Single players iteratively deviate until local maximum of Φ is reached. Potential function bounded by 0 Φ(s) < n 2 W Convergence in a number of steps polynomial in n, log W? Yes, if W = n c for some constant c.

22 PLS What is the complexity of computing a pure Nash equilibrium? Non-Constructive Existence Argument: Potential Function Idea: Single players iteratively deviate until local maximum of Φ is reached. Potential function bounded by 0 Φ(s) < n 2 W Convergence in a number of steps polynomial in n, log W? Yes, if W = n c for some constant c. For large W, however, there are games where convergence must take time c n for some constant c.

23 PLS What is the complexity of computing a pure Nash equilibrium? Non-Constructive Existence Argument: Potential Function Idea: Single players iteratively deviate until local maximum of Φ is reached. Potential function bounded by 0 Φ(s) < n 2 W Convergence in a number of steps polynomial in n, log W? Yes, if W = n c for some constant c. For large W, however, there are games where convergence must take time c n for some constant c. Can we instead compute PNE efficiently with a centralized algorithm? Complexity Class: PLS (polynomial local search) [Johnson, Papadimitriou, Yannakakis 1988] Completeness Idea: Define PLS-complete problem, construct polynomial reductions

24 PLS For a local search problem in PLS there are: Objective function and neighborhood relation for solutions Three polynomial-time algorithms: Alg A computes a starting solution Alg B computes the objective function value for each solution Alg C checks if a solution is a local optimum. If not, it computes a strictly better neighbor solution.

25 PLS For a local search problem in PLS there are: Objective function and neighborhood relation for solutions Three polynomial-time algorithms: Alg A computes a starting solution Alg B computes the objective function value for each solution Alg C checks if a solution is a local optimum. If not, it computes a strictly better neighbor solution. Many classic local search problems are PLS-complete: Circuit-Flip with FLIP Neighborhood MaxCut with FLIP neighborhood TSP with k-opt or Lin-Kernighan neighborhood Theorem Computing a PNE in correlation clustering games is PLS-complete. [Feldman, Levin-Eytan, Naor 2012]

26 Modularity Clustering Games Graph G = (V, E), n vertices, m edges Vertices are players, d i degree of i V Strategies are clusters, S i = [n] i Edge weight w ij = 2m (1 ij) d id j Utility for i of partition s: u i(s) = w ij. j:s i =s j Proposition Every improvement sequence reaches a PNE after O(m 2 ) steps. [Hoefer 2007]

27 Modularity Clustering Games Graph G = (V, E), n vertices, m edges Vertices are players, d i degree of i V Strategies are clusters, S i = [n] i Edge weight w ij = 2m (1 ij) d id j Utility for i of partition s: u i(s) = w ij. j:s i =s j Proposition Every improvement sequence reaches a PNE after O(m 2 ) steps. [Hoefer 2007]

28 Modularity Clustering Games 6 Graph G = (V, E), n vertices, m edges Vertices are players, d i degree of i V Strategies are clusters, S i = [n] i Edge weight w ij = 2m (1 ij) d id j Utility for i of partition s: u i(s) = w ij. j:s i =s j Proposition Every improvement sequence reaches a PNE after O(m 2 ) steps. [Hoefer 2007]

29 Symmetric Additive-Separable Hedonic Games -2 n players, weights w ij = w ji Z Strategies are clusters, S i = [n] i Utility for i of partition s: u i(s) = w ij. j:s i =s j Theorem Computing a PNE in symmetric additiveseparable hedonic games is PLS-complete. [Gairing, Savani 2010] 8

30 Symmetric Additive-Separable Hedonic Games -2 n players, weights w ij = w ji Z Strategies are clusters, S i = [n] i Utility for i of partition s: u i(s) = w ij. j:s i =s j 6 5 Theorem Computing a PNE in symmetric additiveseparable hedonic games is PLS-complete. [Gairing, Savani 2010] 8

31 Equilibrium Existence and Computation Concepts in Games: Pure Nash equilibrium Mixed Nash equilibrium Correlated equilibrium Coarse-correlated equilibrium Perfect equilibrium Strong equilibrium Core Shapley Value Nucleolus Market equilibrium Evolutionary Stable Strategies etc. Methods of Computation: Centralized Algorithms Oracle Models Tâtonnement Best-Response Dynamics Sequential Improvements Concurrent Improvements No-Regret Learning Logit-Response Dynamics etc.

32 Cooperative Games n players, weights w ij = w ji Z Partition C = (C 1,..., C k ) of [n] C(i) denotes coalition of i. Utility for i coalition C(i) is u i(c(i)) = w ij. j C(i) C is in the core iff there is no C [n] such that for all i C u i(c ) > u i(c(i)).

33 Cooperative Games -2 n players, weights w ij = w ji Z Partition C = (C 1,..., C k ) of [n] C(i) denotes coalition of i. Utility for i coalition C(i) is u i(c(i)) = w ij. j C(i) C is in the core iff there is no C [n] such that for all i C u i(c ) > u i(c(i)).

34 Cooperative Games n players, weights w ij = w ji Z Partition C = (C 1,..., C k ) of [n] C(i) denotes coalition of i. Utility for i coalition C(i) is u i(c(i)) = w ij. j C(i) C is in the core iff there is no C [n] such that for all i C u i(c ) > u i(c(i)).

35 Core? Deciding non-emptiness of the core is hard: NP-hard in symmetric additive-separable hedonic games. [Aziz, Brandt, Seedig 2010] Σ p 2-complete in additive-separable hedonic games. [Woeginger 2013]

36 Core? Deciding non-emptiness of the core is hard: NP-hard in symmetric additive-separable hedonic games. [Aziz, Brandt, Seedig 2010] Σ p 2-complete in additive-separable hedonic games. [Woeginger 2013]

37 Core in Additive-Separable Games [Dimitrov, Borm, Hendrickx, Sung 2006] w ij {n, 1}: Consider digraph G with E = {(i, j) w ij = n}. Partition G into strongly connected components Core partition. Computation in P, recognition is an open problem.

38 Core in Additive-Separable Games [Dimitrov, Borm, Hendrickx, Sung 2006] w ij {n, 1}: Consider digraph G with E = {(i, j) w ij = n}. Partition G into strongly connected components Core partition. Computation in P, recognition is an open problem. w ij {1, n}: Consider graph G with E = {{i, j} w ij = w ji = 1}. Select a largest clique C from G as a separate cluster. Remove C from G and repeat Core partition. Special case of games with weak top-coalition property. [Banerjee, Konishi, Sönmez 2001] Computation and recognition are both strongly NP-complete.

39 Fractional Hedonic Games n players, weights w ij Z, w ij = w ji Utility of partition C for i is given by u i(c(i)) = w ij/ C(i). Theorem Deciding existence of PNE j C(i) non-emptiness of the core is NP-hard in symmetric fractional hedonic games. [Brandl, Brandt, Strobel 2015]

40 Fractional Hedonic Games n players, weights w ij Z, w ij = w ji Utility of partition C for i is given by u i(c(i)) = w ij/ C(i). j C(i) Theorem Deciding existence of PNE non-emptiness of the core is NP-hard in symmetric fractional hedonic games. [Brandl, Brandt, Strobel 2015]

41 Fractional Hedonic Games n players, weights w ij Z, w ij = w ji Utility of partition C for i is given by u i(c(i)) = w ij/ C(i). j C(i) Theorem Deciding existence of PNE non-emptiness of the core is NP-hard in symmetric fractional hedonic games. [Brandl, Brandt, Strobel 2015]

42 Fractional Hedonic Games on Graphs If w ij = w ji {0, 1}, then w describes an unweighted, undirected graph. Max-Degree 2 Forests Bipartite with Perfect Matching Girth 5 Non-Empty Core Computation in P? [Aziz, Brandt, Harrenstein 2014]

43 Equilibrium Existence and Computation Concepts in Games: Pure Nash equilibrium Mixed Nash equilibrium Correlated equilibrium Coarse-correlated equilibrium Perfect equilibrium Strong equilibrium Core Shapley Value Nucleolus Market equilibrium Evolutionary Stable Strategies etc. Methods of Computation: Centralized Algorithms Oracle Models Tâtonnement Best-Response Dynamics Sequential Improvements Concurrent Improvements No-Regret Learning Logit-Response Dynamics etc.

44 Multi-Armed Bandits Learning to play optimally: m slot machines, T rounds In round t, first pick some machine i t Then learn reward u t (i t ) [0, 1] Reward chosen by adversary Goal: Minimize regret R(T ) = ( max j [m] t=1 No-Regret Algorithm picks i t such that ) T T u t (j) u t (i t ) lim R(T )/T = 0 T t=1

45 Full Information Assume after each round we learn u t (j) for all j [m]. Let η = (ln m)/t. Randomized Weighted Majority (RWM) Algorithm Initially, set w 1 j = 1, for every j [m]. At every time t, let W t = m j=1 wt j; choose machine j with probability p t j = w t j/w t ; set w t+1 j = w t j (1 η) 1 ut (j). The algorithm obtains R(T )/T = ε after T = Ω( ln m /ε 2 ) rounds. [Littestone, Warmuth 1994] Similar algorithms exist for incomplete information when we only learn u t (i t). They carefully trade exploration and exploitation.

46 Playing Games with Learning Algorithms Suppose a strategic game is played repeatedly for T rounds. Every player uses a no-regret learning algorithm to make his strategy choice in each round. Consider the sequence of states s 1, s 2,..., s T, then every player i obtains T t=1 u i(s t ) = max j S i T u i(j, s t i) R(T ) t=1

47 Playing Games with Learning Algorithms Suppose a strategic game is played repeatedly for T rounds. Every player uses a no-regret learning algorithm to make his strategy choice in each round. Consider the sequence of states s 1, s 2,..., s T, then every player i obtains 1 T T t=1 u i(s t 1 ) = max j S i T T t=1 u i(j, s t i) R(T ) T

48 Playing Games with Learning Algorithms Suppose a strategic game is played repeatedly for T rounds. Every player uses a no-regret learning algorithm to make his strategy choice in each round. Consider the sequence of states s 1, s 2,..., s T, then every player i obtains 1 T T t=1 u i(s t 1 ) = max j S i T T t=1 u i(j, s t i) R(T ) T Consider T and let D be the distribution of play resulting from averaging over s 1, s 2,... Let x D, then E [u i(x)] max j S i E [u i(j, x i)] Such a distribution D is called a coarse-correlated equilibrium.

49 Equilibrium Concepts PNE Mixed NE Correlated No-Regret

50 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion

51 Price of Anarchy In many applications we are interested in the quality of equilibria. To measure quality of a state s, we use a social welfare function sw(s). A prominent choice is utilitarian social welfare with sw(s) = i ui(s). To quantify the deterioration in equilibrium we compare the cost to that of an optimum state s. The price of anarchy for an equilibrium concept in a single game is determined by the worst equilibrium. The price of anarchy for a class G of games is the worst ratio in any game: PoA = max I G sw(s, I) sw(s, I) max s is equil.

52 Price of Anarchy for Equilibrium Concepts Since the sets of equilibria are expanding, the worst-case ratios for the PoA are increasing for different equilibrium concepts: 1 Optimum PNE Mixed NE Correlated No-Regret

53 Robust Price of Anarchy A game is (λ, µ)-semi smooth if there exists a randomized strategy x i for each player i such that for every outcome s: E [u i(x i, s i)] λ sw(s ) µ sw(s) i

54 Robust Price of Anarchy A game is (λ, µ)-semi smooth if there exists a randomized strategy x i for each player i such that for every outcome s: E [u i(x i, s i)] λ sw(s ) µ sw(s) i Consider any PNE s of the game, then sw(s) = i u i(s) PNE semi smooth max u i(j, s i) j S i i E [u i(x i, s i)] i λ sw(s ) µ sw(s)

55 Robust Price of Anarchy A game is (λ, µ)-semi smooth if there exists a randomized strategy x i for each player i such that for every outcome s: E [u i(x i, s i)] λ sw(s ) µ sw(s) i Consider any PNE s of the game, then sw(s) = i u i(s) PNE semi smooth max u i(j, s i) j S i i E [u i(x i, s i)] i λ sw(s ) µ sw(s) Hence (1 + µ) sw(s) λ sw(s ) = sw(s ) sw(s) 1 + µ λ A similar calculation shows the same bound for coarse-correlated equilibria. [Caragiannis, Kaklamansis, Kanellopoulos, Kyropoulou, Lucier, Paes Leme, Tardos 2015].

56 Price of Anarchy MaxCut Game n players, weights w ij = w ji 0. Strategies are clusters, S i = {1, 2} i Utility of partition s for i is given by u i(s) = j:s i s j w ij.

57 Price of Anarchy MaxCut Game n players, weights w ij = w ji 0. Strategies are clusters, S i = {1, 2} i Utility of partition s for i is given by u i(s) = j:s i s j w ij.

58 Price of Anarchy MaxCut Game n players, weights w ij = w ji 0. Strategies are clusters, S i = {1, 2} i Utility of partition s for i is given by u i(s) = j:s i s j w ij. Let x i = (1/2, 1/2) for every i. For every s u i(1, s i) + u i(2, s i) = j w ij = w i. Thus, E [u i(x i, s i)] = i i w i 2 sw(s ), 2 i.e. λ = 1/2, µ = 0, and the robust price of anarchy is 2.

59 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion

60 Conclusion Computational Game Theory Deciding Existence and Recognition of Equilibria Computing and Converging to Equilibria Inefficiency and Price-of-Anarchy Mechanism Design, Social Choice This talk: Strategic Games, PNE, Potential Functions, PLS Cooperative Games, Core, Hardness No-Regret Learning, Coarse-Correlated Equilibrium Robust Price of Anarchy

Mediated Equilibria in Load-Balancing Games

Mediated Equilibria in Load-Balancing Games Mediated Equilibria in Load-Balancing Games Joshua R. Davis, David Liben-Nowell, Alexa Sharp, and Tom Wexler Carleton College; Northfield, MN Oberlin College; Oberlin, OH joshuadavis@q.com, dlibenno@carleton.edu,

More information

Individual security and network design

Individual security and network design Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be

More information

NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS

NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

4 Learning, Regret minimization, and Equilibria

4 Learning, Regret minimization, and Equilibria 4 Learning, Regret minimization, and Equilibria A. Blum and Y. Mansour Abstract Many situations involve repeatedly making decisions in an uncertain environment: for instance, deciding what route to drive

More information

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Evangelos Markakis Orestis Telelis Abstract We study formally two simple discrete bidding strategies in the context

More information

Compact Representations and Approximations for Compuation in Games

Compact Representations and Approximations for Compuation in Games Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions

More information

20 Selfish Load Balancing

20 Selfish Load Balancing 20 Selfish Load Balancing Berthold Vöcking Abstract Suppose that a set of weighted tasks shall be assigned to a set of machines with possibly different speeds such that the load is distributed evenly among

More information

Game Theory: Supermodular Games 1

Game Theory: Supermodular Games 1 Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

A Graph-Theoretic Network Security Game. Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou and Paul G. Spirakis

A Graph-Theoretic Network Security Game. Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou and Paul G. Spirakis Int. J. Autonomous and Adaptive Communications Systems, Vol. x, No. x, xx 1 A Graph-Theoretic Network Security Game Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou and Paul G. Spirakis Department

More information

A Graph-Theoretic Network Security Game

A Graph-Theoretic Network Security Game A Graph-Theoretic Network Security Game Marios Mavronicolas 1, Vicky Papadopoulou 1, Anna Philippou 1, and Paul Spirakis 2 1 Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus.

More information

Facility Location: Discrete Models and Local Search Methods

Facility Location: Discrete Models and Local Search Methods Facility Location: Discrete Models and Local Search Methods Yury KOCHETOV Sobolev Institute of Mathematics, Novosibirsk, Russia Abstract. Discrete location theory is one of the most dynamic areas of operations

More information

Small Maximal Independent Sets and Faster Exact Graph Coloring

Small Maximal Independent Sets and Faster Exact Graph Coloring Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected

More information

Games Manipulators Play

Games Manipulators Play Games Manipulators Play Umberto Grandi Department of Mathematics University of Padova 23 January 2014 [Joint work with Edith Elkind, Francesca Rossi and Arkadii Slinko] Gibbard-Satterthwaite Theorem All

More information

Tight Bounds for Selfish and Greedy Load Balancing

Tight Bounds for Selfish and Greedy Load Balancing Tight Bounds for Selfish and Greedy Load Balancing Ioannis Caragiannis 1, Michele Flammini, Christos Kaklamanis 1, Panagiotis Kanellopoulos 1, and Luca Moscardelli 1 Research Academic Computer Technology

More information

Lecture 11: Sponsored search

Lecture 11: Sponsored search Computational Learning Theory Spring Semester, 2009/10 Lecture 11: Sponsored search Lecturer: Yishay Mansour Scribe: Ben Pere, Jonathan Heimann, Alon Levin 11.1 Sponsored Search 11.1.1 Introduction Search

More information

Existence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results:

Existence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results: Existence Theorems and Approximation Algorithms for Generalized Network Security Games V.S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram, College of Computer & Information Science, Northeastern

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction 6.254 : Game Theory with Engineering Applications Lecture 1: Introduction Asu Ozdaglar MIT February 2, 2010 1 Introduction Optimization Theory: Optimize a single objective over a decision variable x R

More information

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

CMPSCI611: Approximating MAX-CUT Lecture 20

CMPSCI611: Approximating MAX-CUT Lecture 20 CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to

More information

Tutorial 8. NP-Complete Problems

Tutorial 8. NP-Complete Problems Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Equilibrium computation: Part 1

Equilibrium computation: Part 1 Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph

More information

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center

More information

1 Nonzero sum games and Nash equilibria

1 Nonzero sum games and Nash equilibria princeton univ. F 14 cos 521: Advanced Algorithm Design Lecture 19: Equilibria and algorithms Lecturer: Sanjeev Arora Scribe: Economic and game-theoretic reasoning specifically, how agents respond to economic

More information

The Max-Distance Network Creation Game on General Host Graphs

The Max-Distance Network Creation Game on General Host Graphs The Max-Distance Network Creation Game on General Host Graphs 13 Luglio 2012 Introduction Network Creation Games are games that model the formation of large-scale networks governed by autonomous agents.

More information

Application of Game Theory in Inventory Management

Application of Game Theory in Inventory Management Application of Game Theory in Inventory Management Rodrigo Tranamil-Vidal Universidad de Chile, Santiago de Chile, Chile Rodrigo.tranamil@ug.udechile.cl Abstract. Game theory has been successfully applied

More information

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012 276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the

More information

CSC 373: Algorithm Design and Analysis Lecture 16

CSC 373: Algorithm Design and Analysis Lecture 16 CSC 373: Algorithm Design and Analysis Lecture 16 Allan Borodin February 25, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 17 Announcements and Outline Announcements

More information

Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding

More information

Discussion paper // Center for Mathematical Studies in Economics and Management Science, No. 1439

Discussion paper // Center for Mathematical Studies in Economics and Management Science, No. 1439 econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW Leibniz Information Centre for Economics Ben-Sasson,

More information

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

More information

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting

More information

Online Algorithms: Learning & Optimization with No Regret.

Online Algorithms: Learning & Optimization with No Regret. Online Algorithms: Learning & Optimization with No Regret. Daniel Golovin 1 The Setup Optimization: Model the problem (objective, constraints) Pick best decision from a feasible set. Learning: Model the

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Distributed Selfish Load Balancing on Networks

Distributed Selfish Load Balancing on Networks Distributed Selfish Load Balancing on Networks Petra Berenbrink Martin Hoefer Thomas Sauerwald Abstract We study distributed load balancing in networks with selfish agents In the simplest model considered

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games 6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses

More information

Energy Efficient Monitoring in Sensor Networks

Energy Efficient Monitoring in Sensor Networks Energy Efficient Monitoring in Sensor Networks Amol Deshpande, Samir Khuller, Azarakhsh Malekian, Mohammed Toossi Computer Science Department, University of Maryland, A.V. Williams Building, College Park,

More information

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Evangelos Markakis 1 and Orestis Telelis 2 1 Department of Informatics, Athens University of Economics and Business,

More information

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard goddard@cse.unl.edu CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Introduction to Algorithms. Part 3: P, NP Hard Problems

Introduction to Algorithms. Part 3: P, NP Hard Problems Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter

More information

On the Relationship between Classes P and NP

On the Relationship between Classes P and NP Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Online Matching and Ad Allocation. Contents

Online Matching and Ad Allocation. Contents Foundations and Trends R in Theoretical Computer Science Vol. 8, No. 4 (2012) 265 368 c 2013 A. Mehta DOI: 10.1561/0400000057 Online Matching and Ad Allocation By Aranyak Mehta Contents 1 Introduction

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

The Multiplicative Weights Update method

The Multiplicative Weights Update method Chapter 2 The Multiplicative Weights Update method The Multiplicative Weights method is a simple idea which has been repeatedly discovered in fields as diverse as Machine Learning, Optimization, and Game

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Local-Effect Games. Kevin Leyton-Brown and Moshe Tennenholtz. Abstract. 1 Introduction. 2 Local-Effect Games

Local-Effect Games. Kevin Leyton-Brown and Moshe Tennenholtz. Abstract. 1 Introduction. 2 Local-Effect Games Local-Effect Games Kevin Leyton-Brown and Moshe Tennenholtz kevinlb@stanford.edu; Computer Science Department, Stanford University, Stanford CA 430, USA moshet@ie.technion.ac.il; Faculty of Industrial

More information

Pareto Efficiency and Approximate Pareto Efficiency in Routing and Load Balancing Games

Pareto Efficiency and Approximate Pareto Efficiency in Routing and Load Balancing Games Pareto Efficiency and Approximate Pareto Efficiency in Routing and Load Balancing Games Yonatan Aumann Yair Dombb Abstract We analyze the Pareto efficiency, or inefficiency, of solutions to routing games

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information

Mechanisms for Fair Attribution

Mechanisms for Fair Attribution Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is

More information

Designing Incentives in Online Collaborative Environments 1

Designing Incentives in Online Collaborative Environments 1 Designing Incentives in Online Collaborative Environments 1 Yoram Bachrach, Vasilis Syrgkanis, and Milan Vojnović November 2012 Technical Report MSR-TR-2012-115 Microsoft Research Microsoft Corporation

More information

Theoretical Computer Science (Bridging Course) Complexity

Theoretical Computer Science (Bridging Course) Complexity Theoretical Computer Science (Bridging Course) Complexity Gian Diego Tipaldi A scenario You are a programmer working for a logistics company Your boss asks you to implement a program that optimizes the

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

More information

Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand

Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand Notes V General Equilibrium: Positive Theory In this lecture we go on considering a general equilibrium model of a private ownership economy. In contrast to the Notes IV, we focus on positive issues such

More information

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2 Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are

More information

Closing the Price of Anarchy Gap in the Interdependent Security Game

Closing the Price of Anarchy Gap in the Interdependent Security Game Closing the Price of Anarchy Gap in the Interdependent Security Game Parinaz aghizadeh and Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, Michigan,

More information

Analysis of user-driven peer selection in peer-to-peer backup and storage systems

Analysis of user-driven peer selection in peer-to-peer backup and storage systems Analysis of user-driven peer selection in peer-to-peer backup and storage systems Laszlo Toka and Pietro Michiardi ABSTRACT In this paper we present a realistic model of peer-to-peer backup and storage

More information

Adaptive Linear Programming Decoding

Adaptive Linear Programming Decoding Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006

More information

Ant Colony Optimization (ACO)

Ant Colony Optimization (ACO) Ant Colony Optimization (ACO) Exploits foraging behavior of ants Path optimization Problems mapping onto foraging are ACO-like TSP, ATSP QAP Travelling Salesman Problem (TSP) Why? Hard, shortest path problem

More information

Social Distance Games

Social Distance Games Social Distance Games Simina Brânzei and Kate Larson School of Computer Science University of Waterloo, Canada {sbranzei, klarson}@cs.uwaterloo.ca Abstract In this paper we introduce and analyze social

More information

Chapter 7. Sealed-bid Auctions

Chapter 7. Sealed-bid Auctions Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)

More information

10 Evolutionarily Stable Strategies

10 Evolutionarily Stable Strategies 10 Evolutionarily Stable Strategies There is but a step between the sublime and the ridiculous. Leo Tolstoy In 1973 the biologist John Maynard Smith and the mathematician G. R. Price wrote an article in

More information

How To Find The Price Of Anarchy Of A Network Game

How To Find The Price Of Anarchy Of A Network Game DOI 10.1007/s00224-014-9598-9 The Strong Price of Anarchy of Linear Bottleneck Congestion Games Bartde Keijzer Guido Schäfer Orestis Telelis Springer Science+Business Media New York 2014 Abstract We study

More information

SCAN: A Structural Clustering Algorithm for Networks

SCAN: A Structural Clustering Algorithm for Networks SCAN: A Structural Clustering Algorithm for Networks Xiaowei Xu, Nurcan Yuruk, Zhidan Feng (University of Arkansas at Little Rock) Thomas A. J. Schweiger (Acxiom Corporation) Networks scaling: #edges connected

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

On the Unique Games Conjecture

On the Unique Games Conjecture On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary

More information

Network Algorithms for Homeland Security

Network Algorithms for Homeland Security Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially

More information

CIS 700: algorithms for Big Data

CIS 700: algorithms for Big Data CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv

More information

Price of Anarchy in Non-Cooperative Load Balancing

Price of Anarchy in Non-Cooperative Load Balancing Price of Anarchy in Non-Cooperative Load Balancing Urtzi Ayesta, Olivier Brun, Balakrishna Prabhu To cite this version: Urtzi Ayesta, Olivier Brun, Balakrishna Prabhu. Price of Anarchy in Non-Cooperative

More information

LDPC Codes: An Introduction

LDPC Codes: An Introduction LDPC Codes: An Introduction Amin Shokrollahi Digital Fountain, Inc. 39141 Civic Center Drive, Fremont, CA 94538 amin@digitalfountain.com April 2, 2003 Abstract LDPC codes are one of the hottest topics

More information

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification) Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Week 1: Introduction to Online Learning

Week 1: Introduction to Online Learning Week 1: Introduction to Online Learning 1 Introduction This is written based on Prediction, Learning, and Games (ISBN: 2184189 / -21-8418-9 Cesa-Bianchi, Nicolo; Lugosi, Gabor 1.1 A Gentle Start Consider

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

Competitive Influence Maximization in Social Networks

Competitive Influence Maximization in Social Networks Competitive Influence Maximization in Social Networks Shishir Bharathi David Kempe Mahyar Salek Department of Computer Science, University of Southern California Abstract. Social networks often serve as

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation 6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma

More information

Yale University Department of Computer Science

Yale University Department of Computer Science Yale University Department of Computer Science Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Aspnes 1 2 Kevin Chang 1 3 Aleksandr Yampolskiy 1 4 YALEU/DCS/TR-1295

More information

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Background One basic goal in complexity theory is to separate interesting complexity

More information

How to Win Texas Hold em Poker

How to Win Texas Hold em Poker How to Win Texas Hold em Poker Richard Mealing Machine Learning and Optimisation Group School of Computer Science University of Manchester / 44 How to Play Texas Hold em Poker Deal private cards per player

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

1 Portfolio Selection

1 Portfolio Selection COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # Scribe: Nadia Heninger April 8, 008 Portfolio Selection Last time we discussed our model of the stock market N stocks start on day with

More information