Sybilproof Reputation Mechanisms
|
|
|
- Claire Cox
- 10 years ago
- Views:
Transcription
1 Sybilproof Reputation Mechanisms Alice Cheng Center for Applied Mathematics Cornell University, Ithaca, NY Eric Friedman School of Operations Research and Industrial Engineering Cornell University, Ithaca, NY ABSTRACT Due to the open, anonymous nature of many P2P networks, new identities - or sybils - may be created cheaply and in large numbers. Given a reputation system, a peer may attempt to falsely raise its reputation by creating fake links between its sybils. Many existing reputation mechanisms are not resistant to these types of strategies. Using a static graph formulation of reputation, we attempt to formalize the notion of sybilproofness. We show that there is no symmetric sybilproof reputation function. For nonsymmetric reputations, following the notion of reputation propagation along paths, we give a general asymmetric reputation function based on flow and give conditions for sybilproofness. Categories and Subject Descriptors C.2.4 [Computer-Communication Networks]: Distributed Systems General Terms Design, Theory Keywords sybils, reputation, peer-to-peer 1. INTRODUCTION The large scale of many P2P networks and other online communities make it difficult for peers or users to assess the trustworthiness of other users, since a typical user s past history includes only a small fraction of the entire community. A common approach to this problem is the creation of a reputation system within the community. A reputation system attempts to aggregate the peers or users collective experiences in order to allow a user to form an opinion about someone with whom he has not previously interacted [8]. Further, reputation may be used to assess and reward Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SIGCOMM 05 Workshops, August 22 26, 2005, Philadelphia, PA, USA. Copyright 2005 ACM /05/ $5.00. good behavior, for example, a peer or user with high reputation may be rewarded with preferred queueing or preferred partnering. In recent years, many people have come up with reputation mechanisms for various applications [4, 5, 9, 7, 1], see also citations in [6]. However, much of this work has been ad-hoc - creating specific reputation mechanisms to combat some particular collection of adversarial strategies. In contrast, we would like to explore what conditions a reputation function must satisfy in order to be robust to adversarial strategies. This may allow a move towards defining a general class of robust reputation mechanisms. In this paper, we focus on the sybil attack. In an online environment, new identities may be created with minimal cost, and users are not tied to unique identifiers. Therefore, a single user may create enough sybils to constitute a large fraction of the community [2]. In particular, a user may strategically create sybils for the purpose of boosting his own reputation. One example of this is the link spamming attack to PageRank [7] - when a single user attempts to boost his reputation by creating a large number of duplicate identities, who all recommend him. Like many others [4, 9], we base our analysis on the trust network (or web of trust ) that may be constructed between users, where edges represent direct trust (i.e. the outcome of actual interactions). To aid analysis, we restrict our attention to reputation mechanisms that depend only the current structure of the trust graph. In section two, we summarize our main results. In section 3, we define such a reputation function on a trust graph, and define the notion of sybilproofness in this framework. In section 4, we discuss conditions for sybilproofness. In the case of symmetric reputation functions (i.e. functions invariant to graph isomorphism), we show that no sybilproof mechanism exists. In the asymmetric case, we give a generalized flow-based reputation function and give some conditions for sybilproofness in that case. In section 5, we conclude with some open questions in this area. 2. OVERVIEW OF RESULTS While there has been much work related to reputation systems, many of these systems fail to be sybilproof. For example, in the well-known reputation system EigenTrust [5], users can typically increase their reputation values by creating complete subgraphs of sybils. Maximum flow from a fixed node s is another possible reputation function where a user may increase its relative rank via a sybil strategy. If we regard the edge values as capacities, then the maxi-
2 mum flow from s to a node i is the maximum amount of flow we can push from s to i while respecting all capacity constraints. To see that max flow isn t sybilproof, notice that for any node i, several paths may contribute to i s reputation. Nodes that lie along those paths may have a worse reputation than i, and may be able to worsen the reputation of i by cutting off the path to i (for example, the node may split into two nodes, one taking all incoming links, one taking all outgoing links). Therefore, a node may be able to improve his rank with a sybil strategy. In this paper, we only consider sybil strategies where a user is only concerned with raising his own reputation. One might additionally consider badmouthing strategies where a user attempts to lower the reputation of others, without necessarily raising his own reputation. However, we conjecture that there is no reputation function which guards against all badmouthing strategies. Related work includes [6], which has similar motivations. Our primary interest in this paper is to provide conditions for which a reputation function is sybilproof. We show that symmetric reputation functions cannot be sybilproof, where a symmetric function is one which is invariant under a renaming of the nodes (i.e. it depends only on the edge structure of the graph). A sketch of the proof is as follows: If some node i doesn t have the highest possible reputation in a graph G, he can create a group of sybils, formed into an exact copy of G. (Note that we do not put restrictions on the number of sybils i may create, or on i s knowledge of the overall graph.) A symmetric function cannot distinguish between a node in the original graph and its corresponding node in the sybil copy, so for each node in the original part of the graph, there is some node in the sybil copy with the same reputation. Therefore, some sybil must have the highest reputation in the new graph. We can use a similar argument to show that symmetric reputation functions cannot be sybilproof even when we bound the number of allowable sybils by a constant. Intuitively, symmetric reputation functions fail to be sybilproof because a symmetric function cannot distinguish between groups of sybils and real nodes. In contrast, asymmetric reputation functions may assume that some specified nodes are trusted, and propagate trust from those nodes. We also construct a formula for a class of asymmetric reputation functions. We build these functions from a realvalued function on paths, g, and a generalized addition operator. Like many existing reputation mechanisms [4, 9], this formulation employs the notion of transitive trust. This is the idea that if a user A trusts B, and B trusts C, then A may trust C to some extent, even if A hasn t previously interacted with C. Since direct trust is represented in the graph as directed edges, the notion of transitive trust exactly corresponds to propagation of trust along paths. Intuitively, g describes how trust propagates along a path, and describes how to aggregate the trust among several paths. We show that when g and satisfy certain properties, no user may increase his own reputation value with a sybil strategy. Furthermore, when we propagate trust along only a single maximum path, no user can improve his relative rank. Under some additional conditions for g, we show that f sybilproof implies that f propagates trust along a single path. 3. PROBLEM FORMULATION We represent a network as a directed graph G =(V, E), with users (some of whom may be sybils) represented as nodes, and interactions between a pair of users i, j V represented as directed edges e E between i and j with edge values c(e) representing the outcomes of actual transactions. For this paper, we assume that c(e) corresponds positively with positive transactions (so higher values correspond to higher trust). For example, c(i, j) might be the number of times i successfully downloaded a file from j, or it may be a rating that i personally assigns to j. is the collection of all such graphs, with a node set V a finite subset of = {0, 1, 2,...} and edge set E a subset of V V. Given a graph G =(V, E) we define the reputation to be a mapping on a graph associating each node with a real value. Definition 1. A reputation function f is a real valued function on that maps nodes of a graph to real values. We say that a node i in a graph G has reputation f(g) i. In a sybil strategy, a user is allowed to create arbitrarily many sybil nodes and fake edges between sybils. If U is the collection of sybils, and i / U, we require that any edge between i and U represent real transactions, since i is not a member of the sybil group. Definition 2. Given a graph G =(V, E) and a user i V, we say that a graph G =(V,E ) along with a subset U V is a sybil strategy for user i in the network G =(V, E) if i U and that collapsing U into a single node with label i in G yields G. We can refer to U as the sybils of i, and denote a sybil strategy by (G,U ). Note that in this formulation, if there is an edge (j, i) E with value c(j, i) = α, we allow in the sybil strategy of i the splitting of the edge to (j, u 1),...,(j, u k ) (with u 1,..., u k sybils of i). However, we must split the value additively, so that c(j, u 1) c(j, u k )=α. Likewise, for any edge (i, j) with value α, we allow splitting of the edge to (u 1,j),..., (u k,j) in a sybil strategy for i, such that c(u 1,j)+...+ c(u k,j)=α. Reputations are often used to distinguish between users, and in many applications, users care more about relative reputation values than the actual values. Therefore, we say that a sybil strategy (G,U ) for node i in G is successful, if some sybil has a better relative rank than i in G. Since i may use any of his sybils to perform transactions in the future, a sybil strategy is successful if at least one sybil has higher rank. Thus, a reputation function is sybilproof if no successful sybil strategies are possible. Definition 3. A reputation function f is (rank) sybilproof if for all graphs G =(V, E), and all users i V, there is no sybil strategy for i, (G,U ), with G =(V,E ) such that for some u U, j V such that f(g) j >f(g) i and f(g ) u f(g ) j. If f is rank sybilproof, then we will typically say that f is sybilproof. Note that in this definition, we allow a user to create arbitrarily many sybils. Though the cost of new identities is typically low in many settings, it is usually nonzero, so it is reasonable to consider cases where no user can create more than K sybils, for some K. This may allow a wider set of available reputation functions, as the set of K-sybilproof functions contain all sybilproof functions.
3 Definition 4. We say that a reputation function is K- sybilproof if it is sybilproof over all possible sybil strategies (G,U ), with U K. Finally, in some settings, users may care more about their actual reputation values than their relative rank. For example, there are cases when users may earn specific rewards based on their reputation values. (e.g. Epinions paying users royalties based on their reputations [4]) To deal with these cases, we define the following: Definition 5. A reputation function f is value sybilproof if for all graphs G =(V, E) and all users i V there is no sybil strategy for i, (G,U ) such that for some u U, f(g) i <f(g ) u. 4. REPUTATION FUNCTIONS In this section, we describe two types of reputation functions - symmetric and asymmetric - and give conditions for sybilproofness. 4.1 Symmetric Reputations If anonymity is preserved within a reputation system for all users, it is sensible that under any renaming of the nodes, a reputation function should return the same values. More formally, Definition 6. A reputation function f is symmetric if given a graph isomorphism σ, for all graphs G =(V, E) with image G under σ, and all nodes i V, f(g) i = f(g ) σ(i) In this treatment, the edge values encapsulate all information about actual interactions, so reputation should be determined only by the structure of the graph and the edge values. Therefore, two isomorphic graphs yield the same reputations. Unfortunately, no symmetric reputation function is sybilproof, or even k-sybilproof for any k 2. We may ignore the trivial reputation function which assigns to every node the same value, since it is trivially symmetric and sybilproof (but clearly unsatisfying as a reputation function candidate). Theorem 1. There is no symmetric sybilproof nontrivial reputation function Proof. Given a graph G =(V, E), and a nontrivial global reputation function f, let i V be a node which doesn t have the highest reputation in V. f is nontrivial, so we can find a G such that such a node exists. Note that for any f, G, since V is finite, there always exists a node i V that attains the maximum value of f(g) i among nodes in V. Consider the sybil strategy of i, (G,U ) such that G G and for all nodes j, there is an additional copy of j, j V, such that for all edges (j, k) E with edge value c(j, k), there is an edge (j,k ) E with value c(j, k). In other words, G is a disjoint union of two copies of G. If U = i {j j V }, then by symmetry, there is some u U that attains the maximal reputation: f(g ) u f(g ) j for all j V. Not only is a symmetric reputation function not sybilproof, the above proof shows that if G is such that not all nodes have the same reputation value, any node that doesn t have the highest possible value has a successful sybil strategy. To show the impossibility of k-sybilproofness, we assume a k-sybilproof function exists, and rather than creating the duplicate graph in one step as in the above proof, we create it over many steps, applying k-sybilproofness at each step. We then get a contradiction at the final step by applying symmetry. Theorem 2. There is no nontrivial symmetric k-sybilproof reputation function for any constant k>1. Proof. It suffices to show the result for k = 2. For a contradiction, suppose a symmetric 2-sybilproof nontrivial reputation function f exists. Let G = (V, E) be a network, where there is some user u V such that there exists a v V with f(g) v > f(g) u. Let n = V, and WLOG, let V = {0,..., n 1}. There exist graphs G 1 = (V 1,E 1),...,G n = G =(V, E), where G i 1 is constructed from G i by contracting nodes i 2 and i 1 and relabelling it i 2. We can relabel the vertices in G i so that V i = {n,..., n + i 1} so that vertex j is relabelled as n + j, and let G i = G G i. From the proof of Theorem 1, there is a node v G n such that f(g n) v is maximal over V n. We can relabel the nodes so that v =2n 1. By construction, G i is a sybil strategy in G i 1 for node n + i 2 for each i =1,..., n, and G 1 is a sybil strategy in G for node u. Since f is sybilproof, node n G 1 cannot have the highest reputation in V 1, and by induction, for each i, node n + i 1 cannot have the highest reputation in V i. Therefore, f(g n) v is not maximal over V n, a contradiction. Thus, if f is a symmetric nontrivial reputation function, it cannot be 2-sybilproof. A parallel argument shows an similar result for value sybilproof reputation functions. However, we need to exclude certain pathological reputation functions. One simple criteria which is satisfied by all nontrivial reputation functions is based on the following construction: Given a graph G define its B-extension with respect to i, B i(g) to be the graph which is constructed by taking a copy of G and contracting the node i V with its double in the copy of G. Definition 7. A reputation function f is B-Nontrivial if there exists a graph G =(V, E) and i, j G such that f(g) j >f(g) i and v V such that f(g ) v >f(g ) i, where G is the B-extension of B with respect to i. Theorem 3. If a reputation function f is B-nontrivial then it cannot be value sybilproof, or k-value sybilproof. Note that PageRank is B-nontrivial, so this shows that symmetric variants of PageRank are not sybilproof or value sybilproof. 4.2 Asymmetric Reputations To construct an asymmetric sybilproof reputation function, note that we can easily break symmetry by computing reputation values with respect to some fixed node in the graph. This may be useful when we can identify some trusted user, or when each user computes separately the reputations of other users with respect to themselves. Once we have a fixed root node s, we may allow reputation to propagate along paths outward from s. Similar ideas also motivated the flow-based reputation systems described in [3, 9]. Given a fixed graph G =(V, E) and a root node s V, let i be the set of all collections of edge-disjoint paths from
4 s to i in G. We allow an edge of value α+β to split into two parallel edges with values α, β at will. Let g be a function from paths to real numbers, and let be an addition -like operator on real numbers. Given root node s, G =(V, E) and i V, i s, define (f s (G)) i := max s,i i P s,i g(p ) We set f s (G) s =. Reputation propagates along disjoint paths in some manner (described by the function g), and then the reputation values are aggregated by. If we regard edge values as edge capacities, flow-based reputation functions may be considered. For example, one can show that maximum flow falls under this category of functions, if we let g(p )= min{c(e) e P } and = +. Many flow variants are included in this class, such as maximum generalized flow (the case where flow leaks along an edge), or the variation on max flow preferring closer nodes used in [3]. Other possible functions in this framework include the maximum capacity path and 1/#hops for the minimum hop path. Given some restrictions on g,, we can show that f s is value sybilproof: Theorem 4. If f s as defined above satisfies the following properties, (a) (Diminishing returns) For all s i paths P, if an s j path P is an extension of P, then g(p ) g(p ). (b) (Monotonicity) is nondecreasing, and g is nondecreasing with respect to the edge values. (c) (No splitting) Given a single s i path P, if we split P into two s i paths P 1,P 2, then g(p 1) g(p 2) g(p ). for all graphs G =(V, E), s V, and all i V, then f s is value sybilproof. Proof. Let G =(V, E) be a graph, let s V, and i V, i s. Let (G,U ) be a sybil strategy for i with respect to f s, with collection of sybils U. For u U, there is some collection of disjoint s u paths in G such that f s (G ) u = P g(p ). For each P, let P be the subpath starting from s and ending at the first node in U appearing along the path. By (a), g(p ) g(p ), and by the definition of a sybil strategy, P must correspond to some s i path in G. Let = {P P }. forms an edge disjoint collection of s i paths in G. So, by the definition of f s, f s (G) i P g(p ) P g(p )=f s (G ) u If i = s, f s (G) i =, so f s (G ) u cannot have a higher value for any sybil strategy (G,U ), and u U. For f s satisfying the above conditions, in any graph G with base node s, no node i can increase his reputation value, f s (G) i. However, a node may still be able to improve his rank if he can sufficiently lower the reputation values for certain other nodes. A node i may not improve by this method if the only nodes who may be affected by i s sybil strategies have lower reputation than i, since lowering their reputation doesn t affect i s rank. Thus, propagating reputation only along a maximum g-valued single path gives a sybilproof function. = max gives this single path reputation function, so we have the following: Theorem 5. If f s satisfies the above properties and additionally, = max, then f s is sybilproof. Conversely, if g is such that for all paths P, there exists a strictly longer path P, P P, such that g(p )=g(p ), then f s sybilproof implies that = max. Proof. By theorem 4, there is no sybil strategy to increase one s own reputation value, so it suffices to show that there is no sybil strategy to reduce the reputation value of higher ranked users. By the definition of a sybil strategy, and the monotonicity of, at worst, a node i can affect a node j by removing all the s j paths that pass through i. However, i may only affect j s reputation value if i lies along the s j path P with maximum value g(p ) over all s j paths in G. If P is an s i path contained in P, f s (G) i g(p ), but f s (G) j g(p ), so f s (G) j f s (G) i, and i cannot increase his rank by by lowering j s reputation value. For the other direction, suppose > max. Let paths P 1,...,P k be the minimal set of paths such that g(p 1)... g(p k ) > max(g(p 1),...,g(P k )). Note that k > 1, since g(p 1) = max(g(p 1)). For convenience, let g(p 1) g(p 2)... g(p k ), so Since this set is minimal, v = g(p 1)... g(p k ) >g(p 1) g(p 2)... g(p k ) = max(g(p 2),..., g(p k )) g(p 1) <v By assumption on g, there exists a strictly longer path P 1 such that P 1 is a subpath of P 1 and g(p 1)=g(P 1). Let G be the graph such that s and i have k parallel s i paths: P 1,P 2,..., P k. There is some node j on P 1 such that the only s j path is P 1. By no splitting rule, f s (G) j = g(p 1). f s (G) i g(p 1)... g(p k ) >g(p 1). Consider the sybil strategy for j where j splits into two nodes, one accepting all incoming arcs to j, and the other accepting all outgoing arcs from j. In this new graph G, i is only connected to s via P 2,...,P k, so f s (G ) i = g(p 2)... g(p k )=g(p 2) g(p 1). The sybil node for j accepting all incoming arcs clearly has the same reputation as j, and for all other nodes, their reputation may not increase. Therefore, this sybil strategy gives j a strictly higher rank, so f s is not sybilproof. Therefore, max. Suppose < max. Then, for some collection of disjoint paths P 1,..., P k with g(p 1)... g(p k ), g(p 1)... g(p k ) <g(p 1). Therefore, when we maximize over all collections of disjoint paths, we only choose collections with only one path, so replacing with max gives the same function. Therefore, = max. Note that we cannot entirely remove the requirement on g in Theorem 5. For example, consider the case where c(e) =1 1 for all e, g(p )= if P is composed only of edges hop length of P with capacity 1, and v 1... v k = max(v 1,..., v k )+ɛ(#v i that attain the maximum value), for ɛ some infinitesimal value. One can check that this yields a sybilproof f s, and clearly, max. 5. CONCLUSIONS We have presented a possible framework for assessing a reputation mechanism s robustness to sybils. We have shown that no nonconstant, symmetric reputation function exists.
5 Further, we have given a collection of flow-based asymmetric reputation functions which are sybilproof, under some conditions. There are many open questions related to this direction of work. For one, the flow-based reputation function defined on section 4.2 is unlikely to be the most general formulation of an asymmetric reputation function. Finding a more general formulation, along with necessary and sufficient conditions for sybilproofness would be useful. Furthermore, in this paper, we have focused strictly on a static graph model of reputation. One possible generalization of this framework is to allow reputation functions to depend on the state of the network at previous time steps as well as the current state of the network. It would also be interesting to extend the analysis here to explore necessary requirements for sybilproofness in a dynamic reputation model. 6. REFERENCES [1] S. Buchegger and J. Le Boudec. A robust reputation system for p2p and mobile ad-hoc networks. In Second Workshop on the Economics of Peer-to-Peer Systems, [2] J. Douceur. The sybil attack. In Proc. of the IPTPS02 Workshop, [3] M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks. In ACM E-Commerce Conference (EC 04), [4] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In Proceedings of the 13th International World Wide Web Conference, pages , [5] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International World Wide Web Conference, pages , [6] R. Morselli, J. Katz, and B. Bhattacharjee. A game-theoretic framework for analyzing trust-inference protocols. In Second Workshop on the Economics of Peer-to-Peer Systems, [7] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. In Proceedings of the 7th International World Wide Web Conference, pages , [8] P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. In Communications of the ACM, volume 43, pages 45 48, [9] M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference, pages , 2003.
Maximum Likelihood Estimation of Peers Performance in P2P Networks
Maximum Likelihood Estimation of Peers Performance in P2P Networks Zoran Despotovic, Karl Aberer EPFL - Swiss Federal Institute of Technology Lausanne, Switzerland email:{zoran.despotovic, karl.aberer}@epfl.ch
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,
Reputation Management in P2P Networks: The EigenTrust Algorithm
Reputation Management in P2P Networks: The EigenTrust Algorithm by Adrian Alexa supervised by Anja Theobald 1 Introduction Peer-to-Peer networks is a fast developing branch of Computer Science and many
each college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
A 2-factor in which each cycle has long length in claw-free graphs
A -factor in which each cycle has long length in claw-free graphs Roman Čada Shuya Chiba Kiyoshi Yoshimoto 3 Department of Mathematics University of West Bohemia and Institute of Theoretical Computer Science
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu
Exponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
The chromatic spectrum of mixed hypergraphs
The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
Lecture 16 : Relations and Functions DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY
DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY BARBARA F. CSIMA, JOHANNA N. Y. FRANKLIN, AND RICHARD A. SHORE Abstract. We study arithmetic and hyperarithmetic degrees of categoricity. We extend
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
Tools for parsimonious edge-colouring of graphs with maximum degree three. J.L. Fouquet and J.M. Vanherpe. Rapport n o RR-2010-10
Tools for parsimonious edge-colouring of graphs with maximum degree three J.L. Fouquet and J.M. Vanherpe LIFO, Université d Orléans Rapport n o RR-2010-10 Tools for parsimonious edge-colouring of graphs
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
Sharing Online Advertising Revenue with Consumers
Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, [email protected] 2 Harvard University.
Near Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
Small Maximal Independent Sets and Faster Exact Graph Coloring
Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected
Single machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
Dedekind s forgotten axiom and why we should teach it (and why we shouldn t teach mathematical induction in our calculus classes)
Dedekind s forgotten axiom and why we should teach it (and why we shouldn t teach mathematical induction in our calculus classes) by Jim Propp (UMass Lowell) March 14, 2010 1 / 29 Completeness Three common
Mathematical Research Letters 1, 249 255 (1994) MAPPING CLASS GROUPS ARE AUTOMATIC. Lee Mosher
Mathematical Research Letters 1, 249 255 (1994) MAPPING CLASS GROUPS ARE AUTOMATIC Lee Mosher Let S be a compact surface, possibly with the extra structure of an orientation or a finite set of distinguished
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Three Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
Labeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
On end degrees and infinite cycles in locally finite graphs
On end degrees and infinite cycles in locally finite graphs Henning Bruhn Maya Stein Abstract We introduce a natural extension of the vertex degree to ends. For the cycle space C(G) as proposed by Diestel
Tree-representation of set families and applications to combinatorial decompositions
Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. [email protected]
The positive minimum degree game on sparse graphs
The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA [email protected] András Pluhár Department of Computer Science University
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Odd induced subgraphs in graphs of maximum degree three
Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing
Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs
MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set
POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS
POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS RUSS WOODROOFE 1. Unique Factorization Domains Throughout the following, we think of R as sitting inside R[x] as the constant polynomials (of degree 0).
Routing in Line Planning for Public Transport
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARC E. PFETSCH RALF BORNDÖRFER Routing in Line Planning for Public Transport Supported by the DFG Research
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,
The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
1 Definitions. Supplementary Material for: Digraphs. Concept graphs
Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
The Trip Scheduling Problem
The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
On the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
Persuasion by Cheap Talk - Online Appendix
Persuasion by Cheap Talk - Online Appendix By ARCHISHMAN CHAKRABORTY AND RICK HARBAUGH Online appendix to Persuasion by Cheap Talk, American Economic Review Our results in the main text concern the case
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS
A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS PAWE L PRA LAT Abstract. In this note we consider the on-line Ramsey numbers R(P n, P m ) for paths. Using a high performance computing clusters,
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
6.231 Dynamic Programming and Stochastic Control Fall 2008
MIT OpenCourseWare http://ocw.mit.edu 6.231 Dynamic Programming and Stochastic Control Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.231
Two-Sided Matching Theory
Two-Sided Matching Theory M. Utku Ünver Boston College Introduction to the Theory of Two-Sided Matching To see which results are robust, we will look at some increasingly general models. Even before we
Detecting Denial of Service Attacks in Tor
Detecting Denial of Service Attacks in Tor Norman Danner, Danny Krizanc, and Marc Liberatore Department of Mathematics and Computer Science Wesleyan University Middletown, CT 06459 USA Abstract. Tor is
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
Improved Algorithms for Data Migration
Improved Algorithms for Data Migration Samir Khuller 1, Yoo-Ah Kim, and Azarakhsh Malekian 1 Department of Computer Science, University of Maryland, College Park, MD 20742. Research supported by NSF Award
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
How Asymmetry Helps Load Balancing
How Asymmetry Helps oad Balancing Berthold Vöcking nternational Computer Science nstitute Berkeley, CA 947041198 voecking@icsiberkeleyedu Abstract This paper deals with balls and bins processes related
No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
Definition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
Mechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING
THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING 1. Introduction The Black-Scholes theory, which is the main subject of this course and its sequel, is based on the Efficient Market Hypothesis, that arbitrages
Cycle transversals in bounded degree graphs
Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.
Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs
Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Iyad A. Kanj Ljubomir Perković Ge Xia Abstract We describe a new distributed and strictly-localized approach for constructing
Impact of Peer Incentives on the Dissemination of Polluted Content
Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto [email protected] Virgilio Almeida [email protected] Cristiano Costa [email protected] Jussara Almeida [email protected]
Sharing Online Advertising Revenue with Consumers
Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, [email protected] 2 Harvard University.
6.3 Conditional Probability and Independence
222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
8. Matchings and Factors
8. Matchings and Factors Consider the formation of an executive council by the parliament committee. Each committee needs to designate one of its members as an official representative to sit on the council,
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE
SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE 2012 SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH (M.Sc., SFU, Russia) A THESIS
INCIDENCE-BETWEENNESS GEOMETRY
INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full
arxiv:cs/0605141v1 [cs.dc] 30 May 2006
General Compact Labeling Schemes for Dynamic Trees Amos Korman arxiv:cs/0605141v1 [cs.dc] 30 May 2006 February 1, 2008 Abstract Let F be a function on pairs of vertices. An F- labeling scheme is composed
Markov random fields and Gibbs measures
Chapter Markov random fields and Gibbs measures 1. Conditional independence Suppose X i is a random element of (X i, B i ), for i = 1, 2, 3, with all X i defined on the same probability space (.F, P).
Using Generalized Forecasts for Online Currency Conversion
Using Generalized Forecasts for Online Currency Conversion Kazuo Iwama and Kouki Yonezawa School of Informatics Kyoto University Kyoto 606-8501, Japan {iwama,yonezawa}@kuis.kyoto-u.ac.jp Abstract. El-Yaniv
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
Graph Security Testing
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp. 29-45 Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of
1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal 506009, AP, INDIA [email protected]
A New Allgoriitthm for Miiniimum Costt Liinkiing M. Sreenivas Alluri Institute of Management Sciences Hanamkonda 506001, AP, INDIA [email protected] Dr. T. Srinivas Department of Mathematics Kakatiya
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
