Randomized K-Server on Hierarchical Binary Trees
|
|
|
- Kellie Walters
- 10 years ago
- Views:
Transcription
1 Randomized K-Server on Hierarchical Binary Trees Aaron Coté Computer Science Department UCLA 473 Boelter Hall Los Angeles, CA Adam Meyerson Computer Science Department UCLA 473 Boelter Hall Los Angeles, CA Laura Poplawski College of Computer and Information Science Northeastern University 360 Huntington Avenue Boston, MA 0115 ABSTRACT We design a randomized online algorithm for k-server on binary trees with hierarchical edge lengths, with expected competitive ratio O(log ), where is the diameter of the metric. This is one of the first k-server algorithms with competitive ratio poly-logarithmic in the natural problem parameters, and represents substantial progress on the randomized k-server conjecture. Extending the algorithm to trees of higher degree would give a competitive ratio of O(log log n) for the k-server problem on general metrics with n points and diameter. Categories and Subject Descriptors F.. [Theory of Computation]: Non-numerical Algorithms and Problems Computations on Discrete Structures General Terms Algorithms, Theory Keywords Online Competitive Analysis, K-Server 1. INTRODUCTION The metric k-server problem is among the oldest and moststudied problems in online algorithms. We are given a set of k initial server locations (an initial configuration) in some underlying metric space. Requests for service arrive at various nodes in this space, and as each request arrives we must move one of our k servers to that location (thus obtaining a new configuration which includes the new request as one of the server nodes). The goal is to minimize the total distance traveled by the k servers; in the offline setting this can be solved optimally using flow techniques, but many of the natural applications are online, where we are unable to see the future requests before determining which server to move. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. STOC 08, May 17 0, 008, Victoria, British Columbia, Canada. Copyright 008 ACM /08/05...$5.00. Our main result is a randomized online algorithm for k- server on hierarchically structured binary trees, which guarantees an expected cost of at most O(log ) times optimum, where is the diameter of the metric space. This is one of the first sub-linear competitive ratios for any non-uniform metric with n > k + O(1) (n is the number of nodes), and is particularly interesting because of a potential extension to non-binary trees, which would give a sub-linear competitive ratio for general graphs by applying the metric embedding techniques of Bartal [1, ] or Fakcharoenphol et al [14]. Once we are considering a binary tree, we model the problem as a set of many online decision makers, one residing at each node i of the tree. Each decision-maker sees the request stream in an online fashion, and also sees a dynamic number of servers available in the subtree rooted at node i over time. The job of this decision-maker is to partition its servers between the subtrees rooted at its children, thus passing a similar problem down to the next layer. We bound the cost thus passed down, as well as the cost paid to transfer servers between child subtrees, summing over all levels to get a general bound of O(L), where L is the number of levels of the tree. Because of the hierarchical nature of the distances, the number of levels must be bounded by O(log ), allowing us to obtain the overall bound claimed. We view our results as making progress towards the randomized k-server conjecture, that there exists an O(log k)- competitive randomized online algorithm for the problem. Of course, our results depend heavily on the underlying graph, but currently the only case where any similar ratio is known for general graphs comes from algorithms for metrical task systems [5] which apply only when n = k + O(1). 1.1 Previous Work Online k-server has been studied at least since 1990, when Manasse, McGeoch and Sleator presented an (n 1)-competitive algorithm for (n 1) servers, a -competitve algorithm for servers, and a deterministic lower bound of k for the competitive ratio. They also introduced the k-server conjecture - the conjecture that there exists a deterministic k- competitive solution [0]. The same year, Fiat, Rabani and Ravid showed that a competitive algorithm exists for any metric space and any k [17]. The best known general deterministic algorithm is the work function algorithm by Koutsoupias and Papadimitriou [19], which achieves a competitive ratio of k 1 on any metric. While no known deterministic algorithm has a competitive ratio better than k 1 for arbitrary metrics, there are k-competitive deterministic algorithms for many special
2 classes of metric. In addition to the case where k = n 1 and where k =. Chrobak, Karloff, Payne, and Vishwanathan gave a k-competitive algorithm on the line and the star graph [8]. Chrobak and Larmore gave a k-competitive algorithm on trees [11]. The work function algorithm is k- competitive on the line, the weighted star, and metrics with k + points [6]. There is also a great deal of interest in randomized algorithms for k-server, since randomized algorithms often obtain better performance for online problems (against an adversary which is oblivious to the random choices). The randomized k-server conjecture states that there exists an O(log k)-competitive randomized algorithm. So far, no randomized O(polylog(n, k)) algorithm has been published for the general k-server problem on arbitrary metrics. However, there are known randomized algorithms for a number of special cases. Perhaps the best-known example is the marking algorithm of Fiat et al for the paging problem (k-server on a uniform metric) [15]. Chrobak and Sgall presented the HARMONIC algorithm, which is 3-competitive when k= [10, 1]. Csaba and Lodha gave a O(n /3 log n)-competitive randomized algorithm for equally spaced points on a line [13]. Seiden proved the existence O(polylog(k)) randomized algorithms for metrics consisting of some number (polylogarithmic in k) of widely separated subspaces []. Seiden also provided an algorithm that is O(h log n log log n)- competitive on any metric with h-hsts (Hierarchically Separated Subtrees), as long as h = Θ > k. Bartal and Mendel gave an algorithm for graphs with bounded growthrate that is O( 1 (1/(ρ+)) polylog(n))-competitive, where ρ is the growth-rate and is the diameter of the graph [7]. Blum, Karloff, Rabani, and Saks proved a lower bound of Ω( p log k/ log log k) for any randomized algorithm on any metric where k < n [5]. Bartal, Bollobás, and Mendel improved this to Ω(log k/ log log k) [3]. Throughout our algorithm and analysis, we use the concept of the work function, which was initially discussed by Chrobak and Larmore in 199 [9] and was used to deterministically solve the k-server problem by Koutsoupias and Papadimitriou [19]. The work function value is the optimum offline cost to handle all requests up through time t and end with servers in a particular configuration C. The work function algorithm of Koutsoupias and Papadimitriou [19] handles each request by moving the servers to the configuration which minimizes the sum of the work function value and the distance from the prior configuration.. PROBLEM STATEMENT A k-server instance (V, d, C[0], ρ, k) is defined by a metric space (V, d), assumed to satisfy symmetry and the triangle inequality, along with an initial configuration C[0] V with C[0] = k and requests ρ = {ρ[1], ρ[],..., ρ[m]} V m. A solution to this instance is a sequence of configurations {C[1], C[],..., C[m]} where C[t] V and C[t] = k, with the requirement that ρ[t] C[t] for each t. The cost of the solution is Σ m t=1d(c[t 1], C[t]) where the distance between two configurations is defined to be the cost of the minimumcost matching between them on a complete bipartite graph weighted by the distance function d. We observe that the k-server problem can be solved to optimality in polynomial time via minimum-cost flow on a time-dilated graph with flow requirements on the vertices. Typically we will be interested in the online version of the problem, where the request sequence ρ arrives one at a time in order, and we must select C[t] immediately after the arrival of ρ[t], without knowledge of the yet-to-arrive ρ[u] for u > t. The competitive ratio for an online algorithm for k-server is the maximum over all instances of the ratio of the cost of the solution constructed by the online algorithm to the cost of the minimum-cost (offline) solution. For a randomized online algorithm, replace the cost of the solution constructed with the expected cost of the solution constructed. It is known that the online version of the problem has a k 1 competitive deterministic algorithm and that no deterministic algorithm can have competitive ratio better than k. Algorithms with competitive ratio k are known for some special metrics (for example uniform metric and trees). Randomized algorithms might be able to improve upon the competitive ratio; it is known that no randomized algorithm can have competitive ratio better than log k, but results better than k 1 are only known for a few special cases of the problem. 3. QUASI-CONVEXITY We state a general version of the quasi-convexity lemma first proved by Koutsoupias and Papadimitriou [19]. These will be used in sections 5 and 6. Theorem 1. Quasi-Convexity: Let (V, d, C[0], ρ, k) be a k-server instance. For any configuration X, define c(x) to be the cost of the best solution to this instance which ends in configuration X (we can suppose X = C[m] in the solution, or more generally allow ρ[m] / X by adding a null ρ[m+1] to the request sequence and setting X = C[m+1]). For any pair of configurations A, B there exists a matching µ : A B which guarantees that for all partitions A 1 A and A = A A 1, we have c(a 1 µ(a ))+c(µ(a 1) A ) c(a)+c(b). Further, for any vertex x A B, we have µ(x) = x. Proof. We can solve k-server offline by constructing a time-dilated graph G. The vertices of this graph come from V m+1, with a directed edge ((u, i), (v, i + 1)) for every vertices u, v V and every 0 i m. The cost of this edge will be d(u, v). We add a source node with capacity one, cost zero edges to each vertex (v, 0) with v C[0]. We add a sink node with a capacity one, cost zero edge from each vertex (v, m). A k-server solution corresponds to a flow on this graph with the added condition that for each vertex ρ[t] we have at least one unit of flow through (ρ[t], t). The cost of the k-server solution is equal to the cost of the flow. For each of the configurations A, B there are corresponding flows f A, f B in this graph. Consider constructing the residual graph G A corresponding to flow f A. This graph has some reverse direction edges where f A(e) > 0, and these edges have potentially negative cost. Flow f B f A is feasible in this residual graph and has cost c(b) c(a). Note that f B f A does not place any flow on edges from the source (these edges have equal flow in both f A and f B); this flow travels from the sink to the sink, exiting via reverse edges into the nodes of A and returning to the sink via edges from the nodes of B. Like any integral flow, we can decompose f B f A into paths each of which carries one unit of flow. Call these paths P 1, P,..., P k and let P i connect a i to b i. We define µ(a i) = b i. Now consider any partition A 1, A of configuration A. One possible solution ending in configuration A 1 µ(a ) corresponds to the flow which starts from f A and adds paths P i
3 for a i A. This flow has cost c(a)+σ ai A c(p i). Similarly we can end in configuration µ(a 1) A by adding paths P i for a i A 1, finding a flow with cost c(a) + Σ ai A 1 c(p i). Of course, there might be a better (cheaper) flow corresponding to the same configuration, so we conclude that c(a 1 µ(a )) c(a)+σ ai A c(p i) and that c(µ(a 1) A ) c(a) + Σ ai A 1 c(p i). Combining these two inequalities, and noticing that c(a) + Σ ai Ac(P i) = c(b) gives the desired inequality. For the further point, any x A B has f A(x, t) = f B(x, t) = 1 so there is no flow on (x, t) in f B f A. Thus no path starts or ends at x (or equivalently there is a path which both starts and ends at x without any nodes in between), so µ(x) = x. We can use this theorem to prove two useful corollaries. Corollary 1. Let ρr be the request sequence ρ followed by one additional request r. Then for any k, we have: c(v, d,c[0], ρr, k + 1) c(v, d, C[0], ρ, k + 1) c(v, d, C[0], ρr, k) c(v, d, C[0], ρ, k) Proof. Let A be the final configuration in the optimum solution to (V, d, C[0], ρ, k + 1) and B be the final configuration for the optimum solution to (V, d, C[0], ρr, k). We observe that r B. We can consider B to instead be a solution to (V, d, C[0], ρ, k); it will not necessarily be an optimum such solution. We now observe that there are flows f A and f B through the time-dilated graph corresponding to the solutions of (V, d, C[0], ρ, k +1) and (V, d, C[0], ρ, k) ending in A and B respectively, and that the costs of these flows are equal to c(v, d, C[0], ρ, k + 1) and c(v, d, C[0], ρr, k) respectively. Despite the fact that the amount of flow differs (k + 1 for f A and k for f B), we can still apply theorem 1 to find a partial mapping µ : A B; however since the values of the flows differ, there will be one path in the residual graph G A that leads from the sink to the source rather than from sink to sink (this corresponds to the extra unit of flow in f A). Recall that r B and let q A be such that µ(q) = r. We now apply theorem 1 with A 1 = {q} and A = A {q}, and note that µ(a ) = B {r} to get c({q} B {r}) + c({r} A {q}) c(a) + c(b). We observe that {q} B {r} = k. Thus this is a feasible solution to (V, d, C[0], ρ, k), and the optimum solution costs only less. Similarly, we have {r} A {q} = k + 1 and this is a feasible solution to (V, d, C[0], ρ, k + 1). Further, this solution includes a server at r, meaning it is also a solution to (V, d, C[0], ρr, k + 1) with the same cost. We conclude that c(v, d, C[0], ρ, k) + c(v, d, C[0], ρr, k + 1) c({q} B {r}) + c({r} A {q}). In other words, the difference in optimal cost when request r is tacked on cannot be larger when an additional server is available. Corollary. Let c(v, d, C[0], ρ, x, X) represent the cost of the cheapest solution to (V, d, C[0], ρ, x) which also has final configuration C[m] = X for the given X V. For any X and x = X, and any integer y, there exists Y such that Y = y, X Y = min(x, y), and: c(v, d, C[0], ρ, y, Y ) c(v, d, C[0], ρ, x, X) + c(v, d, C[0], ρ, y) c(v, d, C[0], ρ, x) Proof. Let A = X. Let B represent the final configuration in the optimum solution for (V, d, C[0], ρ, y); thus c(v, d, C[0], ρ, y, B) = c(v, d, C[0], ρ, y). We now apply theorem 1, constructing flows f A and f B and considering the flow through residual graph G A to transform f A to f B. This will apply despite the fact that flows f A and f B have different values (x and y respectively). We will produce a partial matching µ : A B. First, suppose that x > y. Then let Y A be those members of A which are matched. We have X Y = y. The partial matching guarantees that c(a Y B) + c(y ) c(a) + c(b). Since A Y B = x, it is a feasible final configuration for (V, d, C[0], ρ, x) and thus has cost at least the optimum cost for that problem. It follows that c(v, d, C[0], ρ, x)+c(v, d, C[0], ρ, y, Y ) c(v, d, C[0], ρ, x, X) + c(v, d, C[0], ρ, y) which completes the proof. We also need the case x < y. Here, let W B be the members of B which remain unmatched. Let Y = W A. Now we again apply theorem 1 to guarantee that c(b W )+ c(y ) c(a) + c(b). We observe that B W = x and thus it is a feasible solution for (V, d, C[0], ρ, x) and has cost at least the optimum cost for that problem. We conclude that c(v, d, C[0], ρ, x) + c(v, d, C[0], ρ, y, Y ) c(a) + c(b) which again completes the proof. This essentially says that for any y, there is some final configuration of y servers that overlaps X as much as possible, such that the additional optimal cost to end in this configuration is at most the difference between the optimal cost to end with any x server placements and the optimal cost to end with any y server placements. 4. METRIC EMBEDDING AND HSTS A sequence of results on metric embedding allows us to transform the arbitrary metric space (V, d) given in the k- server definition to a tree with hierarchical properties. The following theorem is the main result of Fakcharoenphol et al [14]: Theorem. For any metric space (V, d) and any α > 1, we can randomly construct a rooted, weighted tree (T, d T ) along with a function f : V T. We write d T (x, y) for vertices x, y T for the length of the path through T (according to weighting function d T ) between x and y. The construction guarantees that: 1. If c 1(x) and c (x) are both children of x in T, then d T (x, c 1(x)) = d T (x, c (x)).. For any node x T not the root or a leaf, let p(x) and c(x) be a parent and a child of x respectively. Then d T (x, p(x)) = αd T (x, c(x)). 3. All leaves of the tree are exactly log α hops from the root (in other words, the depth of the tree is log α ) where is the diameter of the metric space (V, d). 4. For all nodes u V, f(u) is a leaf of the tree T. 5. For any u, v V, d T (f(u), f(v)) d(u, v). 6. For any u, v V, E[d T (f(u), f(v))] (α log V )d(u, v). Suppose that we could solve k-server as long as the metric were a tree with the properties described. This would enable us to solve k-server on any metric space, with a somewhat worse competitive ratio.
4 Theorem 3. Suppose we could solve k-server online, with some expected competitive ratio γ, provided that the metric space given was a tree as described in theorem with all requests at the leaves. Then we have an expected O(γα log V )- competitive randomized online algorithm for k-server on any metric space. 5. A HIERARCHICAL ALGORITHM We consider the following more general version of the k- server problem. We are given a rooted tree with the properties described in theorem which we additionally assume to be a binary tree. We also have an initial configuration and a vector κ telling us how many servers will be in this subtree at each time, along with a sequence of requests. Thus we are given (T, d T, C[0], ρ, κ), where C[0] = κ[0] and both C[0] and all elements of ρ come from the leaves of T. Let δ represent the distance from the root of T to any leaf. The goal is to select a sequence of configurations C[1], C[],..., C[m] such that ρ[t] C[t] for each t and C[t] = κ[t] for each t. We define d T (C[t], C[t+1]) to be the minimum cost of a matching between these two configurations; the matching should be maximal, but since C[t] may not equal C[t + 1], there can be unmatched vertices on one side or the other (but not both). The cost of the solution is Σ m t=1d T (C[t], C[t+1])+δg(κ) where g(κ) = Σ t κ[t] κ[t+1]. Effectively this means that we must pay to move servers which are leaving T to the root, or to move new incoming servers from the root to their locations. Note that solving this more general version of k-server in an online scenario would allow us to solve k-server on a binary tree (the more general version reduces to k-server if we set κ[t] = k for all t). Instead of actually solving this problem directly, we will solve it in a hierarchical manner. We will construct (online) vectors κ 1, κ corresponding to the children of the root of T, representing the number of servers in that subtree at each time. We will then recursively do the same for the instance (T i, d T, C[0] T i, ρ T i, κ i) (here T i is the subtree rooted at the i th child of the root, and ρ T i represents the subset of requests that are made to nodes in subtree T i). We let c(t, d T, C[0], ρ, κ) represent the optimum (minimum) cost for any set of configurations acting as a solution to this instance. Supposing that C[t] is the optimum configuration for request t, we observe that we can set κ i[t] = C[t] T i. We can then use C[t] T i as the configuration for instance (T i, d T, C[0] T i, ρ T i, κ i) at time t, implying that: c(t, d T, C[0], ρ, κ) = Σ i=1c(t i, d T, C[0] T i, ρ T i, κ i) + (δ δ )Σ i=1g(κ i) Where δ is the distance from the root of any child subtree T i to one of its leaves. Ideally, we would like to be able to select the κ i online in order to minimize the right-hand side of this equation. This would correspond to selecting the optimum such vectors, and we could prove (by induction) that we would thereby have an optimum solution to k-server. The problem is that these vectors κ i must be constructed online and will therefore not be optimum. We notice that there are two pieces to the right-hand side of the equation in question: the first part represents the cost which is passed down to the next level of the hierarchical process and the second part represents the cost of moving servers between subtrees. These parts should be considered separately, because multiplying the second part (cost of moving servers) by a competitive factor will lose us only the same competitive factor for our overall algorithm, whereas multiplying the first part (cost passed down) by a factor will lead to a competitive ratio exponential in the number of levels. We will define two functions which approximate these two costs and solve the problem online. This is essentially an instance of metrical task systems [4]; however, this instance has special properties which enable us to design a novel algorithm with much improved competitive ratio. Definition 1. The Move Cost of vectors κ i for instance (T, d T, C[0], ρ, κ) is MC = δσ i=1g(κ i) Definition. For ease of notation, we define ρ t as the sequence of requests {ρ[0], ρ[1],..., ρ[t]}. The Hit Cost of a set of vectors κ i for instance (T, d T, C[0], ρ, κ) is the sum over child trees T i of the sum over all times t of: c(t i, d T, C[0] T i, ρ t T i, κ i[t]) c(t i, d T, C[0] T i, ρ t 1 T i, κ i[t]) Our main result will follow from hierarchically applying an algorithm to construct vectors κ i to minimize the move cost and hit cost. There are three main parts to this proof: first, we need to show that there in fact exists a solution with low move cost and hit cost, second, that we can find such a solution, and third, that such solutions imply that the cost passed down to the next level of the hierarchy is bounded. Lemma 1. δ 1 δ (where α is the hierarchical separation factor, as described in theorem α ). We define HC(κ i) as the hit cost on subtree T i resulting from κ i, so that the total hit cost is HC = Σ i=1hc(κ i). We define T C(κ i) = c(t i, d T, C[0] T i, ρ T i, κ i), so the total cost is T C = Σ i=1t C(κ i). Theorem 4. There exists a set of vectors κ i with total move cost plus hit cost MC +HC α+ c(t, dt, C[0], ρ, κ). α 1 Proof. If C[1], C[],..., C[m] are the optimum configurations, we will use vectors κ i defined by κ i[t] = C[t] T i. These vectors guarantee c(t, d T, C[0], ρ, κ) = Σ i=1t C(κ i)+ (δ δ )Σ i=1g(κ i). This means we need to show that MC + HC is at most: α + α 1 (T C(κ1) + T C(κ) + (δ δ )(g(κ 1) + g(κ ))) Subtracting the move cost from both sides, it will be sufficient to show that HC(κ i) T C(κ i) + α+ (δ α 1 δ )g(κ i) δg(κ i). We observe based upon lemma 1 that this implies it will be sufficient to show that HC(κ i) T C(κ i) + δ g(κ i). We will prove this by induction on the value of g(κ i). If this value is zero, then κ i[t] is the same for all t. In this case the hit cost summation telescopes and the two sides of the equation will be equal. This is the base case; we continue to the inductive case. Here, we can assume that g(κ i) > 0
5 so there exists some first time τ where κ i[τ] κ i[τ + 1]. We define a new vector κ i by letting κ i[x] = κ i[x] for x > τ. For x τ, we set κ i[x] = κ i[τ + 1]. We observe that g(κ i) = g(κ i) κ i[τ] κ i[τ + 1]. By applying the inductive hypothesis, the desired inequality will hold for κ i: HC(κ i) T C(κ i) + δ g(κ i) We observe that most terms in the hit cost summation for κ i, κ i are the same, and the terms which are different telescope in each sum. This yields: HC(κ i) HC(κ i) = c(t i, d T, C[0] T i, ρ τ T i, κ i[τ]) c(t i, d T, C[0] T i, ρ τ T i, κ i[τ]) There is some set of configurations for κ i. Let these be C[0], C[1],..., C[m]. These configurations have the sum of their matching costs equal to T C(κ i). We will modify these configurations to get a sequence of configurations for κ i. In particular, we set C [x] = C[x] for x > τ. For x = τ, we make use of corollary to find a configuration C [τ] such that: c(c [τ], C [τ + 1]) δ κ i[τ] κ i[τ + 1] + c(c[τ], C[τ + 1]) c(t i, d T, C[0] T i, ρ τ T i, κ i[τ], C [τ]) c(t i, d T, C[0] T i, ρ τ T i, κ i[τ], C[τ]) HC(κ i) + HC(κ i) Of course, T C(κ i) cannot exceed the cost of this set of configurations, so we have: T C(κ i) T C(κ i) + HC(κ i) HC(κ i) + δ (g(κ i) g(κ i)) Substituting gives us the desired inequality. Theorem 5. There is a randomized online algorithm which can construct a set of vectors κ i such that, if there exists a set of vectors with move cost MC and hit cost HC, we guarantee E[MC] MC + HC and E[HC] MC + HC. The proof of theorem 5 is our main algorithmic result, and will be the subject of the next section. For now, we will assume this theorem in order to see how it leads to a result for the k-server problem in general. Theorem 6. Suppose we compute a set of vectors κ i with hit cost HC and move cost MC. Then these vectors guarantee Σ i=1c(t i, d T, C[0] T i, ρ T i, κ i) HC + 1 α MC. Proof. Note that the left and right sides of the desired inequality look very much like the sums over i of T C(κ i) and HC(κ i) respectively, with the addition of the move cost to the right side. It will be sufficient to show that: T C(κ i) HC(κ i) + δ g(κ i) We will show this by induction on the value of g(κ i). For the base case, if this value is zero then the hit cost summation telescopes and the two sides of the inequality will be equal. Otherwise, we let τ be the minimum such that κ i[τ] κ i[τ + 1]. We define κ i by κ i[x] = κ i[x] for x > τ and κ i[x] = κ i[τ + 1] for x τ. We observe that g(κ i) = g(κ i) κ i[τ] κ i[τ + 1], and that the inductive hypothesis can thus be applied to κ i. Because most terms in the hit cost summation are identical, we have: HC(κ i) HC(κ i) = c(t i, d T, C[0], ρ τ, κ i[τ]) c(t i, d T, C[0], ρ τ, κ i[τ]) There is some set of configurations which comprise the cheapest solution for κ i; let these configurations be C [0], C [1],... where their pairwise matching costs sum to T C(κ i). We will construct a set of configurations for κ i, then argue that T C(κ i) is at most the sum of pairwise matching costs for these configurations. For x > τ we let C[x] = C [x]. We set C[τ] according to corollary, guaranteeing that C[τ] overlaps C [τ] as much as possible and the cost to end in configuration C[τ] is at most: c(t i, d T, C[0], ρ τ, κ i[τ], C[τ]) c(t i, d T, C[0], ρ τ, κ i[τ], C [τ]) + HC(κ i) HC(κ i) The cost represented by T C(κ i) is at most the sum of the matching costs of the C[x]. For x up to τ we have cost c(t i, d T, C 0, ρ τ, κ i[τ], C[τ]). The matching cost between C[τ] and C[τ +1] will be very similar to the cost of matching C [τ] and C [τ + 1], except that we have g(κ i) g(κ i) fewer servers to match. For each server we don t have to match (representing a difference in total number of servers between configurations), we must pay δ. For matching costs C[τ +1] onward, we pay the same as we paid for κ i, so we have: T C(κ i) T C(κ i) + HC(κ i) HC(κ i) + δ (g(κ i) g(κ i)) Substituting from the various equations, summing this over all i, and recalling that δ 1 δ gives the desired inequality. α Theorem 7. We can solve k-server on a binary tree with the properties described in theorem with an expected competitive ratio Θ(log ) provided α = Ω(log ). Proof. We solve the problem hierarchically as described. The actual cost paid to move servers will be bounded by the total move cost. For level j, let z j represent the sum over subtrees rooted at level j of c(t, d T, C[0] T, ρ T, κ T ). Let L log be the number of levels. At the top level, we have z L = OP T. By theorem 4 there exists a set of solutions at level j with total hit cost plus move cost bounded by α+ zj. We then find solutions with expected hit cost α 1 and move cost both bounded by this value according to theorem 5. It follows by theorem 6 that the next level has E[z j 1] (α+)(α+1) z α(α 1) j. The expected move cost is also bounded by z j, so summing this up we have a total move cost of at most: Σ jz j and using martingales to bound the expected cost we get a geometric sum. If we let A = (α+)(α+1) α(α 1) then the summation will look like AL 1. If we set A 1+ 1 A 1 L then this will give us an O(L) bound as desired. Making use of the definition of A and solving for α shows that for α = Ω(L) we can satisfy this inequality.
6 6. ONLINE ALGORITHM It remains to describe our local algorithm for determining how to partition servers between subtrees, and to prove theorem 5. This is essentially an instance of metrical task systems, where the possible states are equally spaced points along a line and refer to partitions of servers between the left and right subtrees. Each state is δ away from its neighbors, representing the cost to move a server between subtrees. We first observe that the costs applied to the various states at each time t look like the change in hit cost. If the request ρ[t] T 1 then we have: c x[t] = c(t 1, d T, C[0] T 1, ρ t T 1, x) c(t 1, d T, C[0] T 1, ρ t 1 T 1, x) Otherwise if request ρ[t] T then we have: c x[t] = c(t, d T, C[0] T, ρ t T, κ[t] x) c(t, d T, C[0] T, ρ t 1 T, κ[t] x) By applying corollary 1, we see that this will be either non-decreasing or non-increasing as we traverse the possible states. We consider these cost vectors to arrive one at a time online, as does the current number of servers κ[t]. Our goal is to minimize the total cost (essentially to solve this metrical task system instance). We define the work function value for a state to be the minimum cost way to end in that state; thus for state x we have w x[t] = min{w x[t 1] + c x[t], w x 1[t] + δ, w x+1[t] + δ}. We will essentially try to stay in the state with minimum w x[t] at each time, but we must add some randomization to the process to prevent the adversary from causing us to move between states (thus move servers between subtrees) with too much frequency. The algorithm is described below. Algorithm 1 SUBPROBLEM(distance δ, initial state s i): outputs a sequence of states as a solution to the above problem 1: generate a random number r between -1 and 1. : output initial state x[0] corresponding to C[0] 3: for each timestep t do 4: current number of servers, κ t arrives 5: cost vector c x[t]=(c 0[t], c 1[t],..., c κt [t]) arrives 6: calculate the work function value for each state w x[t] 7: find the state x[t] that minimizes X x[t] = w x[t] xr(δ). 8: output the current state x[t] Theorem 8. Algorithm 1 pays expected hit cost the total cost of the optimum offline solution to the metrical task system instance. Proof. We claim that over time 0 through t our algorithm pays hit cost at most X x[t] [t] X x[0] [0] where X x[t] = w x[t] rxδ. We will prove this by induction. For the base case, t=0, there is no hit cost yet, and X x[t] [t] X x[0] [0] = 0. Inductively, we will consider two cases. If x[t] = x[t 1] then the hit cost paid at time t will be exactly c x[t] [t]. We observe that if w x[t] = w x+1[t] + δ or w x[t] = w x 1[t] + δ, then because r is between positive and negative one, the probability of selecting x[t] = x will be zero. It follows that for whatever state x we return, we must have w x[t] = w x[t 1] + c x[t]. From here we conclude that X x[t] [t] = X x[t 1] [t 1] + c x[t] [t] and that our algorithm pays hit cost c x[t] [t], completing the induction. The second case has x[t] x[t 1]. However, we can consider cost to arrive in sized increments without changing the behavior of the algorithm, and observe that at the moment we transition from one state to another, the values of w x[t 1] [t] rx[t 1]δ = w x[t] [t] rx[t]δ. So at this moment we pay no hit cost (although we do pay to move servers) and the value of X x[t] remains unchanged. The overall hit cost paid by our algorithm is therefore bounded by X x[t] [t] X x[0] [0]. Since the initial work function value at x[0] is zero, this is at most: w x[t] [t] rδx[t] + rδx[0] Since we select x[t] to minimize the value of w x[t] [t] rδx[t], we can conclude that if the optimum algorithm would have final partition p, then w x[t] [t] rδx[t] w p[t] rδp. Of course, the value of w p[t] is just the total cost of the optimum offline solution, so we have our total hit cost bounded by: OP T + rδ(x[0] x[p]) Obviously this depends upon r, but in expectation r = 0 so the expected hit cost paid by our algorithm looks like the optimum total cost for the offline solution. Theorem 9. Algorithm 1 pays expected move cost the total cost of the optimum offline solution to the metrical task system instance. Proof. Let M[t] be the total move cost paid by our algorithm up until time t. Define a potential function: k 1 X φ[t] = kδ w x+1[t] w x[t] x=0 We will show that at any timestep t, E[M[t]] + 1 φ[t] OP T [t], where OP T [t] is the total cost paid by the optimum solution so far. By application of corollary 1, we will assume that, c 0[t] c 1[t]... c k [t] (the other case where there is a request on the opposite child subtree will be symmetrc). We can view timestep t as a series of smaller timesteps: c 0 steps in which cost is put on all states, followed by c 1 c 0 steps in which work is put on all states except c 0, etc. Notice that the cost of the optimum offline solution cannot get worse because of this change, while no online algorithm can achieve a lower cost. We will show that E[M[t]] + 1 φ[t] OP T [t] by induction on t. The base case is t = 0. Here, E[M[t]] = OP T [t] = 0, since no requests have arrived yet. Since we are given an initial state, w x[0] = 0 for exactly one state. For all other states, w x[0] = δ x x[0] (the cost to move from our initial state to state x). So k 1 X k 1 X φ[0] = kδ w x+1[0] w x[0] = kδ δ = 0 x=0 i=0
7 Now, assume for timestep t 1, E[M[t 1] + 1 φ[t 1] OP T [t 1]. Consider how each term will change at timestep t. By definition of the work function, OP T [t] = min x(w x[t]). Our expected move cost is just the probability that we move times the distance that we would move. Suppose we are in state x. By definition of the algorithm, there is only one state, y, to which we might move (this is the cheapest state to which no cost was added). Additionally, since we are considering size cost, there is only one state x from which we might move; also note that x > y because of our assumption about the costs. If there are two valid states to move from, we will just shrink the timesteps until there is only one valid state to move from. Now, the probability that we move in this step is exactly the probability that our random number r is high enough that we would move during this timestep but low enough that we would not have moved given the previous work function values. This requires both X x[t 1] X y[t 1] and X y[t] X x[t]. The first inequality implies that w x[t 1] w y[t 1] r(x y)δ and the second implies that w x[t] w y[t] r(x y)δ. Since no cost was added to y and cost was added to x, we have: w x[t 1] w y[t 1] r(x y)δ w x[t 1] w y[t 1] + (x y)δ and This means that r must fall within a range of since r is chosen uniformly between plus and minus one we have: P r[move x to y] 4(x y)δ If we do move from x to y, we pay exactly δ(x y). This gives us an expected move cost =. Finally, we examine φ[t]. For most pairs of states w x+1[t] w x[t] = w x+1[t 1] w x[t 1], with the exception of one pair of states where they differ by. Depending on which was larger, we will have φ[t] = φ[t 1] or φ[t] = φ[t 1] +. The first case occurs when the minimum work value did not actually increase, and thus when OP T [t] = OP T [t 1], whereas the second occurs when OP T [t] = OP T [t 1] +. This shows that, at each timestep t, E[M[t]] + 1 φ[t] OP T [t]. Notice that φ[t] 0 for all t, since w x+1[t] w x[t] δ by definition of the work function (we could handle request t and end in state x + 1 by ending in state x and then paying δ to move to x + 1). Therefore, after the last request has arrived, we can say that E[M] OP T. 7. REFERENCES [1] Y. Bartal. Probabilistic approximation of metric spaces and its algorithmic applications. 37th IEEE Symposium on Foundations of Computer Science, [] Y. Bartal. On approximating arbitrary metrics by tree metrics. 30th ACM Symposium on Theory of Computing, [3] Y. Bartal, B. Bollobás, and M. Mendel. A Ramsey-type Theorem for Metric Spaces and its Applications for Metrical Task Systems and Related Problems. 4nd IEEE Symposium on Foundations of Computer Science, 001. [4] Y. Bartal, A. Blum, C. Burch, and A. Tomkins. A polylog(n)-competitive algorithm for metrical task systems. ACM Symposium on Theory of Computing, [5] A. Blum, H. Karloff, Y. Rabani, M. Saks. A Decomposition Theorem for Task Systems and Bounds for Randomized Server Algorithms. 33rd IEEE Symposium on Foundations of Computer Science, 199. [6] Y. Bartal, E. Koutsoupias. On the competitive ratio of the work function algorithm for the k-server problem. 17th Symposium on Theoretical Aspects of Computer Science, 000. [7] Y. Bartal, M. Mendel. Randomized k-server Algorithms for Growth-Rate Bounded Graphs. Symposium on Discrete Algorithms, 004. [8] M. Chrobak, H. Karloff, T. Payne, S. Vishwanathan. New Results on Server Problems. Symposium on Discrete Algorithms, [9] M. Chrobak and L. Larmore. The server problem and on-line games. On-line algorithms: proceedings of a DIMACS workshop. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 7:11-64, 199. [10] M. Chrobak and L. Larmore. HARMONIC is three-competitive for two servers. Theoretical Computer Science, 98: , 199. [11] M. Chrobak and L. Larmore. An Optimal On-line Algorithm for k-server on Trees. SIAM Journal on Computing, 0(1), [1] M. Chrobak and J. Sgall. A simple analysis of the harmonic algorithm for two servers. Information Processing Letters, 75:75-77, 000. [13] B. Csaba and S. Lodha. A randomized on-line algorithm for the k-server problem on a line. Technical Report , DIMACS, 001. [14] J. Fakcharoenphol, S. Rao, and K. Talwar. A tight bound on approximating arbitrary metrics by tree metrics. ACM Symposium on Theory of Computing, 003. [15] A. Fiat, R. Karp, M. Luby, L. McGeoch, D. Sleator, and N. Young. Competitive Paging Algorithms. Journal of Algorithms, 1: , [16] A. Fiat and M. Mendel. Better Algorithms for Unfair Metrical Task Systems and Applications. SIAM Journal on Computing, 3: , 003. [17] A. Fiat, Y. Rabani, Y. Ravid. Competitve k-server Algorithms. 31st IEEE Symposium on Foundations of Computer Science, [18] E. Koutsoupias. Weak adverseries for the k-server problem. 40th IEEE Symposium on Foundations of Computer Science, [19] E. Koutsoupias and C. Papadimitriou. On the k-server conjecture. Journal of the ACM 4(5), [0] M. Manasse, L. McGeoch, and D. Sleator. Competitive Algorithms for Server Problems. Journal of Algorithms (11, 08-30), [1] S. Seiden. Unfair Problems and Randomized Algorithms for Metrical Task Systems. Information and Computation, 148:19-40, [] S. Seiden. A General Decomposition Theorem for the k-server Problem. European Symposium on Algorithms, 001.
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Influences in low-degree polynomials
Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
Lecture 4 Online and streaming algorithms for clustering
CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
The Online Set Cover Problem
The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S
Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA
A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
The Relative Worst Order Ratio for On-Line Algorithms
The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, [email protected]
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Stiffie's On Line Scheduling Algorithm
A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical
Lecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,
Lecture 4: BK inequality 27th August and 6th September, 2007
CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound
Load balancing of temporary tasks in the l p norm
Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE
ECON20310 LECTURE SYNOPSIS REAL BUSINESS CYCLE YUAN TIAN This synopsis is designed merely for keep a record of the materials covered in lectures. Please refer to your own lecture notes for all proofs.
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
Every tree contains a large induced subgraph with all degrees odd
Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University
THREE DIMENSIONAL GEOMETRY
Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
Graphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
A Non-Linear Schema Theorem for Genetic Algorithms
A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
Topology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
Online Scheduling with Bounded Migration
Online Scheduling with Bounded Migration Peter Sanders, Naveen Sivadasan, and Martin Skutella Max-Planck-Institut für Informatik, Saarbrücken, Germany, {sanders,ns,skutella}@mpi-sb.mpg.de Abstract. Consider
ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.
A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of
An Approximation Algorithm for Bounded Degree Deletion
An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
Gambling Systems and Multiplication-Invariant Measures
Gambling Systems and Multiplication-Invariant Measures by Jeffrey S. Rosenthal* and Peter O. Schwartz** (May 28, 997.. Introduction. This short paper describes a surprising connection between two previously
On the Power of Randomization in Online Algorithms
On the Power of Randomization in Online Algorithms S. Ben-David Technion, Haifa, Israel A. Borodin University of Toronto, Toronto, Canada R. Karp University of California at Berkeley and International
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
Online Bipartite Perfect Matching With Augmentations
Online Bipartite Perfect Matching With Augmentations Kamalika Chaudhuri, Constantinos Daskalakis, Robert D. Kleinberg, and Henry Lin Information Theory and Applications Center, U.C. San Diego Email: [email protected]
Mathematics for Algorithm and System Analysis
Mathematics for Algorithm and System Analysis for students of computer and computational science Edward A. Bender S. Gill Williamson c Edward A. Bender & S. Gill Williamson 2005. All rights reserved. Preface
Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling
6.854 Advanced Algorithms Lecture 16: 10/11/2006 Lecturer: David Karger Scribe: Kermin Fleming and Chris Crutchfield, based on notes by Wendy Chu and Tudor Leu Minimum cost maximum flow, Minimum cost circulation,
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
A Note on Maximum Independent Sets in Rectangle Intersection Graphs
A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada [email protected] September 12,
Online Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
arxiv:cs/0605141v1 [cs.dc] 30 May 2006
General Compact Labeling Schemes for Dynamic Trees Amos Korman arxiv:cs/0605141v1 [cs.dc] 30 May 2006 February 1, 2008 Abstract Let F be a function on pairs of vertices. An F- labeling scheme is composed
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
A binary search tree is a binary tree with a special property called the BST-property, which is given as follows:
Chapter 12: Binary Search Trees A binary search tree is a binary tree with a special property called the BST-property, which is given as follows: For all nodes x and y, if y belongs to the left subtree
Distributed Network Monitoring and Multicommodity Flows: A Primal-Dual Approach
Distributed Network Monitoring and Multicommodity Flows: A Primal-Dual Approach Baruch Awerbuch Johns Hopkins University. [email protected] Rohit Khandekar IBM T.J. Watson Research Center. [email protected].
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Lecture 4: AC 0 lower bounds and pseudorandomness
Lecture 4: AC 0 lower bounds and pseudorandomness Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: Jason Perry and Brian Garnett In this lecture,
VERTICES OF GIVEN DEGREE IN SERIES-PARALLEL GRAPHS
VERTICES OF GIVEN DEGREE IN SERIES-PARALLEL GRAPHS MICHAEL DRMOTA, OMER GIMENEZ, AND MARC NOY Abstract. We show that the number of vertices of a given degree k in several kinds of series-parallel labelled
1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let
Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as
20 Selfish Load Balancing
20 Selfish Load Balancing Berthold Vöcking Abstract Suppose that a set of weighted tasks shall be assigned to a set of machines with possibly different speeds such that the load is distributed evenly among
Math 181 Handout 16. Rich Schwartz. March 9, 2010
Math 8 Handout 6 Rich Schwartz March 9, 200 The purpose of this handout is to describe continued fractions and their connection to hyperbolic geometry. The Gauss Map Given any x (0, ) we define γ(x) =
root node level: internal node edge leaf node CS@VT Data Structures & Algorithms 2000-2009 McQuain
inary Trees 1 A binary tree is either empty, or it consists of a node called the root together with two binary trees called the left subtree and the right subtree of the root, which are disjoint from each
The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
Course: Model, Learning, and Inference: Lecture 5
Course: Model, Learning, and Inference: Lecture 5 Alan Yuille Department of Statistics, UCLA Los Angeles, CA 90095 [email protected] Abstract Probability distributions on structured representation.
Exponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
The Advantages and Disadvantages of Online Linear Optimization
LINEAR PROGRAMMING WITH ONLINE LEARNING TATSIANA LEVINA, YURI LEVIN, JEFF MCGILL, AND MIKHAIL NEDIAK SCHOOL OF BUSINESS, QUEEN S UNIVERSITY, 143 UNION ST., KINGSTON, ON, K7L 3N6, CANADA E-MAIL:{TLEVIN,YLEVIN,JMCGILL,MNEDIAK}@BUSINESS.QUEENSU.CA
A characterization of trace zero symmetric nonnegative 5x5 matrices
A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the
Section 4.4 Inner Product Spaces
Section 4.4 Inner Product Spaces In our discussion of vector spaces the specific nature of F as a field, other than the fact that it is a field, has played virtually no role. In this section we no longer
Definition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
How Asymmetry Helps Load Balancing
How Asymmetry Helps oad Balancing Berthold Vöcking nternational Computer Science nstitute Berkeley, CA 947041198 voecking@icsiberkeleyedu Abstract This paper deals with balls and bins processes related
Copyrighted Material. Chapter 1 DEGREE OF A CURVE
Chapter 1 DEGREE OF A CURVE Road Map The idea of degree is a fundamental concept, which will take us several chapters to explore in depth. We begin by explaining what an algebraic curve is, and offer two
Steiner Tree Approximation via IRR. Randomized Rounding
Steiner Tree Approximation via Iterative Randomized Rounding Graduate Program in Logic, Algorithms and Computation μπλ Network Algorithms and Complexity June 18, 2013 Overview 1 Introduction Scope Related
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
The chromatic spectrum of mixed hypergraphs
The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex
Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff
Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Duplicating and its Applications in Batch Scheduling
Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Near Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
