Price of Anarchy in Non-Cooperative Load Balancing
|
|
|
- Nigel Ball
- 10 years ago
- Views:
Transcription
1 Price of Anarchy in Non-Cooperative Load Balancing Urtzi Ayesta, Olivier Brun, Balakrishna Prabhu To cite this version: Urtzi Ayesta, Olivier Brun, Balakrishna Prabhu. Price of Anarchy in Non-Cooperative Load Balancing: <hal > HAL Id: hal Submitted on 11 Sep 2009 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Price of Anarchy in Non-Cooperative Load Balancing U. Ayesta, O. Brun, B.J. Prabhu LAAS-CNRS Université de Toulouse 7 Avenue du Colonel Roche Toulouse, France. {urtzi, brun, bjprabhu}@laas.fr Abstract We investigate the price of anarchy of a load balancing game with K dispatchers. The service rates and holding costs are assumed to depend on the server, and the service discipline is assumed to be processor-sharing at each server. The performance criterion is taken to be the weighted mean number of jobs in the system, or equivalently, the weighted mean sojourn time in the system. We first show that, for a fixed amount of total incoming traffic, the worst-case Nash equilibrium occurs when each player routes exactly the same amount of traffic, i.e., when the game is symmetric. For this symmetric game, we provide the expression for the loads on the servers at the Nash equilibrium. Using this result we then show that, for a system with two or more servers, the price of anarchy, which is the worst-case ratio of the global cost of the Nash equilibrium to the global cost of the centralized setting, is lower bounded by K/(2 K 1) and upper bounded by K, independently of the number of servers. 1 Introduction Server farms are used nowadays in as diverse areas as e-service industry, database systems and grid computing clusters. Figure 1 depicts the typical architecture of a server farm with a single centralized dispatcher who receives jobs from different sources and routes them to a set of servers. Server farms have become a popular architecture in computing centers and are used, for example, in the Cisco Local Director, IBM Network Dispatcher and Microsoft Sharepoint (see [4] for a recent survey). This configuration can also be used to model a web server farm, where requests for files (or HTTP pages) arrive to a dispatcher and are dispatched immediately to one of the servers in the farm for processing. 1
3 2 Servers Dispatcher Figure 1: Centralized architecture for a server farm. One of the fundamental issues in this context is to characterize the optimal routing strategy. The problem amounts to finding the routing strategy of the dispatcher that will optimize a certain performance objective such as the mean processing time (or sojourn time) of jobs. By Little s law, this performance objective is equivalent to the mean number of jobs in the system. Such a routing strategy is known as the social optimum or the social welfare since it minimizes the mean processing time of jobs (we will also refer to it as the global optimum). This load balancing problem is perhaps one of the most studied one in the operations research community, and many works have been devoted to the analysis of the optimal routing in various static and dynamic scenarios [9, 13, 20]. In practice, it may however happen that a single centralized dispatcher is simply not feasible due to scalability or complexity reasons. In this case, the system designer will certainly have to resort to a distributed scheme in which several dispatchers are used as shown in Figure 2. In this case, each dispatcher will independently seek to minimize the processing time perceived by the traffic it routes. Thus, the shift from a centralized to a distributed scheme will give rise to a non-cooperative game between the dispatchers. Servers Dispatcher Dispatcher Dispatcher Figure 2: Decentralized architecture for a server farm.
4 3 Game theory provides the systematic framework to study and to understand such problems. We can distinguish two different types of games depending on the number of dispatchers. If the number of dispatchers is finite then the game is said to be atomic and a well-known equilibrium strategy is given by the Nash equilibrium, that is, a routing strategy from which unilateral deviation does not help any dispatcher in improving the performance perceived by the traffic it routes. If the number of dispatchers is infinite (every arriving job takes its own routing decision and can be thought of as a dispatcher) the game is said to be non-atomic and the corresponding equilibrium is given by the notion of Wardrop equilibrium. In this case, the equilibrium point is characterized by the fact that the performance in every (used) server is the same. In the present article we are mostly interested in the atomic setting, and we refer to Section 2 for related work in the non-atomic setting. From the system designer s perspective a very important question pertains to the loss of performance incurred when shifting to a decentralized architecture. Indeed, in the decentralized architecture each dispatcher performs an individual optimization for its own jobs, and thus it can be expected that the overall performance of the decentralized scheme will be worse than that of the centralized scheme. The system designer is probably ready to accept a distributed routing scheme provided that the gain in scalability is not achieved at the expense of a significant loss in performance. In this context, the question turns out to be: can we provide performance guarantees for these decentralized routing schemes? This is the main question addressed in this paper. Our objectives are two fold. Firstly, we investigate the properties of the noncooperative game. We show that there always exists a unique Nash equilibrium, that is, a routing strategy from which no dispatcher has any incentive to deviate. We also show that the worst Nash equilibrium occurs when the amount of traffic that every dispatcher routes is exactly the same. To the best of our knowledge this property has not been shown previously, and it may find applications in other games. For this particular case, we show that the game belongs to a particular class of games known as Potential Games [16] which are known to have several desirable properties. For instance, for a potential game, the best response algorithm converges to the equilibrium. Secondly, we compare the performance of the global optimum with that given by the Nash equilibrium. In other words, we compare the performance when there is only one dispatcher which routes all the traffic with the performance when there are several dispatchers each one seeking to optimize its own performance. In order to do so we look at the Price of Anarchy (PoA) which was introduced by Koutsoupias and Papadimitriou [15]. The PoA is a measure of the inefficiency of a decentralized scheme. It is defined as the ratio of the performance obtained by the worst Nash equilibrium to that of the global optimal solution, and hence it lies in the interval [1, ). We show that the PoA is of the order of the square root of the number of dispatchers. Thus, it grows fairly quickly and unboundedly with the number of dispatchers. As a consequence, we recover the result in [1] where it was shown that when the number of dispatchers is infinite (the non-atomic as pointed out above) the
5 4 PoA is infinite. The rest of the paper is organized as follows. In Section 3, we describe the model and state the problem. In Section 4, we explore the structure of the underlying Nash equilibria and prove their existence and uniqueness. We also establish several properties of these equilibria that form the foundation of the subsequent analysis. In Section 5, we analyze the global cost at the Nash equilibria, and show that the maximum of this cost is achieved in the symmetric case. With this result at hand, in Section 6, we derive lower and upper bounds on the PoA. Finally, we draw some conclusions and give possible extensions in Section 7. 2 Related work Load balancing in multi-server systems has been widely studied in the literature. Global and individual optimality in load balancing are considered in the monograph [13], which does not consider decisions based on the knowledge of the amount of load. Systems with a general service-time distribution and the FCFS scheduling discipline were studied in [6, 2, 3, 10], while [17, 12] studied systems with an exponential service-time distributions and an arbitrary scheduling discipline. In [11], the authors analyzed a multi-server system where requests join the server that has the smallest number of requests. In a recent work [5], the authors investigate the performance of a server farm where the scheduling discipline in each server is SRPT (Shortest Remaining Processing Time First). In [8], the authors studied the performance of selfish routing in a server farm with a min-max objective, that is, when the objective is to minimize the maximum sojourn time in the servers. In recent years the study of PoA in multi-server queues has started to receive attention. In [12], the authors considered the non-atomic scenario where every arriving job can select the server in which it will be served. An important assumption is that the holding cost is the same in every server. Building upon results from [2], it is shown in [12] that the PoA is upper bounded by the number of servers. We also refer to [21] for similar results. Another closely related work is [1]. The main difference between the models studied in [12] and [1] is that in the latter the holding costs in every server could be arbitrarily chosen. Using potential game theory, it is shown in [1] that the PoA is unbounded in the nonatomic setting, i.e., it can be arbitrarily close to infinity. This was a surprising result since it indicated that unequal holding costs may have a profound impact on the system s performance. Our present work is closely related to work by Orda and co-authors [14, 18]. In these references the atomion-cooperative setting was studied, but the focus was on existence, uniqueness and the properties of the Nash equilibrium rather than on the PoA. Moreover, it was also assumed that the holding cost per unit
6 5 of time is the same in every server, which as we have mentioned can have a profound impact on the performance. Several of the arguments used in the present work are directly inspired from those references, but we emphasize that our main results and characterizations are new. 3 Problem Formulation and Main Results We consider a non-cooperative routing game with K dispatchers and S Processor- Sharing servers. Denote C = {1,...,K} to be the set of dispatchers and S = {1,...,S} to be the set of servers. Jobs received by dispatcher i are said to be jobs of class i. Server j S has capacity r j and a holding cost c j per unit time is incurred for each job sent to this server. It is assumed that servers are numbered in the order of increasing cost per unit capacity, i.e., if m n, then cm r m cn r n. Let r = (r j ) j S and c = (c j ) j S denote the vectors of server capacities and server costs, respectively, and let r = n S r n denote the total capacity of the system. Jobs of class i C arrive to the system according to a Poisson process and have generally distributed service-times. We do not specify the arrival rate and the characteristics of the service-time distribution due to the fact that in an M/G/1 PS queue the mean number of jobs depends on the arrival process and service-time distribution only through the traffic intensity, i.e., the product of the arrival rate and the mean service-time. Let λ i be the traffic intensity of class i. It is assumed that λ i λ j for i j. Moreover, it will also be assumed that the vector λ of traffic intensities belongs to the following set: { } Λ = λ IR K : λ i = λ, where λ denotes the total incoming traffic intensity. It will be assumed throughout the paper that λ < r, which is the necessary and sufficient condition to guarantee the stability of the system. Let x i = (x i,j ) j S denote the routing strategy of dispatcher i, with x i,j being the amount of traffic it sends towards server j. Let X i = x i IR S : 0 x i,j r j, j S; x i,j = λ i j S denote the set of feasible routing strategies for dispatcher i. The vector x = (x i ) i C will be called a multi-strategy. The multi-strategies belong to the product strategy space X = i C X i. i C
7 6 Dispatcher i seeks to find a routing strategy that minimizes the mean weighted sojourn times of its jobs, which, by Little s law, is equivalent to minimizing the mean weighted number of jobs in the system as seen by this class. This optimization problem, which depends on the routing decisions of the other classes, can be formulated as follows: minimize x i X i T i (x) = j S c j x i,j r j y j where y j = k C x k,j is the traffic offered to server j. Note that, introducing r i,j = r j k i x k,j, the available capacity of server j as seen by class i, the problem can alternatively be formulated as minimize x i X i j S c j x i,j r i,j x i,j. (1) A Nash equilibrium of the routing game is a multi-strategy from which no class finds it beneficial to deviate unilaterally. Hence, x X is a Nash Equilibrium Point (NEP) if x i = arg min z Xi T i (x 1,...,x i 1,z,x i+1,...,x K ), i C. Let T ij (x) denote the partial derivative of T i with respect to x i,j at point x, then [ ] 1 x i,j T ij (x) = c j + r j y j (r j y j ) 2. (2) According to the Karush-Kuhn-Tucker (KKT) optimality conditions, x X is a NEP if and only if there exist multipliers µ i such that T ij (x) = c j + c jx i,j r j y j (r j y j ) 2 = µ i if x i,j > 0, (3) T ij (x) = c j r j y j µ i if x i,j = 0. (4) Let C j = {i C : x i,j > 0} be the set of classes which route traffic to server j. Similarly, let S i = {j S : x i,j > 0} be the set of servers to which class i routes traffic. Note that i C j j S i. We can now rewrite equations (3) and (4) as c j r j y j < µ i i C j j S i. (5) Let x be a NEP for the system with K dispatchers. The global performance of the system can be assessed using the global cost D K (λ,r,c) = i C T i (x) = j S c j y j r j y j,
8 7 where the offered traffic y j are those at the NEP. The above cost represents the mean weighted number of jobs in the system. Note that when there is a single dispatcher, we have a single class whose traffic intensity is λ 1 = λ. The global cost can therefore be written as D 1 ( λ,r,c) in this case. We shall use the price of anarchy as a metric in order to assess the inefficiency of a decentralized scheme with K dispatchers. For our problem, it is defined as D K (λ,r,c) PoA(K) = sup λ,r,c D 1 ( λ,r,c). In the following section, we establish several important properties of the Nash equilibrium when the input parameters λ, r, and c are fixed. These properties will be used to prove the main results of this paper related to the PoA. 3.1 Main Results Before getting into the technical details, we present here an overview of the most important results obtained in the paper. The first theorem, which is proved in Section 5, states that that the global cost D K (λ,r,c) achieves its maximum when λ is the symmetric vector λ = = ( λ K,..., λ K ). Theorem 1 sup λ,r,c D K (λ,r,c) = sup D K (λ =,r,c). r,c This result implies that, for the calculation of the PoA, we can restrict ourselves to the symmetric game. This, coupled with the fact that in our setting the symmetric game is also a potential game, makes it more tractable for the analytic computation of the NEP and the global cost, thereby greatly simplifying the derivation of the lower and upper bounds on the PoA. The second theorem, which is proved in Section 6, gives these lower and upper bounds on the PoA. Theorem 2 For a system with two or more servers, K 2 K 1 PoA(K) K. This result states that the PoA is of the order of K independently of the number of servers, and thus remains bounded for a finite number of dispatchers. Remark 1 For a system with only one server, PoA(K) = 1. Hence, we do not consider this case.
9 8 4 Existence, Uniqueness and Other Properties of The Nash Equilibrium In this section, we show the existence and uniqueness of the NEP and investigate properties of the traffic flow at this point. 4.1 Existence and Uniqueness Let x be a multi-strategy for the routing game. The cost function T i (x) of each user i C is the sum over servers j S of the link cost functions t i,j (x) = c j x i,j /(r j y j ). The latter are continuous functions of x which are convex and continuously differentiable in x i,j. We have also assumed that λ < r. As stated in [18], these conditions are sufficient to guarantee the existence of a NEP (Theorem 1 in [19]). Now observe that the function t i,j (x) is a function of two arguments, x i,j and y j, which is increasing in each of its two arguments. Moreover, the partial derivative T i,j (x) is strictly increasing in x i,j and in y j. We therefore conclude that the function T i (x) meets the conditions defining a type-a cost function in [18]. Hence, we can apply Theorem 2.1 in [18] and conclude that the NEP is unique. 4.2 Properties related to traffic intensities We prove below that there is a monotonicity among classes in their use of servers: a class with a higher demand uses more of each and every server. We first prove a series of technical lemmata before stating our main results in Proposition 1 and Corollary 1. Lemma 1 S i S k. Proof. Assume the contrary, i.e., if m S i then m / S k, and if n S k then n / S i. For one such pair m and n, from (5), we can conclude that µ i > cm r m y m µ k and µ k > cn r n y n µ i, which is a contradiction. Since S i S k, from (3), we have µ i µ k = Lemma 2 µ i < µ k j S k : x i,j < x k,j. c j (r j y j ) 2 (x i,j x k,j ), j S i S k. (6) Proof. Straight part: From Lemma 1, S i S k. If µ i < µ k, then, from (6), j S k : x i,j < x k,j.
10 9 Converse part: j S k : x i,j < x k,j. Either j S i or j / S i. If j S i then, from (6), µ i < µ k. If j / S i, then, from (5), µ i cj r j y j < µ k. Lemma 3 If µ i < µ k, then S i S k. c j r j y j Proof. If j S i, then, from (5), < µ i. If µ i < µ k then Hence, from (5) we can conclude that j S k. Therefore, S i S k. c j r j y j < µ k. Lemma 4 m S k : x i,m < x k,m x i,j < x k,j, j S k. Proof. Straight part: If m S k : x i,m < x k,m, then, from Lemmata 2 and 3, we have µ i < µ k and S i S k. For j S i, from (6), we have x i,j < x k,j. For j S k \ S i, x i,j = 0 and 0 < x k,j. Hence, x i,j < x k,j, j S k. Converse part: It is true from the statement. Proposition 1 The following statements are equivalent: 1. µ i < µ k. 2. j S k : x i,j < x k,j. 3. x i,j < x k,j, j S k. 4. λ i < λ k. Proof follows from Lemmata 2 and 4. Now, we show 3 4. Straight part: If x i,j < x k,j, j S k, then, from the fact that 3 1 and Lemma 3, we can conclude that λ i = j S i x i,j = j S k x i,j < j S k x k,j = λ k. Converse part: Since λ k = j S k x k,j, if λ i < λ k, then j S k : x i,j < x k,j. Since 2 3, if λ i < λ k, then x i,j < x k,j, j S k. The above proposition shows that a class with a higher demand uses more of each and every server. The following corollary shows that if two classes have the same traffic intensity, then they send the same amount of flow on each server. Corollary 1 From Proposition 1, it follows that 1. µ i = µ k j S k : x i,j = x k,j x i,j = x k,j, j S k λ i = λ k. 2. If λ i < λ k, then S i S k.
11 10 3. If λ i = λ k, then S i = S k. In particular, if all classes have the same demand, i.e. λ = λ =, then, for all server j S and for all i C, we have x i,j = y j /K. Recall that we have assumed that λ i λ k for i k. Therefore, according to the above results, if we consider two classes i and k > i, then we have S i S k, µ i µ k and x i,j x k,j for all servers j S k, with the equalities holding if and only if λ i = λ k. Let N j = C j. Proposition 1 implies that if k C j, then i C j, i > k. As a consequence, the set C j has the following structure: C j = {k N j +1,..., K}. 4.3 Properties related to server costs per unit capacity The above results tell how an order on λ i translates to an order on x i,j, µ i and S i, i.e., quantities of class i. We now give the analogous results for similar quantities of server j. As before, we first prove a series of technical lemmata before stating our main results in Proposition 2 and Corollary 2. Denote rj yj c j =: κ j. We can rewrite (5) as µ 1 i < κ j i C j j S i. (7) Note that κ m is to class m what µ i is to class i. Also, for i C m, we can rewrite (3) as ( µ i = 1 + c ) m x i,m r m y m r j y m ( ) = κ 1 m 1 + κ 1 x i,m m. (8) Lemma 5 C m C n. Proof. Assume the contrary, i.e., if i C m, then i / C n, and if k C n, then k / C m. For one such pair i and k, from (7), we can conclude that κ m > µ i 1 κ n and κ n > µ 1 k κ m, which is a contradiction. Since C m C n, from (8), we have ( ) ( κm κm 1 x i,m = κ 1 n 1 + κ 1 n ) x i,n, i C m C n. (9) Lemma 6 κ m < κ n i C n : xi,m < xi,n.
12 11 Proof. Straight part: From Lemma 5, C m C n. If κ m < κ n, then, from (9), i : xi,m < xi,n. Converse part: i C n : xi,m < xi,n. Either i C m or i / C m. If i C m, then, from (9), κ m < κ n. If i / C m, then, from (7), κ m µ 1 i < κ n. Lemma 7 If κ m < κ n, then C m C n. Proof. If i C m, then, from (7), µ i < κ m. If κ m < κ n, then µ i < κ n. Hence, from (7) we can conclude that i C n. Therefore, C m C n. Lemma 8 m C i : xi,m < xi,n xi,m < xi,n, i C n. Proof. Straight part: If i C n : xi,m have κ m < κ n and C m C n. For i C m, from (9), xi,m x i,m = 0 and 0 < x i,n. Hence, xi,m < xi,n, then, from Lemmata 6 and 7, we < xi,n. For i C n \ C m,, i C n. < xi,n Converse part: It is true from the statement. The following proposition proves a monotonic property regarding the order of preference of servers as seen by each class. Proposition 2 The following statements are equivalent: 1. κ m < κ n. 2. i S n : xi,m x i,m r m cm < rn. < xi,n. < xi,n, i C n. Proof follows from Lemmata 6 and 8. Next, we show 3 4. Straight part: If xi,m < xi,n, i C n, then from the fact that 3 1 and < κ n + x i,n i C n = rn. Lemma 7, we can conclude that rm = κ m + i C m x i,m Converse part: Since rn = κ n + i C n x i,n, if rm < rn, then either κ m < κ n or i C n : xi,m then xi,m < xi,n < xi,n. Since 1 2 3, we can conclude that if rm < cn, i C n. The above proposition shows that if server n has a lower cost per unit capacity than server m, i.e. /r n < /r m, then, at the NEP, the ratio of the r residual capacities will be greater than /, i.e. n y n r m y m > cn, and for each class i using server n, the ratio of the amount of traffic sent to each server by x class i will be greater than /, i.e. i,n x i,m > cn. r n,
13 12 Corollary 2 From Proposition 2 it follows that 1. κ m = κ n i C n : xi,m c r m m cm = rn. 2. If rm < rn then C m C n. 3. If rm = rn then C m = C n. = xi,n xi,m = xi,n, i C n The above corollary shows that we get a partition of classes among servers at the NEP: starting with a server m of maximal cost per unit capacity cm r m and moving towards servers n with lower cost per unit capacity cn r n < cm r m, we observe more and more classes joining the servers, i.e. C m C n. Recall that it is assumed that the servers are numbered in the following order: c 1 /r 1 c 2 /r 2... c S /r S. According to the above properties, it implies that if we consider two servers n and m > n, then we have C m C n, r n y n r m y m cn and xi,n x i,m cn for each class i C n, with the equalities holding if and only if /r n = /r m. Let S i = S i. Proposition 2 implies that if m S i, then n S i, n < m. As a consequence, the set S i has the following structure: S i = {1,...,S i }. Before moving to the analysis of the set of servers used by each class at the equilibrium, we conclude this section with a last property related to the server costs per unit capacity. This technical result will play a key role when comparing the costs of two different equilibria. Lemma 9 with strict inequality if C j \ C j+1. Proof. From (3), if x i,j > 0, then from which we conclude that i C j µ i = c jn j r j y j + c j r j (r j y j ) 2 c j+1 r j+1 (r j+1 y j+1 ) 2, j, µ i = c j + c jx i,j r j y j (r j y j ) 2, c j y j (r j y j ) 2 = c j(n j 1) + r j y j c j r j (r j y j ) 2.
14 13 Now, c j+1 (N j+1 1) c j+1 r j+1 + r j+1 y j+1 (r j+1 y j+1 ) 2 = Thus, i C j+1 µ i = i C j µ i i C j\c j+1 µ i = c j(n j 1) c j r j + r j y j (r j y j ) 2 i C j\c j+1 ( cj + c ) jx i,j r j y j (r j y j ) 2 = c j(n j 1) c j r j + r j y j (r j y j ) 2 c j(n j N j+1 ) r j y j = c j(n j+1 1) c j r j + r j y j (r j y j ) 2 i C j\c j+1 c j r j (r j y j ) 2 c j+1 r j+1 (r j+1 y j+1 ) 2 = c j+1(n j+1 1) r j+1 y j+1 c j(n j+1 1) r j y j + i C j\c j+1 i C j\c j+1 c j x i,j (r j y j ) 2. c j x i,j (r j y j ) 2 (10) ( c j+1 = c ) j (N j+1 1) + r j+1 y j+1 r j y j i C j\c j+1 (11) From Proposition 2, cj r j cj+1 r j+1 implies κ j κ j+1, i.e. r j+1 y j+1 cj r j y j. Since the second term on the RHS is strictly positive if C j \ C j+1, we can conclude that c j r j (r j y j ) 2 c j+1 r j+1 (r j+1 y j+1 ) 2 0, with strict inequality if C j \ C j+1. c j+1 c j x i,j (r j y j ) 2. c j x i,j (r j y j ) Characterization of the set of servers used The following proposition shows that the set of servers used by each class has the so-called water-filling structure. Recall that dispatcher i solves the optimization problem (1). Proposition 3 For each class i C, the threshold S i is such that where G i,si < λ i G i,si+1, (12)
15 14 s 1 ri,s G i,s = r i,j c s j=1 s 1 cj r i,j s = 2,...,S. (13) j=1 with G i,1 = 0 and G i,s+1 = j S r j λ + λ i. Note that G i,s+1 is the system capacity as seen by class i jobs. Proof. Let A be a subset of S i. Since r i,j = r j y j + x i,j, (3) can be rewritten as µ i (r j y j ) 2 = c j r i,j for all j S i. Summing over j A, we get µ i = which in the case A = S i can be written as, ( ) 2 j A cj r i,j j A r A S i, (14) j y j µ i = ( ) 2 j S cj i r i,j (15) j S i r i,j λ i since j S i r j y j = j S i r i,j x i,j = j S i r i,j λ i. Since S i+1 S i, we have from (4), which yields µ i = ( ) 2 j S cj i r i,j j S i r i,j λ i S i ri,si+1 λ i r i,j c Si+1 j=1 S i j=1 c Si+1, r Si+1 y Si+1 cj r i,j = G i,si+1. (16) For the lower bound, observe that, since S i S i, (3) holds for j = S i. Therefore, using (14) with A = {1,..., S i 1}, we can write i.e., µ i = ( Si 1 j=1 cj r i,j Si 1 j=1 r j y j ) 2 = c S i r i,si (r Si y Si ) 2,
16 15 S i 1 j=1 cj r i,j = csi r i,si r i,si x i,si S i 1 S r i,j x i,j csi i 1 > r i,j λ i, r i,si j=1 j=1 from which we get G i,si = S i 1 j=1 ri,si r i,j c Si S i 1 j=1 cj r i,j < λ i (17) Remark 2 In the special case λ i = G i,si+1, inequality (4) holds tight for j = S i + 1. Therefore, in this case, we can define the set of servers used by class i as S i = {1,..., S i, S i + 1}, where server S i + 1 is marginally used, with x i,si+1 = 0. From Corollary 1, we can conclude that the thresholds S 1,...,S K satisfy the order S 1 S 2... S K. 5 Analysis of the Global Cost In this section, it will be assumed that the capacity vector r and the cost vector c are fixed. Our goal is to prove that the global cost D K (λ,r,c) achieves its maximum in the symmetric case, i.e. when λ = λ =. For each rate vector λ Λ, we already know that there exists a unique NEP x X. Let us define the function N : Λ X such that for each vector λ Λ, N(λ) X is this unique NEP. In the sequel, the function N will be called the Nash mapping. We have the following result. Theorem 3 The Nash mapping N is a continuous function from Λ into X. Proof. Note that for each vector λ Λ, N(λ) X i C j S [0, r j] and the latter set is a compact set. As a consequence, in order to apply the closed graph theorem (see Appendix A), we only need to show that the graph G N of N is closed. Let us therefore consider a convergent sequence (λ n, x n ) n IN of points in G N, where x n = N(λ n ). Let (λ, x) denote the limit of this sequence. Note that λ Λ since Λ is closed as a topological space. We need to show that x = N(λ). We first show that x X and j S x i,j = λ i for each i C. For i C and j S fixed, the sequence (x n i,j ) n IN takes values in the closed set [0, r j ]
17 16 and converges to x i,j, from which we deduce that 0 x i,j r j and thus that x X. Moreover, for each n IN and each i C, we have j S xn i,j = λn i. Since x n x, we have for each class i C, λ i = lim n λn i = lim x n n i,j = x i,j. j S j S We therefore conclude that the limit point x is such that x X and satisfies j S x i,j = λ i for each i C. Let us now show that x is the unique NEP in X satisfying these conditions. For each n IN, since x n is a NEP, there exist multipliers µ n i, i C, such that µ n i = µ n i c j r j y n j c j r j y n j + c j x n i,j (r j y n j )2 if x n i,j > 0 if x n i,j = 0. Now, let us show that there exist µ i such that µ n i µ i. To this end, let y j = lim n y n j = i C x i,j for each j S. Note that y n j < r j implies y j r j. Let us first show that y 1 < r 1. Assume by contradiction that y 1 = r 1. Then we have ǫ > 0, N ǫ, n IN, n N ǫ = r 1 y n 1 < ǫ. But, since r j yj n c j(r 1 y1 n )/c 1 for all j S, it implies that for each ǫ > 0, we can find n sufficiently large such that r j yj n < c j ǫ/c 1 for all j S, and thus, r j λ = r j yj n < ǫ c j. c 1 j S j S j S j S Since the above holds for each ǫ > 0, this is clearly a contradiction with our assumption λ < j S r j. We therefore conclude that y 1 < r 1. Now since each class uses server 1, we have for each n, µ n i = c 1 r 1 y n 1 + c 1 x n i,1 (r 1 y n 1 )2 Since x n x and y n 1 y 1 < r 1, we conclude that the sequence (µ n i ) n IN convergences to a limit µ i such that µ i = c 1 r 1 y 1 + c 1 x i,1 (r 1 y 1 ) 2. Observe that it implies that y j < r j for all j S. Indeed, if we assume on the contrary that y j = i C x i,j = r j, then it implies that there exist i C such that x i,j = ǫ > 0. But in turn it implies that for n sufficiently large we have x n i,j > ǫ/2 and thus µn i > (c j ǫ/2)/(r j y n j )2. We then deduce from y n j r j that
18 17 µ n i, which is a contradiction with µn i µ i. Therefore y j < r j for all j S. Now, let us consider the complementary slackness conditions for each NEP x n, that is, ( ) x n i,j c j r j y n j + c j x n i,j (r j y n j )2 µn i = 0. Taking the limit as n, we obtain ( cj x i,j + c ) j x i,j r j y j (r j y j ) 2 µ i = 0. Since the above are the necessary and sufficient optimality conditions for a point to be a NEP, we conclude that x = N(λ) and thus that the graph G N is closed. Applying the closed graph theorem yields the proof. In order to prove that the global cost achieves its maximum in the symmetric case, we need to compare the equilibria N(λ) and N(ˆλ) that are induced by two different rate vectors λ and ˆλ in Λ. If the resulting equilibria are such that the set of servers over which each class sends its flow do not coincide at both equilibria, then the comparisons become extremely complex, if possible at all. To avoid this difficulty, we proceed as follows. In section 5.1, we first prove some preliminary results concerning the comparison of the equilibria induced by two different rate vectors λ and ˆλ, assuming that these equilibria are such that each class sends its flow to the same servers under both equilibria. In Section 5.2, we compare the equilibria induced by two different rate vectors λ and ˆλ, assuming that (i) these equilibria are such that each class sends its flow to the same servers under both equilibria, and (ii) ˆλ is obtained from λ using a certain transformation. In Section 5.3 we exploit the continuity of the Nash mapping to show that the global cost increases under this transformation even when the set of servers is different at the two equilibria. Finally, in Section 5.4, we show that the symmetric rate vector λ = can be obtained from any rate vector λ with a finite number of such transformations. 5.1 Preliminary Results In this section, we prove some lemmata that will be used in order to compare the Nash equilibria induced by two vectors λ Λ and ˆλ Λ. In the sequel, if z is a certain quantity related to the Nash equilibrium induced by the vector λ then we shall denote the corresponding quantity for vector ˆλ by ẑ. Lemma 10 For i C j, 1. if ŷ j < y j and ˆx i,j x i,j, then ˆµ i < µ i.
19 18 2. if ŷ j y j and ˆx i,j x i,j, then ˆµ i µ i. 3. if ŷ j y j and ˆx i,j < x i,j, then ˆµ i < µ i. 4. if ŷ j = y j and ˆµ i < µ i, then ˆx i,j < x i,j. Proof. Proof of part 1 : for i C j, we rewrite (3) as ( ) rj y j x i,j = (r j y j ) µ i 1. c j Therefore, ˆx i,j x i,j is equivalent to ( ) ( ) rj ŷ j rj y j (r j ŷ j ) ˆµ i 1 (r j y j ) µ i 1, c j c j which, since r j y j < r j ŷ j, is equivalent to ( ) ( ) rj ŷ j rj y j (r j ŷ j ) ˆµ i 1 < (r j ŷ j ) µ i 1, c j c j which is equivalent to r j ŷ j c j ˆµ i < r j y j c j µ i. Since r j y j < r j ŷ j, we can conclude that ˆµ i < µ i. The proofs of parts 2, 3, and 4 follow similarly. Lemma 11 For m and n in S, and i C m C n, if ŷ m > y m, ˆx i,m x i,m, and ŷ n y n, then ˆx i,n > x i,n. Proof. Assume the contrary, that is, n, m S and i C m C n such that ŷ m > y m, ˆx i,m x i,m, ŷ n y n and ˆx i,n x i,n. From Lemma 10.1, ŷ m > y m and ˆx i,m x i,m implies ˆµ i > µ i. However, from Lemma 10.2, ŷ n y n and ˆx i,n x i,n implies ˆµ i µ i, which is a contradiction. In the rest of the section, we shall make the following assumption on the vectors λ and ˆλ. Assumption 1 The vectors λ and ˆλ are such that C j = Ĉj, j S. From the above assumption, it follows that S i = Ŝi, i C. Lemma 12 For any j S:
20 19 1. ŷ j y j i C j ˆµ i i C j µ i. 2. ŷ j > y j i C j ˆµ i > i C j µ i. Proof. Proof of part 1: from (2) and (3), if i C j, then [ ] 1 x i,j µ i = c j + r j y j (r j y j ) 2. Thus, 1 y j µ i = n j c j + c j r j y j (r j y j ) 2. i C j Since N j = ˆN j (from Assumption 1), we can conclude that i C j µ i is an increasing function of y j. The proof of part 2 follows similarly. Lemma 13 If C m = C n then : 1. ŷ m y m ŷ n y n. 2. ŷ m > y m ŷ n > y n. Proof. Proof of part 1: from Lemma 12, ŷ m y m is equivalent to i S m ˆµ i i S m µ i, which, since C m = C n, is equivalent to i S n ˆµ i i S n µ i. Again, from Lemma 12, we can conclude that ŷ n y n. The proof of part 2 follows similarly. Corollary 3 For m, n S 1, ŷ m > y m ŷ n > y n. Proof. Since, for m, n S 1, C m = C n = {1, 2,..., K}, the above statement follows from Lemma Basic Transformation of a Rate Vector For each rate vector λ Λ, recall that by convention λ 1 = min i C λ i and λ K = max i C λ i. Define the sets C min and C max as follows: C min = {i C : λ i = λ 1 }, C max = {i C : λ i = λ K }, and let n min = C min and n max = C max.
21 20 Definition 1 For each rate vector λ Λ, define the function h λ : [0, n max λ K ] Λ as follows: ( ) 1 1 h λ (ǫ) = λ + ǫ e i e i, (18) n min n max i C min i C max where e i denotes the vector in IR K with the i-th component equals to 1 and all other components are equal to 0. A rate vector ˆλ Λ is said to be obtained from λ under a basic transformation if and only if there exists ǫ [0, n max λ K ] such that ˆλ = h λ (ǫ). In this case, ǫ is called the step of the transformation. Note that the above transformation increases the traffic of classes i C min (the classes with the smallest amount of traffic) and decrease correspondingly the traffic of classes i C max (the classes with the largest amount of traffic), i C λ i = i C ˆλ i = λ. There i.e., it preserves the total amount of traffic: are several other properties of the basic transformation which are worthwhile noticing. They are stated in the following lemma. Lemma 14 Let ˆλ be obtained from λ under a basic transformation, i.e., ˆλ = h λ (ǫ). Then, 1. ˆλ i λ i for all i C min, ˆλ i λ i for all i C max, and ˆλ i = λ i for all i C min C max, where the inequalities are strict if and only if C min C max and ǫ > ˆλ i = ˆλ 1 for all i C min and ˆλ i = ˆλ K for all i C max, 3. ˆλ i λ K for all i C min and ˆλ i λ 1 for all i C max for ǫ min(n min, n max )(λ K λ 1 ). 4. i C min ˆλi λ i = i C max ˆλi λ i, 5. j S y j = j S ŷj, Proof. In part 1, if either C min = C max or ǫ = 0, then ˆλ = λ. Hence, the equalities are satisfied. So, we consider the case when C min C max and ǫ > 0, and show that the inequalities are strict. From (18), it is immediate that ˆλ i = λ i for i C min C max. Moreover ˆλ i = λ i + ǫ ǫ n min for all i C min and ˆλ i = λ i n max for all i C max. Since ǫ > 0, we thus obtain ˆλ i > λ i for i C min and ˆλ i < λ i for i C max, and 1 is proved. We note that if C min = C max, then ˆλ = λ. Hence, the parts 2 to 5 are true in this case. So, for the rest of the proof, we assume that C min C max. From λ i = λ 1 for i C min and λ i = λ K for i C max, we obtain that ˆλ i = λ 1 + ǫ ˆλ 1 for i C min and ˆλ i = λ K + ǫ n max = ˆλ K for i C max, which proves 2. n min =
22 21 To prove 3, let us consider i C min. We observe that ǫ min(n min, n max )(λ K λ 1 ) implies that ˆλ i = λ i + ǫ n min λ i + min(nmin,nmax) n min (λ K λ 1 ) λ i +(λ K λ 1 ) = λ K. The proof of ˆλ i λ 1 for i C max is symmetric. To prove 4, we observe that, ǫ ˆλi λ i = = ǫ = n min i C min i C min i C max ǫ n max = i C max ˆλi λ i Finally, the proof of property 5 is immediate since it is equivalent to i C λ i = ˆλ i C i. In the following, we will compare two rate vectors λ and ˆλ. If z is a certain quantity related to the Nash equilibrium induced by the vector λ then we shall denote the corresponding quantity for vector ˆλ by ẑ. The comparison is done under the following assumption. Assumption 2 The rate vectors λ Λ and ˆλ Λ are such that: 1. ˆλ is obtained from λ under a basic transformation, 2. C j = Ĉj, j S. In other words, we assume that the transformation λ into ˆλ leaves unaffected the set of servers used by each class. The key point here is that in order to determine the impact of a basic transformation of the rate vector λ on the global cost, we need to compare the server loads under the equilibria x = N(λ) and ˆx = N(ˆλ). To this end, let us define the sets S + and S as follows: S + = {j S : ŷ j > y j } and S = S \ S +, i.e., S + is the set of servers whose load increases under the transformation while S is the set of servers whose load is non-increasing under the transformation. We first prove two lemmata concerning the sets S + and S. The first one shows that S + is empty if and only if the load of each and every server is constant under the transformation. Lemma 15 y j = ŷ j, j S S + =. Proof. If S + = then S = S. That is, ŷ j y j, j S. We also have j S ŷj = j S y j. This is possible only if ŷ j = y j, j S. The converse is true by definition of S +. The second lemma shows that S cannot be empty, i.e. that there is at least one server whose load is non-increasing under the transformation.
23 22 Lemma 16 S. Proof. Assume S =, then y j < ŷ j, j S. Therefore, j S y j < j S ŷj. This is in contradiction with Assumption 2 which says j S y j = j S ŷj. We now prove three fundamental propositions regarding the impact of the transformation on server loads. We first show in proposition 4 that if there exists at least one server whose load increases under the transformation, then the load of each and every server used by class 1 increases. We then prove in proposition 5 that the load of all servers is non-increasing under the transformation if and only if all traffic classes use the same set of servers. Finally, proposition 6 proves that the transformation induces a monotonic partition of servers: there exists a threshold J < S such that for all servers j > J the load is non-increasing under the transformation. Proposition 4 If S + then S 1 S +. Proof. Assume by contradiction that we can find a server s S 1 such that s S. Then, according to Corollary 3, S 1 S. Since S + and ŷ j > y j for all j S +, we have j S + ŷ j > j S + y j, i.e., i C j S + ˆx i,j > i C j S + x i,j from which we conclude that there exists i such that j S + ˆx i,j > j S + x i,j. Since S k = S 1 S for all k C min, we necessarily have i C min and thus ˆλ i λ i. Therefore, ˆλ i = j S ˆx i,j + j S + ˆx i,j j S x i,j +, j S + x i,j = λ i. Thus, ˆx i,j x i,j + x i,j j S j S j S + j S + ˆx i,j < j S x i,j. We therefore conclude that class i is such that j S ˆx + i,j > j S x + i,j and j S ˆx i,j < j S x i,j. Therefore, we can find a server m S + and a server n S such that ˆx i,m > x i,m and ˆx i,n < x i,n. But according to Lemma 11, this is impossible. We therefore conclude that S 1 S +. Proposition 5 S + = S 1 = S K.
24 23 Proof. We first prove that if S + = then S 1 = S K. From Lemma 15, this is equivalent to proving that if y j = ŷ j, j S then S 1 = S K. Assume the contrary, that is S 1 S K. Then, m : m S K, m / S 1. Since y m = ŷ m, from Lemma 12, we get i C m µ i = i C m ˆµ i, which we can rewrite as µ i + µ i = ˆµ i + ˆµ i. (19) i C max i C m\c max i C max i C m\c max We shall show that the above equality is not possible, which then proves the claim. For i C max, since λ i > ˆλ i, j S i x i,j > j S i ˆx i,j. Thus, there exists an n S i such that x i,n > ˆx i,n. Since y n = ŷ n, from Lemma 10.3, we can conclude that µ i > ˆµ i, and that i C max µ i > i C min ˆµ i, which, upon substitution in (19), leads to µ i < ˆµ i. i C m\c max i C m\c max If C m \C max =, then the above inequality cannot be possible which then proves the claim. So, assume C m \ C max. Then the above inequality implies that i / C min C max : µ i < ˆµ i. Since y j = ŷ j, j S i, application of Lemma 10.4 leads to x i,j < ˆx i,j, j S i, and consequently to λ i = j S i x i,j < j S i ˆx i,j = ˆλ i. However, for i / C min C max, from Lemma 14.1, λ i = ˆλ i. Hence, there is a contradiction, and we can conclude that S 1 = S K. As a direct consequence of the above proposition, we get the following corollary that tells us that if at equilibria x and ˆx all classes use the same set of servers, then the server loads are constant under the transformation. Corollary 4 y j = ŷ j, j S S 1 = S K. We now turn our attention to the set S and prove the following result. Proposition 6 For all j S, if j S then j + 1 S. Proof. If S + = then the proposition is true. So, assume S +. Then, from Proposition 4, S 1 S +. In order to prove the proposition, assume by contradiction that there exists a server j {S 1 + 1,...,S K 1} such that j S and j + 1 S +. Again, if S = S K then the proposition is true. So, assume that S < S K. Since j S and j + 1 S +, from Lemma 13, ˆµ i µ i, (20) i C j i C j
25 24 and i C j+1 ˆµ i > i C j+1 µ i, (21) Moreover, from the contrapositive of Lemma 13, we can conclude that C j \C j+1. Note that since j < S K, classes i C max do not belong to C j \C j+1. Similarly, since j > S 1, classes i C min do not belong to C j \ C j+1. Since C j+1 C j, we have, for all i C j+1, µ i = c j x i,j + c j r j y j (r j y j ) 2. Therefore, i C j+1 ˆµ i > i C j+1 µ i is equivalent to N j+1 c j c j + r j ŷ j (r j ŷ j ) 2 i C j+1 ˆx i,j > N j+1 c j c j + r j y j (r j y j ) 2 x i,j, i C j+1 and since ŷ j y j, this implies that i C j+1 ˆx i,j > i C j+1 x i,j. Since ŷ j y j, necessarily i C j\c j+1 ˆx i,j < i C j\c j+1 x i,j. However, since all classes k C min C max do not belong to C j \C j+1, we know that ˆλ i = λ i for all i C j \C j+1, and thus j j x i,l = ˆx i,l, l=1 i C j\c j+1 l=1 i C j \C j+1 from which we obtain x i,l = ˆx i,l + ˆx i,j l<j i C j\c j+1 l<j i C j\c j+1 i C j\c j+1 and therefore i C j \C j+1 x i,j, x i,l < ˆx i,l. (22) l<j i C j\c j+1 l<j i C j \C j+1 Substracting (21) from (20), we obtain Hence, for each server l < j, i C j\c j+1 ˆµ i < i C j\c j+1 µ i. c l c l c l c l (N j N j+1 ) + r l ŷ l (r l ŷ l ) 2 ˆx i,l < (N j N j+1 ) + r l y l (r l y l ) 2 x i,l. i C j \C j+1 i C j\c j+1
26 25 But, for l < j and l S +, it implies that i C j\c j+1 ˆx i,l < i C j\c j+1 x i,l, and thus l<j,l S + i C j\c j+1 ˆx i,l < l<j,l S + i C j\c j+1 x i,l. (23) From (22), we have l<j,l S i C j\c j+1 ˆx i,l > and using (23) it leads to l<j,l S l<j,l S x i,l + i C j\c j+1 i C j\c j+1 ˆx i,l > According to (21), for each server l < j, N j+1 c l c l + r l ŷ l (r l ŷ l ) 2 l<j,l S i C j+1 ˆx i,l > N j+1 l<j,l S + But, for l < j, l S, it implies that ˆx i,l > x i,l, i C j+1 i C j+1 i C j\c j+1 x i,l i C j\c j+1 x i,l. (24) c l c l + r l y l (r l y l ) 2 x i,l. i C j+1 ˆx i,l l<j,l S + i C j\c j+1, and thus l<j,l S i C j+1 ˆx i,l > l<j,l S i C j+1 x i,l (25) Now, summing (25) and (24) gives l<j,l S i C j ˆx i,l > l<j,l S i C j x i,l. (26) However, for each server l S, we have ŷ l y l and thus l<j,l S ŷ l y l. Since, for l < j, y l<j,l S l can also be written as y l = i C j x i,l + i C j x i,l, it yields l<j,l S i/ C j ˆx i,l l<j,l S x i,l + i/ C j l<j,l S i C j x i,l ˆx i,l l<j,l S i C j,
27 26 and using (26), l<j,l S i/ C j ˆx i,l < l<j,l S Therefore, there exists a class i / C j such that l<j,l S ˆx i,l < i/ C j x i,l. (27) l<j,l S x i,l. (28) It implies that, for this class i, we can find a server n / S i and n S such that ˆx i,n < x i,n. Since C max C j, we know that i C max. Moreover, since S k = S 1 S + for all k C min, i C min. We therefore have ˆλ i = λ i. Thus, ˆx i,l + ˆx i,l = x i,l + x i,l, l S l S + l S l S + which implies ( ˆx i,l = x i,l + x i,l l S + l S + l S l S ˆx i,l ), and with (28), it yields ˆx i,l > x i,l. l S + l S + This implies that there exists a server m < j, m S + such that ˆx i,m > x i,m. But, according to Lemma 11, there cannot be two servers m, n S such that ŷ m > y m, ŷ n y n, ˆx i,m > x i,m and ˆx i,n < x i,n. This is a contradiction. Therefore, if j S, then j + 1 S for all servers j S. Proposition 6 proves that the transformation induces a monotonic partition of servers: there exists a threshold J < S such that for all servers j > J the load is non-increasing under the transformation. Using the above results regarding the impact of the transformation on the server loads, the following two theorems compare the costs D(λ) and D(ˆλ). The first theorem uses the following lemma. Lemma 17 If b i, i = 1, 2,..., is such that 1. b 1 > 0, 2. b i 0 b i+1 0, and 3. i b i = 0,
28 27 and a i, i = 1, 2,..., is such that 1. a i a i+1, and 2. a I a I+1 > 0, where I = max{i : b i > 0}, then i a ib i > 0. Proof. We have a i b i = a i b i + a i b i i i I i>i a I b i + a i b i i I i>i a I b i a I+1 b i i I i>i (a I a I+1 ) i I > 0. b i We are now in position to state our main results. Theorem 4 D(λ) < D(ˆλ) S 1 S K. Proof. We first show that if S 1 S K then D(λ) < D(ˆλ). As a function of the loads, the global cost is given by c j r j D(λ) = r j y j j S j S c j. (29) Let y j = ŷ j y j. Note that y j > 0 (r j ŷ j ) 1 > (r j y j ) 1, which leads to y j 0 y j (r j ŷ j ) 1 > y j (r j y j ) 1. Thus, D(ˆλ) D(λ) = c j r j (ŷ j y j ) (r j ŷ j )(r j y j ) c j r j (r j y j ) 2 y j. (30) j S j S We now show that the RHS in the above inequality is positive. Since S 1 S K, from Proposition 4 and Lemma 16, we can infer that S + and S. From Proposition 4, we can also infer that S 1 S +. Hence, y 1 > 0. From Proposition 6, if j S then j + 1 S. Therefore, the sequence y j, j S is such that 1. y 1 > 0,
29 28 2. y j 0 y j+1 0, and 3. j S y j = 0. Let J = max{j : j S + }. Then, J + 1 = min{j : j S }. Note that C J C J+1, otherwise from Lemma 13, either both J and J + 1 belong to S + or both belong to S. From Lemma 9, we can conclude that c jr j (r j y j) 2 cj+1rj+1 (r j+1 y j+1) 2, j, and c Jr J (r J y J) 2 > cj+1rj+1 (r J+1 y J+1) 2. Since the sequences c j r j /((r j y j ) 2 and y j satisfy the conditions of Lemma 17, we have c j r j (r j y j ) 2 y j > 0, and hence, from (30), we can conclude that D(λ) < D(ˆλ). j To show the converse, if D(λ) < D(ˆλ) then necessarily there exists an m such that y m ŷ m. From Proposition 4, we obtain S 1 S K. Since S 1 S K, we can conclude that S 1 S K. Remark 3 If S 1 S K, we have shown that in order to prove D(λ) < D(ˆλ) it is sufficient to prove that c jr j j (r j y j) y 2 j > 0. It is remarkable that it amounts to prove that j D y j y j > 0. However, the above proof is not based on this variational argument and is valid whatever the value of 0 < ǫ n max λ K. Theorem 4 shows that if all the classes do not use the same set of servers at the equilibrium x, then the transformation will strictly increase the cost. The following theorem proves that the cost is constant under the transformation if all classes use the same set of servers. Theorem 5 D(λ) = D(ˆλ) S 1 = S K. Proof. From Lemma 16 and Proposition 4, if S 1 = S K then y j = ŷ j, j S and therefore, D(λ) = D(ˆλ). To prove the inverse, if S 1 S K then necessarily S 1 S K. From Theorem 4, we can conclude that D(λ) D(ˆλ). 5.3 Maximum Step of a Basic Transformation Theorems 4 and 5 enable the comparison of the equilibria induced by two different rate vectors λ and ˆλ, provided that ˆλ can be obtained from λ under a basic
30 29 transformation which leaves unaffected the set of servers used by each class. The main limitation of these results comes from the latter assumption. However, as will be shown below, the continuity of the Nash mapping can be exploited to prove that, under certain conditions, the global cost is non-decreasing under the transformation even if some classes change the set of servers they use. Definition 2 For each rate vector λ Λ, the maximum step of the transformation h λ is = min (n min min, n max max ), (31) ( ) where min = λ 1 +min λ K, min i C\C min λ i and max = λ K max( λ K, max i C\C max λ i ). Intuitively, if the step ǫ of a basic transformation is lower than the maximum step, then the sets C min and C max will be unaffected by the transformation. On the contrary, if ǫ =, then, after the transformation, we will have either (i) one more class in the set C min or C max, or (ii) λ = λ =. For each rate vector λ, let λ(ǫ) = h λ (ǫ) for ǫ [0, ]. All quantities of interest can be treated as functions of ǫ. Therefore, in the following, if z is a certain quantity related to the Nash equilibrium induced by the vector λ then we shall denote the corresponding quantity for vector λ(ǫ) by z(ǫ). We first prove the following properties of the transformation when ǫ. Lemma 18 For each ǫ, ( ) 1. λ i (ǫ) min λ K, min k C\C min λ k for all i C min, and the inequality is strict if ǫ < n min min whereas it holds as an equality if ǫ = = n min min, ( ) 2. λ i (ǫ) max λ K, max k C\C max λ k for all i C max, and the inequality is strict if ǫ < n max max, whereas it holds as an equality if ǫ = = n max max. Proof. For i C min, we have λ i (ǫ) = λ 1 + ǫ n min. Since ǫ n min min, it yields ( λ i (ǫ) λ 1 + min, i.e. λ i (ǫ) min λ K, min k C\C min λ k ), as claimed. Note that the inequality is strict if ǫ < n min min and that it holds as an equality if ǫ = n min min. The proof of property 2 is symmetric. The following two lemmata detail how the sets C min and C max evolve under the transformation.
31 30 Lemma 19 For each ǫ, 1. C min C min (ǫ) and C max C max (ǫ), 2. If ǫ < n min min, then C min = C min (ǫ), 3. If ǫ < n max max, then C max = C max (ǫ), 4. If ǫ = n min min and C min C, then C min C min (ǫ), 5. If ǫ = n max max and C max C, then C max C max (ǫ). Proof. We just prove the relations between C min and C min (ǫ), since the proofs of the relations between C max and C max (ǫ) are symmetric. We first prove assertion 1. Let i C min. From Lemma 18.1, we have λ i (ǫ) λ k for all k C \ C min. For k C min C max, Lemma 14.1 states that λ k (ǫ) = λ k, which implies that λ i (ǫ) λ k (ǫ) for all k C min C max. From Lemma 18.1, we also have λ i (ǫ) λ K λ k(ǫ) for all k C max, where the last inequality comes from Lemma We therefore conclude that λ i (ǫ) λ k (ǫ) for all k C \ C min. However, from Lemma 14.2, we have λ k (ǫ) = λ i (ǫ) = λ 1 (ǫ) for all k C min. We conclude that if i C min, then λ i (ǫ) λ k (ǫ) for all k C, and thus i C min (ǫ). This shows that C min C min (ǫ). Let us now prove assertion 2. Assume ǫ < n min min. Since C min C min (ǫ), we just need to prove that C min (ǫ) C min. It is sufficient to show that if k C min, then k C min (ǫ). Let k C \ C min. If k C max, then, according to Lemma 18.1, λ 1 (ǫ) < λ k = λ k (ǫ), whereas if k C max, λ 1 (ǫ) < λ K λ k(ǫ), also from Lemma 18. Since λ 1 (ǫ) = min i C λ i (ǫ), we conclude that k C min (ǫ), and thus that C min = C min (ǫ). We now prove assertion 4. From Lemma 18.1, we have either λ 1 (ǫ) = λ K or λ 1 (ǫ) = min k C\Cmin λ k. If λ 1 (ǫ) = λ K, then it clearly implies that λ i(ǫ) = λ K for all i C. However, since C min C, it implies that class K belongs to C min (ǫ) but not to C min. If λ 1 (ǫ) = min k C\Cmin λ k, we can find j C \ C min such that λ j λ K and λ j = min k C\Cmin λ k. From λ j λ K we deduce that j C max. Therefore from Lemma 14.1 we obtain λ j (ǫ) = λ j = λ 1 (ǫ). We conclude that class j belongs to C min (ǫ) but not to C min. Since in both cases we can find a class i C min (ǫ) such that i C min, we conclude that C min C min (ǫ). Lemma 20 The following statements hold.
32 31 1. If C min C max C, then C min C max C min ( ) C max ( ). 2. If C min C max = C, then λ( ) = λ =. Proof. We first prove assertion 1. Assume that C min C max C. We have either = n min min, or = n max max. According to Lemmata 19.4 and 19.5, if = n min min, then C min C min (ǫ), while if = n max max we have C max C max (ǫ). We therefore conclude that C min C max C min ( ) C max ( ). Now we prove assertion 2. We first note that if C min = C max = C, then λ = λ =, and thus λ( ) = λ =. So we consider the case C min C max. Since C\C min = C max, min = λ 1 +min ( λ/k, mini Cmax λ i ) = λ/k λ1. Similarly, max = λ K λ/k. Also, n min min = n min λ/k nmin λ 1 = (K n max ) λ/k ( λ n max λ K ) = n max max. Hence, n min min = n max max =. Now, i C min, λ i ( ) = λ 1 + /n min = λ/k. Similarly, i C max, λ i ( ) = λ/k. Hence, λ( ) = λ =. The following proposition states that if we consider two rate vectors obtained from λ under basic transformations of steps lower than the maximum step, then one can be obtained from the other by a basic transformation. Proposition 7 Let ǫ 1, ǫ 2 [0, ], ǫ 1 < ǫ 2. Then λ(ǫ 2 ) can be obtained from λ(ǫ 1 ) under a basic transformation. Proof. Since ǫ 1 < ǫ 2 implies ǫ 1 <, from Lemmata 19.2 and 19.3 we have C min (ǫ 1 ) = C min and C max (ǫ 1 ) = C max. Accordingly, λ(ǫ 2 ) can be written as λ(ǫ 2 ) = λ + ǫ 1 i C min e i n min +(ǫ 2 ǫ 1 ) i C min(ǫ 1) n min (ǫ 1 ) i C max e i n max e i i C max(ǫ 1) n max (ǫ 1 ) e i, i.e., λ(ǫ 2 ) = h λ(ǫ1)(ǫ 2 ǫ 1 ). We now show that even if some classes change the set of servers they use, the global cost is non-decreasing under the transformation λ(ǫ) = h λ (ǫ) provided that ǫ. The proof is based on the following theorem which is proved in [14] (Theorem 5, page 321), and closely parallels the discussion in section III.B of the above reference.
33 32 Theorem 6 (Theorem 5 in [14]) Let f : X IR, where X IR is a closed interval. Consider a family A = {A 1,..., A n } of closed subsets of X, such that (i) n i=1 A i = X, and (ii) for every A i A, we have : x, y A i and x < y f(x) < f(y). Then f is non-decreasing in X. The following theorem extends Theorems 4 and 5 to the case when the transformation changes the set of servers used by some classes. Theorem 7 For ǫ, D(λ(ǫ)) D(λ). Proof. Consider a rate vector λ and the transformation λ(ǫ) = h λ (ǫ) of this rate vector for ǫ [0, ]. We want to prove that D(λ(ǫ)) D(λ). Since all quantities of interest, and in particular the global cost, can be treated as functions of ǫ, it suffices to show that D is a nondecreasing function of ǫ on [0, ]. Let A i,j = {ǫ [0, ] : G i,j (ǫ) λ i (ǫ) G i,j+1 (ǫ)}, denote the set of ǫ [0, ] for which class i sends flow to servers {1,..., j} under equilibrium N(ǫ). From (13), one can see that G i,j is a continuous function of the r i,j, which in turn are continuous function of the equilibrium strategies of the other classes. The continuity of the Nash mapping then implies that G i,j is a continuous function of ǫ [0, ]. Continuity of the functions G i,j (ǫ) and λ i (ǫ) implies that A i,j is a closed set. For each S S K, define A S = i C A i,si, which is also a closed set. If ǫ 1, ǫ 2 A S, then each class sends its flow to the same set of servers under equilibria N(ǫ 1 ) and N(ǫ 2 ). Consider a vector S S K and assume that we can find ǫ 1, ǫ 2 A S such that ǫ 1 < ǫ 2, i.e. A S is neither empty nor reduced to an isolated point. According to Proposition 7, the vector λ(ǫ 2 ) can be obtained from λ(ǫ 1 ) under a basic transformation. Since ǫ 1, ǫ 2 A S, this transformation satisfies Assumption 1, and according to Theorems 4 and 5 we have either D(ǫ 2 ) > D(ǫ 1 ) or D(ǫ 2 ) = D(ǫ 1 ). We therefore conclude that if we can find ǫ 1, ǫ 2 A S such that ǫ 1 < ǫ 2, then D(ǫ 2 ) D(ǫ 1 ). Since [0, ] = S S KA S, all conditions of Theorem 6 are fullfilled, and we can conclude that D is a nondecreasing function of ǫ on [0, ]. 5.4 Maximum of the Global Cost The purpose of this section is to prove that the ( global cost ) achieves its maximum in the symmetric case, i.e., when λ = λ = = λ λ K,..., K. To this end, starting
34 33 from a fixed rate vector λ, we build a sequence that: λ 0 = λ, and ( λ k) of rate vectors such k IN λ k+1 is obtained from λ k under a basic transformation of maximum step, i.e., λ k+1 = h λ k( k ). The following proposition shows that the sequence λ = in a finite number of steps. Proposition 8 The sequence ( λ k) k IN converges to ( λ k) k IN converges to λ= in at most K steps. Proof. Let w k be the number of classes in Cmin k Ck max. Note that w0 2. According to Lemma 20.2, if w k = K, then λ k+1 = λ =. Otherwise, according to Lemma 20.1, we have Cmin k Ck max C k+1 min Ck+1 max, and thus w k < w k+1 K. This structure implies that in at most K steps we have w k = K, and thus λ k+1 = λ =. We now prove Theorem 1. ( Proof of Theorem 1. For each λ Λ, the sequence λ k) converges to λ= k IN in a finite number of steps. According to Theorem 7, we have D(λ k+1 ) D(λ k ). This implies that D(λ = ) D(λ). 6 Price of Anarchy According to Theorem 1, we have D K (λ,r,c) PoA(K) = sup λ,r,c D 1 ( λ,r,c) = sup D K (λ =,r,c) r,c D 1 ( λ,r,c). (32) Therefore, in order to analyze the PoA, we can focus on the symmetric case. We analyze the symmetric game in Section 6.1 and derive an explicit expression for the equilibrium flows. These results are then used in Section 6.2 to prove that the PoA is upper-bounded by the square root of the number of dispatchers. In Section 6.3 we prove the lower bound on the PoA by exhibiting an example for which the ratio DK(λ,r,c) D is K/(2 1( λ,r,c) K 1). Finally, in Section 6.4, we summarize our result on the PoA and discuss its consequences.
35 Analysis of the Symmetric Game It is well known that in this case the non-cooperative routing game is a potential game, i.e., the equilibrium flows are the global minima of a standard convex optimization problem (see e.g. Theorem 4.1 in [7]). This is formally stated in the following proposition. Proposition 9 If the vector y is global optimum of the following convex optimization problem, then [ ( )] c j y j rj minimize + (K 1) log y K r j y j r j y j s.t. j S j S y j = λ, 0 y j < r j, j S. then the multi-strategy x = (y/k,...,y/k) is a NEP of the symmetric game. Proof. The statement follows from Theorem 4.1 in [7]) with c a (x a ) = ca r a x a. Note that when K = 1, the above problem reduces to the global optimization problem solved by the centralized scheme, whereas when K, the above problem reduces to the problem stated in Proposition 4 of [1]. In the latter case, the equivalent problem states that the common function optimized jointly by an infinite number of players and is characteristic of the Wardrop equilibrium. In order to describe the solution of the above equivalent problem, let us define u j = c j /r j, j S, and u S+1 =. Note that, by definition, the sequence u j is increasing in j. Let us also define the function j W j (K, z) =½{z [u j,u j+1)} s=1 2r s (K 1) 2 +4Ku 1 s z (K 1) j r s + λ, and let W(K, z) = j S W j(k, z). The following lemma states some properties of the function W(K, z). s=1 Lemma 21 The function W(K, z) is such that: 1. for a fixed K, the function W : [u 1, ) R is continuous and decreasing in z, 2. for a fixed z, W(K, z) is decreasing in K, 3. for a fixed K, W(K, z) = 0 has a unique solution in the interval (u 1, ).
36 35 Proof. Let us first prove property 1. By definition W(k, x) = W j (K, x) in the interval [u j, u j+1 ). Since W j is continuous and decreasing in (u j, u j+1 ) so is W. To conclude the proof, we need to verify that W is continuous at u j, j = 2, 3,..., S. We have lim W(K, x) lim x u + j x u j W(K, x) = lim x u + j j = i=1 j 1 = 0, W j (K, x) lim x u j W j 1 (K, u j ) 2r i (K 1) 2 + 4Ku 1 i u j (K 1) i=1 2r i (K 1) 2 + 4Ku 1 i u j (K 1) which shows that the function W(K, x) is also continuous at the points u j, j = 2, 3,..., S. To prove property 2, it is sufficient to show that for K 1 < K 2, 1 > (K 1 1) 2 + 4K 1 u 1 i u j (K 1 1) 1. (K 2 1) 2 + 4K 2 u 1 i u j (K 2 1) It is thus sufficient to show that (K 2 1) 2 + 4K 2 u 1 i u j (K 2 1) > (K 1 1) 2 + 4K 1 u 1 i u j (K 1 1). We show below that, under a certain condition, the function j r i + λ i=1 (K 1) 2 + 4Ku 1 i (K 1) is increasing in K on assuming K to be real, and that this condition is satisfied. For this we show its derivative is positive, which is equivalent to showing (K 1) 2 + 4(u 1 i 1 2(K 1)+4u 1 i u j 2 (K 1) 2 +4Ku 1 Since u 1 i u j > 1 the above inequality holds. 1 > 0 i u j (K 1) + 2u 1 i u j > (K 1) 2 + 4Ku 1 i u j ) 2 + 4(K 1)u 1 i u j > (K 1) 2 + 4Ku 1 i u j 4(u 1 i u j ) 2 4u 1 i u j > 0. Finally, let us now prove property 3. First, we note that W(K, u 1 ) = λ and W(K, ) = r + λ which is negative (by assumption). Also according to property 1, W(K, x) is continuous and decreasing in the interval [u 1, ). Hence, there is a unique value of x for which W(K, x) = 0. In the following, we let γ(k) be the unique solution of W(K, x) = 0 in [u 1, ). u j r i + λ j 1 i=1 u j
37 36 The following proposition gives the solution of the symmetric game. Proposition 10 The subset of servers that are used at the NEP is S (K) = {1, 2,..., j (K)}, where j (K) is the greatest value of j such that W(K, u j+1 ) 0 < W(K, u j ). The equilibrium flows are x i,j = yj K, i C, j S (K), where the offered traffic of server j is given by y j = r j (K 1)2 + 4Kγ(K)r j /c j (K + 1) (K 1)2 + 4Kγ(K)r j /c j (K 1), (33) with γ(k) the unique root of W(K, z) = 0 in [u 1, ). Proof. Let y be an optimal solution of the equivalent problem stated in Proposition 9. According to the KKT conditions, there exist γ and ν j 0, j S such that for each j S, y j ν j = 0, (34) u j K φ j(φ j + K 1) = γ + ν j, (35) where φ j = r j /(r j y j ). Since ν j 0, we have from (35) that K u 1 j γ φ j (φ j + K 1), j S, (36) with equality if and only if y j > 0. Moreover, eliminating ν j from (34), we obtain the following complementary slackness condition y j [ φj (φ j + K 1) K u 1 j γ ] = 0, j S. (37) Let us now consider a server j. Let us first assume that u j < γ. In this case, a necessary condition for (36) to hold is φ j (φ j + K 1) > K, which implies φ j > 1 and hence y j > 0. We therefore obtain from (37) that φ 2 j + (K 1)φ j Ku 1 j γ = 0. The above equation has a single positive root given by φ j = 1 [ ] (K 1) Ku 1 j γ (K 1). We thus conclude that if u j < γ, then the load y j = r j (φ j 1)/φ j of the server j is given by (K 1) 2 + 4Ku 1 j γ (K + 1) y j = r j. (K 1) 2 + 4Ku 1 j γ (K 1) Let us now assume on the contrary that u j > γ. If y j > 0, then φ j > 1, which implies that φ j (φ j + K 1) > K. However, according to the complementary
38 37 slackness condition (37), the left hand side is just Ku 1 j γ, and we therefore obtain that γ > u j, i.e., a contradiction. As a consequence, if u j > γ, then y j = 0. Finally, we conclude from the above analysis that q (K 1) r 2 +4Ku 1 j γ (K+1) j q if u j < γ, (K 1) y j = 2 +4Ku 1 j γ (K 1) 0 otherwise. (38) Let j (K) be such that u j (K) < γ u j (K)+1. Then the subset of servers used at the Nash equilibrium is S (K) = {1,..., j (K)}. Using (38), we deduce from j S (K) y j = λ that j S (K) r j λ = k S (K) 2r k, (K 1) 2 + 4Ku 1 k γ (K 1) i.e., W(K, γ) = 0, which implies that γ = γ(k) according to Lemma Moreover, since for a fixed K the function W : [u 1, ) R is decreasing in z, we deduce from u j (K) < γ(k) u j (K)+1 that W(K, u j (K)+1) 0 < W(K, u j (K)). We now prove that the distributed scheme with K dispatchers uses only a subset of the servers used by the centralized scheme. The proof is based on the following proposition. Proposition 11 The function γ(k) is decreasing in K. Proof. For K 1 < K 2, we have 0 = W(K 1, γ(k 1 )) > W(K 2, γ(k 1 )), where the inequality follows from Lemma Using W(K 2, u 1 ) = λ > 0, and Lemma 21.3, we can conclude that u 1 < γ(k 2 ) < γ(k 1 ). The fact that γ(k) is decreasing in K implies that j (K) is non-increasing in K. We therefore have the following important corollary. Corollary 5 For K 1, S (K + 1) S (K). As an immediate consequence, we can conclude that S (K) S (1), i.e., the distributed scheme with K dispatchers uses only a subset of the servers used by the centralized scheme.
39 Upper Bound on the PoA In order to distinguish between the offered traffic in server j for different values of K, we denote by y j (K) the offered traffic in equilibrium in the K player symmetric game, where y j (K) is given by (33). The following lemma gives a bound on the mean number of jobs in a server in the decentralized case in terms of the mean number of jobs in the same server in the centralized case. Lemma 22 y j (K) r j y j (K) K y j(1) r j y j (1), j S (1). (39) Proof. From Corollary 5, we have S (K) S (1). For j S (1) \ S (K), ρ j (K) = 0. Hence (39) holds. It now remains to be shown that (39) holds for every j S (K). From (33), y j (K) = r j (K 1)2 + 4Kγ(K)r j /c j (K + 1) (K 1)2 + 4Kγ(K)r j /c j (K 1), (40) from which it follows that and that 1 y j(k) 2 = r j (K 1)2 + 4Kγ(K)r j /c j (K 1), (41) y j (K) (K r j y j (K) = 1)2 + 4Kγ(K)r j /c j (K + 1). (42) 2 We shall now use the fact that y j (K)/(r j y j (K)) is increasing in γ(k). Since
40 39 γ(k) γ(1), from (42), y j (K) r j y j (K) = (K 1)2 + 4Kγ(1)r j /c j (K + 1) 2 (K 1)2 + 4Kγ(1)r j /c j (K + 1) (K 1)2 + 4Kγ(1)r j /c j + (K + 1) 2 (K 1)2 + 4Kγ(1)r j /c j + (K + 1) = 4Kγ(1)r j/c j 4K 2 1 (K 1)2 + 4Kγ(1)r j /c j + (K + 1) γ(1)r j /c j 1 = 2K (K 1)2 + 4Kγ(1)r j /c j + (K + 1) γ(1)r j /c j 1 2K 4Kγ(1)rj /c j + (K + 1) γ(1)r j /c j 1 2K 4Kγ(1)rj /c j + 2 K (since K 1 0) (since K K) From (42), = K γ(1)r j/c j 1 γ(1)rj /c j + 1 = ( ) K γ(1)r j /c j 1. (43) y j (1) r j y j (1) = 4γ(1)rj /c j 2 = γ(1)r j /c j 1, (44) 2 which upon substitution in (43) gives y j (K) r j y j (K) K y j(1) r j y j (1), j S (K). (45) The above lemma leads to the following upper bound on PoA(K). Proposition 12 PoA(K) K. Proof. Since S (K) S (1), D K (λ =,r,c) = j S (K) j S (1) c j c j y j (K) r j y j (K) y j (K) r j y j (K).
41 40 which, on substituting from Lemma 22, gives D K (λ =,r,c) D 1 ( λ,r,c) K. Since this bound in independent of r and c, we can conclude that PoA(K) K. 6.3 Lower Bound on the PoA We now give an example which shows that the PoA is bounded below by K/(2 K 1). Proposition 13 PoA(K) K 2 K 1. Proof. To prove this statement, we give a particular choice of the r and c for, independently of the number of servers S 2. It which DK(λ,r,c) D 1( λ,r,c) = K 2 K 1 follows closely the example in Theorem 5 in [1]. We take c j = r j = 1, for j > 1. Using Proposition 3, one can verify that if (r 1 λ) 2 r 1 < c 1 < (r 1 λ) 2 r 1 λ + 1 K λ (46) then the centralized scheme will use all servers whereas, at the NEP, the distributed scheme with K dispatchers will only use the first server. In order to ensure that (46) is always satisfied we set c 1 = (r 1 λ) 2 α(r 1 ) for α(r 1 ) such that ( r1 1 < α(r 1 ) < r 1 λ + λ K with the assumption that c j /r j are non-decreasing in j. ) 1. Note that c 1 r 1 < 1 = c2 r 2, which is in agreement For K 2, since all the classes use only the first server, For K = 1, λ D K (λ =,r,c) = c 1 r 1 λ = λα(r 1 )(r 1 λ). (47) D 1 ( λ,r,c) = j S (1) c j y j (1) r j y j (1). which, upon substituting from (42), gives D 1 ( λ,r,c) = ) c j (γ(1)r j /c j 1 = j S (1) j S (1) ( γ(1) cj r j c j ). (48)
42 41 Since the centralized scheme uses all the S servers, from Proposition 10, γ(1) is such that S r S j rj /c j γ(1) r j + λ = 0, j=1 which upon substitution in (48) gives Since c 2 = r 2 = 1, we obtain j=1 D 1 ( λ,r,c) = ( S j=1 cj r j ) 2 S S j=1 r j λ c j. D 1 ( λ,r,c) = ( c 1 r 1 + S 1) 2 r 1 λ + S 1 (c 1 + S 1) j=1 = (S 1)(2 c 1 r 1 (r 1 λ)) c 1 (S 1 λ) r 1 λ + S 1 = (S 1)(r λ)(2 r 1 α(r 1 ) 1) (r λ) 2 α(r 1 )(S 1 λ) r 1 λ + S 1 From the above equation and (47), D K (λ =,r,c) D 1 ( λ,r,c) Taking the limit as r 1 λ, = λα(r 1 ) (S 1)(2 r 1α(r 1) 1) (r λ)α(r 1)(S 1 λ) r 1 λ+s 1. D K (λ =,r,c) D 1 ( λ,r,c) = λα( λ) 2 ( λα( λ) ) 1/2 1. Note that the RHS in the above equation is increasing in λα( λ), and that λα( λ) has to be chosen in the interval (1, K). Choosing the larger value, we obtain D K (λ =,r,c) D 1 ( λ,r,c) which proves the inequality (13). = K 2 K 1, 6.4 Discussion on the PoA We first give the proof of Theorem 2. Proof of Theorem 2. From Propositions 12 and 13 we can conclude that K 2 K 1 PoA(K) K.
43 42 We first note that the bounds on the PoA are valid for all values of K and not just asymptotically. From these bounds, we can infer that the PoA grows as K as K grows to infinity. Thus, the PoA can be made arbitrarily large in the limit K, which is an alternative proof of Theorem 5 in [1] for the Wardrop equilibrium. In the other extreme case of K = 1, the bounds lead to PoA(1) = 1, which is consistent with the fact that the case K = 1 corresponds to the centralized setting. We also observe that the PoA is independent of the number of servers the bounds are valid as long as there are at least two servers. This result is in contrast to the corresponding one for the case when server costs are equal, for which the PoA was shown to be bounded by the number of servers ([12], [21]) in the non-atomic game. Thus, we infer that the inclusion of unequal server costs has a non-negligible impact on the PoA in the sense that, even in a system with two servers, the PoA can be of the order of K. 7 Conclusions and future work We investigated the performance of non-cooperative load-balancing in processorsharing server-farms. We have first shown that the worst global performance is obtained when all K dispatchers route exactly the same amount of traffic. This result implies that the analysis of the PoA can be done by focusing on the symmetric case, and therefore using the potential function method. We have then proved that, for a system with two or more servers, the PoA is lower bounded by K/(2 K 1) and upper bounded by K, independently of the number of servers. We believe that this methodology can be generalized to other network topologies than the parallel link scenario considered in this paper. We therefore plan to investigate under which conditions the symmetry of traffic demands leads to a maximum global cost for general network topologies. References [1] E. Altman, U. Ayesta, and B. J. Prabhu. Load balancing in processor sharing systems. To appear in Telecommunication Systems, [2] C. H. Bell and S. Stidham. Individual versus social optimization in the allocation of customers to alternative servers. Management Science, 29: , [3] S. C. Borst. Optimal probabilistic allocation of customer types to servers. In Proceedings of ACM SIGMETRICS, pages , Sept
44 43 [4] V. Cardellini, E. Casalicchio, M. Colajanni, and P. S. Yu. The state of the art in locally distributed web-server systems. ACM Computing Surveys, 34(2): , [5] H. L. Chen, J. Marden, and A. Wierman. The effect of local scheduling in load balancing designs. In Proceedings of IEEE Infocom, [6] Y.-C. Chow and W. H. Kohler. Models for dynamic load balancing in a heterogeneous multiple processor system. IEEE Transactions on Computers, 28(5): , [7] R. Cominetti, J. R. Correa, and N. E. Stier-Moses. The impact of oligopolistic competition in networks. Operations Research, Published online in Articles in Advance, DOI: /opre , June [8] A. Czumaj, P. Krysta, and B. Vocking. Selfish traffic allocation for server farms. In Proceedings of STOC, [9] S. El-Zoghdy, H. Kameda, and J. Li. Comparison of dynamic vs. static load-balancing policies in a mainframe-personal computer network model. Information, 5(4): , [10] H. Feng, V. Misra, and D. Rubenstein. Optimal state-free, size-aware dispatching for heterogeneous M/G/-type systems. Performance Evaluation, 62(1 4):36 39, [11] V. Gupta, M. Harchol-Balter, K. Sigman, and W. Whitt. Analysis of jointhe-shortest-queue routing for web server farms. In Proceedings of Performance, [12] M. Haviv and T. Roughgarden. The price of anarchy in an exponential multi-server. Operations Research Letters, 35: , [13] H. Kameda, J. Li, C. Kim, and Y. Zhang. Optimal load balancing in distributed computer systems. Springer-Verlag, [14] Y. Korilis, A. Lazar, and A. Orda. Capacity allocation under noncooperative routing. IEEE Transactions on Automatic Control, 42(3): , March [15] E. Koutsoupias and C. H. Papadimitriou. Worst-case equilibria. In STACS 1999, [16] D. Monderer and L. S. Shapley. Potential games. Games and Econ. Behavior, 14: , [17] L. M. Ni and K. Hwang. Optimal load balancing in a multiple processor with many job classes. IEEE Trans. Software Eng., 11(5): , 1985.
45 44 [18] A. Orda, R. Rom, and N. Shimkin. Competitive routing in multi-user communication networks. IEEE/ACM Transactions on Networking, 1: , October [19] J. Rosen. Existence and uniqueness of equilibrium points for concave n- person games. Econometrica, 33: , july [20] B. Shirazi, A. Hurson, and K. Kavi. Scheduling and load-balancing in parallel and distributed systems. Silver Spring, MD: IEEE Computer Society Press, [21] T. Wu and D. Starobinski. A comparative analysis of server selection in content replication networks. IEEE/ACM Trans. Netw., 16(6): , 2008.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
Minkowski Sum of Polytopes Defined by Their Vertices
Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
OPRE 6201 : 2. Simplex Method
OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
Pareto Efficiency and Approximate Pareto Efficiency in Routing and Load Balancing Games
Pareto Efficiency and Approximate Pareto Efficiency in Routing and Load Balancing Games Yonatan Aumann Yair Dombb Abstract We analyze the Pareto efficiency, or inefficiency, of solutions to routing games
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,
The truck scheduling problem at cross-docking terminals
The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking
Optimization results for a generalized coupon collector problem
Optimization results for a generalized coupon collector problem Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers, Bruno Sericola To cite this version: Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers,
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
Alok Gupta. Dmitry Zhdanov
RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University
CPC/CPA Hybrid Bidding in a Second Price Auction
CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets
Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that
Capacity Management and Equilibrium for Proportional QoS
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Capacity Management and Equilibrium for Proportional QoS Ishai Menache and Nahum Shimkin, Senior Member, IEEE Abstract Differentiated services architectures are scalable
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
20 Selfish Load Balancing
20 Selfish Load Balancing Berthold Vöcking Abstract Suppose that a set of weighted tasks shall be assigned to a set of machines with possibly different speeds such that the load is distributed evenly among
A Game-Theoretic Model and Algorithm for Load Balancing in Distributed Systems
In Proc of the 6th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2002, Workshop on Advances in Parallel and Distributed Computational Models (APDCM 02, April 5, 2002, Fort Lauderdale,
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders
Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Evangelos Markakis Orestis Telelis Abstract We study formally two simple discrete bidding strategies in the context
Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand
Notes V General Equilibrium: Positive Theory In this lecture we go on considering a general equilibrium model of a private ownership economy. In contrast to the Notes IV, we focus on positive issues such
SOLUTIONS TO ASSIGNMENT 1 MATH 576
SOLUTIONS TO ASSIGNMENT 1 MATH 576 SOLUTIONS BY OLIVIER MARTIN 13 #5. Let T be the topology generated by A on X. We want to show T = J B J where B is the set of all topologies J on X with A J. This amounts
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
Working Paper Series
RGEA Universidade de Vigo http://webs.uvigo.es/rgea Working Paper Series A Market Game Approach to Differential Information Economies Guadalupe Fugarolas, Carlos Hervés-Beloso, Emma Moreno- García and
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Hydrodynamic Limits of Randomized Load Balancing Networks
Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
THE SCHEDULING OF MAINTENANCE SERVICE
THE SCHEDULING OF MAINTENANCE SERVICE Shoshana Anily Celia A. Glass Refael Hassin Abstract We study a discrete problem of scheduling activities of several types under the constraint that at most a single
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
An update on acoustics designs for HVAC (Engineering)
An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,
Ideal Class Group and Units
Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals
ALMOST COMMON PRIORS 1. INTRODUCTION
ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
The Max-Distance Network Creation Game on General Host Graphs
The Max-Distance Network Creation Game on General Host Graphs 13 Luglio 2012 Introduction Network Creation Games are games that model the formation of large-scale networks governed by autonomous agents.
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
Convex analysis and profit/cost/support functions
CALIFORNIA INSTITUTE OF TECHNOLOGY Division of the Humanities and Social Sciences Convex analysis and profit/cost/support functions KC Border October 2004 Revised January 2009 Let A be a subset of R m
Nonparametric adaptive age replacement with a one-cycle criterion
Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: [email protected]
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.
Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S
No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri
Scheduling Real-time Tasks: Algorithms and Complexity
Scheduling Real-time Tasks: Algorithms and Complexity Sanjoy Baruah The University of North Carolina at Chapel Hill Email: [email protected] Joël Goossens Université Libre de Bruxelles Email: [email protected]
4.6 Linear Programming duality
4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
A Cournot-Nash Bertrand Game Theory Model of a Service-Oriented Internet with Price and Quality Competition Among Network Transport Providers
of a Service-Oriented Internet with Price and Quality Competition Among Network Transport Providers Anna Nagurney 1 Tilman Wolf 2 1 Isenberg School of Management University of Massachusetts Amherst, Massachusetts
Distributed network topology reconstruction in presence of anonymous nodes
Distributed network topology reconstruction in presence of anonymous nodes Thi-Minh Dung Tran, Alain Y Kibangou To cite this version: Thi-Minh Dung Tran, Alain Y Kibangou Distributed network topology reconstruction
Stiffie's On Line Scheduling Algorithm
A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
Aligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete
Game Theory: Supermodular Games 1
Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution
R&D cooperation with unit-elastic demand
R&D cooperation with unit-elastic demand Georg Götz This draft: September 005. Abstract: This paper shows that R&D cooperation leads to the monopoly outcome in terms of price and quantity if demand is
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
A Simple Model of Price Dispersion *
Federal Reserve Bank of Dallas Globalization and Monetary Policy Institute Working Paper No. 112 http://www.dallasfed.org/assets/documents/institute/wpapers/2012/0112.pdf A Simple Model of Price Dispersion
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1 J. Zhang Institute of Applied Mathematics, Chongqing University of Posts and Telecommunications, Chongqing
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
Metric Spaces. Chapter 7. 7.1. Metrics
Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some
MOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao [email protected]
Integer Polynomials June 9, 007 Yufei Zhao [email protected] We will use Z[x] to denote the ring of polynomials with integer coefficients. We begin by summarizing some of the common approaches used in dealing
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d).
1. Line Search Methods Let f : R n R be given and suppose that x c is our current best estimate of a solution to P min x R nf(x). A standard method for improving the estimate x c is to choose a direction
3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,
Load balancing of temporary tasks in the l p norm
Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The
Computational Game Theory and Clustering
Computational Game Theory and Clustering Martin Hoefer [email protected] 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion Computational
Walrasian Demand. u(x) where B(p, w) = {x R n + : p x w}.
Walrasian Demand Econ 2100 Fall 2015 Lecture 5, September 16 Outline 1 Walrasian Demand 2 Properties of Walrasian Demand 3 An Optimization Recipe 4 First and Second Order Conditions Definition Walrasian
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
The Relative Worst Order Ratio for On-Line Algorithms
The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, [email protected]
CONTRIBUTIONS TO ZERO SUM PROBLEMS
CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg
Dynamic Multi-User Load Balancing in Distributed Systems
Dynamic Multi-User Load Balancing in Distributed Systems Satish Penmatsa and Anthony T. Chronopoulos The University of Texas at San Antonio Dept. of Computer Science One UTSA Circle, San Antonio, Texas
An example of a computable
An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept
Analysis of Load Balancing in Large Heterogeneous Processor Sharing Systems
Analysis of Load Balancing in Large Heterogeneous Processor Sharing Systems Arpan MUKHOPADHYAY 1 and Ravi R. MAZUMDAR 2 1 Department of Electrical and Computer Engineering, University of Waterloo, Waterloo,
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
LOOKING FOR A GOOD TIME TO BET
LOOKING FOR A GOOD TIME TO BET LAURENT SERLET Abstract. Suppose that the cards of a well shuffled deck of cards are turned up one after another. At any time-but once only- you may bet that the next card
Duality of linear conic problems
Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least
BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
Optimal shift scheduling with a global service level constraint
Optimal shift scheduling with a global service level constraint Ger Koole & Erik van der Sluis Vrije Universiteit Division of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The
