The Online Freeze-tag Problem



Similar documents
Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

A Modified Measure of Covert Network Performance

X How to Schedule a Cascade in an Arbitrary Graph

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

1 Gambler s Ruin Problem

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks

The Magnus-Derek Game

The Freeze-Tag Problem: How to Wake Up a Swarm of Robots

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

Computational Finance The Martingale Measure and Pricing of Derivatives

Automatic Search for Correlated Alarms

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Storage Basics Architecting the Storage Supplemental Handout

Stat 134 Fall 2011: Gambler s ruin

United Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

POISSON PROCESSES. Chapter Introduction Arrival processes

Concurrent Program Synthesis Based on Supervisory Control

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Computing the Most Probable String with a Probabilistic Finite State Machine

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Jena Research Papers in Business and Economics

Load Balancing Mechanism in Agent-based Grid

Web Application Scalability: A Model-Based Approach

The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree

C-Bus Voltage Calculation

An important observation in supply chain management, known as the bullwhip effect,

Large firms and heterogeneity: the structure of trade and industry under oligopoly

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

THE WELFARE IMPLICATIONS OF COSTLY MONITORING IN THE CREDIT MARKET: A NOTE

Assignment 9; Due Friday, March 17

Moving Objects Tracking in Video by Graph Cuts and Parameter Motion Model

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products

On Software Piracy when Piracy is Costly

Risk in Revenue Management and Dynamic Pricing

Factoring Variations in Natural Images with Deep Gaussian Mixture Models

Coin ToGa: A Coin-Tossing Game

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Provable Ownership of File in De-duplication Cloud Storage

IEEM 101: Inventory control

Offline sorting buffers on Line

LOAD BALANCING USING ANT COLONY IN CLOUD COMPUTING

ERDŐS SZEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II

Comparing Dissimilarity Measures for Symbolic Data Analysis

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: (2015) ISSN:

Machine Learning with Operational Costs

SECTION 6: FIBER BUNDLES

Asymmetric Information, Transaction Cost, and. Externalities in Competitive Insurance Markets *

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Stochastic Derivation of an Integral Equation for Probability Generating Functions

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Efficient Training of Kalman Algorithm for MIMO Channel Tracking

PRIME NUMBERS AND THE RIEMANN HYPOTHESIS

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Characterizing and Modeling Network Traffic Variability

Project Management and. Scheduling CHAPTER CONTENTS

Software Cognitive Complexity Measure Based on Scope of Variables

The Economics of the Cloud: Price Competition and Congestion

Minimizing the Communication Cost for Continuous Skyline Maintenance

Effect Sizes Based on Means

Joint Production and Financing Decisions: Modeling and Analysis

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Title: Stochastic models of resource allocation for services

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

17609: Continuous Data Protection Transforms the Game

Precalculus Prerequisites a.k.a. Chapter 0. August 16, 2013

Completion Time Scheduling and the WSRPT Algorithm

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Learning Human Behavior from Analyzing Activities in Virtual Environments

Module 5. Three-phase AC Circuits. Version 2 EE IIT, Kharagpur

Rummage Web Server Tuning Evaluation through Benchmark

An Introduction to Risk Parity Hossein Kazemi

TRANSCENDENTAL NUMBERS

Multiperiod Portfolio Optimization with General Transaction Costs

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

Ant Colony Optimization for the Traveling Salesman Problem Based on Ants with Memory

A o(n)-competitive Deterministic Algorithm for Online Matching on a Line

The Economics of the Cloud: Price Competition and Congestion

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

Optional Strain-Rate Forms for the Johnson Cook Constitutive Model and the Role of the Parameter Epsilon_0 1 AUTHOR

Alpha Channel Estimation in High Resolution Images and Image Sequences

Improved Symmetric Lists


Competitive Analysis of On line Randomized Call Control in Cellular Networks

Principles of Hydrology. Hydrograph components include rising limb, recession limb, peak, direct runoff, and baseflow.

Large Sample Theory. Consider a sequence of random variables Z 1, Z 2,..., Z n. Convergence in probability: Z n

Transcription:

The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University, SE-05 06 Malmö, Sweden Bengt.Nilsson@ts.mah.se, mia@cs.lth.se Abstract. We consider the following roblem from swarm robotics: given one or more awake robots in some metric sace M, wake u a set of aslee robots. A robot awakens a sleeing robot by moving to the sleeing robot s osition. When a robot awakens, it is available to assist in awakening other slumbering robots. We investigate offline and online versions of this roblem and give a -cometitive strategy and a lower bound of in the case when M is discrete and the objective is to minimize the total movement cost. We also study the case when M is continuous and show a lower bound of 7/3 when the objective is to minimize the time when the last robot awakens. Introduction The Freeze-tag roblem has received some attention recently [,, 7]: given a set of n robots located at oints in some metric sace. Initially, there is one or more awake or active robots and the other robots are aslee, i.e., in a stand-by mode. The objective is for the active robots to awaken the sleeing ones. An active robot is able to awaken a sleeing robot just by touching it. Once awake, this new robot is available to assist in awakening other sleeing robots. This roblem was dubbed the Freeze-tag roblem by the authors of [,,7]. In this aer, we consider online versions of this roblem where the sleeing robots, also denoted as requests, occur in an online fashion, i.e., neither the total number of requests nor their exact location in sace are known in advance. Therefore, decisions, i.e., which robots to move in order to wake u sleeing robots, has to be made without any knowledge about future requests. We consider the following two online roblems. The online ste deendent Freeze-tag roblem (online SDFT(k) for short) has k awake robots from the start and a request is released only when the revious request has been activated or served and the objective is to minimize the total distance travelled by all the robots. The online time deendent Freeze-tag roblem (online TDFT for short), closely models the Freeze-tag roblem defined in [] but in an online setting. The requests are released indeendently of how many of them have already been served and our objective is to minimize the makesan. The Freeze-tag roblem has many alications such as data distribution, network design, broadcasting, routing and scheduling []. Another feature is

that SDFT(k) and TDFT exhibit some elements of the k-server roblem and the Traveling Salesman Problem, resectively. In the well studied k-server roblem (see e.g. [4,5]) one aims to online serve a set of requests, ositioned on oints in some metric sace M, by k mobile servers and simultaneously minimize the total movement cost. Here a request is a oint in M and the servers are located on oints of M. A request r is said to be served if one of the servers lies on r. Manasse et al.[5] have shown that k is a lower bound on the cometitive ratio of any deterministic k-server algorithm in any metric sace with at least k + oints, whereas the work function algorithm for the k-server roblem has been shown to have a cometitive ratio of at most (k )[4]. The online ste deendent Freeze-tag roblem closely models the online k-server roblem but with the difference that now the number of servers, i.e., active robots, is not constant; a new server aears for each served request. In this aer, we rovide a -cometitive online algorithm for this variant of the k-server roblem. The online time deendent Freeze-tag roblem can be viewed as a arallel online version of the Traveling Salesman Problem, in which the cities of the TSP instance corresond to the aslee robots initial locations in time deendent Freeze-tag, and the objective is to visit all cities as raidly as ossible. Furthermore, in TDFT there are many salesmen working in arallel since whenever a salesman visit a city, he recruits a new salesman to hel visit other cities. The time deendent Freeze-tag roblem was first introduced by Arkin et al.[]. They showed that in the offline case, minimizing the time when the last robot awakens, even simle versions of the roblem (e.g. in star metrics) are NP-comlete and they rovide a PTAS for geometric instances on a set of oints in any constant dimension. Sztainberg et al.[7] further investigate offline Freeze-tag and rove that the greedy strategy gives a tight aroximation bound for the case of oints in the lane and that greedy yields a Θ((log n) /δ )-aroximation for n oints in R δ. Arkin et al.[] recently rove the NP-hardness and resent an O()-aroximation for offline Freeze-tag in unweighted grahs, in which there is one aslee robot at each node. They further generalize to the case when there are multile robots at each node and edges are unweighted and they obtain a Θ( log n)-aroximation. In the case of weighted edges for this roblem, they rovide an O((L/d)log n + )-aroximation, where L is the edge of heaviest weight and d is the diameter of the grah.. Our Results In this aer we show that offline SDFT(k) can be solved in olynomial time for all ossible values of the arameter k. We further give a -cometitive algorithm in the online case and also rove a lower bound of on the cometitive ratio for all k. For online TDFT we rove a lower bound of 7/3 on the cometitive ratio. Our aer is organized as follows. In section we give some basic definitions and also formally define the different variants of the Freeze-tag roblems. In section 3 we consider the offline version of SDFT(k) and rove that this roblem can be solved in olynomial time. In section 4 we resent a strategy yielding a cometitive ratio of for online SDFT(k) and then we further rove that this is

in fact otimal. In section 5 we rove a lower bound of 7/3 on the cometitive ratio for the TDFT roblem. Preliminaries We begin with some notation and basic definitions. Given a metric sace M, the robots are reresented as oints in M. A robot can be in two different states, the awake state and the aslee state. We also call sleeing robots requests and say that a request is served when a sleeing robot is awakened by an active robot. An active robot is also denoted as a server. The release time of robot r secifies the first oint in time when r can be awakened and also the first oint in time when the awake robots become aware of r. The formal definition of the roblems is as follows. Definition. In the online Ste Deendent Freeze-tag roblem, (SDFT(k) for short), one is given a set of k initially awake robots located on oints in some discrete metric sace M and the objective is to serve all requests in such a way that the total movement cost is minimized. A new request is released only when the revious request has been served. In the online Time Deendent Freeze-tag roblem, (TDFT for short), one is given one initially awake robot, located on a oint in some continuous metric sace L and the objective is to serve all requests in such a way that the makesan, i.e., the time when the last robot is awakened, is minimized. An awake robot can move with at most unit seed and associated to each robot is a release time. Note that in the TDFT roblem a moving robot is allowed to reconsider its choice, i.e., aborting its motion when a new request occur. This is not ossible in the SDFT(k) roblem since a new request is released only when the revious request has been served. The erformance of deterministic online algorithms is measured in comarison with the otimal offline algorithm, denoted by OPT, using the standard cometitive ratio, see e.g. [3]. It is assumed that OPT knows the entire inut sequence, i.e., the total number of requests and their locations in M, and can hence achieve a lower cost. Furthermore, an online algorithm A is c-cometitive for a constant c, if for all inut sequences σ, the following holds: A(σ) copt(σ). The infimum of all such values c over all request sequences σ is called the cometitive ratio of A. The inut to an online algorithm is constructed by an adversary. For deterministic online algorithms, a cruel adversary knows exactly what the online algorithm s resonse will be to each inut element and this adversary ays the otimal offline cost. A different kind of adversary is the adative-online adversary, who must serve each request it generates before the randomized online algorithm serves the request and this adversary knows its own strategy for generating requests as well as the descrition of the online algorithm and all its action taken thus far (see e.g. [3] for a more comrehensive survey on adversaries). We refer to an algorithm A as being lazy if () A moves its robot along the shortest ath to a sleeing robot and () A moves only one robot in order to serve a request.

The following lemma roves that any non-lazy online algorithm for SDFT(k) can be relaced by a lazy online algorithm without increasing the algorithms total movement cost. Lemma. Any online algorithm for the SDFT(k) roblem can be relaced by a lazy online algorithm without increasing the total ath travelled by the robots. Proof. Consider a feasible solution, i.e., a sequence σ = (r,..., r n ) of serving robots, generated by a non-lazy algorithm A for SDFT(k). We show how to construct a new feasible solution by relacing all non-lazy movements by lazy movements without increasing the total distance travelled by the robots. The construction goes as follows. First, let us assume that A moves robot r i σ in order to wake u the sleeing robot r(j) and furthermore, assume that A makes its first non-lazy movement in this ste, denoted as the j:th ste. This non-lazy movement is clearly (at least) one of the following kind: () A does not move along the shortest ath to serve r(j), or () A moves more than one robot to serve r(j). Now relace this non-lazy movement by a lazy movement by moving only r i along the shortest ath to robot r(j) and no further. It is clear that this relacement will not increase the total distance travelled by the robots u to ste j. Reeat this rocess of exchanging non-lazy moves by lazy ones until all moves are lazy, using the same serving robot sequence, i.e., σ, as A. Since we only consider discrete metric saces, the exchange of non-lazy moves to lazy ones will never result in a loss of cost. 3 Offline Ste Deendent Freeze-tag In this section we consider the offline version of SDFT(k) and we show that this roblem has a olynomial time solution by reducing it to maximum cardinality minimum weight matching on biartite grahs, which is known to have olynomial time algorithms (see e.g. [6]). We reduce SDFT(k) to maximum cardinality minimum weight matching on biartite grahs. Let R = (r,..., r n ) be a set of n requests where r j denotes the j:th request in the sequence, where j goes from to n. Let S 0 = (s 0,...,s 0k ) be a set of k initially awake robots. We further define two new sets S = (s,..., s n ) and S = (s,...,s n ) such that s j = s j = r j. Thus, S and S are coies of R. Now define a grah G = (S 0 S S, R, E), whose vertices reresent the set of requests and the set of servers, i.e., active robots that can be used to awaken the sleeing robots. Clearly, G is biartite because the set of vertices can be artitioned into two sets, one set containing the vertices corresonding to the servers (set S 0 S S ) and the other containing the vertices corresonding to the requests (set R). Two vertices (s i, r j ) G (or (s i, r j) G), with i n, are adjacent if and only if i < j. Also, for each s 0i G, there are edges connecting s 0i to every r j R. Furthermore, an edge (s 0i, r j ) (or (s i, r j ) or (s i, r j), resectively) is assigned weight equal to the distance between request r j and server s 0i (or s i or s i, resectively). Note that if r i and r m, for m n, are two distinct requests with i < m, that haen to occur on the same oint, then the corresonding

vertices in G are considered as being distinct, although the edges (s i, r m ) and (s i, r m) have zero weights. Furthermore, the edges (s i, r i ) and (s i, r i) does not exist for any r i R. It suffices to rove that the biartite grah G has a maximum cardinality minimum weight matching of size l if and only if the total movement cost for the robots in SDFT(k) is l. Let {e,...,e n } be a set of edges in a maximum cardinality minimum weight matching on G. Since S 0 > and an edge (s i, s j ) E for each i < j it follows that a maximium cardinality minimum weight matching covers all vertices in R exactly once, whereas a vertex in set S 0 S S is covered at most once. Furthermore, note that the set of edges E G simulates the recedence constraints in SDFT(k), i.e., a sleeing robot cannot be used for awaking other robots before it has been awaken. Hence, {e,...,e n } is a set of movements costs with minimum cost for the serving robots in SDFT(k). Conversely, let {l,...,l n } reresent a set of movements costs of minimum cost for the serving robots generated from the SDFT(k) execution rocess on grah G. Since there is only one active robot located on each vertex in S 0 S S in G and since each request is served exactly once it follows that {l,..., l n } forms a maximum cardinality minimum weight matching in G. See Fig. for an illustrating examle of the reduction, where the dashed edges indicate an otimal solution of cost 7 for SDFT(k). We have roved the following theorem: Theorem. The roblem SDFT(k) can be solved in olynomial time. s 0 9 r s s s 3 5 4 6 r 9 r 3 8 4 6 3 r 4 3 5 s s s 3 Fig.. Grah G for sequence of requests (r, r, r 3, r 4) with initially one active server s 0. 4 Online Ste Deendent Freeze-tag We now resent a strategy, Simle, which achieves a cometitive ratio of two for SDFT(k). This strategy works in arbitrary metric saces and for all ossible

values of the arameter k. Simle works as follows. For each request in the sequence, the request is served with the closest robot which afterwards returns to its original osition. Hence, Simle is a non-lazy strategy. Theorem. Simle is -cometitive. Proof. To rove our claim about a cometitive ratio of two for our strategy, we just need to consider that for any request in the request sequence, the otimal strategy must move at least the minimum distance from a revious request. Simle moves exactly this distance in order to serve the request and then back to its original osition, thus roving the theorem. By using Lemma Simle can be made lazy without increasing its cometitive ratio. We roceed by roving that Simle is in fact otimal. We start by giving an easy argument to why two is a lower bound for SDFT(k) when k, i.e., there are at least two active robots initially. Theorem 3. There exist metric saces for which the cometitive ratio for the SDFT(k) is at least, when k. Proof. Given a k+ oint unit-distance metric sace M, i.e., M is a metric sace with k + oints such that for each air of oints and q, distance(, q)=. Let A be any deterministic online algorithm for the SDFT(k) roblem. We show that there exists a request sequence σ such that A(σ) OPT(σ). By Lemma, we assume that A is lazy. For the construction of σ, let the initial configuration of A consist of k active robots, occuying k distinct oints in M, i.e., initially there exist one oint in M not occuied by an active robot. Now, the move for the cruel adversary is to ut request r on oint. Then, assume that A serves r with one of its robots ositioned at say oint q, with q occuied by one active robot r. Hence, this movement of r leaves an emty oint at osition q and the next move for the cruel adversary strategy is to ut the second request r on osition q, forcing A to move a total distance of two in order to serve σ. Clearly, OPT(σ) = since OPT can move some other active robot than robot r to serve r and this concludes the roof. Next, we rove a lower bound holding for all ossible values of the arameter k, i.e, this lower bound holds also in the case when k =. We begin by defining a few concets. A metric sace is a tree metric if the underlying metric grah structure is a tree. The tree metric has unit cost if all tree edges have weight one. The distance between two oints is the sum of the edge weights on the tree ath between the oints. Tree metrics generalize such metric saces as star metrics and line metrics. An online algorithm for SDFT(k) in a tree metric is said to have the nearness roerty if it never serves a request using an active robot having some other active robot on the tree ath to the request. To show that we can restrict ourselves to consider only online algorithms having the nearness roerty, we first need to rove the following lemma.

Lemma. For any online algorithm that solves SDFT(k) in tree metrics there is an online algorithm having the nearness roerty that solves the same instance with the same or better cometitive ratio. Proof. Consider a request r that the algorithm serve with a robot r without using nearness. This means that there is an active robot r on the tree ath from r to r and we can equivalently view the algorithm as moving r to the osition of r and let r serve the request r. However, this ste is non-lazy and by Lemma we can defer the movement of r to the osition of r to a later request, when it is needed. We are now in a osition to rove our lower bound result. Theorem 4. There is a unit cost tree metric such that no randomized online algorithm for SDFT(k) has cometitive ratio ǫ, for any ǫ > 0, against adative online adversaries. Proof. We let an adative online adversary construct a request sequence consisting of n requests in a unit cost tree metric where the tree initially has one or more active robots at a designated node that we denote the root r, i.e., the tree is a rooted tree. Each node in the tree has degree n and the distance from the root to each leaf node is n. The adversary now laces requests at different children of the root until the online algorithm has used all robots at the root to serve these requests. Note that by Lemma we can assume that the online algorithm has the nearness roerty. We denote a oint that reviously had active robots but now does not by a hole and a oint that has a single active robot as a single oint. Hence, once the initially active root robots all have served the requests at the children we have a hole at the root and an even number of active robots, two at each oint having active robots. The adversary continues constructing requests in accordance with the following simle scheme S.. If the tree has a hole, then a request is laced at the hole.. If the tree has a single oint, then a request is laced at a child of the single oint being the root of a subtree having no active robots. A simle induction roves that after the online algorithm has served each request, then the tree will either contain an even number of robots and a hole or an odd number of robots with one single oint. All other oints having active robots will have two active robots ositioned at the same oint. Again we rely on the fact that the online algorithm has the nearness roerty. Let us divide the subsequent work of the online algorithm into stages. A stage begins with the online algorithm A and an adversarial online algorithm A both having a hole at the root of the tree and ends after a number of requests have been served when A and A again reach the same configuration, i.e., both have their hole at the root. The number of children of the root that have active robots we henceforth call the r-degree. Consider now an arbitrary stage i with

r-degree d i. The adversary laces a request at the root and A serves that request using an active robot at one of the children of the root, say. A on the other hand serves that request using an active robot at some other child q of the root. The stage now continues with the adversary lacing requests according to the simle scheme S to be served by both A and A. If A and A reach the same configuration, i.e., both have a single oint at q, then the two subsequent requests will be handled by A so that it has a single oint at the root. Without loss of generality we can assume that A does the same, thus one more request will generate a hole at the root ending the stage and starting the next stage. Figure gives an examle of a stage. The label of an edge is the sum of the movements cost along this edge during the stage. Note that there are always two active robots on each node (excet for the root of the tree which has no active robot) after a stage. Starting the stage 0 r A after the stage A * after the stage r q r q cost 0 cost Fig.. Examle illustrating the roof of Theorem 4. Let us analyze the exected cost of A with resect to the exected cost of A during stage i. The adversary laces a request at the root, which is served by A and A. Note that, indeendently of the robability distribution that A uses, the robability that A and A serve that request using the same active robot is d i if A chooses the robot to use with uniform distribution. Hence, the robability that A and A serve that request using active robots from two different children, where d i denotes the r-degree. A trial is the sequence of stes that A does starting with a single oint at the root until it has a single oint at the root the next time. A trial consists of at least four stes so the exected cost of A in stage i can now be exressed of the root is then di d i

as E(A i ) d i j= E(A i j), where E(A i j) denotes the conditional cost of A in stage i given that stage i consists of j trials. Then, j d i l E(A i j) = k ij d i j + d i l + = k ij, () d i l= where k ij is the number of moves for A in stage i given that it consists of j trials. We know that k ij j since each trial consists of at least four moves. The corresonding exected cost of A in stage i given that A consists of j trials is E(A i j) = k ij/ + d i, () since A i will use only half the number of moves that A i uses excet in the last trial. In the last trial we can assume that both strategies use exactly four moves. In fact, we can let A i know the moves of A i when the last trial occurs so that A i can follow A i s moves. The ratio of the total exected costs for A and A is therefore bounded by E(A) E(A ) = di i= i= E(A di i) m i= E(A i ) = i= j= E(A i j) di i= j= E(A i j) = j= di i= j= m k ij d i k ij +4 d i i= d i di j= k ij i= d i di j= (k ij + 4) i= di d i j= j i= d m i= di i di(di+) d i j= (j + ) m = i= d i di(di+3) i= (d i + ) i= (d i + 3) i= (i + ) = (i + 3) i= (m + 3) (m + 7), (3) as m increases, where m denote the number of stages. We have used the fact that d i i since at each stage the r-degree increases by at least one. Finally, note that there is one more case to handle, namely the case when m is constant. In this case, the ratio of the total exected costs for A and A deends on the cost of the last stage and is therefore bounded by E(A) E(A ) i= d i di j= k ij i= d i di j= (k ij + 4) = B + ( d m ) d i j= k mj C + ( d m ) d i j= (k mj + 4), (4)

as n increases, where n denotes the number of requests, and B and C are constants. 5 Time Deendent Freeze-tag Let us change our roblem secification for Freeze-tag. The robots are oints in some general metric sace and associated to each robot is a release time. The release time t(r) secifies the first oint in time when a robot r can be awakened and the awake robots become aware of r. An awake robot can move with at most unit seed to wake u sleeing robots. Hence, a request sequence is given by σ = ((t(r ), (r )),..., (t(r n ), (r n ))), where (r i ) is the osition of robot r i. Initially one robot r 0 is awake and the objective is to find an awakening schedule that minimizes the time until all robots are awake, i.e., find the directed sanning tree of minimum height where the out degree of any oint is at most two (excet from the root oint r 0 which has out degree one). We call such a tree an otimal scheduling tree. An otimal scheduling tree can be comuted given a request sequence although the best known time comlexity is exonential because of the NP-comleteness of this roblem []. The fact that the robots move in time requires us to use continuous metric saces to accurately model the roblem. This means that at any oint in time a robot is ositioned at some oint in the metric sace and robot motion is continuous. We continue by roviding a lower bound on the cometitive ratio for TDFT. Theorem 5. There is a metric sace such that no algorithm solves the time deendent Freeze-tag roblem with cometitive ratio 7/3 ǫ, for any ǫ > 0. Proof. Consider the grah structure of Fig. 3(a). It defines a continuous metric sace where robots can move along the edges at unit seed. Points,..., 6 are at distance three from the oint 0 having the initial active robot. The oint 7 is at distance six from 0 and nine from the other ones. The first request is (0, 0 ), i.e., at time zero a robot at 0 is released thus giving us two active robots at 0. These two robots are allowed to move along the edges to try to anticiate the release of subsequent robots. However, at time three the cruel adversary releases two robots, one on each of the oints,..., 6 that does not have an active robot on its corresonding edge. Without loss of generality we can assume that the requests are (3, ) and (3, ), thus giving us the situation deicted in Fig. 3(b) (d). The first active robot that serve a request will have to do so at the earliest at time six. Assume without loss of generality that this is and we look at the other robot r at time six. If r is further from than one, then nothing more haens giving a total time for the schedule of 7. The otimal schedule takes time three because the two robots can be at and resectively at time three. On the other hand, if r is closer to than one, then a fourth request (6, 7 ) is generated by the cruel adversary. To serve this request, any of the robots will have to use at least a total of 4 time units. An otimal schedule will serve

3 4 3 0 5 6 3 3 3 0 0 0 6 6 6 6 7 7 7 7 t = 3 t = 6 t = 6 Case Case (a) (b) (c) (d) Fig.3. Illustrating the roof of Theorem 5. and in time four with one robot and the other will serve 7 in six time units giving a total otimal cost of six. In both cases the ratio for any algorithm is at least 7/3. 6 Conclusions An interesting oen roblem is to investigate online algorithms for time deendent Freeze-tag. Does there exists a strategy with constant cometitive ratio for this roblem? References. E.M. Arkin, M.A. Bender, S.P. Fekete, J.S.B. Mitchell, and M. Skutella. The freezetag roblem: How to wake u a swarm of robots. In Proc. 3th ACM-SIAM Sym. on Discrete Algorithms, ages 568 577, 00.. E.M. Arkin, M.A. Bender, D. Ge, S. He, and J.S.B. Mitchell. Imroved Aroximation Algorithms for the Freeze-Tag Problem. In Proc. 5th Annual ACM Symosium on Parallel Algorithms and Architectures, ages 95 303, 003. 3. A. Borodin and R. El-Yaniv. Online Comutation and Cometitive Analysis. Cambridge University Press, 998. 4. E. Koutsouias and C.H. Paadimitriou. On the k-server conjecture. Journal of the ACM, 4(5):97 983, 995. 5. M. Manasse, L.A. McGeoch, D. Sleator. Cometitive algorithms for server roblems. Journal of Algorithms, :08 30, 990. 6. C.H. Paadimitriou, K. Steiglitz. Combinatorial Otimization, Algorithms and Comlexity. Dover Publications, Inc., Mineola, New York, 998. 7. M.O. Sztainberg, E.M. Arkin, M.A. Bender, and J.S.B. Mitchell. Analysis of Heuristics for the Freeze-Tag roblem. In Proc. 8th Scandinavian Worksho on Algorithm Theory, ages 70 79, 00.