1 / 25

CRESCCO Project IST-2001-33135

CRESCCO Project IST-2001-33135. Work Package 2 Algorithms for Selfish Agents V. Auletta, P. Penna and G. Persiano Università di Salerno pino.persiano@unisa.it. Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Proactive initiative “Global Computing”.

fuller
Télécharger la présentation

CRESCCO Project IST-2001-33135

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CRESCCO ProjectIST-2001-33135 Work Package 2 Algorithms for Selfish Agents V. Auletta, P. Penna and G. Persiano Università di Salerno pino.persiano@unisa.it Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Proactive initiative “Global Computing”

  2. AUTONOMOUS SYSTEMS PROVIDERS INTERNET INTERNET PRIVATE COMPANIES UNIVERSITIES DIFFERENT GOALS SELFISH ENTITIES THAT COOPERATE DIFFERENT SOCIO-ECONOMIC ENTITIES

  3. The Internet Open, self organized, no central authority, anarchic: 1. A router may forward packets to optimize its own traffic 2. A client may “ignore” the server ackws and not follow the TCP packet transmission rate 3. An Autonomous System may report false link status to redirect traffic to another AS

  4. Main Goals 1. A deeper understanding of basic principles of a complex system (Internet) Strict and centralized vs loose and local control What is the price of anarchy? 2. Methodology to develop good solutions Design a new “TCP protocol” robust wrt selfish users 3. New concepts, mathematical tools and algorithmic techniques

  5. Mathematical Tools Theory of Computing Computational complexity Design and Analysis of Algorithms Microeconomics and Game Theory Nash equilibria Mechanism design

  6. Research Progress Nash equilibria for routing problems: Existence, worst case, complexity Efficient mechanism design Feasibility, optimality of the solution;

  7. Nash equilibria When no selfish agent has an incentive in changing his/her strategy: Player 2 a b a Player 1 Prisoner’s dilemma b No other strategy improves the current payoff!

  8. Nash equilibria for routing problems source destination • m links with different speeds • Unsplittable traffic t1, t2 ,…, tn • We look at the network congestion (max load) • Selfish users choose the best path for their own traffic

  9. Nash equilibria for routing problems • D. Fotakis, S. Kontogiannis, E. Koutsoupias, M. Mavronicolas, and P.Spirakis. “The Structure and Complexity of Nash Equilibria for a Selfish Routing Game.” Proc. of the Int. Colloquium on Automata, Languages and Programming (ICALP), 2002. • E. Koutsoupias, M. Mavronicolas and P. Spirakis, “Approximate Equilibria and Ball Fusion.” Proc. of the 9th Int. Colloquium on Structural Information and Communication Complexity, June 2002. • A. Ferrante and M. Parente. “Existence of Nash Equilibria in Selfish Routing problems.” Technical Report, Università di Salerno, 2002.

  10. Expected MAX LOAD: Θ(ln n/ln ln n) 1 1 1 1/n Expected MAX LOAD: 1 Nash equilibria for routing problems …

  11. 2 1 m … SUPPORT 1 2 n … Characterizing Nash equilibria: -- Existence for a given support set [3] Computing Nash equilibria : -- For a given support, the best, the worst, any [1,3] Approximate Nash equilibria : -- users change strategy only if a sufficiently better one exists [2]

  12. Achieved Results Characterizations of Nash equilibria: -- with a given support [3] Computing Nash equilibria: -- the best and the worst are NP-hard [1] -- any generalized fully mixed in P [1] Computing the cost of a Nash equilibrium: -- is #P-complete [1], -- but can be well approximated [1]

  13. source destination Mechanism design • m links with different speeds s1, s2,…,sm • Unsplittable traffic t1, t2 ,…, tn • We look at the network congestion (makespan) • Selfish users owns the links and privately know their speeds

  14. Mechanism design Task scheduling on related machines: • m machines of with speeds s1 s2,…,sm • n jobs of weight t1,t2,…,tn • Each machine is owned by a selfish agent, and agents should reveal the speed of their own machine to the system

  15. Mechanism design • A machine i of speed si receiving load li incurs in a cost of li/si • We pay the agents to provide an incentive in revealing the true speed • Agents want to maximize their utility ui := paymenti – costi

  16. Truth-telling is always the best strategy: ui(si) ≥ui(bi) for any agent i and for any false declaration bi Truthful Mechanisms

  17. Mechanism design • Classical problem from microeconomics • Vickrey Clarke Groves (VCG) mechanisms • Unsuitable for our settings • VCG only applies to utilitarian problems • minimize sum of costs • instead we minimize max of costs • Requires solving optimally hard combinatorial problem

  18. Mechanism Design • Extensions of VCG to non-utilitarian problems • P. Penna, G. Proietti, R. Wattenhofer and P. Widmayer. Truthful mechanisms for consistent problems. Submitted.

  19. Mechanism design • Scheduling related machines • Truthful mechanisms must allocate jobs monotonically: an agents declaring higher speed does not get less load; • A monotone algorithm can be turned into a truthful mechanism with the same performances. [Archer and Tardos 2001]

  20. Truthful Mechanisms Existing approximation algorithms are not monotone!! We need new approximation algorithms [Archer and Tardos 2001]

  21. Research Progress • V. Auletta, R. De Prisco, P. Persiano, and P. Penna. “Deterministic Truthful Approximation Mechanisms for Scheduling Related Machines”. Manuscript in preparation. Very close to a polynomial-time (2+ε)-approximation truthful mechanism. [3-approximation mechanism truthful in expectation only, Archer et al. 01]

  22. Not monotone Research Progress PTAS= OPT(t1,t2,…,th) + GREEDY(th+1,…,tn) New monotone GREEDY algorithm

  23. Future Plans 1. A deeper understanding of basic principles in the Internet 2. Methodology to develop good solutions 3. New concepts, new mathematical tools and new algorithmic techniques 4. Cross fertilization between TCS, micro-economics and game theory

  24. Thank You

  25. CRESCCO ProjectIST-2001-33135 Work Package 2 Algorithms for Selfish Agents G. Persiano Università di Salerno pino.persiano@unisa.it Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Proactive initiative “Global Computing”

More Related