Exercise Exercise Proof that

Slides:



Advertisements
Similar presentations
Mathematical Induction
Advertisements

1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Exercise 1.1(Paid Exchanges Necessary) Consider the three-element list with the following initial configuration: (i.e. x1 is at the front). Prove that.
Gibbs sampler - simple properties It’s not hard to show that this MC chain is aperiodic. Often is reversible distribution. If in addition the chain is.
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
Princeton University COS 423 Theory of Algorithms Spring 2001 Kevin Wayne Competitive Analysis.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Section 7.4: Closures of Relations Let R be a relation on a set A. We have talked about 6 properties that a relation on a set may or may not possess: reflexive,
CSC 2300 Data Structures & Algorithms March 16, 2007 Chapter 7. Sorting.
2007/3/6 1 Online Chasing Problems for Regular n-gons Hiroshi Fujiwara* Kazuo Iwama Kouki Yonezawa.
1 Competitive analysis of the LRFU paging algorithm Edith Cohen -- AT&T Haim Kaplan -- Tel Aviv Univ. Uri Zwick -- Tel Aviv Univ.
New Toads and Frogs Results By Jeff Erickson Presented by Nate Swanson.
3. Delaunay triangulation
The main idea of the article is to prove that there exist a tester of monotonicity with query and time complexity.
CPSC 668Set 4: Asynchronous Lower Bound for LE in Rings1 CPSC 668 Distributed Algorithms and Systems Fall 2009 Prof. Jennifer Welch.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
1 Ecole Polytechnque, Nov 7, 2007 Scheduling Unit Jobs to Maximize Throughput Jobs:  all have processing time (length) = 1  release time r j  deadline.
A general approximation technique for constrained forest problems Michael X. Goemans & David P. Williamson Presented by: Yonatan Elhanani & Yuval Cohen.
© Love Ekenberg The Algorithm Concept, Big O Notation, and Program Verification Love Ekenberg.
INFINITE SEQUENCES AND SERIES
The k-server Problem Study Group: Randomized Algorithm Presented by Ray Lam August 16, 2003.
Ecole Polytechnique, Nov 7, Online Job Scheduling Marek Chrobak University of California, Riverside.
Competitive Paging Algorithms Amos Fiat, Richard Karp, Michael Luby, Lyle McGeoch, Daniel Sleator, Neal Young presented by Seth Phillips.
12 INFINITE SEQUENCES AND SERIES The Comparison Tests In this section, we will learn: How to find the value of a series by comparing it with a known.
Priority Models Sashka Davis University of California, San Diego June 1, 2003.
APPLICATIONS OF DIFFERENTIATION 4. In Sections 2.2 and 2.4, we investigated infinite limits and vertical asymptotes.  There, we let x approach a number.
Online Function Tracking with Generalized Penalties Marcin Bieńkowski Institute of Computer Science, University of Wrocław, Poland Stefan Schmid Deutsche.
Scientific Computing QR Factorization Part 1 – Orthogonal Matrices, Reflections and Rotations.
Lecture 9. Arithmetic and geometric series and mathematical induction
Chapter 6 Mathematical Induction
The importance of sequences and infinite series in calculus stems from Newton’s idea of representing functions as sums of infinite series.  For instance,
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
Section 1.8. Section Summary Proof by Cases Existence Proofs Constructive Nonconstructive Disproof by Counterexample Nonexistence Proofs Uniqueness Proofs.
LIMITS AND DERIVATIVES 2. In Sections 2.2 and 2.4, we investigated infinite limits and vertical asymptotes.  There, we let x approach a number.  The.
Approximating the Minimum Degree Spanning Tree to within One from the Optimal Degree R 陳建霖 R 宋彥朋 B 楊鈞羽 R 郭慶徵 R
Online Algorithms. Introduction An offline algorithm has a full information in advance so it can compute the optimal strategy to maximize its profit (minimize.
Methods of Proof Lecture 3: Sep 9. This Lecture Now we have learnt the basics in logic. We are going to apply the logical rules in proving mathematical.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
An Analysis of First-Fit N.S. Narayanaswamy (IITM) Work with R. Subhash Babu.
1 Combinatorial Algorithms Local Search. A local search algorithm starts with an arbitrary feasible solution to the problem, and then check if some small,
CSE 5314 On-line Computation Homework 1 Wook Choi Feb/26/2004.
CS 267: Automated Verification Lecture 3: Fixpoints and Temporal Properties Instructor: Tevfik Bultan.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Hierarchical Well-Separated Trees (HST) Edges’ distances are uniform across a level of the tree Stretch  = factor by which distances decrease from root.
A Optimal On-line Algorithm for k Servers on Trees Author : Marek Chrobak Lawrence L. Larmore 報告人:羅正偉.
CS 203: Introduction to Formal Languages and Automata
Solving Recurrences with the Substitution Method.
1+2+3+…+n = n(n+1)/2 We want to prove the above statement by mathematical Induction for all natural numbers (n=1,2,3,…) Next SlideSlide 1.
© The McGraw-Hill Companies, Inc., Chapter 12 On-Line Algorithms.
Introduction to the k-Server Problem Marcel Birkner.
International Graduate School of Dynamic Intelligent Systems, University of Paderborn Fighting Against Two Adversaries: Page Migration in Dynamic Networks.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
Problem 3.2 Paging Algorithms-Time & Space Requirements Problem:What are the space and time requirements of LIFO, LFU, and LED? LRU:(least-recently-used):
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
Theorem Suppose {a n } is non-decreasing and bounded above by a number A. Then {a n } converges to some finite limit a, with a  A. Suppose {b n } is non-increasing.
CSE 5314 – Spring 2004 Homework #1 - Solutions [Soumya Sanyal] Q 1.5: Prove that the algorithm “MTF every-other-access” (i.e. move the item to the front.
1 Discrete Mathematical Mathematical Induction ( الاستقراء الرياضي )
CHAPTER SIX T HE P ROBABILISTIC M ETHOD M1 Zhang Cong 2011/Nov/28.
1 Linear Grammars Grammars with at most one variable at the right side of a production Examples:
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Integer Programming An integer linear program (ILP) is defined exactly as a linear program except that values of variables in a feasible solution have.
Exercise 3.10 Prove Theorem 3.8 R(ALG) >= k(s+1)/(k+s) Solution:
Chapter 3 The Real Numbers.
11.4 The Comparison Tests In this section, we will learn:
Greedy Algorithms / Caching Problem Yin Tat Lee
Infiniteness Test The Pumping Lemma Nonregular Languages
György Dósa – M. Grazia Speranza – Zsolt Tuza:
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Kleene’s Theorem (Part-3)
Presentation transcript:

Exercise 10.12 Exercise 10.12 Proof that for any k, there exists a metric space (e.g., the line) in which 2 is the lower bound for the (2,k) server problem, where 2 is the total number of servers for offline algorithm(ADV), and k is the total number of servers for online algorithm (ALG). Theorem 10.1 Let M be any metric space with at least k+1 points. For any 1<=h<=k , k/(k-h+1) is a lower bound on the competitive ratio of any online (h, k) server algorithm for M. Main idea: for any k<=K, there exits a metric space in which 2 is the lower bound for any (2,k) server problem. Prove the bases case (k<=K=3) hold (k=2 and k=3). Suppose that k<=K hold. Prove that k=K+1 hold

Base Case k<=K and K=3 Base: prove k=2 and k=3, the results hold. For k=2, From theorem 10.1, let h =2 and k=2, then we have the competitive ratio 2 for any metric space. For k =3, We consider h(2,3) in the line space illustrated in Fig.1 and construct a request sequence that consists of arbitrary number of phases such that the competitive ratio for h(2,3) in a line space is close 2. D >> d d Fig.1 Initial Configuration WEST EAST

For K=3 D >> d d Fig.1 Initial Configuration WEST EAST For this configuration, we place a sequence of requests at the EAST side. ALG eventually will move all three servers to the EAST side. If it is not move all three servers to the EAST side, this configuration is same as the h(2,2) configuration. Therefore it has a lower bound 2. Each phase starts with a configuration similar with the initial configuration or the symmetric configuration.

Notations Now, we define following notations. D >> d d Fig.1 Initial Configuration WEST EAST Now, we define following notations. the cost e1 is the total cost incurred by ALG for servicing requests within the EAST side before it moves its second server to the EAST side, and e2 is the total cost incurred before it moves its third server to the EAST side. The cost of moving servers across the long distance D is not included either e1 or e2

Phase construction If e1 <= D, then ADV keeps one server at each front. ADV pays e1, ALG pays D+e1. ADV continues place requests at EAST side until ALG pays at least twice as much as ADV. Then the phase is end. The end configuration is symmetric to the initial one, so next phase can start it. D >> d d Fig. 2: ALG moves its second server to EAST EAST WEST

Phase construction If e1 > D, ADV immediately moves it second server to the EAST side, place requests in favor of ADV until ALG moves its second server to the EAST side. After that, it is a h(2,2) situation, which guarantees the ratio of 2 until the ALG moves its third server to the EAST side. D >> d d Fig. 2: ALG moves its second server to EAST EAST WEST D >> d d Fig. 4: ALG moves its third server to EAST EAST WEST

Phase construction-Cont. ADV moves one of its server to the WEST side right after the ALG moves its third server to the EAST. ADV makes a request at WEST side. The phase is end. The next phase starts from WEST side. D >> d d Fig. 5: final action of the phase EAST WEST The total cost paid by ALG is e1+e2+3D, while the total cost paid by ADV Is 2D+e2/2. Since e1>D, the close (bigger) than 2.

Induction Statement For any k<=K, there exists a metric space (I.e.,the line) in which 2 is the lower bound for the (2,k)-server problem.

For k = K+1 It stars with the following initial configuration. The ALG has K servers at WEST side, and one server at the EAST side. The ADV has one server at each side. The ADV places requests at the EAST side initially. Eventually, ALG will move all servers at the WEST side to the EAST side. Otherwise, ADV moves its server to the EAST, it is a h(2,k<=K) situation, which guarantees the ratio of 2 according to our induction. D >> d Fig.6 Initial Configuration WEST EAST

Notation Let e2 be the total cost paid by ALG before it moves its last servers in WEST side to the EAST side. The costs of moving servers across the long distance D are not included in e2.

Phase Construction ADV immediately moves its second server to the EAST side and places requests at EAST side. before the ALG moves its last server to the EAST side, the situation is h(2, k<=K), According to the induction, it guarantees the lower bound of 2. D >> d Fig. 7: ALG moves its one server to EAST EAST WEST

Phase Construction ADV moves one of servers to the WEST side and places a request there right after the ALG moves its last server to the EAST side. The next phase starts from the WEST side. D >> d d Fig. 9: final action of the phase EAST WEST Fig. 8: ALG moves another third server to EAST The total cost paid by ADV, is at most 2D+e2/2, while the total cost paid by ALG is e2+(K+1)D. Since K > =3, therefore, ADV pays less than half as much as ALG does for this phase.

Questions ?