CRESCCO Project IST-2001-33135 Work Package 2 Algorithms for Selfish Agents Università di Salerno Project funded by the Future and.

Slides:



Advertisements
Similar presentations
On Designing Truthful Mechanisms for Online Scheduling V. Auletta, R. De Prisco, P.P. and G. Persiano Università di Salerno.
Advertisements

Private capacities in mechanism design Vincenzo Auletta Paolo Penna Giuseppe Persiano Università di Salerno, Italy.
Coordination Mechanisms for Unrelated Machine Scheduling Yossi Azar joint work with Kamal Jain Vahab Mirrokni.
Real-Time Competitive Environments: Truthful Mechanisms for Allocating a Single Processor to Sporadic Tasks Anwar Mohammadi, Nathan Fisher, and Daniel.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Carmine Ventre (University of Liverpool) Joint work with: Paolo Penna (University.
Optimal Collusion-Resistant Mechanisms with Verification Carmine Ventre Joint work with Paolo Penna.
Strongly Polynomial-Time Truthful Mechanisms in One Shot Paolo Penna 1, Guido Proietti 2, Peter Widmayer 3 1 Università di Salerno 2 Università de l’Aquila.
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
Price Of Anarchy: Routing
Fast Convergence of Selfish Re-Routing Eyal Even-Dar, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
Algorithmic Game Theory and Scheduling Eric Angel, Evripidis Bampis, Fanny Pascual IBISC, University of Evry, France GOTha, 12/05/06, LIP 6.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Algorithms and Economics of Networks Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Optimal collusion-resistant mechanisms with verification Paolo Penna Carmine Ventre Università di Salerno University of Liverpool Italy UK.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Truthful Approximation Mechanisms for Scheduling Selfish Related Machines Motti Sorani, Nir Andelman & Yossi Azar Tel-Aviv University.
CRESCCO Project IST Work Package 2 Critical Resources and Selfish Agents Paolo Penna Università di Salerno Project funded.
CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents V. Auletta, P. Penna and G. Persiano Università di Salerno
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Paolo Penna and Carmine Ventre.
The Algorithmic Structure of Group Strategyproof Budget- Balanced Cost-Sharing Mechanisms Paolo Penna & Carmine Ventre Università di Salerno Italy.
Mechanism Design. Overview Incentives in teams (T. Groves (1973)) Algorithmic mechanism design (Nisan and Ronen (2000)) - Shortest Path - Task Scheduling.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno, WP2.
Worst-case Equilibria Elias Koutsoupias and Christos Papadimitriou Presenter: Yishay Mansour Tight Bounds for Worst-case Equilibria Artur Czumaj and Berthold.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
Algorithms for Selfish Agents Carmine Ventre Università degli Studi di Salerno.
More Powerful and Simpler Cost-Sharing Methods Carmine Ventre Joint work with Paolo Penna University of Salerno.
(Optimal) Collusion-Resistant Mechanisms with Verification Paolo Penna & Carmine Ventre Università degli Studi di Salerno Italy.
Load Balancing, Multicast routing, Price of Anarchy and Strong Equilibrium Computational game theory Spring 2008 Michal Feldman.
Convergence Time to Nash Equilibria in Load Balancing Eyal Even-Dar, Tel-Aviv University Alex Kesselman, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
1 Worst-Case Equilibria Elias Koutsoupias and Christos Papadimitriou Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science.
Energy-Efficient Broadcasting in Ad-Hoc Networks: Combining MSTs with Shortest-Path Trees Carmine Ventre Joint work with Paolo Penna Università di Salerno.
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
Algorithms and Economics of Networks: Coordination Mechanisms Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Price of Anarchy Bounds Price of Anarchy Convergence Based on Slides by Amir Epstein and by Svetlana Olonetsky Modified/Corrupted by Michal Feldman and.
Inefficiency of equilibria, and potential games Computational game theory Spring 2008 Michal Feldman.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
1 Network Creation Game A. Fabrikant, A. Luthra, E. Maneva, C. H. Papadimitriou, and S. Shenker, PODC 2003 (Part of the Slides are taken from Alex Fabrikant’s.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
NOBEL WP Szept Stockholm Game Theory in Inter-domain Routing LÓJA Krisztina - SZIGETI János - CINKLER Tibor BME TMIT Budapest,
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Mechanisms with Verification for Any Finite Domain Carmine Ventre Università degli Studi di Salerno.
Algorithms for Incentive-Based Computing Carmine Ventre Università degli Studi di Salerno.
Algorithmic Mechanism Design: an Introduction Approximate (one-parameter) mechanisms, with an application to combinatorial auctions Guido Proietti Dipartimento.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Networks and Games Christos H. Papadimitriou UC Berkeley christos.
Mechanisms with Verification Carmine Ventre [Penna & V, 2007] [V, WINE ‘06]
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Vasilis Syrgkanis Cornell University
Algorithmic Mechanism Design Shuchi Chawla 11/7/2001.
Free-Riders in Steiner Tree Cost-Sharing Games Paolo Penna and Carmine Ventre Università di Salerno.
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Complex Systems in Industrial Mathematics Dr Robert Leese Smith Institute Bath Institute for Complex Systems 31 January 2005.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
Network Creation Game A. Fabrikant, A. Luthra, E. Maneva,
The Price of Routing Unsplittable Flow
Presentation transcript:

CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents Università di Salerno Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Proactive initiative “Global Computing” M.I.T. (majana institute of technology)

DIFFERENT SOCIO-ECONOMIC ENTITIES DIFFERENT GOALS INTERNET SELFISH ENTITIES THAT COOPERATE INTERNET PROVIDERS AUTONOMOUS SYSTEMS UNIVERSITIES PRIVATE COMPANIES

The Internet Open, self organized, no central authority, anarchic: 1. A router may forward packets to optimize its own traffic 2. A client may “ignore” the server ackws and not follow the TCP packet transmission rate 3. An Autonomous System may report false link status to redirect traffic to another AS

Main Goals 1. A deeper understanding of basic principles of a complex system (Internet) 2. Methodology to develop good solutions 3. New concepts, mathematical tools and algorithmic techniques Strict and centralized vs loose and local control What is the price of anarchy? Design a new “TCP/IP protocol” robust wrt selfish users M.I.T. (majana institute of technology)

Mathematical Tools Theory of Computing Computational complexity Design and Analysis of Algorithms Microeconomics and Game Theory Nash equilibria Mechanism design

Research Progress 1.C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, Also accepted in Theoretical Computer Science. 2.V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one- parameter agents. Technical report of CRESCCO, V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, S. Kontogiannis, D. Fotakis and P. Spirakis. Selfish unsplittable flows. Technical report, Computer Technology Institute, G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, P. Penna and C. Ventre. Energy-efficient broadcasting in ad-hoc networks: combining MSTs with shortest-path trees. Technical report of CRESCCO, P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, SCHEDULING/ROUTING (WP1): [2,3,4,5]MECHANISM DESIGN THEORY: [3,6]EXPERIMENTS (WP5): [7]APPLICATIONS (workpackages):WIRELESS NETWORKS (WP1): [1,7,8]

Routing/Scheduling m links with different speeds s 1, s 2,…,s m Unsplittable traffic t 1, t 2,…, t n We look at the network congestion (makespan) sourcedestination Selfish Routing: users choose the best path for their own traffic Scheduling Selfish Jobs: Selfish users own the traffic and privately know their weights Scheduling Selfish Machines: Selfish users own the links and privately know their speeds

Nash equilibria When no selfish agent has an incentive in unilaterally changing his/her strategy: (5,1)(5,1)(0,0) (1,5) he she F T FT Football or Theater

Nash equilibria for selfish routing … 111 Expected MAX LOAD: 1 1/m Expected MAX LOAD: Θ(ln m/ln ln m) Price of anarchy Worst-case equilibria Coordination ratio M.I.T. (majana institute of technology)

Nash equilibria for selfish routing [5] S. Kontogiannis, D. Fotakis and P. Spirakis. Selfish unsplittable flows. Technical report, Computer Technology Institute, Theorem [5]: Every l-layered network has coordination ratio at most O(log m/log log m) 1 … 2l Layered graphs Identical links source destination Corollary: 1-layered graphs are the worst instances. Theorem [5]: Some l-layered networks do not have pure Nash equilibria.

Scheduling Selfish Jobs No selfish routing  Use a scheduler 1.Users cannot refuse the allocation 2.May lie about their traffic weights Provide correct incentives (mechanism design) [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003.

Mechanism design Mechanism: M=(A,P) Computes a solution X=A(r 1,r 2,…, r i,…,r n ) Provides a payment P i (r 1,r 2,…, r i,…,r n ) cost i (X,t i ) Agents’ GOAL: maximize their own utility u i (r 1,r 2,…, r i,…,r n ) := P i (r 1,r 2,…, r i,…,r n ) – cost i (X,t i )

Mechanism design Truthful mechanisms: no incentive to lie 1. Bayesian-Nash u i (t 1,t 2,…, t i,…,t n )  u i (t 1,t 2,…, r i,…,t n ) (truth-telling is Nash equilibrium) 2.With dominant strategies u i (r 1,r 2,…, t i,…,r n )  u i (r 1,r 2,…, r i,…,r n ) (truth-telling is always the best strategy)

Mechanism design Question: Given A, is there P s.t. M=(A,P) is truthful? In general, NO!  new algorithms

Scheduling Selfish Jobs [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, Speed ratio r=smax/smin Lower boundUpper bound identical speeds No exact with dominant strategies Exact (non polytime) (polytime) Bayesian-Nash Different speeds, one job per agent, Bayesian-Nash M.I.T. (majana institute of technology) Bayesian-Nash

Scheduling Selfish Jobs [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, Also submitted for publication k vs mLower boundUpper bound Identical speeds, k jobs per agent, Bayesian-Nash

Scheduling Selfish Machines Truthful mechanisms must allocate jobs monotonically: an agent declaring higher speed does not get less load; A monotone algorithm can be turned into a truthful mechanism with the same performances. [Archer and Tardos, STOC 2001]

Scheduling Selfish Machines [1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004 Existing approximation algorithms are not monotone!! We need new approximation algorithms M.I.T. (majana institute of technology)

Scheduling Selfish Machines [1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004 Machine speeds Our resultPrevious results [ArcTar01] Any 4+  3+  Divisible 2 +  3+  Randomized, no dominant strategies Deterministic, dominant strategies

Scheduling Selfish Machines [1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004 Machine speeds Our resultPrevious results [ArcTar01] Any 4+  3+  Divisible 2 +  3+  Real cases (e.g., Sonet/SDH standards)

Selfish Scheduling Revised [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, Selfish Jobs: a user sends more traffic than the reported one (i.e., t i > r i ) 2.Selfish Machines: a machine declares to be faster than its real speed (i.e., s i < r i ) Can be verified!! (if the machine gets some job)

Approximation and selfish agents [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, We introduce restricted one-parameter agents Theorem [3]: Polynomial-time c-approximation algorithm A  M = (A , P) truthful polynomial-time (c+  )- approximation

Approximation and selfish agents [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO,  No need for new algorithms! (TCS gets its revenge) We introduce restricted one-parameter agents

Applications of restricted one-parameter agents: Selfish Jobs 1. (1+  )-APX mechanism ( breaks lower bounds in [2]) Selfish Machines: 1.first (1+  )-APX mechanism 2.breaks a lower bound in [ArcTar01] for a weighted variant of scheduling Approximation and selfish agents [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, Also submitted for publication Verification helps!

Mechanisms for Wireless Networks Ad Hoc Nets: i power i (j) j Private knowledge of i [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, Also accepted in Theoretical Computer Science. GOAL: Strong connectivity, minimal total power k

Mechanisms for Wireless Networks Ad Hoc Nets: i repow i (j) >> power i (j) j Reported power repow i (j)k [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, Also accepted in Theoretical Computer Science.

Mechanisms for Wireless Networks Polynomial-time VCG-based mechanisms: [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, Also accepted in Theoretical Computer Science. Lower bound Upper bound General graphs No R-APX, every R>1 Metric, Well-spread remain NP-hard 1.5-APX O(1)-APX

Mechanisms for Wireless Networks Wireless Cost-Sharing: Source (e.g., popular sport event) [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, E 3E 2E11E2E 10E GOAL: maximize benefits-costs

Mechanisms for Wireless Networks Wireless Cost-Sharing: Source (e.g., popular sport event) [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, Also submitted for publication. 10E 3E 2E11E2E 10E GOAL: maximize benefits-costs 8E1E

Mechanisms for Wireless Networks [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, Polynomial-time mechanisms: Lower boundUpper bound General graphs No R-APX, every R>1 Trees, “Metric-tree” graphs OPT, distributed mechanism Distributed APX mechanism for other casesSuggests a better new broadcast algorithm [7] P. Penna and C. Ventre. Energy-efficient broadcasting in ad-hoc networks: combining MSTs with shortest-path trees. Technical report of CRESCCO, 2003.

Mechanism Design Theory Probability of link failure GOAL: find the Most Reliable Path [6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003 Payments: pay P e iff link e succeds  Utility: u e =q e ·P e Expected GAIN destination source Not ADDITIVE

Mechanism Design Theory [6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003 VCG mechanisms: 1.Objective function m(X) =  i  X COST i (X,t i ) 2.u i = P i - COST i (X,t i ) MRP problem: 1.Objective function m(X) =  e  X q i 2.u i = P i q i Utilitarian problems

Mechanism Design Theory [6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003 Utilitarian problems Consistent problems VCG [1961] ProblemsMost Reliable Path Arbitrage Task Scheduling Knapsack M.I.T. (majana institute of technology)

Important Issues Computational issues Efficiency Technological issues Different assumptions Existing game theory Not always suitable New algorithms [1-4,7,8] New models/tools [6,3], extract infos Sometimes helpful!! M.I.T. (majana institute of technology)

Recommendations and future plans 1.Consider Algorithms and Game Theory jointly 2.Technological Issues 1.Wireless vs Wired 2.Assumptions (e.g., link speeds) 3.How much technology can help (e.g. verification, known users traffic vs known router speeds) 3.New concepts, new mathematical tools and new algorithmic techniques  Cross fertilization between TCS, micro-economics and game theory [1,7,8] [4] [2,3,5] [3,6] M.I.T. (majana institute of technology)

Thank You M.I.T. (majana institute of technology)