The k-server Problem Study Group: Randomized Algorithm Presented by Ray Lam August 16, 2003.

Slides:



Advertisements
Similar presentations
Completeness and Expressiveness
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Shortest Vector In A Lattice is NP-Hard to approximate
MS 101: Algorithms Instructor Neelima Gupta
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Gibbs sampler - simple properties It’s not hard to show that this MC chain is aperiodic. Often is reversible distribution. If in addition the chain is.
Theory of Computing Lecture 3 MAS 714 Hartmut Klauck.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Entropy Rates of a Stochastic Process
CPSC 668Set 10: Consensus with Byzantine Failures1 CPSC 668 Distributed Algorithms and Systems Fall 2009 Prof. Jennifer Welch.
1 Introduction to Computability Theory Lecture3: Regular Expressions Prof. Amos Israeli.
Data Structures, Spring 2006 © L. Joskowicz 1 Data Structures – LECTURE 4 Comparison-based sorting Why sorting? Formal analysis of Quick-Sort Comparison.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Optimization problems such as MAXSAT, MIN NODE COVER, MAX INDEPENDENT SET, MAX CLIQUE, MIN SET COVER, TSP, KNAPSACK, BINPACKING do not have a polynomial.
1 Ecole Polytechnque, Nov 7, 2007 Scheduling Unit Jobs to Maximize Throughput Jobs:  all have processing time (length) = 1  release time r j  deadline.
13. The Weak Law and the Strong Law of Large Numbers
1 Worst-Case Equilibria Elias Koutsoupias and Christos Papadimitriou Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science.
Data Flow Analysis Compiler Design Nov. 8, 2005.
Preference Analysis Joachim Giesen and Eva Schuberth May 24, 2006.
1 Separator Theorems for Planar Graphs Presented by Shira Zucker.
Distributed Combinatorial Optimization
Competitive Paging Algorithms Amos Fiat, Richard Karp, Michael Luby, Lyle McGeoch, Daniel Sleator, Neal Young presented by Seth Phillips.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Asaf Cohen (joint work with Rami Atar) Department of Mathematics University of Michigan Financial Mathematics Seminar University of Michigan March 11,
International Graduate School of Dynamic Intelligent Systems, University of Paderborn Improved Algorithms for Dynamic Page Migration Marcin Bieńkowski.
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Online Paging Algorithm By: Puneet C. Jain Bhaskar C. Chawda Yashu Gupta Supervisor: Dr. Naveen Garg, Dr. Kavitha Telikepalli.
Trust-Aware Optimal Crowdsourcing With Budget Constraint Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department.
Randomized Online Algorithm for Minimum Metric Bipartite Matching Adam Meyerson UCLA.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology The Weak Law and the Strong.
Introduction to CS Theory Lecture 3 – Regular Languages Piotr Faliszewski
Online Algorithms. Introduction An offline algorithm has a full information in advance so it can compute the optimal strategy to maximize its profit (minimize.
The Selection Problem. 2 Median and Order Statistics In this section, we will study algorithms for finding the i th smallest element in a set of n elements.
Copyright © Cengage Learning. All rights reserved. CHAPTER 11 ANALYSIS OF ALGORITHM EFFICIENCY ANALYSIS OF ALGORITHM EFFICIENCY.
By J. Burns and J. Pachl Based on a presentation by Irina Shapira and Julia Mosin Uniform Self-Stabilization 1 P0P0 P1P1 P2P2 P3P3 P4P4 P5P5.
1 Combinatorial Algorithms Local Search. A local search algorithm starts with an arbitrary feasible solution to the problem, and then check if some small,
Section 2.3 Properties of Solution Sets
Lines in the plane, slopes, and Euler’s formula by Tal Harel
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
CPSC 411 Design and Analysis of Algorithms
© 2001 by Charles E. Leiserson Introduction to AlgorithmsDay 12 L8.1 Introduction to Algorithms 6.046J/18.401J/SMA5503 Lecture 8 Prof. Charles E. Leiserson.
Auctions serve the dual purpose of eliciting preferences and allocating resources between competing uses. A less fundamental but more practical reason.
Hierarchical Well-Separated Trees (HST) Edges’ distances are uniform across a level of the tree Stretch  = factor by which distances decrease from root.
A Optimal On-line Algorithm for k Servers on Trees Author : Marek Chrobak Lawrence L. Larmore 報告人:羅正偉.
© The McGraw-Hill Companies, Inc., Chapter 12 On-Line Algorithms.
Introduction to the k-Server Problem Marcel Birkner.
Copyright © Cengage Learning. All rights reserved. CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF ELEMENTARY NUMBER THEORY AND METHODS OF PROOF.
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
CSE 5314 – Spring 2004 Homework #1 - Solutions [Soumya Sanyal] Q 1.5: Prove that the algorithm “MTF every-other-access” (i.e. move the item to the front.
Approximation Algorithms based on linear programming.
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
MA/CSSE 474 Theory of Computation How many regular/non-regular languages are there? Closure properties of Regular Languages (if there is time) Pumping.
Theory of Computational Complexity M1 Takao Inoshita Iwama & Ito Lab Graduate School of Informatics, Kyoto University.
Chapter 5: Integration Section 5.1 An Area Problem; A Speed-Distance Problem An Area Problem An Area Problem (continued) Upper Sums and Lower Sums Overview.
EMGT 6412/MATH 6665 Mathematical Programming Spring 2016
Perturbation method, lexicographic method
Exercise Exercise Proof that
Direct Proof and Counterexample V: Floor and Ceiling
Chap 3. The simplex method
Chapter 5. The Duality Theorem
Randomized Algorithms CS648
Clustering.
Chapter 2. Simplex method
Presentation transcript:

The k-server Problem Study Group: Randomized Algorithm Presented by Ray Lam August 16, 2003

2 Outline 1. Background and problem definition 2. The Harmonic k-server Algorithm 3. Proving the claimed performance of the algorithm

Background And Problem Definition

4 The Metric Space Definition: A metric space M = (V, d) consists of a set of points V with a distance function d:V R satisfying the following properties: d(u,v) 0 for all u, v V. d(u,v) = 0 iff u = v. d(u,v) = d(v,u) for all u, v V. d(u,v) + d(v,w) d(u,w) for all u, v, w V.

5 The Metric Space Think of it as a complete weighted graph Weight corresponds to distance between points

6 The k-server Problem k servers in the metric space Located at particular points Request of service Happens at the points To serve the request: move a server to the point of request A request sequence, where is a point in M, is a finite sequence of requests

7 The k-server Problem Two competing algorithms An adversary offline algorithm An online algorithm to be designed The adversary algorithm Knows all of right from the beginning and serves them optimally with his own k servers Thus it is offline

8 The k-server Problem Algorithm to be designed Online Only knows the next request and has to serve it immediately Cost measure Total distance moved by all the servers to serve : total cost incurred by the optimal offline algorithm

9 The k-server Problem Let denote the cost of algorithm A on request sequence. Definition: A randomized algorithm A is c- competitive (compared to the optimal offline algorithm), if for all starting configurations there is a real a, independent of, such that

10 Lower Bound of Performance Theorem: For any metric space, the competitive ratio of the k-server problem is at least k (i.e. k- competitive). Note: This lower bound holds for any randomized algorithm against an optimal online adversary The proof is skipped

The Harmonic k-server Algorithm

12 The Harmonic Algorithm Suppose node r makes a request The algorithm works as follows: Let d i be the distance from server i to the request node r If any d i = 0, do nothing (server i will serve the request; no server moves) Else, use server i with probability inversely proportional to d i......

13 The Harmonic Algorithm i.e. let and choose server i with probability. We denote the Harmonic k-server algorithm by Harmonic or H in the following slides Eddie Grove proved that H is -competitive for all.

Eddie Grove’s Proof Showing H is -competitive

15 Process of Serving Requests Let be a request sequence of length m Let be the i th request Think of the process of serving requests as follows: For each request, first the adversary moves a server, if necessary, to serve the request Then H “flips a coin” (takes a decision at random according to the pdf mentioned) to choose a server to serve

16 Process of Serving Requests In this way, we have 2m phases Odd phase (phase ): adversary serves Even phase (phase 2i ): H serves Let Dj be the distance moved by the server during phase j Odd j : Distance moved by adversary’s server Even j : Distance moved by H ’s server

17 Introducing the Potential Function To analyze, a function is used Define to be the value of at the end of phase t. is chosen in such a fashion that the following three conditions hold: 1. 2., where c k is the constant to be determined later 3. Referred as Condition (1), (2) and (3) in the following slides

18 Introducing the Potential Function What means? From Vijay Gupta’s lecture: represents the amount of work that H can be forced to do if the offline servers do not move My intuition: “Potential energy”, reserved by adversary moves, consumed by H ’s moves Why introduce ? Lemma: If Condition (1), (2) and (3) hold, then H is c k -competitive.

19 Lemma from 3 Conditions Proof:

20 Lemma from 3 Conditions Now, (1) (2)

21 Lemma from 3 Conditions Using Equation (1) and (2), we have Put Also, by the linearity of expectation, we have But, from Condition (1), Hence,

22 More Notations k offline and k online servers Lower-case letter: online server Capital letter: offline server Perfect matchings M between online and offline servers Denote by M(x) the mate of x Initial condition: every online server coincides with one offline server i.e. In the 0 th phase, d(x, M(x)) = 0 for each online server x

23 Matching M Each time an online server moves, update matching M Example Request placed at offline server A with M(a) = A Online server b, with M(b) = B, moves to the request at A Change matching to: M(b) = A, M(a) = B Matching unchanged for all other servers

24 Active Set Idea of active set is central to the proof Call OFF the set of all k offline servers For and any online server x, the radius of about x is AS(x), the active set of x, is the with largest minimizing

25 Active Set Example k = 4 All offline servers shown; only online server a shown M(a) = A Let Two possible minimizing AS(x) = {A,B,D} a A B C D

26 Active Set Any minimizing set must contain all offline servers within distance of x Intuitively, the active set includes offline servers close to x in comparison to d(x,M(x)) For convenience: Definition:

The Potential Function All the 3 conditions satisfied?

28 The Potential Function Definition: The potential function is computed as: Condition (1) is satisfied:, hence, is always non-negative At t=0, every online server and its matched offline server at identical point,

29 Notes before Analysis Condition (2) corresponds to an adversary move Condition (3) corresponds to a Harmonic move Analyzing an (generic) adversary move and a (generic) Harmonic move completes the proof

30 Notes before Analysis In the following analysis, a request is placed at some point Let A be the offline server moved in response to the request, with M(a)=A Let b be the online server moved in response to the request, with M(b)=B Unless otherwise specified, all expressions describe configuration BEFORE the movement Abuse notation: same variable for a server and the point it occupies

31 Analysis of Adversary Moves Let Z be the place of request A moves a distance D 2i+1 to Z in phase 2i+1 Consider the set of servers, Physical meaning: online server with A inside its active set, and now A moves out of its active set boundary For won’t increase

32 Analysis of Adversary Moves Indexing all y h as follows: If a in, y 0 =a ; else no y 0 For h>0, index y h such that When an offline server moves a distance D 2i+1 increases by at most for all Other terms do not increase

33 Analysis of Adversary Moves To estimate the increase in potential, we need to estimate S(y h ) Let Y h be the offline server matched to y h Lemma: For h>1,

34 Analysis of Adversary Moves Proof: Let. Hence Distance from y h to any Y j in T h is bounded by Hence,

35 Analysis of Adversary Moves By the minimality in the definition of, we have Hence

36 Analysis of Adversary Moves The increase in potential due to a move by an offline server of distance D 2i+1 is at most Condition (2) is satisfied with competitive ratio

37 Analysis of Harmonic Moves Three cases Case 1: a serves the request at A (i.e. b is identical to a ) Case 2: B is close to a, Case 3: B is at distance greater than R(a) from a, We will describe sets NS(x) for which AFTER update matching M

38 Harmonic Moves: Case 1 Case 1: a serves the request at A AFTER the move, goes to zero Nothing else is changed Chance is Expected change in potential

39 Harmonic Moves: Case 2 Case 2: B is close to a, For, let NS(x)=AS(x). NS(b)={A} Terms for unaffected Potential decreases by at least This term is dropped in an inequality in later proof

40 Harmonic Moves: Case 3 Case 3: B is at distance greater than R(a) from a, Call B i the offline server that is i th closest to a among offline servers at a distance more than R(a) from a Break any ties arbitrarily Let B l = B Call b i the online server matched to B i b l = b Let d l =d(A,b l )

41 Harmonic Moves: Case 3 For R(a,NS(a)) will be at most Now Since, we have

42 Harmonic Moves: Case 3 Only and changes Expected increase in potential at most The increase happens for each l between 1 and k-S(a)

43 Analysis of Harmonic Moves It remains to show that satisfies Condition (3) From previous results, we see that

44 Analysis of Harmonic Moves The identity, proves that This completes the proof that the Harmonic algorithm is -competitive for all

45 Reference V. Gupta, “CS497 SHT Spring 1999 Prof. Shang-Hua Teng Lecture 12: 2nd March, 1999,” Mar E.F. Grove, “The Harmonic online k-server algorithm is competitive,” Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991