Co-opetition in Network Tasks Yoram Bachrach, Peter Key, Jeff Rosenschein, Morteza Zadimoghaddam, Ely Porat.

Slides:



Advertisements
Similar presentations
Path Splicing with Network Slicing
Advertisements

A Short Tutorial on Cooperative Games
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
P3 / 2004 Register Allocation. Kostis Sagonas 2 Spring 2004 Outline What is register allocation Webs Interference Graphs Graph coloring Spilling Live-Range.
1 University of Southern California Keep the Adversary Guessing: Agent Security by Policy Randomization Praveen Paruchuri University of Southern California.
Agent Failures in Totally Balanced Games and Convex Games Authors: Yoram Bachrach 1 Ian Kash 1 Nisarg Shah 2 (speaker) 1 Microsoft Research Cambridge.
Effort Games and the Price of Myopia Michael Zuckerman Joint work with Yoram Bachrach and Jeff Rosenschein.
CROWN “Thales” project Optimal ContRol of self-Organized Wireless Networks WP1 Understanding and influencing uncoordinated interactions of autonomic wireless.
Algorithmic aspects of the core in cooperative games over graphs Vangelis Markakis Athens University of Economics and Business Dept. of Informatics Joint.
Markov Game Analysis for Attack and Defense of Power Networks Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao.
Excursions in Modern Mathematics Sixth Edition
Cooperative Weakest Link Games Yoram Bachrach, Omer Lev, Shachar Lovett, Jeffrey S. Rosenschein & Morteza Zadimoghaddam CoopMAS 2013 St. Paul, Minnesota.
Yoram Bachrach Jeffrey S. Rosenschein November 2007.
Approximation Algorithms for Orienteering and Discounted-Reward TSP Blum, Chawla, Karger, Lane, Meyerson, Minkoff CS 599: Sequential Decision Making in.
Computability and Complexity 23-1 Computability and Complexity Andrei Bulatov Search and Optimization.
Overlapping Coalition Formation: Charting the Tractability Frontier Y. Zick, G. Chalkiadakis and E. Elkind (submitted to AAMAS 2012)
Arbitration, Fairness and Stability Revenue Division in Collaborative Settings Yair Zick Advisor: Prof. Edith Elkind.
A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks John C.S. Lui The Chinese University of Hong Kong Joint work.
Traffic Engineering With Traditional IP Routing Protocols
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
Path Disruption Games (Cooperative Game Theory meets Network Security) Yoram Bachrach, Ely Porat Microsoft Research Cambridge.
Computing Shapley Values, Manipulating Value Distribution Schemes, and Checking Core Membership in Multi-Issue Domains Vincent Conitzer and Tuomas Sandholm.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Edge Deletion and VCG Payments in Graphs (True Costs of Cheap Labor Are Hard to Measure) Edith Elkind Presented by Yoram Bachrach.
14 Oct 03Cost sharing & Approximation1 Group strategy proof mechanisms via primal-dual algorithms (Cost Sharing) Martin PálÉva Tardos.
Multicast Networks Profit Maximization and Strategyproofness David Kitchin, Amitabh Sinha Shuchi Chawla, Uday Rajan, Ramamoorthi Ravi ALADDIN Carnegie.
A Payment-based Incentive and Service Differentiation Mechanism for P2P Streaming Broadcast Guang Tan and Stephen A. Jarvis Department of Computer Science,
Coalition Structures in Weighted Voting Games Georgios Chalkiadakis Edith Elkind Nicholas R. Jennings.
Computing the Banzhaf Power Index in Network Flow Games
Distributed Rational Decision Making Sections By Tibor Moldovan.
Vickrey Prices and Shortest Paths What is an Edge Worth? By John Hershberger and Subhash Suri Carlos Esparza and Devin Low 3/5/02.
Approximating Power Indices Yoram Bachrach(Hebew University) Evangelos Markakis(CWI) Ariel D. Procaccia (Hebrew University) Jeffrey S. Rosenschein (Hebrew.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
Multi-item auctions & exchanges (multiple distinguishable items for sale) Tuomas Sandholm Carnegie Mellon University.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Overlapping Coalition Formation: Charting the Tractability Frontier Y. Zick, G. Chalkiadakis and E. Elkind (AAMAS 2012)
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
CSU 670 Review Fall Software Development Application area: robotic games based on combinatorial maximization problems. Software development is about.
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
Computational problems associated with a solution concept Why we need the compact representation of coalitional games Compactly-represented coalitional.
A Unified Modeling Framework for Distributed Resource Allocation of General Fork and Join Processing Networks in ACM SIGMETRICS
Network Aware Resource Allocation in Distributed Clouds.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing Weijie Shi*, Linquan Zhang +, Chuan Wu*, Zongpeng Li +, Francis C.M. Lau*
Online Algorithms By: Sean Keith. An online algorithm is an algorithm that receives its input over time, where knowledge of the entire input is not available.
Automated Bandwidth Allocation Problems in Data Centers Yifei Yuan, Anduo Wang, Rajeev Alur, Boon Thau Loo University of Pennsylvania.
A Study of Central Auction Based Wholesale Electricity Markets S. Ceppi and N. Gatti.
Memory Allocation of Multi programming using Permutation Graph By Bhavani Duggineni.
Complexity of Determining Nonemptiness of the Core Vincent Conitzer, Tuomas Sandholm Computer Science Department Carnegie Mellon University.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Cooperation, Power and Conspiracies Yoram Bachrach.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
SNU OOPSLA Lab. 1 Great Ideas of CS with Java Part 1 WWW & Computer programming in the language Java Ch 1: The World Wide Web Ch 2: Watch out: Here comes.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
Algorithmic Game Theory and Internet Computing Vijay V. Vazirani 3) New Market Models, Resource Allocation Markets.
11 The Cost of Stability in Network Flow Games Ezra Resnick Yoram Bachrach Jeffrey S. Rosenschein.
TOWARD OPTIMAL ALLOCATION OF LOCATION DEPENDENT TASKS IN CROWDSENSING Jingtao Yao Lab of Cyberspace Computing Shanghai Jiao Tong University.
Coalitional Games on “Sparse” Social Networks Edith Elkind University of Oxford.
Dynamic Weighted Voting Games Edith Elkind Dmitrii Pasechnik Yair Zick AAMAS 2013.
Computing Shapley values, manipulating value division schemes, and checking core membership in multi-issue domains Vincent Conitzer, Tuomas Sandholm Computer.
Complexity of Determining Nonemptiness of the Core
Capriccio – A Thread Model
CS223 Advanced Data Structures and Algorithms
File Transfer Issues with TCP Acceleration with FileCatalyst
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Beyond FTP & hard drives: Accelerating LAN file transfers
Presentation transcript:

Co-opetition in Network Tasks Yoram Bachrach, Peter Key, Jeff Rosenschein, Morteza Zadimoghaddam, Ely Porat

Agenda Joint Network TasksAdvertising in NetworksNetwork Security

Negotiation 3

“Collective Buying Power” Quota: 100 Buyers Reward: Discount of $10 (total saving 10*100=$1000) 4 25 Users70 Users50 Users30 Users

Transferable Utility Games

Solution Concepts Cv(C) …

Solution Concepts Cv(C) … Stability Unblocked agreements

Solution Concepts Cv(C) … Fairness (Power) Average contribution across all agent permutations

Solution Concepts Cv(C) … Fairness (Power) Average contribution across all agent coalitions

Solving the Groupon Game Average contribution across all permutations Users %41.67%25% Required: 100 Users 25 Users70 Users50 Users30 Users

Solving the Groupon Game Average contribution across all permutations Users %66.67%16.66% Required: 100 Users 15 Users70 Users50 Users30 Users

Solving the Groupon Game Core: no deviations – Cannot win without the 70 users Users %100%0% Required: 100 Users 15 Users70 Users50 Users30 Users

Display Advertising

Sponsored Search Advertising

Social Network Advertising

Social Advertising In Groupon

Connectivity Games s t

s t

s t

s t

s t

Richer Model p p p b

Network Reliability p p p b

Network Reliability Models Computer nodes (vertices) connected to each other via network links (edges) – Each link has a certain bandwidth (capacity) Within a time unit, links have a certain probability of failure – Typically networks have some redundancy Classical network reliability works – Each link has a “survival probability”, of remaining in the graph – Compute the probability of obtaining the goal in the surviving graph – Various network goals Source target connectivity (STC-P), full connectivity (FC-P), full connectivity given a backbone infrastructure, connectivity of specific servers, allowing a certain bandwidth between the source and target, … – Complexity Valiant: STC-P is #P-hard Provan and Ball: FC-P is #P hard

Connectivity Games p p p b

Example Network (1)

Example Network (2)

Hotspots and Bargaining

Computational Limitations CG SolutionComputation Power indices Banzhaf, Shapley #P-Complete (even without backbones) Polynomial algorithm for trees General approximations CorePolynomial algorithm Finding veto agents coNP-complete Polynomial algorithm in trees

Network Security Physical networks – Placing checkpoints – Locations for routine checks Computer networks – Protecting servers and links from attacks Various costs for different nodes and links – How easy it is to deploy a check point – Performance degradation for protected servers What agreements would be reached regarding related budgets and rewards?

Security Crowdsourcing Texas Virtual Boarder Watch – Individuals observe US-Mexico border for suspicious behavior

Blocking an adversary s t

s t

s t

s t

s t

s t

s t

Incorporating costs s t

s t

Multiple Adversaries s1 t s2 3 2 t

Coalitions in Network Security Agents must for coalitions to successfully block the adversary – How should they split costs and rewards? Security resources are limited – Which node should be allocated these resources first? Similar tools from Game Theory s t

Path Disruption Games Games played on a graph G= (a network) – Simple version (PDGs): coalition wins if it can block the adversary and loses otherwise – Model with costs (PDGCs): a coalition is guaranteed a reward r for blocking the adversary, but incurs the cost of its checkpoints

Computational Limitations PDG SolutionComputation Coalition utility (optimal strategy)NP-Hard for multiple adversaries and costs Polynomial algorithm for other cases Power indices Banzhaf, Shapley #P-Complete even for single adversary and no costs CorePolynomial algorithm Polynomial algorithm for single adversary NP-Complete for multiple adversaries

Related Models Network Flow Games – C’s value: the maximal flow it can send between s and t Collusion in network auctions – Procurer buys a path from s to t in an auction – C’s value: obtained price when rigging the auction

Conclusions p p p b s t