An equivalent version of the Caccetta-Häggkvist conjecture in an online load balancing problem Angelo Monti 1, Paolo Penna 2, Riccardo Silvestri 1 1 Università.

Slides:



Advertisements
Similar presentations
Private capacities in mechanism design Vincenzo Auletta Paolo Penna Giuseppe Persiano Università di Salerno, Italy.
Advertisements

The strength of routing Schemes. Main issues Eliminating the buzz: Are there real differences between forwarding schemes: OSPF vs. MPLS? Can we quantify.
1 Optimal Online Algorithms for Minimax Resource Scheduling Imen BOURGUIBA CAS 744 McMaster University.
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
Optimization Problems in Optical Networks. Wavelength Division Multiplexing (WDM) Directed: Symmetric: Undirected: Optic Fiber.
Optical networks: Basics of WDM
ECE 667 Synthesis and Verification of Digital Circuits
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Dynamic Graph Algorithms - I
Properties of SPT schedules Eric Angel, Evripidis Bampis, Fanny Pascual LaMI, university of Evry, France MISTA 2005.
Pseudonyms in Cost-Sharing Games Paolo Penna Florian Schoppmann Riccardo Silvestri Peter Widmayer Università di Salerno Stanford University Università.
Optimal Fast Hashing Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay (Hebrew Univ., Israel)
Approximation Algorithms for Capacitated Set Cover Ravishankar Krishnaswamy (joint work with Nikhil Bansal and Barna Saha)
Approximating Maximum Subgraphs Without Short Cycles Guy Kortsarz Join work with Michael Langberg and Zeev Nutov.
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
A Fairy Tale of Greedy Algorithms Yuli Ye Joint work with Allan Borodin, University of Toronto.
Fingerprint Clustering - CPM Fingerprint Clustering with Bounded Number of Missing Values Paola Bonizzoni, Gianluca Della Vedova, Giancarlo Mauri.
Chapter 3 The Greedy Method 3.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
AT&T Labs1 The Sensor Cover Problem Alon Efrat (U. Arizona) Adam Buchsbaum (AT&T Labs) Shaili Jain (Harvard) Suresh Venkatasubramanian (AT&T Labs) Ke Yi.
3rd AMORE meeting, Leiden AMORE meeting, 1-4 October, Leiden, Holland A graph theoretical approach to shunting problems L. Koci, G. Di Stefano Dipartimento.
Structure and Phase Transition Phenomena in the VTC Problem C. P. Gomes, H. Kautz, B. Selman R. Bejar, and I. Vetsikas IISI Cornell University University.
Energy-Efficient Broadcasting in Ad-Hoc Networks: Combining MSTs with Shortest-Path Trees Carmine Ventre Joint work with Paolo Penna Università di Salerno.
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
Paging for Multi-Core Shared Caches Alejandro López-Ortiz, Alejandro Salinger ITCS, January 8 th, 2012.
End-to-End Delay Analysis for Fixed Priority Scheduling in WirelessHART Networks Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen.
1 Distributed Computing Optical networks: switching cost and traffic grooming Shmuel Zaks ©
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Throughput Competitive Online Routing Baruch Awerbuch Yossi Azar Serge Plotkin.
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
Equality Function Computation (How to make simple things complicated) Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Guanfeng.
Structure and Phase Transition Phenomena in the VTC Problem C. P. Gomes, H. Kautz, B. Selman R. Bejar, and I. Vetsikas IISI Cornell University University.
An Algorithm for the Coalitional Manipulation Problem under Maximin Michael Zuckerman, Omer Lev and Jeffrey S. Rosenschein (Simulations by Amitai Levy)
An Efficient Clustering Algorithm For Low Power Clock Tree Synthesis Rupesh S. Shelar Enterprise Microprocessor Group Intel Corporation, Hillsboro, OR.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
1 Optimal Cycle Vida Movahedi Elder Lab, January 2008.
Chapter 2 Greedy Strategy I. Independent System Ding-Zhu Du.
Line Transversals to Disjoint Balls (Joint with C. Borcea, O. Cheong, X. Goaoc, A. Holmsen) Sylvain Petitjean LORIA, Vegas team O. Schwarzkopf.
An Analysis of First-Fit N.S. Narayanaswamy (IITM) Work with R. Subhash Babu.
Solving the Maximum Cardinality Bin Packing Problem with a Weight Annealing-Based Algorithm Kok-Hua Loh University of Maryland Bruce Golden University.
A deterministic near-linear time algorithm for finding minimum cuts in planar graphs Thank you, Steve, for presenting it for us!!! Parinya Chalermsook.
CprE 458/558: Real-Time Systems (G. Manimaran)1 CprE 458/558: Real-Time Systems RMS and EDF Schedulers.
Computer Science & Engineering, ASU1/17 Pfair Scheduling of Periodic Tasks with Allocation Constraints on Multiple Processors Deming Liu and Yann-Hang.
Embeddings, flow, and cuts: an introduction University of Washington James R. Lee.
Multicommodity flow, well-linked terminals and routing problems Chandra Chekuri Lucent Bell Labs Joint work with Sanjeev Khanna and Bruce Shepherd Mostly.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
Christoph Lenzen, STOC What is Load Balancing? work sharing low-congestion routing optimizing storage utilization hashing.
Rounding scheme if r * j  1 then r j := 1  When the number of processors assigned in the continuous solution is between 0 and 1 for each task, the speed.
© The McGraw-Hill Companies, Inc., Chapter 12 On-Line Algorithms.
Vasilis Syrgkanis Cornell University
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
Approximation Algorithms Greedy Strategies. I hear, I forget. I learn, I remember. I do, I understand! 2 Max and Min  min f is equivalent to max –f.
Online Bipartite Matching with Augmentations Presentation by Henry Lin Joint work with Kamalika Chaudhuri, Costis Daskalakis, and Robert Kleinberg.
TU/e Algorithms (2IL15) – Lecture 11 1 Approximation Algorithms.
The Set-covering Problem Problem statement –given a finite set X and a family F of subsets where every element of X is contained in one of the subsets.
The MST and the upper box dimension
A Polynomial-time Tree Decomposition for Minimizing Congestion
Analysis and design of algorithm
Bart M. P. Jansen June 3rd 2016, Algorithms for Optimization Problems
Neural Networks for Vertex Covering
REDUCESEARCH Polynomial Kernels for Hitting Forbidden Minors under Structural Parameterizations Bart M. P. Jansen Astrid Pieterse ESA 2018 August.
Chapter 11 Limitations of Algorithm Power
A Fundamental Bi-partition Algorithm of Kernighan-Lin
NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979.
List Scheduling Given a list of jobs (each with a specified processing time), assign them to processors to minimize makespan (max load) In Graham’s notation:
Dynamic and Online Algorithms:
2nd TERANET 2011 International Workshop co-located with DISC 2011
Minimum Spanning Trees
Presentation transcript:

An equivalent version of the Caccetta-Häggkvist conjecture in an online load balancing problem Angelo Monti 1, Paolo Penna 2, Riccardo Silvestri 1 1 Università di Roma “La Sapienza” 2 Università di Salerno

Outline Online load balancing Caccetta-Häggkvist conjecture Connection between them

Online load balancing processors task (weight, subset, duration)

Online load balancing Example: linear topologies [Bar-Noy et al’99] best worst

Online load balancing How good is greedy? Example: linear topologies [Bar-Noy et al’99] best worst 8 tasks

Online load balancing How good is greedy? Example: linear topologies [Bar-Noy et al’99] best worst 4 tasks

Online load balancing How good is greedy? Example: linear topologies [Bar-Noy et al’99] worst 2 tasks

Online load balancing How good is greedy? Example: linear topologies [Bar-Noy et al’99] worst 1 task  (log n)-competitive

Online load balancing modified-greedy Example: linear topologies [Bar-Noy et al’99] worst 8 tasks4 tasks 2 tasks 1 task 4-competitive More general approach [Crescenzi et al’03]

Online load balancing More general approach [Crescenzi et al’03]: “structure”  comp(“structure”) 1. Competitive ratio of modified-greedy 2. Simple local algorithm 3. Combinatorial approach

Online load balancing More general approach [Crescenzi et al’03]: “structure”  comp(“structure”) Optimal for “nice structures” identical, linerar, hierarchical

Online load balancing More general approach [Crescenzi et al’03]: “structure”  comp(“structure”) Optimal for “nice structures” identical, linerar, hierarchical How good on the “uniform” case? “Equivalent” to a fundamental question in graph theory

Caccetta-Häggkvist Conjecture Every directed graph on n nodes and minimum outdegree d has a directed cycle of length at most n/d

Caccetta-Häggkvist Conjecture Every directed graph on n nodes and minimum outdegree d has a directed cycle of length at most n/d ?

Modified-greedy algorithms S 1,…, S i,…, S m S 1 ’,…, S i ’,…, S m ’ R 1,…, R i,…, R m problem “structure” R i =  S j : S j ’ intersects S i ’ How good is modified-greedy? max i |R i |/|S i ’ | [Crescenzi et al’03]

The “uniform” case How good is modified-greedy? comp(n,s) Each task can be assigned to exactly s processors Apply Crescenzi et al’03 to uniform case S 1,…, S i,…, S m S 1 ’,…, S i ’,…, S m ’ R 1,…, R i,…, R m R i =  S j : S j ’ intersects S i ’ min S’ max i |R i |/|S i ’ | = complete hypergraph “best” 1.Limitations of this method 2.Local vs global

The “uniform” case Each task can be assigned to exactly s processors Trivial upper bound comp(n,s)  n/s greedy Cannot be improved unless CH-Conjecture fails

The “uniform” case Each task can be assigned to exactly s processors Cannot be improved unless CH-Conjecture fails all large

The “uniform” case Each task can be assigned to exactly s processors Cannot be improved unless CH-Conjecture fails

The “uniform” case Each task can be assigned to exactly s processors Cannot be improved unless CH-Conjecture fails high cost equivalent!

High cost d n-d Caccetta-Häggkvist Conjecture Every directed graph on n nodes and minimum outdegree d has a directed cycle of length at most n/d A directed graph on n nodes and minimum outdegree d no directed cycle of length at most s (n – n/s) n/sn/s s

High cost What are these algorithms?“Blind” algorithms “fixed” allocation

Conclusions Analyze “blind” algorithms –Diffult, interesting question Modified-greedy algos are “useless” for uniform instances Maybe a different view of the CH-Conjecture –Procedure ot check the conjecture?

Thank You