CRESCCO Project IST-2001-33135 Work Package 2 Critical Resources and Selfish Agents Paolo Penna Università di Salerno M.I.T. (majana institute of technology ) [email protected] Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Proactive initiative “Global Computing” SELFISH DIFFERENT DIFFERENT ENTITIES SOCIO-ECONOMIC GOALS THAT COOPERATE ENTITIES AUTONOMOUS SYSTEMS PROVIDERS INTERNET INTERNET PRIVATE COMPANIES UNIVERSITIES The Internet Open, self organized, no central authority, anarchic: 1. A router may forward packets to optimize its own traffic 2. A client may “ignore” the server ackws and not follow the TCP packet transmission rate 3. An Autonomous System may report false link status to redirect traffic to another AS Main Goals 1. A deeper understanding of basic principles of a complex system (Internet) Strict and centralized vs loose and local control What is the price of anarchy? 2. Methodology to develop good solutions Design a new “TCP/IP protocol” robust wrt selfish users 3. New concepts, mathematical tools and algorithmic techniques M.I.T. (majana institute of technology ) Mathematical Tools Theory of Computing •Computational complexity •Design and Analysis of Algorithms Microeconomics and Game Theory •Nash equilibria •Mechanism design Research Progress 1. P. Ambrosio and V. Auletta. Deterministic Monotone Algorithms for Scheduling on Related Machines. In Proc. of WAOA, 2004. 2. V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005. 3. V. Auletta, R. De Prisco, P. Penna, and G. Persiano. Monotone algorithms characterize mechanisms for selfish jobs. CRESCCO TR, 2004. 4. V. Auletta, A.V. Fishkin, and G. Persiano. On gaining a control over two links occupied by selfish agents. CRESCCO TR, 2004. 5. P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, 2005. 6. P. Penna and C. Ventre. When is cost-sharing possible? CRESCCO TR, 2004. 7. P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 2004. APPLICATIONS (workpackages): WIRELESS SCHEDULING/ROUTING EXPERIMENTS NEW GAME NETWORKS THEORY: (WP5): [2,5,6,7] [7] (WP1): (WP1):[5,6,7] [1,2,3,4] Routing/Scheduling Scheduling Selfish Machines: Selfish users own the links and privately know their speeds source s1 0 s2 0 sm 0 destination •Unsplittable traffic J1, J2 ,…,Jn •We look at the network congestion (makespan) Mechanism design Mechanism: M=(A,P) Computes a solution X=A(r1,r2,…, ri ,…,rn ) Provides a payment Pi(r1,r2,…, ri ,…,rn ) t1,t2,…, ti ,…,tn cost true input i(X,t i) Agents’ GOAL: maximize their own utility ui (ri) := Pi(r1,r2,…, ri ,…,rn ) – costi(X,ti) Mechanism design Strategyproof mechanisms: no incentive to lie (report ri ti) ui (ti) ui (ri) (truth-telling is the best strategy) Mechanism design Question: Given A, is there P s.t. M=(A,P) is strategyproof? In general, NO! Scheduling Selfish Machines Monotone algorithms: an agent declaring a higher speed does not get less work/load. A monotone [Archer and Tardos, STOC 2001] M=(A,P) strategyproof Translation techniques Algorithm Mechanism A A hard M=(A,P) A’ loss of performance M=(A’,P) Translation techniques (selfish machines) Not needed A A “easy” A’=A A’ c-apx c’-apx A black-box, polytime greedy (like) and speeds si=2k offline: c’ = c(1+) online: c < c’ c• [1] P. Ambrosio and V. Auletta. Deterministic Monotone Algorithms for Scheduling on Related Machines. In Proc. of WAOA, 2004. [2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005. Loss of performance Online vs Offline (m=2) online offline “<“ is possible 3/2 c hardest c’ c•1.78 (1+) (1+) unselfish selfish [2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005. “Unknown” input Input: jobs future speeds loss selfish 1+ selfish loss < 1.83 Verification < loss < < < [Aulettaloss et al, ICALP’04] selfish selfish future selfish < loss < [2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005. [3] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. Monotone algorithms characterize mechanisms for selfish jobs. CRESCCO TR, 2004. Cost-Sharing Games Service provider S Customers Q U ti = willingness to pay 1. Which customers to service? 2. At which price? Cost-Sharing Games Service provider S Customers Q U 1. Budget balanced: Cost(Q) = Pi 2. Users can form coalitions Group strategyproof mechanisms Cost-Sharing Games Service provider Customers S Q U Multicast: S S 1 1 0.9 0.9 wired 0.9 0.9 wireless Cost-Sharing Games A [Moulin-Shenker’97] A=OPT A [7] A any M=(A,P) (1+)-APX NP-hard M=(A,P) OPT (wired:polytime) (wireless: NP-hard) [7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 200 Cost-Sharing Games A M=(A,P) A=OPT A (1+)-APX NP-hard [7] M=(A,P) Free-riders (fairness) [5] P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, 2005. [7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 200 Cost-Sharing Games A M=(A,P) A=OPT A [7] [6] (1+)-APX NP-hard M=(A,P) characterization [5] P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, 2005. [6] P. Penna and C. Ventre. When is cost-sharing possible? CRESCCO TR, 2004. [7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 200 This year: Recommendations and future plans (from 2nd year review talk) 1. Consider Algorithms and Game Theory jointly 2. Technological Issues 1. Wireless vs Wired [5,6,7] 2. Assumptions (e.g., link speeds) [1,4] 3. How much technology can help (e.g. verification, known users traffic vs known router speeds) [2,3] 3. New concepts, new mathematical tools and new algorithmic techniques [2,5,6,7] Cross fertilization between TCS, micro-economics and game theory M.I.T. (majana institute of technology ) Answered Questions 1. When verification helps: Online YES, offline NO [2] 2. Online Setting: More difficult! [2] 3. Selfish Jobs vs Selfish Machines: Constant loss [3] 4. Wireless Networks: Budget-balance, Wireless vs Wired [6,7] 5. Mechanism Design Theory: Problem restrictions [6,7] Important Issues (2nd year review talk) 3rd Computational issues •Efficiency, extract infos Technological issues •Different assumptions Existing game theory •Not always suitable New Algorithms [1-4,7,8] [1-4] New Game Theory [6,3] 2nd year work: ICALP (2), IFIP-TCS, SPAA,[2,3,5-6] STACS, Provably Better Theory SIROCCO, Technology Theor. Comp. Helps Sci. Thank You Combining Tools ? Theory of Computing Efficient (polytime apx algorithm) Game Theory Incentive compatible (strategyproof mechanism) “Good Protocol”: part doresource we change? 1. RunWhich fast, optimal allocation 2. Agents “follow” the protocol New Game Theory: Helpful? Verification: 1. Offline Scheduling, NO 2. Online Scheduling, YES Cost-Sharing Methods 1. YES Other Issues: 1. Technology 2. Fairness M.I.T. (majana institute of technology ) New Game Theory A hard loss A easier A’ M=(A’,P) new game theory A’ no loss, provably better M=(A’,P) Scheduling Selfish Jobs No selfish routing Use a scheduler 1. Users cannot refuse the allocation 2. May lie about their traffic weights Provide correct incentives (mechanism design) [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003. Mechanisms for Wireless Networks • Wireless Cost-Sharing: 10E 2E 1E 3E 10E 2E 11E 8E Source (e.g., popular sport event) GOAL: maximize benefits-costs [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, 2003. Also submitted for publication. Mechanism Design Theory Problems Consistent problems Utilitarian problems Most Reliable Path Arbitrage Task Scheduling Knapsack VCG [1961] M.I.T. (majana institute of technology ) [6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003 Mechanisms for Wireless Networks Polynomial-time mechanisms: General graphs Trees, “Metric-tree” graphs Lower bound No R-APX, every R>1 Upper bound OPT, distributed mechanism Distributed Suggests a better APX mechanism new broadcast for other algorithm cases [7] P. Penna and C. Ventre. Energy-efficient broadcasting in ad-hoc networks: combining MSTs with shortest-path trees. Technical report of CRESCCO, 2003. [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, 2003. Mechanisms for Wireless Networks Polynomial-time VCG-based mechanisms: Lower bound General graphs Upper bound No R-APX, every R>1 Metric, remain Well-spread NP-hard 1.5-APX O(1)-APX [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, 2003. Also accepted in Theoretical Computer Science. Mechanisms for Wireless Networks • Ad Hoc Nets: k poweri(j) j i GOAL: Strong connectivity, Private knowledge of i minimal total power [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, 2003. Also accepted in Theoretical Computer Science. Nash equilibria for selfish routing … source 1 2 destination Layered graphs Identical links l Theorem [5]: Every l-layered network has Corollary: 1-layered graphs are the worst coordination ratio at l-layered most Theorem [5]: Some networks doinstances. not have pure Nash equilibria. O(log m/log log m) [5] S. Kontogiannis, D. Fotakis and P. Spirakis. Selfish unsplittable flows. Technical report, Computer Technology Institute, 2003. Bayesian-Nash Scheduling Selfish Jobs Speed ratio r=smax/smin r 1.61 1 r 2 Lower bound r 1 1 2r 2 r 1 1 min r ,1 2 r Upper bound 1 m 1 r 1 r No exact with Exact (non polytime) (polytime) ε Different job per agent,1 Bayesian-Nash identicalspeeds, speeds one dominant Bayesian-Nash strategies r 1 M.I.T. (majana institute of technology ) [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003. Scheduling Selfish Jobs k vs m k m k m Lower bound k 2 k 2 m2 m3 m4 any m 7 6 4 3 Upper bound 3/ 2 ε 2 3/ 2 ε 9/ 4ε 3 ε 41 1 / m Identical speeds, k jobs per agent, Bayesian-Nash [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003. Also submitted for publication Scheduling Selfish Machines Machine speeds Our result Any 4+ Previous results [ArcTar01] 3+ Divisible 2+ 3+ Randomized, no dominant strategies Deterministic, dominant strategies [1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004 Scheduling Selfish Machines Machine speeds Our result Any 4+ Previous results [ArcTar01] 3+ Divisible 2+ 3+ Real cases (e.g., Sonet/SDH standards) [1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004 Approximation and selfish agents Applications of restricted one-parameter agents: Selfish Jobs 1. (1+)-APX mechanism (breaks lower bounds in [2]) Selfish Machines: 1. first (1+)-APX mechanism 2. breaks a lower bound in [ArcTar01] for a weighted variant of scheduling Verification helps! [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, 2003. Also submitted for publication Approximation and selfish agents We introduce restricted one-parameter agents No need for new algorithms! (TCS gets its revenge) [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, 2003. Approximation and selfish agents We introduce restricted one-parameter agents Theorem [3]: Polynomial-time c-approximation algorithm A M = (A , P) truthful polynomial-time (c+)approximation [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, 2003. Mechanism design Mechanism: M=(A,P) Computes a solution X=A(r1,r2,…, ri ,…,rn ) Provides a payment Pi(r1,r2,…, ri ,…,rn ) costi(X,ti) Agents’ GOAL: maximize their own utility ui (r1,r2,…, ri ,…,rn ) := Pi(r1,r2,…, ri ,…,rn ) – costi(X,ti) Mechanism design Strategyproof mechanisms: no incentive to lie 1. Bayesian-Nash ui (t1,t2,…, ti ,…,tn ) ui (t1,t2,…, ri ,…,tn ) (truth-telling is Nash equilibrium) 2. With dominant strategies ui (r1,r2,…, ti ,…,rn ) ui (r1,r2,…, ri ,…,rn ) (truth-telling is always the best strategy) Mechanisms for Wireless Networks • Wireless Cost-Sharing: 10E 2E 3E 10E 2E 11E Source (e.g., popular sport event) GOAL: maximize benefits-costs [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, 2003. Nash equilibria for selfish routing … 1 1/m 1 1 Expected Expected MAX LOAD: MAX LOAD: 1 Θ(ln m/ln ln m) M.I.T. (majana institute of technology ) Price of anarchy Worst-case equilibria Coordination ratio Routing/Scheduling Scheduling Selfish Routing: SelfishMachines: Jobs: Scheduling Selfish Selfish users choose usersown own the best thelinks traffic path and for and their privately own know traffic knowtheir theirspeeds weights Selfish users the privately source destination •m links with different speeds s1, s2,…,sm •Unsplittable traffic t1, t2 ,…, tn •We look at the network congestion (makespan) Routing/Scheduling Scheduling SchedulingSelfish Selfish Machines: Jobs: Selfish Selfish users users own own thethe links traffic andand privately privately know know their their speeds weights source destination •m links with different speeds s1, s2,…,sm •Unsplittable traffic t1, t2 ,…, tn •We look at the network congestion (makespan)
© Copyright 2026 Paperzz