48
CRESCCO Project IST-2001-33135 Work Package 2 Critical Resources and Selfish Agents Paolo Penna Paolo Penna Università di Salerno Università di Salerno [email protected] [email protected] Project funded by the Future and Emerging Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Technologies arm of the IST Programme – FET Proactive initiative “Global Computing” Proactive initiative “Global Computing”

CRESCCO Project IST-2001-33135

  • Upload
    naiya

  • View
    22

  • Download
    1

Embed Size (px)

DESCRIPTION

CRESCCO Project IST-2001-33135. Work Package 2 Critical Resources and Selfish Agents Paolo Penna Università di Salerno [email protected]. M.I.T. (majana institute of technology). - PowerPoint PPT Presentation

Citation preview

Page 1: CRESCCO Project IST-2001-33135

CRESCCO ProjectIST-2001-33135

Work Package 2

Critical Resources and Selfish Agents

Paolo PennaPaolo PennaUniversità di SalernoUniversità di Salerno

[email protected]@dia.unisa.it

Project funded by the Future and Emerging Technologies arm of Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Proactive initiative “Global the IST Programme – FET Proactive initiative “Global Computing”Computing”

M.I.T. (majana institute of technology)

Page 2: CRESCCO Project IST-2001-33135

DIFFERENT SOCIO-ECONOMIC ENTITIES DIFFERENT GOALS

INTERNET

SELFISH ENTITIES THAT COOPERATE

INTERNET

PROVIDERSAUTONOMOUS SYSTEMS

UNIVERSITIES

PRIVATECOMPANIES

Page 3: CRESCCO Project IST-2001-33135

The Internet

Open, self organized, no central authority, anarchic:

1. A router may forward packets to optimize its own traffic

2. A client may “ignore” the server ackws and not follow the TCP packet transmission rate

3. An Autonomous System may report false link status to redirect traffic to another AS

Page 4: CRESCCO Project IST-2001-33135

Main Goals1. A deeper understanding of basic principles of a complex system (Internet)

2. Methodology to develop good solutions

3. New concepts, mathematical tools and algorithmic techniques

Strict and centralized vs loose and local controlWhat is the price of anarchy?

Design a new “TCP/IP protocol” robust wrt selfish users

M.I.T. (majana institute of technology)

Page 5: CRESCCO Project IST-2001-33135

Mathematical Tools

Theory of Computing•Computational complexity•Design and Analysis of Algorithms

Microeconomics and Game Theory•Nash equilibria•Mechanism design

Page 6: CRESCCO Project IST-2001-33135

Research Progress1. P. Ambrosio and V. Auletta. Deterministic Monotone Algorithms

for Scheduling on Related Machines. In Proc. of WAOA, 2004.2. V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On

designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005.

3. V. Auletta, R. De Prisco, P. Penna, and G. Persiano. Monotone algorithms characterize mechanisms for selfish jobs. CRESCCO TR, 2004.

4. V. Auletta, A.V. Fishkin, and G. Persiano. On gaining a control over two links occupied by selfish agents. CRESCCO TR, 2004.

5. P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, 2005.

6. P. Penna and C. Ventre. When is cost-sharing possible? CRESCCO TR, 2004.

7. P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 2004.

SCHEDULING/ROUTING (WP1): [1,2,3,4]NEW GAME THEORY: [2,5,6,7]EXPERIMENTS (WP5): [7]APPLICATIONS (workpackages): WIRELESS NETWORKS (WP1): [5,6,7]

Page 7: CRESCCO Project IST-2001-33135

Routing/Scheduling

•Unsplittable traffic J1, J2 ,…,Jn

•We look at the network congestion (makespan)

source destination

Scheduling Selfish Machines:Selfish users own the links and privately know their speeds

s1

sm

s2

0

0

0

Page 8: CRESCCO Project IST-2001-33135

Mechanism design

Mechanism: M=(A,P)

Computes a solution

X=A(r1,r2,…, ri ,…,rn )

Provides a payment

Pi(r1,r2,…, ri ,…,rn )

Agents’ GOAL: maximize their own utility ui (ri) := Pi(r1,r2,…, ri ,…,rn ) – costi(X,ti)

costi(X,ti) t1,t2,…, ti ,…,tn

true input

Page 9: CRESCCO Project IST-2001-33135

Mechanism design

Strategyproof mechanisms:

no incentive to lie (report ri ti)

ui (ti) ui (ri)

(truth-telling is the best strategy)

Page 10: CRESCCO Project IST-2001-33135

Mechanism design

Question: Given A, is there P s.t.

M=(A,P)

is strategyproof?

In general, NO!

Page 11: CRESCCO Project IST-2001-33135

Scheduling Selfish Machines

Monotone algorithms: an agent declaring a higher speed does not get less work/load.

A monotone M=(A,P) strategyproof

[Archer and Tardos, STOC 2001]

Page 12: CRESCCO Project IST-2001-33135

Translation techniques

A’A M=(A’,P)

Algorithm Mechanism

M=(A,P)A

hard

loss of performance

Page 13: CRESCCO Project IST-2001-33135

Translation techniques

A black-box, polytime

A’A“easy”

c-apx c’-apxoffline: c’ = c(1+)online: c < c’ c•

A’=AA

Not needed

[1] P. Ambrosio and V. Auletta. Deterministic Monotone Algorithms for Scheduling on Related Machines. In Proc. of WAOA, 2004.[2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005.

greedy (like) andspeeds si=2k

(selfish machines)

Page 14: CRESCCO Project IST-2001-33135

Loss of performance

[2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005.

Online vs Offline (m=2)

offline

online

selfishunselfish

(1+) (1+)

3/2 c c’ c•1.78

“<“ is possible

hardest

Page 15: CRESCCO Project IST-2001-33135

“Unknown” input

[2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, 2005.

Input: jobs speeds loss

1+

[3] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. Monotone algorithms characterize mechanisms for selfish jobs. CRESCCO TR, 2004.

selfish

loss < 1.83selfishfuture

< loss <

selfish

selfish future selfish

< loss < < loss < Verification[Auletta et al, ICALP’04]

Page 16: CRESCCO Project IST-2001-33135

Cost-Sharing Games

UQ

1. Which customers to service?2. At which price?

S

Service provider Customers

ti = willingness to pay

Page 17: CRESCCO Project IST-2001-33135

Cost-Sharing Games

UQS

Service provider Customers

1. Budget balanced: Cost(Q) = Pi

2. Users can form coalitions Group strategyproof mechanisms

Page 18: CRESCCO Project IST-2001-33135

Cost-Sharing Games

UQS

Service provider Customers

S

0.9 0.9

1

Multicast:S

0.9 0.9

1

wired wireless

Page 19: CRESCCO Project IST-2001-33135

Cost-Sharing Games

M=(A,P)[Moulin-Shenker’97]

A

A=OPT (1+)-APXNP-hard

A any OPT (wired:polytime)

M=(A,P)[7]

A

[7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 2004.

(wireless: NP-hard)

Page 20: CRESCCO Project IST-2001-33135

Cost-Sharing Games

M=(A,P)A

A=OPT (1+)-APXNP-hard

Free-riders (fairness)

[5] P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, 2005.

M=(A,P)[7]

A

[7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 2004.

Page 21: CRESCCO Project IST-2001-33135

Cost-Sharing Games

M=(A,P)A

A=OPT (1+)-APXNP-hard

[5] P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, 2005.

M=(A,P)[7]

A

[7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 2004.

[6] P. Penna and C. Ventre. When is cost-sharing possible? CRESCCO TR, 2004.

[6] characterization

Page 22: CRESCCO Project IST-2001-33135

Recommendations and future plans (from 2nd year review talk)

1. Consider Algorithms and Game Theory jointly2. Technological Issues

1. Wireless vs Wired2. Assumptions (e.g., link speeds)3. How much technology can help (e.g. verification,

known users traffic vs known router speeds)3. New concepts, new mathematical tools and new

algorithmic techniques

Cross fertilization between TCS, micro-economics and game theory

[5,6,7][1,4]

[2,3]

[2,5,6,7]

M.I.T. (majana institute of technology)

This year:

Page 23: CRESCCO Project IST-2001-33135

Answered Questions1. When verification helps:

Online YES, offline NO [2]2. Online Setting:

More difficult! [2]3. Selfish Jobs vs Selfish Machines:

Constant loss [3]4. Wireless Networks:

Budget-balance, Wireless vs Wired [6,7]5. Mechanism Design Theory:

Problem restrictions [6,7]

Page 24: CRESCCO Project IST-2001-33135

Important Issues (2nd year review talk)

Computational issues•Efficiency

Technological issues•Different assumptions

Existing game theory•Not always suitable

New Algorithms[1-4,7,8]

New Game Theory[6,3]

, extract infos

Provably Better2nd year work: ICALP (2), IFIP-TCS, SPAA, STACS, SIROCCO, Theor. Comp. Sci.

[1-4]

[2,3,5-6]

3rd

Technology Helps Theory

Page 25: CRESCCO Project IST-2001-33135

Thank You

Page 26: CRESCCO Project IST-2001-33135

Theory of Computing Game Theory

Combining Tools

Efficient Incentive compatible(strategyproof mechanism)(polytime apx

algorithm)

Which part do we change? “Good Protocol”:1. Run fast, optimal resource allocation2. Agents “follow” the protocol

?

Page 27: CRESCCO Project IST-2001-33135

New Game Theory: Helpful? Verification:

1. Offline Scheduling, NO2. Online Scheduling, YES

Cost-Sharing Methods1. YES

Other Issues:1. Technology2. Fairness

M.I.T. (majana institute of technology)

Page 28: CRESCCO Project IST-2001-33135

New Game Theory

A’A M=(A’,P)

loss

hard

game theorynew

A’A M=(A’,P)easier

no loss, provably better

Page 29: CRESCCO Project IST-2001-33135

Scheduling Selfish Jobs

No selfish routing Use a scheduler1. Users cannot refuse the allocation2. May lie about their traffic weights

Provide correct incentives (mechanism design)

[2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003.

Page 30: CRESCCO Project IST-2001-33135

Mechanisms for Wireless Networks

• Wireless Cost-Sharing:

Source(e.g., popular sport event)

[8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, 2003. Also submitted for publication.

10E

3E

2E 11E2E10E

GOAL: maximize benefits-costs

8E1E

Page 31: CRESCCO Project IST-2001-33135

Mechanism Design Theory

[6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003

Utilitarian problems

Consistent problems

VCG [1961]

Problems Most Reliable PathArbitrageTask SchedulingKnapsack

M.I.T. (majana institute of technology)

Page 32: CRESCCO Project IST-2001-33135

Mechanisms for Wireless Networks

[8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, 2003.

Polynomial-time mechanisms: Lower bound Upper bound

General

graphs

No R-APX,

every R>1

Trees,

“Metric-tree” graphs

OPT, distributed

mechanism

Distributed APX mechanism for other casesSuggests a better new broadcast algorithm[7] P. Penna and C. Ventre. Energy-efficient broadcasting in ad-hoc networks: combining MSTs with shortest-path trees. Technical report of CRESCCO, 2003.

Page 33: CRESCCO Project IST-2001-33135

Mechanisms for Wireless Networks

Polynomial-time VCG-based mechanisms:

[1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, 2003. Also accepted in Theoretical Computer Science.

Lower bound

Upper bound

General

graphs

No R-APX,

every R>1

Metric,

Well-spread

remain

NP-hard

1.5-APX

O(1)-APX

Page 34: CRESCCO Project IST-2001-33135

Mechanisms for Wireless Networks

• Ad Hoc Nets:

i

poweri(j) j

Private knowledge of i

[1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, 2003. Also accepted in Theoretical Computer Science.

GOAL: Strong connectivity, minimal total power

k

Page 35: CRESCCO Project IST-2001-33135

Nash equilibria for selfish routing

[5] S. Kontogiannis, D. Fotakis and P. Spirakis. Selfish unsplittable flows. Technical report, Computer Technology Institute, 2003.

Theorem [5]: Every l-layered network has coordination ratio at most

O(log m/log log m)

1

2 l

Layered graphsIdentical links

source destination

Corollary: 1-layered graphs are the worst instances.Theorem [5]: Some l-layered networks do not have pure Nash equilibria.

Page 36: CRESCCO Project IST-2001-33135

Scheduling Selfish Jobs

[2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003.

Speed ratio

r=smax/smin

Lower bound Upper bound

identical speeds

No exact with dominant strategies

Exact (non polytime)

(polytime)

Bayesian-Nash

rr

r

22

1161.1r

1

11

r

m

1r

rr

1

2

11,min r21 r

ε1Different speeds, one job per agent, Bayesian-NashM.I.T. (majana institute of technology)

Bayesian-Nash

Page 37: CRESCCO Project IST-2001-33135

Scheduling Selfish Jobs

[2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003. Also submitted for publication

k vs m Lower bound Upper bound

6

7mk

2k

2k

ε2/3

2

3

4mk

Identical speeds, k jobs per agent, Bayesian-Nash

m/114 many

ε2/3 2m3m4m

ε4/9 ε3

Page 38: CRESCCO Project IST-2001-33135

Scheduling Selfish Machines

[1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004

Machine speeds

Our result Previous results [ArcTar01]

Any 4+ 3+

Divisible 2 + 3+

Randomized, no dominant strategies

Deterministic, dominant strategies

Page 39: CRESCCO Project IST-2001-33135

Scheduling Selfish Machines

[1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004

Machine speeds

Our result Previous results [ArcTar01]

Any 4+ 3+

Divisible 2 + 3+

Real cases (e.g., Sonet/SDH standards)

Page 40: CRESCCO Project IST-2001-33135

Applications of restricted one-parameter agents:Selfish Jobs

1. (1+)-APX mechanism (breaks lower bounds in [2])

Selfish Machines: 1. first (1+)-APX mechanism2. breaks a lower bound in [ArcTar01] for a weighted

variant of scheduling

Approximation and selfish agents

[3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, 2003. Also submitted for publication

Verification helps!

Page 41: CRESCCO Project IST-2001-33135

Approximation and selfish agents

[3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, 2003.

No need for new algorithms!

(TCS gets its revenge)

We introduce restricted one-parameter agents

Page 42: CRESCCO Project IST-2001-33135

Approximation and selfish agents

[3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, 2003.

We introduce restricted one-parameter agents

Theorem [3]: Polynomial-time c-approximation algorithm A

M = (A , P) truthful polynomial-time (c+)-approximation

Page 43: CRESCCO Project IST-2001-33135

Mechanism design

Mechanism: M=(A,P)

Computes a solution

X=A(r1,r2,…, ri ,…,rn )

Provides a payment

Pi(r1,r2,…, ri ,…,rn )

costi(X,ti)

Agents’ GOAL: maximize their own utility ui (r1,r2,…, ri ,…,rn ) := Pi(r1,r2,…, ri ,…,rn ) – costi(X,ti)

Page 44: CRESCCO Project IST-2001-33135

Mechanism design Strategyproof mechanisms: no incentive to lie

1. Bayesian-Nash

ui (t1,t2,…, ti ,…,tn ) ui (t1,t2,…, ri ,…,tn )

(truth-telling is Nash equilibrium)

2. With dominant strategies

ui (r1,r2,…, ti ,…,rn ) ui (r1,r2,…, ri ,…,rn )

(truth-telling is always the best strategy)

Page 45: CRESCCO Project IST-2001-33135

Mechanisms for Wireless Networks

• Wireless Cost-Sharing:

Source(e.g., popular sport event)

[8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, 2003.

10E

3E

2E 11E2E10E

GOAL: maximize benefits-costs

Page 46: CRESCCO Project IST-2001-33135

Nash equilibria for selfish routing

1 1 1 Expected MAX LOAD: 1

1/mExpected MAX LOAD:

Θ(ln m/ln ln m) Price of anarchyWorst-case equilibriaCoordination ratio

M.I.T. (majana institute of technology)

Page 47: CRESCCO Project IST-2001-33135

Routing/Scheduling

•m links with different speeds s1, s2,…,sm

•Unsplittable traffic t1, t2 ,…, tn

•We look at the network congestion (makespan)

source destination

Selfish Routing:users choose the best path for their own traffic

Scheduling Selfish Jobs: Selfish users own the traffic and privately know their weightsScheduling Selfish Machines:Selfish users own the links and privately know their speeds

Page 48: CRESCCO Project IST-2001-33135

Routing/Scheduling

•m links with different speeds s1, s2,…,sm

•Unsplittable traffic t1, t2 ,…, tn

•We look at the network congestion (makespan)

source destination

Scheduling Selfish Jobs: Selfish users own the traffic and privately know their weights

Scheduling Selfish Machines:Selfish users own the links and privately know their speeds