351 research outputs found
Incubators vs Zombies: Fault-Tolerant, Short, Thin and Lanky Spanners for Doubling Metrics
Recently Elkin and Solomon gave a construction of spanners for doubling
metrics that has constant maximum degree, hop-diameter O(log n) and lightness
O(log n) (i.e., weight O(log n)w(MST). This resolves a long standing conjecture
proposed by Arya et al. in a seminal STOC 1995 paper.
However, Elkin and Solomon's spanner construction is extremely complicated;
we offer a simple alternative construction that is very intuitive and is based
on the standard technique of net tree with cross edges. Indeed, our approach
can be readily applied to our previous construction of k-fault tolerant
spanners (ICALP 2012) to achieve k-fault tolerance, maximum degree O(k^2),
hop-diameter O(log n) and lightness O(k^3 log n)
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
Massively Parallel Computation (MPC) is a model of computation widely believed to best capture realistic parallel computing architectures such as large-scale MapReduce and Hadoop clusters. Motivated by the fact that many data analytics tasks performed on these platforms involve sensitive user data, we initiate the theoretical exploration of how to leverage MPC architectures to enable efficient, privacy-preserving computation over massive data. Clearly if a computation task does not lend itself to an efficient implementation on MPC even without security, then we cannot hope to compute it efficiently on MPC with security. We show, on the other hand, that any task that can be efficiently computed on MPC can also be securely computed with comparable efficiency. Specifically, we show the following results:
- any MPC algorithm can be compiled to a communication-oblivious counterpart while asymptotically preserving its round and space complexity, where communication-obliviousness ensures that any network intermediary observing the communication patterns learn no information about the secret inputs;
- assuming the existence of Fully Homomorphic Encryption with a suitable notion of compactness and other standard cryptographic assumptions, any MPC algorithm can be compiled to a secure counterpart that defends against an adversary who controls not only intermediate network routers but additionally up to 1/3 - ? fraction of machines (for an arbitrarily small constant ?) - moreover, this compilation preserves the round complexity tightly, and preserves the space complexity upto a multiplicative security parameter related blowup.
As an initial exploration of this important direction, our work suggests new definitions and proposes novel protocols that blend algorithmic and cryptographic techniques
Mechanism Design for Automated Market Makers
Blockchains have popularized automated market makers (AMMs). An AMM exchange
is an application running on a blockchain which maintains a pool of
crypto-assets and automatically trades assets with users governed by some
pricing function that prices the assets based on their relative demand/supply.
AMMs have created an important challenge commonly known as the Miner
Extractable Value (MEV). In particular, the miners who control the contents and
ordering of transactions in a block can extract value by front-running and
back-running users' transactions, leading to arbitrage opportunities that
guarantee them risk-free returns.
In this paper, we consider how to design AMM mechanisms that eliminate MEV
opportunities. Specifically, we propose a new AMM mechanism that processes all
transactions contained within a block in a batch. We show that our new
mechanism satisfies two tiers of guarantees. First, for legacy blockchains
where each block is proposed by a single (possibly rotating) miner, we prove
that our mechanism satisfies arbitrage resilience, i.e., a miner cannot gain
risk-free profit. Moreover, we also guarantee fair treatment among all
transactions within the same block, such that the miner is unable to sell off
favorable positions in the block to users or arbitragers. Second, for
blockchains where the block proposal process is decentralized and offers
sequencing-fairness, we prove a stronger notion called incentive compatibility
-- roughly speaking, we guarantee that any individual user's best response is
to follow the honest strategy.Comment: 1 title page and 23 pages for the main bod
Revisiting Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search
International audienceWe revisit the opinion susceptibility problem that was proposed by Abebe et al. [1], in which agents influence one another's opinions through an iterative process. Each agent has some fixed innate opinion. In each step, the opinion of an agent is updated to some convex combination between its innate opinion and the weighted average of its neighbors' opinions in the previous step. The resistance of an agent measures the importance it places on its innate opinion in the above convex combination. Under non-trivial conditions, this iterative process converges to some equilibrium opinion vector. For the unbudgeted variant of the problem, the goal is to select the resistance of each agent (from some given range) such that the sum of the equilibrium opinions is minimized. Contrary to the claim in the aforementioned KDD 2018 paper, the objective function is in general non-convex. Hence, formulating the problem as a convex program might have potential correctness issues. We instead analyze the structure of the objective function, and show that any local optimum is also a global optimum, which is somehow surprising as the objective function might not be convex. Furthermore, we combine the iterative process and the local search paradigm to design very efficient algorithms that can solve the unbudgeted variant of the problem optimally on large-scale graphs containing millions of nodes
Fully Dynamic k -Center Clustering
International audienceStatic and dynamic clustering algorithms are a fundamental tool in any machine learning library. Most of the efforts in developing dynamic machine learning and data mining algorithms have been focusing on the sliding window model (where at any given point in time only the most recent data items are retained) or more simplistic models. However, in many real-world applications one might need to deal with arbitrary deletions and insertions. For example, one might need to remove data items that are not necessarily the oldest ones, because they have been flagged as containing inappropriate content or due to privacy concerns. Clustering trajectory data might also require to deal with more general update operations. We develop a (2 +)-approximation algorithm for the k-center clustering problem with "small" amortized cost under the fully dynamic adversarial model. In such a model, points can be added or removed arbitrarily, provided that the adversary does not have access to the random choices of our algorithm. The amortized cost of our algorithm is poly-logarithmic when the ratio between the maximum and minimum distance between any two points in input is bounded by a polynomial, while k and are constant. Our theoretical results are complemented with an extensive experimental evaluation on dynamic data from Twitter, Flickr, as well as trajectory data, demonstrating the effectiveness of our approach
- …