14,996 research outputs found

    A k-server problem with parallel requests and unit distances

    Get PDF
    In the paper a k-server problem with parallel requests where several servers can also be located on one point is considered. We show that a HARMONIC_p k-server algorithm is competitive against an adaptive online adversary in case of unit distances

    The k-Server problem with parallel requests and the compound Harmonic algorithm

    Get PDF
    In this paper we consider a generalized k-server problem with parallel requests where several servers can also be located on one point (which was initiated by an operations research problem). In Section 4 the ''compound Harmonic algorithm'' for the generalized k-server problem is presented. Certain multi-step transition probabilities and absorbing probabilities are used by the compound Harmonic algorithm. For their computation one step of the generalized k-server problem is replaced by a number of steps of other (generalized) specific k-server problems. We show that this algorithm is competitive against an adaptive online adversary. In the case of unit distances the Harmonic algorithm and the compound Harmonic algorithm are identical

    Online Assignment Algorithms for Dynamic Bipartite Graphs

    Full text link
    This paper analyzes the problem of assigning weights to edges incrementally in a dynamic complete bipartite graph consisting of producer and consumer nodes. The objective is to minimize the overall cost while satisfying certain constraints. The cost and constraints are functions of attributes of the edges, nodes and online service requests. Novelty of this work is that it models real-time distributed resource allocation using an approach to solve this theoretical problem. This paper studies variants of this assignment problem where the edges, producers and consumers can disappear and reappear or their attributes can change over time. Primal-Dual algorithms are used for solving these problems and their competitive ratios are evaluated

    Distributed Selfish Coaching

    Full text link
    Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node's resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage at each node. Motivated by content networking applications -- including web caching, CDNs, and P2P -- this paper extends our previous work on the on-line version of the problem, which was conducted under a game-theoretic framework, and limited to object replication. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache management policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that on-line cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. To appear in a substantial manner, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the "outlier" characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes. Our framework utilizes a simple control-theoretic approach to dynamically parameterize the cache management scheme. We show performance evaluation results that quantify the benefits from instantiating such a framework, which could be substantial under skewed demand profiles.National Science Foundation (CNS Cybertrust 0524477, CNS NeTS 0520166, CNS ITR 0205294, EIA RI 0202067); EU IST (CASCADAS and E-NEXT); Marie Curie Outgoing International Fellowship of the EU (MOIF-CT-2005-007230

    Optimal Data Placement on Networks With Constant Number of Clients

    Full text link
    We introduce optimal algorithms for the problems of data placement (DP) and page placement (PP) in networks with a constant number of clients each of which has limited storage availability and issues requests for data objects. The objective for both problems is to efficiently utilize each client's storage (deciding where to place replicas of objects) so that the total incurred access and installation cost over all clients is minimized. In the PP problem an extra constraint on the maximum number of clients served by a single client must be satisfied. Our algorithms solve both problems optimally when all objects have uniform lengths. When objects lengths are non-uniform we also find the optimal solution, albeit a small, asymptotically tight violation of each client's storage size by ϵ\epsilonlmax where lmax is the maximum length of the objects and ϵ\epsilon some arbitrarily small positive constant. We make no assumption on the underlying topology of the network (metric, ultrametric etc.), thus obtaining the first non-trivial results for non-metric data placement problems

    Metrical Service Systems with Multiple Servers

    Full text link
    We study the problem of metrical service systems with multiple servers (MSSMS), which generalizes two well-known problems -- the kk-server problem, and metrical service systems. The MSSMS problem is to service requests, each of which is an ll-point subset of a metric space, using kk servers, with the objective of minimizing the total distance traveled by the servers. Feuerstein initiated a study of this problem by proving upper and lower bounds on the deterministic competitive ratio for uniform metric spaces. We improve Feuerstein's analysis of the upper bound and prove that his algorithm achieves a competitive ratio of k((k+ll)1)k({{k+l}\choose{l}}-1). In the randomized online setting, for uniform metric spaces, we give an algorithm which achieves a competitive ratio O(k3logl)\mathcal{O}(k^3\log l), beating the deterministic lower bound of (k+ll)1{{k+l}\choose{l}}-1. We prove that any randomized algorithm for MSSMS on uniform metric spaces must be Ω(logkl)\Omega(\log kl)-competitive. We then prove an improved lower bound of (k+2l1k)(k+l1k){{k+2l-1}\choose{k}}-{{k+l-1}\choose{k}} on the competitive ratio of any deterministic algorithm for (k,l)(k,l)-MSSMS, on general metric spaces. In the offline setting, we give a pseudo-approximation algorithm for (k,l)(k,l)-MSSMS on general metric spaces, which achieves an approximation ratio of ll using klkl servers. We also prove a matching hardness result, that a pseudo-approximation with less than klkl servers is unlikely, even for uniform metric spaces. For general metric spaces, we highlight the limitations of a few popular techniques, that have been used in algorithm design for the kk-server problem and metrical service systems.Comment: 18 pages; accepted for publication at COCOON 201
    corecore