520 research outputs found
Online Computation with Untrusted Advice
The advice model of online computation captures a setting in which the
algorithm is given some partial information concerning the request sequence.
This paradigm allows to establish tradeoffs between the amount of this
additional information and the performance of the online algorithm. However, if
the advice is corrupt or, worse, if it comes from a malicious source, the
algorithm may perform poorly. In this work, we study online computation in a
setting in which the advice is provided by an untrusted source. Our objective
is to quantify the impact of untrusted advice so as to design and analyze
online algorithms that are robust and perform well even when the advice is
generated in a malicious, adversarial manner. To this end, we focus on
well-studied online problems such as ski rental, online bidding, bin packing,
and list update. For ski-rental and online bidding, we show how to obtain
algorithms that are Pareto-optimal with respect to the competitive ratios
achieved; this improves upon the framework of Purohit et al. [NeurIPS 2018] in
which Pareto-optimality is not necessarily guaranteed. For bin packing and list
update, we give online algorithms with worst-case tradeoffs in their
competitiveness, depending on whether the advice is trusted or not; this is
motivated by work of Lykouris and Vassilvitskii [ICML 2018] on the paging
problem, but in which the competitiveness depends on the reliability of the
advice. Furthermore, we demonstrate how to prove lower bounds, within this
model, on the tradeoff between the number of advice bits and the
competitiveness of any online algorithm. Last, we study the effect of
randomization: here we show that for ski-rental there is a randomized algorithm
that Pareto-dominates any deterministic algorithm with advice of any size. We
also show that a single random bit is not always inferior to a single advice
bit, as it happens in the standard model
Scheduling of Multicast and Unicast Services under Limited Feedback by using Rateless Codes
Many opportunistic scheduling techniques are impractical because they require
accurate channel state information (CSI) at the transmitter. In this paper, we
investigate the scheduling of unicast and multicast services in a downlink
network with a very limited amount of feedback information. Specifically,
unicast users send imperfect (or no) CSI and infrequent acknowledgements (ACKs)
to a base station, and multicast users only report infrequent ACKs to avoid
feedback implosion. We consider the use of physical-layer rateless codes, which
not only combats channel uncertainty, but also reduces the overhead of ACK
feedback. A joint scheduling and power allocation scheme is developed to
realize multiuser diversity gain for unicast service and multicast gain for
multicast service. We prove that our scheme achieves a near-optimal throughput
region. Our simulation results show that our scheme significantly improves the
network throughput over schemes employing fixed-rate codes or using only
unicast communications
Local search for the surgery admission planning problem
We present a model for the surgery admission planning problem, and a meta-heuristic algorithm for solving it. The problem involves assigning operating rooms and dates to a set of elective surgeries, as well as scheduling the surgeries of each day and room. Simultaneously, a schedule is created for each surgeon to avoid double bookings. The presented algorithm uses simple Relocate and Two-Exchange neighbourhoods, governed by an iterated local search framework. The problem's search space associated with these move operators is analysed for three typical fitness surfaces, representing different compromises between patient waiting time, surgeon overtime, and waiting time for children in the morning on the day of surgery. The analysis shows that for the same problem instances, the different objectives give fitness surfaces with quite different characteristics. We present computational results for a set of benchmarks that are based on the admission planning problem in a chosen Norwegian hospital
Optimal Rate Scheduling via Utility-Maximization for J-User MIMO Markov Fading Wireless Channels with Cooperation
We design a dynamic rate scheduling policy of Markov type via the solution (a
social optimal Nash equilibrium point) to a utility-maximization problem over a
randomly evolving capacity set for a class of generalized processor-sharing
queues living in a random environment, whose job arrivals to each queue follow
a doubly stochastic renewal process (DSRP). Both the random environment and the
random arrival rate of each DSRP are driven by a finite state continuous time
Markov chain (FS-CTMC). Whereas the scheduling policy optimizes in a greedy
fashion with respect to each queue and environmental state and since the
closed-form solution for the performance of such a queueing system under the
policy is difficult to obtain, we establish a reflecting diffusion with
regime-switching (RDRS) model for its measures of performance and justify its
asymptotic optimality through deriving the stochastic fluid and diffusion
limits for the corresponding system under heavy traffic and identifying a cost
function related to the utility function, which is minimized through minimizing
the workload process in the diffusion limit. More importantly, our queueing
model includes both J-user multi-input multi-output (MIMO) multiple access
channel (MAC) and broadcast channel (BC) with cooperation and admission control
as special cases. In these wireless systems, data from the J users in the MAC
or data to the J users in the BC is transmitted over a common channel that is
fading according to the FS-CTMC. The J-user capacity region for the MAC or the
BC is a set-valued stochastic process that switches with the FS-CTMC fading. In
any particular channel state, we show that each of the J-user capacity regions
is a convex set bounded by a number of linear or smooth curved facets.
Therefore our queueing model can perfectly match the dynamics of these wireless
systems.Comment: 53 pages, Originally submitted on June 17, 2010; Revised version
submitted on December 24, 201
Efficient Algorithms and Hardness Results for the Weighted -Server Problem
In this paper, we study the weighted -server problem on the uniform metric
in both the offline and online settings. We start with the offline setting. In
contrast to the (unweighted) -server problem which has a polynomial-time
solution using min-cost flows, there are strong computational lower bounds for
the weighted -server problem, even on the uniform metric. Specifically, we
show that assuming the unique games conjecture, there are no polynomial-time
algorithms with a sub-polynomial approximation factor, even if we use
-resource augmentation for . Furthermore, if we consider the natural
LP relaxation of the problem, then obtaining a bounded integrality gap requires
us to use at least resource augmentation, where is the number of
distinct server weights. We complement these results by obtaining a
constant-approximation algorithm via LP rounding, with a resource augmentation
of for any constant .
In the online setting, an lower bound is known for the competitive
ratio of any randomized algorithm for the weighted -server problem on the
uniform metric. In contrast, we show that -resource augmentation can
bring the competitive ratio down by an exponential factor to only . Our online algorithm uses the two-stage approach of first
obtaining a fractional solution using the online primal-dual framework, and
then rounding it online.Comment: This paper will appear in the proceedings of APPROX 202
Receiver-Based Flow Control for Networks in Overload
We consider utility maximization in networks where the sources do not employ
flow control and may consequently overload the network. In the absence of flow
control at the sources, some packets will inevitably have to be dropped when
the network is in overload. To that end, we first develop a distributed,
threshold-based packet dropping policy that maximizes the weighted sum
throughput. Next, we consider utility maximization and develop a receiver-based
flow control scheme that, when combined with threshold-based packet dropping,
achieves the optimal utility. The flow control scheme creates virtual queues at
the receivers as a push-back mechanism to optimize the amount of data delivered
to the destinations via back-pressure routing. A novel feature of our scheme is
that a utility function can be assigned to a collection of flows, generalizing
the traditional approach of optimizing per-flow utilities. Our control policies
use finite-buffer queues and are independent of arrival statistics. Their
near-optimal performance is proved and further supported by simulation results.Comment: 14 pages, 4 figures, 5 tables, preprint submitted to IEEE INFOCOM
201
Online Algorithms for Weighted Paging with Predictions
In this paper, we initiate the study of the weighted paging problem with predictions. This continues the recent line of work in online algorithms with predictions, particularly that of Lykouris and Vassilvitski (ICML 2018) and Rohatgi (SODA 2020) on unweighted paging with predictions. We show that unlike unweighted paging, neither a fixed lookahead nor knowledge of the next request for every page is sufficient information for an algorithm to overcome existing lower bounds in weighted paging. However, a combination of the two, which we call the strong per request prediction (SPRP) model, suffices to give a 2-competitive algorithm. We also explore the question of gracefully degrading algorithms with increasing prediction error, and give both upper and lower bounds for a set of natural measures of prediction error
- …