30 research outputs found
Average-case Approximation Ratio of Scheduling without Payments
Apart from the principles and methodologies inherited from Economics and Game
Theory, the studies in Algorithmic Mechanism Design typically employ the
worst-case analysis and approximation schemes of Theoretical Computer Science.
For instance, the approximation ratio, which is the canonical measure of
evaluating how well an incentive-compatible mechanism approximately optimizes
the objective, is defined in the worst-case sense. It compares the performance
of the optimal mechanism against the performance of a truthful mechanism, for
all possible inputs.
In this paper, we take the average-case analysis approach, and tackle one of
the primary motivating problems in Algorithmic Mechanism Design -- the
scheduling problem [Nisan and Ronen 1999]. One version of this problem which
includes a verification component is studied by [Koutsoupias 2014]. It was
shown that the problem has a tight approximation ratio bound of (n+1)/2 for the
single-task setting, where n is the number of machines. We show, however, when
the costs of the machines to executing the task follow any independent and
identical distribution, the average-case approximation ratio of the mechanism
given in [Koutsoupias 2014] is upper bounded by a constant. This positive
result asymptotically separates the average-case ratio from the worst-case
ratio, and indicates that the optimal mechanism for the problem actually works
well on average, although in the worst-case the expected cost of the mechanism
is Theta(n) times that of the optimal cost
A New Lower Bound for Deterministic Truthful Scheduling
We study the problem of truthfully scheduling tasks to selfish
unrelated machines, under the objective of makespan minimization, as was
introduced in the seminal work of Nisan and Ronen [STOC'99]. Closing the
current gap of on the approximation ratio of deterministic truthful
mechanisms is a notorious open problem in the field of algorithmic mechanism
design. We provide the first such improvement in more than a decade, since the
lower bounds of (for ) and (for ) by
Christodoulou et al. [SODA'07] and Koutsoupias and Vidali [MFCS'07],
respectively. More specifically, we show that the currently best lower bound of
can be achieved even for just machines; for we already get
the first improvement, namely ; and allowing the number of machines to
grow arbitrarily large we can get a lower bound of .Comment: 15 page
Interdomain routing and games
We present a game-theoretic model that captures many of the intricacies of \emph{interdomain routing} in today's Internet. In this model, the strategic agents are source nodes located on a network, who aim to send traffic to a unique destination node. The interaction between the agents is dynamic and complex -- asynchronous, sequential, and based on partial information. Best-reply dynamics in this model capture crucial aspects of the only interdomain routing protocol de facto, namely the Border Gateway Protocol (BGP). We study complexity and incentive-related issues in this model. Our main results are showing that in realistic and well-studied settings, BGP is incentive-compatible. I.e., not only does myopic behaviour of all players \emph{converge} to a ``stable'' routing outcome, but no player has motivation to unilaterally deviate from the protocol. Moreover, we show that even \emph{coalitions} of players of \emph{any} size cannot improve their routing outcomes by collaborating. Unlike the vast majority of works in mechanism design, our results do not require any monetary transfers (to or by the agents).Interdomain Routing; Network Games; BGP protocol;
New bounds for truthful scheduling on two unrelated selfish machines
We consider the minimum makespan problem for tasks and two unrelated
parallel selfish machines. Let be the best approximation ratio of
randomized monotone scale-free algorithms. This class contains the most
efficient algorithms known for truthful scheduling on two machines. We propose
a new formulation for , as well as upper and lower bounds on
based on this formulation. For the lower bound, we exploit pointwise
approximations of cumulative distribution functions (CDFs). For the upper
bound, we construct randomized algorithms using distributions with piecewise
rational CDFs. Our method improves upon the existing bounds on for small
. In particular, we obtain almost tight bounds for showing that
.Comment: 28 pages, 3 tables, 1 figure. Theory Comput Syst (2019
The Strategic Justification for BGP
The Internet consists of many administrative domains, or \emph{Autonomous Systems} (ASes), each owned by an economic entity (Microsoft, AT\&T, The Hebrew University, etc.). The task of ensuring interconnectivity between ASes, known as \emph{interdomain routing}, is currently handled by the \emph{Border Gateway Protocol} (BGP). ASes are self-interested and might be willing to manipulate BGP for their benefit. In this paper we present the strategic justification for using BGP for interdomain routing in today's Internet: We show that, in the realistic Gao-Rexford setting, BGP is immune to almost all forms of rational manipulation by ASes, and can easily be made immune to all such manipulations. The Gao-Rexford setting is said to accurately depict the current commercial relations between ASes in the Internet. Formally, we prove that a slight modification of BGP is incentive-compatible in \emph{ex-post Nash equilibrium}. Moreover, we show that, if a certain reasonable condition holds, then this slightly modified BGP is also \emph{collusion-proof} in ex-post Nash -- i.e., immune to rational manipulations even by \emph{coalitions} of \emph{any} size. Unlike previous works on achieving incentive-compatibility in interdomain routing, our results \emph{do not require any monetary transfer between ASes} (as is the case in practice). We also strengthen the Gao-Rexford constraints by proving that one of the three constraints can actually be enforced by the rationality of ASes if the two other constraints hold.Networks; Ex post Nash; Routing; rational manipulation; Border Gateway Protocol; Dispute Wheel
Bribeproof mechanisms for two-values domains
Schummer (Journal of Economic Theory 2000) introduced the concept of
bribeproof mechanism which, in a context where monetary transfer between agents
is possible, requires that manipulations through bribes are ruled out.
Unfortunately, in many domains, the only bribeproof mechanisms are the trivial
ones which return a fixed outcome.
This work presents one of the few constructions of non-trivial bribeproof
mechanisms for these quasi-linear environments. Though the suggested
construction applies to rather restricted domains, the results obtained are
tight: For several natural problems, the method yields the only possible
bribeproof mechanism and no such mechanism is possible on more general domains.Comment: Extended abstract accepted to SAGT 2016. This ArXiv version corrects
typos in the proofs of Theorem 7 and Claims 28-29 of prior ArXiv versio
An Improved Randomized Truthful Mechanism for Scheduling Unrelated Machines
We study the scheduling problem on unrelated machines in the mechanism design
setting. This problem was proposed and studied in the seminal paper (Nisan and
Ronen 1999), where they gave a 1.75-approximation randomized truthful mechanism
for the case of two machines. We improve this result by a 1.6737-approximation
randomized truthful mechanism. We also generalize our result to a
-approximation mechanism for task scheduling with machines, which
improve the previous best upper bound of $0.875m(Mu'alem and Schapira 2007)