34 results on '"Koutsoupias, E."'
Search Results
2. Better Bounds for Online Line Chasing
- Author
-
Bienkowski, M, Byrka, J, Chrobak, M, Coester, C, Jeż, Ł, and Koutsoupias, E
- Subjects
FOS: Computer and information sciences ,000 Computer science, knowledge, general works ,Computer Science - Data Structures and Algorithms ,Computer Science ,Data Structures and Algorithms (cs.DS) - Abstract
We study online competitive algorithms for the line chasing problem in Euclidean spaces Rd, where the input consists of an initial point P0 and a sequence of lines X1,X2,...,Xm, revealed one at a time. At each step t, when the line Xt is revealed, the algorithm must determine a point Pt ∈ Xt. An online algorithm is called c-competitive if for any input sequence the path P0, P1, ..., Pm it computes has length at most c times the optimum path. The line chasing problem is a variant of a more general convex body chasing problem, where the sets Xt are arbitrary convex sets. To date, the best competitive ratio for the line chasing problem was 28.1, even in the plane. We improve this bound by providing a simple 3-competitive algorithm for any dimension d. We complement this bound by a matching lower bound for algorithms that are memoryless in the sense of our algorithm, and a lower bound of 1.5358 for arbitrary algorithms. The latter bound also improves upon the previous lower bound of √2 ≈ 1.412 for convex body chasing in 2 dimensions.
- Published
- 2019
- Full Text
- View/download PDF
3. Beyond myopic best response (in Cournot competition)
- Author
-
Fiat, A. Koutsoupias, E. Ligett, K. Mansour, Y. Olonetsky, S.
- Subjects
Computer Science::Computer Science and Game Theory - Abstract
The Nash equilibrium as a prediction myopically ignores the possibility that deviating from the equilibrium could lead to an avalanche of beneficial changes by other agents. We consider a non-myopic version of Cournot competition, where each firm selects either profit maximization (as in the classical model) or revenue maximization (by masquerading as a firm with zero production costs). We consider many non-identical firms with linear demand functions and show existence of pure Nash equilibria, that simple dynamics will produce such an equilibrium, and that some natural dynamics converge within linear time. Furthermore, we compare the outcome of the non-myopic Cournot competition with that of the standard Cournot competition. Prices in the non-myopic game are lower and the firms, in total, produce more and have a lower aggregate utility. We also briefly consider a non-myopic version of Bertrand competition, and find that prices increase relative to the classical model. © 2013 Elsevier Inc.
- Published
- 2019
4. Carpooling in Social Networks
- Author
-
Fiat, A, Karlin, A, Koutsoupias, E, Mathieu, C, and Zach, R
- Subjects
000 Computer science, knowledge, general works ,010201 computation theory & mathematics ,Computer Science ,0102 computer and information sciences ,01 natural sciences - Abstract
We consider the online carpool fairness problem of [Fagin and Williams, 1983] in which an online algorithm is presented with a sequence of pairs drawn from a group of n potential drivers. The online algorithm must select one driver from each pair, with the objective of partitioning the driving burden as fairly as possible for all drivers. The unfairness of an online algorithm is a measure of the worst-case deviation between the number of times a person has driven and the number of times they would have driven if life was completely fair. We introduce a version of the problem in which drivers only carpool with their neighbors in a given social network graph; this is a generalization of the original problem, which corresponds to the social network of the complete graph. We show that for graphs of degree d, the unfairness of deterministic algorithms against adversarial sequences is exactly d/2. For random sequences of edges from planar graph social networks we give a [deterministic] algorithm with logarithmic unfairness (holds more generally for any bounded-genus graph). This does not follow from previous random sequence results in the original model, as we show that restricting the random sequences to sparse social network graphs may increase the unfairness. A very natural class of randomized online algorithms are so-called static algorithms that preserve the same state distribution over time. Surprisingly, we show that any such algorithm has unfairness Θ( ˜ √ d) against oblivious adversaries. This shows that the local random greedy algorithm of [Ajtai et al, 1996] is close to optimal amongst the class of static algorithms. A natural (non-static) algorithm is global random greedy (which acts greedily and breaks ties at random). We improve the lower bound on the competitive ratio from Ω(log1/3 (d)) to Ω(log d). We also show that the competitive ratio of global random greedy against adaptive adversaries is Ω(d).
- Published
- 2016
- Full Text
- View/download PDF
5. A Lower Bound of 1+φ for Truthful Scheduling Mechanisms
- Author
-
Koutsoupias, E. Vidali, A.
- Abstract
We study the mechanism design version of the unrelated machines scheduling problem, which is at the core of Algorithmic Game Theory and was first proposed and studied in a seminal paper of Nisan and Ronen. We give an improved lower bound of 1+φ≈2.618 on the approximation ratio of deterministic truthful mechanisms for the makespan. The proof is based on a recursive preprocessing argument which yields a strictly increasing series of new lower bounds for each fixed number of machines n≥4. © 2012 Springer Science+Business Media, LLC.
- Published
- 2013
6. Preface to Special Issue on Algorithmic Game Theory
- Author
-
Kontogiannis, S. Koutsoupias, E. Spirakis, P.
- Published
- 2013
7. Competitive analysis of organization networks or multicast acknowledgment: How much to wait?
- Author
-
Brito, C.F. Koutsoupias, E. Vaya, S.
- Abstract
We study, from the perspective of competitive analysis, the trade-off between communication cost and delay cost, or simply the send-or-wait dilemma on a hierarchical rooted tree. The problem is an abstraction of the message aggregation problem on communication networks and an organizational problem in network hierarchies. We consider the most natural variant of the problem, the distributed asynchronous regime, and give tight (within a small additive constant) upper and lower bounds on the competitive ratio of the optimization problem. We also consider the centralized version of the problem, in which there is a central entity which remains updated about any incoming messages to the network and which can control the internal delivery of messages in the network. For the centralized setting, we combine a natural rent-tobuy strategy with prediction techniques to achieve the first constant competitive ratio algorithm for any non-trivial class of network topologies. © 2011 The Author(s).
- Published
- 2012
8. Contention issues in congestion games
- Author
-
Koutsoupias, E. Papakonstantinopoulou, K.
- Subjects
TheoryofComputation_MISCELLANEOUS ,ComputingMilieux_PERSONALCOMPUTING ,TheoryofComputation_GENERAL ,ComputerApplications_COMPUTERSINOTHERSYSTEMS - Abstract
We study time-dependent strategies for playing congestion games. The players can time their participation in the game with the hope that fewer players will compete for the same resources. We study two models: the boat model, in which the latency of a player is influenced only by the players that start at the same time, and the conveyor belt model in which the latency of a player is affected by the players that share the system, even if they started earlier or later; unlike standard congestion games, in these games the order of the edges in the paths affect the latency of the players. We characterize the symmetric Nash equilibria of the games with affine latencies of networks of parallel links in the boat model and we bound their price of anarchy and stability. For the conveyor belt model, we characterize the symmetric Nash equilibria of two players on parallel links. We also show that the games of the boat model are themselves congestion games. The same is true for the games of two players for the conveyor belt model; however, for this model the games of three or more players are not in general congestion games and may not have pure equilibria. © 2012 Springer-Verlag Berlin Heidelberg.
- Published
- 2012
9. On the competitive ratio of online sampling auctions
- Author
-
Koutsoupias, E. Pierrakos, G.
- Subjects
TheoryofComputation_MISCELLANEOUS ,TheoryofComputation_GENERAL - Abstract
We study online profit-maximizing auctions for digital goods with adversarial bid selection and uniformly random arrivals. Our goal is to design auctions that are constant competitive with ; in this sense our model lies at the intersection of prior-free mechanism design and secretary problems. We first give a generic reduction that transforms any offline auction to an online one, with only a loss of a factor of 2 in the competitive ratio; we then present some natural auctions, both randomized and deterministic, and study their competitive ratio; our analysis reveals some interesting connections of one of these auctions with RSOP, which we further investigate in our final section. © 2010 Springer-Verlag.
- Published
- 2010
10. Coordination mechanisms
- Author
-
Christodoulou, G. Koutsoupias, E. Nanavati, A.
- Subjects
TheoryofComputation_MISCELLANEOUS ,GeneralLiterature_INTRODUCTORYANDSURVEY ,TheoryofComputation_GENERAL - Abstract
We introduce the notion of coordination mechanisms to improve the performance in systems with independent selfish and non-colluding agents. The quality of a coordination mechanism is measured by its price of anarchy - the worst-case performance of a Nash equilibrium over the (centrally controlled) social optimum. We give upper and lower bounds for the price of anarchy for selfish task allocation and congestion games. © Springer-Verlag Berlin Heidelberg 2004.
- Published
- 2009
11. A lower bound for scheduling mechanisms
- Author
-
Christodoulou, G. Koutsoupias, E. Vidali, A.
- Abstract
We study the mechanism design problem of scheduling tasks on n unrelated machines in which the machines are the players of the mechanism. The problem was proposed and studied in the seminal paper of Nisan and Ronen on algorithmic mechanism design, where it was shown that the approximation ratio of mechanisms is between 2 and n. We improve the lower bound to 1+ √2 for 3 or more machines. © 2008 Springer Science+Business Media, LLC.
- Published
- 2009
12. Competitive analysis of aggregate max in windowed streaming
- Author
-
Becchetti, L. Koutsoupias, E.
- Abstract
We consider the problem of maintaining a fixed number k of items observed over a data stream, so as to optimize the maximum value over a fixed number n of recent observations. Unlike previous approaches, we use the competitive analysis framework and compare the performance of the online streaming algorithm against an optimal adversary that knows the entire sequence in advance. We consider the problem of maximizing the aggregate max, i.e., the sum of the values of the largest items in the algorithm's memory over the entire sequence. For this problem, we prove an asymptotically tight competitive ratio, achieved by a simple heuristic, called partition-greedy, that performs stream updates efficiently and has almost optimal performance. In contrast, we prove that the problem of maximizing, for every time t, the value maintained by the online algorithm in memory, is considerably harder: in particular, we show a tight competitive ratio that depends on the maximum value of the stream. We further prove negative results for the closely related problem of maintaining the aggregate minimum and for the generalized version of the aggregate max problem in which every item comes with an individual window. © 2009 Springer Berlin Heidelberg.
- Published
- 2009
13. The k-server problem
- Author
-
Koutsoupias, E.
- Abstract
The k-server problem is perhaps the most influential online problem: natural, crisp, with a surprising technical depth that manifests the richness of competitive analysis. The k-server conjecture, which was posed more than two decades ago when the problem was first studied within the competitive analysis framework, is still open and has been a major driving force for the development of the area online algorithms. This article surveys some major results for the k-server problem. © 2009 Elsevier Inc. All rights reserved.
- Published
- 2009
14. Worst-case equilibria
- Author
-
Koutsoupias, E. Papadimitriou, C.
- Abstract
In a system where noncooperative agents share a common resource, we propose the price of anarchy, which is the ratio between the worst possible Nash equilibrium and the social optimum, as a measure of the effectiveness of the system. Deriving upper and lower bounds for this ratio in a model where several agents share a very simple network leads to some interesting mathematics, results, and open problems.22The conference version of this work [Koutsoupias and Papadimitriou (1999) [17]] appeared a decade ago and it has been followed by a large amount of work on the concept of the price of anarchy (as witnessed by the extensive coverage in Nisan et al. (2007) [9]). In this journal version we tried to keep as much as possible the text of the original paper. There are, though, important changes because results that were substantially improved in the meantime are omitted. The other notable change is that here we use the term "price of anarchy" instead of the original term "coordination ratio". The use of the latter term faded away in the literature, being replaced by the term "price of anarchy" which was first introduced in Papadimitriou (2001) [18]. © 2009 Elsevier Inc. All rights reserved.
- Published
- 2009
15. A characterization of 2-player mechanisms for scheduling
- Author
-
Christodoulou, G. Koutsoupias, E. Vidali, A.
- Abstract
We study the mechanism design problem for scheduling unrelated machines and we completely characterize the decisive truthful mechanisms for two players when the domain contains both positive and negative values. We show that the class of truthful mechanisms is very limited: A decisive truthful mechanism partitions the tasks into groups so that tasks in each group are allocated independently of the other groups. Tasks in a group of size at least two are allocated by an affine minimizer and tasks in singleton groups by a task-independent mechanism. This characterization is about all truthful mechanisms, including those with unbounded approximation ratio. A direct consequence of this approach is that the approximation ratio of mechanisms for two players is 2, even for two tasks. In fact, it follows that for two players, VCG is the unique algorithm with optimal approximation 2. © 2008 Springer-Verlag Berlin Heidelberg.
- Published
- 2008
16. A lower bound of 1 + φ for truthful scheduling mechanisms
- Author
-
Koutsoupias, E. Vidali, A.
- Subjects
GeneralLiterature_INTRODUCTORYANDSURVEY - Abstract
We give an improved lower bound for the approximation ratio of truthful mechanisms for the unrelated machines scheduling problem. The mechanism design version of the problem which was proposed and studied in a seminal paper of Nisan and Ronen is at the core of the emerging area of Algorithmic Game Theory. The new lower bound 1+φ ≈ 2.618 is a step towards the final resolution of this important problem. © Springer-Verlag Berlin Heidelberg 2007.
- Published
- 2007
17. Mechanism design for fractional scheduling on unrelated machines
- Author
-
Christodoulou, G. Koutsoupias, E. Kovács, A.
- Abstract
Scheduling on unrelated machines is one of the most general and classical variants of the task scheduling problem. Fractional scheduling is the LP-relaxation of the problem, which is polynomially solvable in the nonstrategic setting, and is a useful tool to design deterministic and randomized approximation algorithms. The mechanism design version of the scheduling problem was introduced by Nisan and Ronen. In this article, we consider the mechanism design version of the fractional variant of this problem. We give lower bounds for any fractional truthful mechanism. Our lower bounds also hold for any (randomized) mechanism for the integral case. In the positive direction, we propose a truthful mechanism that achieves approximation 3/2 for 2 machines, matching the lower bound. This is the first new tight bound on the approximation ratio of this problem, after the tight bound of 2, for 2 machines, obtained by Nisan and Ronen. For n machines, our mechanism achieves an approximation ratio of n+1/2. Motivated by the fact that all the known deterministic and randomized mechanisms for the problem assign each task independently from the others, we focus on an interesting subclass of allocation algorithms, the task-independent algorithms. We give a lower bound of n+1/2, that holds for every (not only monotone) allocation algorithm that takes independent decisions. Under this consideration, our truthful independent mechanism is the best that we can hope from this family of algorithms. © 2010 ACM.
- Published
- 2007
18. Experiments with an economic model of the worldwide web
- Author
-
Kouroupas, G. Koutsoupias, E. Papadimitriou, C.H. Sideri, M.
- Subjects
GeneralLiterature_INTRODUCTORYANDSURVEY - Abstract
We present a simple model in which the worldwide web (www) is created by the interaction of selfish agents, namely document authors, users, and search engines. We show experimentally that power law statistics emerge very naturally in this context, and that the efficiency of the system has certain monotonicity properties. © Springer-Verlag Berlin Heidelberg 2005.
- Published
- 2005
19. The online matching problem on a line
- Author
-
Koutsoupias, E. Nanavati, A.
- Abstract
We study the online matching problem when the metric space is a single straight line. For this case, the offline matching problem is trivial but the online problem has been open and the best known competitive ratio was the trivial Θ(n) where n is the number of requests. It was conjectured that the generalized Work Function Algorithm has constant competitive ratio for this problem. We show that it is in fact Ω(log n) and O(n), and make some progress towards proving a better upper bound by establishing some structural properties of the solutions. Our technique for the upper bound doesn't use a potential function but it reallocates the online cost in a way that the comparison with the offline cost becomes more direct. © Springer-Verlag 2004.
- Published
- 2004
20. On the competitive ratio of the work function algorithm for the k -server problem
- Author
-
Bartal, Y. Koutsoupias, E.
- Abstract
The k-server problem is one of the most fundamental online problems. The problem is to schedule k mobile servers to visit a sequence of points in a metric space with minimum total mileage. The k-server conjecture of Manasse, McGeogh, and Sleator states that there exists a k-competitive online algorithm. The conjecture has been open for over 15 years. The top candidate online algorithm for settling this conjecture is the work function algorithm (WFA) which was shown to have competitive ratio at most 2k-1. In this paper, we lend support to the conjecture that WFA is in fact k-competitive by proving that it achieves this ratio in several special metric spaces: the line, the star, and all metric spaces with k+2 points. © 2004 Elsevier B.V. All rights reserved.
- Published
- 2004
21. The CNN problem and other k -server variants
- Author
-
Koutsoupias, E. Taylor, D.S.
- Abstract
We study several interesting variants of the k-server problem. In the CNN problem, one server services requests in the Euclidean plane. The difference from the k-server problem is that the server does not have to move to a request, but it has only to move to a point that lies in the same horizontal or vertical line with the request. This, for example, models the problem faced by a crew of a Certain News Network trying to shoot scenes on the streets of Manhattan from a distance; for any event at an intersection, the crew has only to be on a matching street or avenue. The CNN problem contains as special cases two important problems: the BRIDGE problem, also known as the cow-path problem, and the weighted 2-server problem in which the 2 servers may have different speeds. We show that any deterministic online algorithm has competitive ratio at least 6+17. We also show that some successful algorithms for the k-server problem fail to be competitive. In particular, no memoryless randomized algorithm can be competitive. We also consider another variant of the k-server problem, in which servers can move simultaneously, and we wish to minimize the time spent waiting for service. This is equivalent to the regular k-server problem under the L∞ norm for movement costs. We give a 12k(k+1) upper bound for the competitive ratio on trees. © 2004 Elsevier B.V. All rights reserved.
- Published
- 2004
22. Approximate Equilibria and Ball Fusion
- Author
-
Koutsoupias, E. Mavronicolas, M. Spirakis, P.
- Abstract
We consider selfish routing over a network consisting of m parallel links through which n selfish users route their traffic trying to minimize their own expected latency. We study the class of mixed strategies in which the expected latency through each link is at most a constant multiple of the optimum maximum latency had global regulation been available. For the case of uniform links it is known that all Nash equilibria belong to this class of strategies. We are interested in bounding the coordination ratio (or price of anarchy) of these strategies defined as the worst-case ratio of the maximum (over all links) expected latency over the optimum maximum latency. The load balancing aspect of the problem immediately implies a lower bound ω (ln m/ln ln m) of the coordination ratio. We give a tight (up to a multiplicative constant) upper bound. To show the upper bound, we analyze a variant of the classical balls and bins problem, in which balls with arbitrary weights are placed into bins according to arbitrary probability distributions. At the heart of our approach is a new probabilistic tool that we call ball fusion; this tool is used to reduce the variant of the problem where balls bear weights to the classical version (with no weights). Ball fusion applies to more general settings such as links with arbitrary capacities and other latency functions.
- Published
- 2003
23. The structure and complexity of Nash equilibria for a selfish routing game
- Author
-
Fotakis, D. Kontogiannis, S. Koutsoupias, E. Mavronicolas, M. Spirakis, P.
- Subjects
TheoryofComputation_MISCELLANEOUS ,Computer Science::Computer Science and Game Theory ,TheoryofComputation_GENERAL - Abstract
In this work, we study the combinatorial structure and the computational complexity of Nash equilibria for a certain game that models selfish routing over a network consisting of m parallel links. We assume a collection of n users, each employing a mixed strategy, which is a probability distribution over links, to control the routing of its own assigned traffic. In a Nash equilibrium, each user selfishly routes its traffic on those links that minimize its expected latency cost, given the network congestion caused by the other users. The social cost of a Nash equilibrium is the expectation, over all random choices of the users, of the maximum, over all links, latency through a link. We embark on a systematic study of several algorithmic problems related to the computation of Nash equilibria for the selfish routing game we consider. In a nutshell, these problems relate to deciding the existence of a Nash equilibrium, constructing a Nash equilibrium with given support characteristics, constructing the worst Nash equilibrium (the one with maximum social cost), constructing the best Nash equilibrium (the one with minimum social cost), or computing the social cost of a (given) Nash equilibrium. Our work provides a comprehensive collection of efficient algorithms, hardness results (both as NP-hardness and #P-completeness results), and structural results for these algorithmic problems. Our results span and contrast a wide range of assumptions on the syntax of the Nash equilibria and on the parameters of the system. © 2002 Springer-Verlag Berlin Heidelberg.
- Published
- 2002
24. Optimization problems in congestion control.
- Author
-
Karp, R., Koutsoupias, E., Papadimitriou, C., and Shenker, S.
- Published
- 2000
- Full Text
- View/download PDF
25. Weak adversaries for the k-server problem.
- Author
-
Koutsoupias, E.
- Published
- 1999
- Full Text
- View/download PDF
26. An approximation scheme for planar graph TSP.
- Author
-
Grigni, M., Koutsoupias, E., and Papadimitriou, C.
- Published
- 1995
- Full Text
- View/download PDF
27. Beyond competitive analysis [on-line algorithms].
- Author
-
Koutsoupias, E. and Papadimitriou, C.H.
- Published
- 1994
- Full Text
- View/download PDF
28. The complexity of solution concepts in Lipschitz games
- Author
-
Katzman, M, Koutsoupias, E, Kanellopoulos, P, Elkind, E, Goldberg, P, and Santhanam, R
- Subjects
Computational complexity ,Game theory - Abstract
Nearly a decade ago, Azrieli and Shmaya introduced the class of λ-Lipschitz games in which every player’s payoff function is λ-Lipschitz with respect to the actions of the other players. They showed via the probabilistic method that n-player Lipschitz games with m strategies per player have pure 𝜖-approximate Nash equilibria, for 𝜖 ≥ λ√8n log(2mn). They left open, however, the question of how hard it is to find such an equilibrium. In this work, we develop an efficient reduction from more general games to Lipschitz games. We use this reduction to study both the query and computational complexity of algorithms finding λ-approximate pure Nash equilibria of λ-Lipschitz games and related classes. We show a query lower bound exponential in nλ/𝜖 against randomized algorithms finding 𝜖- approximatepure Nash equilibria of n-player, λ-Lipschitz games. We additionally present the first PPAD-completeness result for finding pure Nash equilibria in a class of finite, non-Bayesian games (we show this for λ-Lipschitz polymatrix games for suitable pairs of values 𝜖 and λ) in which both the proof of PPAD-hardness and the proof of containment in PPAD require novel approaches (in fact, our approach implies containment in PPAD for any class of Lipschitz games in which payoffs from mixed-strategy profiles can be deterministically computed), and present a definition of “randomized PPAD”. We define and subsequently analyze the class of “Multi-Lipschitz games”, a generalization of Lipschitz games involving player-specific Lipschitz parameters in which the value of interest appears to be the average of the individual Lipschitz parameters. We discuss a dichotomy of the deterministic query complexity of finding 𝜖-approximate Nash equilibria of general games and, subsequently, a query lower bound for λ-Lipschitz games in which any non-trivial value of 𝜖 requires exponentially-many queries to achieve. We examine which parts of this extend to the concepts of approximate correlated and coarse correlated equilibria, and in the process generalize the edge-isoperimetric inequalities to generalizations of the hypercube. Finally, we improve the block update algorithm presented by Goldberg and Marmolejo to break the potential boundary of a 0.75-approximation factor, presenting a randomized algorithm achieving a 0.7368-approximate Nash equilibrium making polynomially-many profile queries of an n-player 1/n−1 -Lipschitz game with an unbounded number of actions.
- Published
- 2023
29. Structural results for total search complexity classes with applications to game theory and optimisation
- Author
-
Alexandros Hollender, Goldberg, P, and Koutsoupias, E
- Subjects
Computational Complexity ,Theoretical Computer Science - Abstract
While the celebrated theory of NP-completeness has been very successful in explaining the intractability of many interesting problems, there still remain many natural and seemingly hard problems that are not known to be NP-hard. Several of these problems lie in the class of total NP search problems (TFNP), namely the class of NP search problems that always have a solution. Importantly, these problems cannot be NP-hard unless NP = co-NP. Notable examples of TFNP problems include FACTORING (given a natural number, compute its prime factorisation) and NASH (given a game, compute a mixed Nash equilibrium). In order to shed light on the complexity of these problems, researchers have attempted to classify them in various subclasses of TFNP such as PPAD, PPA, PPP, PLS, and CLS. A celebrated result in this line of research is the PPAD-completeness of NASH, yielding strong evidence that the problem is not polynomial-time solvable. In this thesis we provide new structural results for TFNP subclasses and show how they can be used to classify natural problems arising from application areas such as game theory and optimisation. In the first part of this work, we construct more powerful tools for proving membership in PPAD, as well as PPAD-hardness. We directly apply these tools to show that the Hairy Ball theorem from topology ("you can't comb a hairy ball flat without creating a cowlick"), as well as the equilibrium computation problem in First Price Auctions with subjective priors, are both PPAD-complete. In the second part of this thesis, we present our main result: the collapse CLS = PPAD ∩ PLS. We prove this surprising collapse by exhibiting the first non-artificial PPAD ∩ PLS-complete problem - a problem arising naturally from the famous gradient descent algorithm. Our result puts PPAD ∩ PLS on the map as a TFNP subclass that captures the complexity of natural problems. In the third and final part, we provide various structural results for the classes PPA-k (corresponding to arguments modulo k), including the first topological characterisations of these classes. As a direct application, we prove that NECKLACE-SPLITTING with k thieves - a notorious problem in combinatorics and fair division - lies in PPA-k under Turing reductions.
- Published
- 2021
30. Competitive analysis of k-server variants and metrical task systems
- Author
-
Coester, C, Kanade, V, Gupta, A, and Koutsoupias, E
- Abstract
In the online k-server problem, an algorithm controls k mobile servers in a metric space. One by one, requests arrive at points of the space, and the algorithm must serve each request by selecting a server to visit it. The goal is to minimize the total distance traveled by all servers. In the framework of competitive analysis, we study two variants of the k-server problem, the infinite server problem and the k-taxi problem, and the more general metrical task systems problem. The infinite server problem is the variant of the k-server problem where the number of servers is infinite, initially all starting at the same point. We obtain a surprisingly tight connection between the infinite server problem and the resource augmentation version of the k-server problem. Using this connection, we also improve the known lower bounds for the resource augmented k-server problem. The k-taxi problem generalizes the k-server problem in that a request consists not of one point, but two points s and t, representing the start and destination of a taxi request. To serve such a request, a server (taxi) must move first to s and then to t. This problem becomes particularly difficult when the cost is defined as the distance of empty runs only. Indeed, we show an exponential gap between the competitive ratio of the k-taxi problem and that of the k-server problem. A main positive result is an O(2k log n)-competitive algorithm for arbitrary n-point metrics. Metrical task systems are a general framework subsuming many other online problems, including the k-server problem. Here, the algorithm suffers two kinds of costs, movement and service costs. For HST metrics, using an entropy regularization approach, we obtain tight bounds on the refined guarantees, i.e., movement and service costs are simultaneously optimally competitive against the optimal total cost. This also improves the refined guarantees for general metrics.
- Published
- 2020
31. Online algorithms for markets
- Author
-
Lazos, F and Koutsoupias, E
- Subjects
Computer science - Abstract
The thesis consists of two parts, both dealing with issues of uncertainty and incentives in markets. In the first part we examine the online properties of markets. In most of the Mechanism Design literature, markets are studied under the assumption that all participants are present at the same time and can seamlessly interact with each other. This may not always be the case in practice. We consider markets where buyers and sellers appear in sequence, one after another, without overlapping and it is the duty of an intermediary to coordinate with them. We take the role of that intermediary and our goal is redistribute items among them to maximise certain objectives, namely the profit, social welfare or gain from trade. We focus on posted price mechanisms, which are robust and truthful. There are two natural, complementary variants of the order of arrival of the agents. In the first case, an adversary dictates their order, but the intermediary has prior, distributional information about their valuations, similar to the prophet inequality setting. In the second, the adversary selects their valuations but their order is a uniformly random permutation. We obtain asymptotically tight worst-case guarantees for both cases, under a competitive analysis benchmark. In the second part, we study the strategic implications that arise from adding one extra option to the miners participating in the bitcoin proto- col. We propose that when adding a block, miners also have the ability to pay forward an amount to be collected by the first miner who successfully extends their branch, giving them the power to influence the incentives for mining. We formulate a stochastic game for the study of such incentives and show that with this added option, smaller miners can guarantee that the best response of even substantially more powerful miners is to follow the expected behavior intended by the protocol designer. Moreover, pay-forward can be used to alleviate the predicted instability when block rewards are small compared with respect to transaction fees, by smoothing out the variability of the rewards collected from transaction fees.
- Published
- 2019
32. Duality theory for optimal mechanism design
- Author
-
Yiannis Giannakopoulos and Koutsoupias, E
- Subjects
Computer Science::Computer Science and Game Theory ,Game theory,economics,social and behavioral sciences (mathematics) ,Applications and algorithms ,Computer science (mathematics) - Abstract
In this work we present a general duality-theory framework for revenue maximization in additive Bayesian auctions involving multiple items and many bidders whose values for the goods follow arbitrary continuous joint distributions over some multi-dimensional real interval. Although the single-item case has been resolved in a very elegant way by the seminal work of Myerson [1981], optimal solutions involving more items still remain elusive. The framework extends linear programming duality and complementarity to constraints with partial derivatives. The dual system reveals the natural geometric nature of the problem and highlights its connection with the theory of bipartite graph matchings. We demonstrate the power of the framework by applying it to various special monopoly settings where a seller of multiple heterogeneous goods faces a buyer with independent item values drawn from various distributions of interest, to design both exact and approximately optimal selling mechanisms. Previous optimal solutions were only known for up to two and three goods, and a very limited range of distributional priors. The duality framework is used not only for proving optimality, but perhaps more importantly, for deriving the optimal mechanisms themselves. Some of our main results include: the proposal of a simple deterministic mechanism, which we call Straight-Jacket Auction (SJA) and is defined in a greedy, recursive way through natural geometric constraints, for many uniformly distributed goods, where exact optimality is proven for up to six items and general optimality is conjectured; a scheme of sufficient conditions for exact optimality for two-good settings and general independent distributions; a technique for upper-bounding the optimal revenue for arbitrarily many goods, with an application to uniform and exponential priors; and the proof that offering deterministically all items in a single full bundle is the optimal way of selling multiple exponentially i.i.d. items.
- Published
- 2015
33. Going higher in the First-order Quantifier Alternation Hierarchy on Words
- Author
-
Thomas Place, Marc Zeitoun, Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), Esparza, J., Fraigniaud, P., Husfeldt, T. and Koutsoupias, E., Zeitoun, Marc, and Esparza, J., Fraigniaud, P., Husfeldt, T. and Koutsoupias, E.
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Computer Science - Logic in Computer Science ,[INFO.INFO-LO] Computer Science [cs]/Logic in Computer Science [cs.LO] ,Hierarchy (mathematics) ,Formal Languages and Automata Theory (cs.FL) ,Block (permutation group theory) ,Sigma ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,Computer Science - Formal Languages and Automata Theory ,First order ,Logic in Computer Science (cs.LO) ,Regular language ,[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL] ,Quantifier elimination ,Quantifier (linguistics) ,Alternation (formal language theory) ,[INFO.INFO-FL] Computer Science [cs]/Formal Languages and Automata Theory [cs.FL] ,Mathematics - Abstract
Accepted to ICALP 2014.; International audience; We investigate the quantifier alternation hierarchy in first-order logic on finite words. Levels in this hierarchy are defined by counting the number of quantifier alternations in formulas. We prove that one can decide membership of a regular language to the levels $\mathcal{B}\Sigma_2$ (boolean combination of formulas having only 1 alternation) and $\Sigma_3$ (formulas having only 2 alternations beginning with an existential block). Our proof works by considering a deeper problem, called separation, which, once solved for lower levels, allows us to solve membership for higher levels.
- Published
- 2014
34. Coloring relatives of interval overlap graphs via on-line games
- Author
-
Tomasz Krawczyk, Bartosz Walczak, Esparza, J, Fraigniaud, P, Husfeldt, T, and Koutsoupias, E
- Subjects
Discrete mathematics ,Trapezoid graph ,Interval graph ,1-planar graph ,Brooks' theorem ,Combinatorics ,Indifference graph ,Pathwidth ,Chordal graph ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Graph coloring ,ComputingMethodologies_COMPUTERGRAPHICS ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
The main goal of this paper is to formalize and explore a connection between chromatic properties of graphs defined by geometric representations and competitivity analysis of on-line algorithms. This connection became apparent after the recent construction of triangle-free geometric intersection graphs with arbitrarily large chromatic number due to Pawlik et al. We show that any on-line graph coloring problem gives rise to a class of game graphs, which in many cases have a natural representation by geometric objects. As a consequence, problems of estimating the chromatic number of graphs with geometric representations are reduced to finding on-line coloring algorithms that use few colors or proving that such algorithms do not exist. We use this framework to derive upper and lower bounds on the maximum possible chromatic number in terms of the clique number in the following classes of graphs: rectangle overlap graphs, subtree overlap graphs and interval filament graphs. These graphs generalize interval overlap graphs (also known as circle graphs)-a well-studied class of graphs with chromatic number bounded by a function of the clique number. Our bounds are absolute for interval filament graphs and asymptotic of the form (log log n)(f(w)) for rectangle and subtree overlap graphs. In particular, we provide the first construction of geometric intersection graphs with bounded clique number and with chromatic number asymptotically greater than log log n. Moreover, with some additional assumptions on the geometric representation, the bounds obtained are tight.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.