CRESCCO Project IST-2001-33135 Work Package 2 Critical Resources and Selfish Agents Paolo Penna Università di Salerno Project funded.

Slides:



Advertisements
Similar presentations
On Designing Truthful Mechanisms for Online Scheduling V. Auletta, R. De Prisco, P.P. and G. Persiano Università di Salerno.
Advertisements

Private capacities in mechanism design Vincenzo Auletta Paolo Penna Giuseppe Persiano Università di Salerno, Italy.
Coordination Mechanisms for Unrelated Machine Scheduling Yossi Azar joint work with Kamal Jain Vahab Mirrokni.
Real-Time Competitive Environments: Truthful Mechanisms for Allocating a Single Processor to Sporadic Tasks Anwar Mohammadi, Nathan Fisher, and Daniel.
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Carmine Ventre (University of Liverpool) Joint work with: Paolo Penna (University.
Optimal Collusion-Resistant Mechanisms with Verification Carmine Ventre Joint work with Paolo Penna.
Algorithmic mechanism design Vincent Conitzer
Strongly Polynomial-Time Truthful Mechanisms in One Shot Paolo Penna 1, Guido Proietti 2, Peter Widmayer 3 1 Università di Salerno 2 Università de l’Aquila.
Collaboration Mechanisms in SOA based MANETs. Introduction Collaboration implies the cooperation between the nodes to support the proper functioning of.
Price Of Anarchy: Routing
Fast Convergence of Selfish Re-Routing Eyal Even-Dar, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
Algorithmic Game Theory and Scheduling Eric Angel, Evripidis Bampis, Fanny Pascual IBISC, University of Evry, France GOTha, 12/05/06, LIP 6.
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
Regret Minimization and the Price of Total Anarchy Paper by A. Blum, M. Hajiaghayi, K. Ligett, A.Roth Presented by Michael Wunder.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
Optimal collusion-resistant mechanisms with verification Paolo Penna Carmine Ventre Università di Salerno University of Liverpool Italy UK.
Xujin Chen, Xiaodong Hu Institute of Applied Mathematics Chinese Academy of Sciences Network Routing Games on Ring Infrastructure G CN-GER Conf on Math.
Balázs Sziklai Selfish Routing in Non-cooperative Networks.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Truthful Approximation Mechanisms for Scheduling Selfish Related Machines Motti Sorani, Nir Andelman & Yossi Azar Tel-Aviv University.
CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents Università di Salerno Project funded by the Future and.
CRESCCO Project IST Work Package 2 Algorithms for Selfish Agents V. Auletta, P. Penna and G. Persiano Università di Salerno
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Paolo Penna and Carmine Ventre.
Distributed Multiagent Resource Allocation In Diminishing Marginal Return Domains Yoram Bachrach(Hebew University) Jeffrey S. Rosenschein (Hebrew University)
The Algorithmic Structure of Group Strategyproof Budget- Balanced Cost-Sharing Mechanisms Paolo Penna & Carmine Ventre Università di Salerno Italy.
Price of Anarchy, and Strategyproof Network Protocol Design Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Collaborated.
Mechanism Design. Overview Incentives in teams (T. Groves (1973)) Algorithmic mechanism design (Nisan and Ronen (2000)) - Shortest Path - Task Scheduling.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno, WP2.
SECOND PART: Algorithmic Mechanism Design. Mechanism Design MD is a subfield of economic theory It has a engineering perspective Designs economic mechanisms.
Algorithms for Selfish Agents Carmine Ventre Università degli Studi di Salerno.
More Powerful and Simpler Cost-Sharing Methods Carmine Ventre Joint work with Paolo Penna University of Salerno.
(Optimal) Collusion-Resistant Mechanisms with Verification Paolo Penna & Carmine Ventre Università degli Studi di Salerno Italy.
Load Balancing, Multicast routing, Price of Anarchy and Strong Equilibrium Computational game theory Spring 2008 Michal Feldman.
Convergence Time to Nash Equilibria in Load Balancing Eyal Even-Dar, Tel-Aviv University Alex Kesselman, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
1 Worst-Case Equilibria Elias Koutsoupias and Christos Papadimitriou Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science.
Energy-Efficient Broadcasting in Ad-Hoc Networks: Combining MSTs with Shortest-Path Trees Carmine Ventre Joint work with Paolo Penna Università di Salerno.
Mechanism Design Traditional Algorithmic Setting Mechanism Design Setting.
Sharing the cost of multicast transmissions in wireless networks Carmine Ventre Joint work with Paolo Penna University of Salerno.
Coalitions in Congested Networks By Shai Roitman & Jeffrey Rosenschein.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
How Bad is Selfish Routing A survey on existing models for selfish routing Professor John Lui, David Yau and Dah-Ming Qiu presented by Joe W.J. Jiang
Algorithms and Economics of Networks: Coordination Mechanisms Abraham Flaxman and Vahab Mirrokni, Microsoft Research.
Network Formation Games. Netwok Formation Games NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models:
Price of Anarchy Bounds Price of Anarchy Convergence Based on Slides by Amir Epstein and by Svetlana Olonetsky Modified/Corrupted by Michal Feldman and.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Distributed Algorithms on a Congested Clique Christoph Lenzen.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Mechanisms with Verification for Any Finite Domain Carmine Ventre Università degli Studi di Salerno.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Algorithms for Incentive-Based Computing Carmine Ventre Università degli Studi di Salerno.
Algorithmic Mechanism Design: an Introduction Approximate (one-parameter) mechanisms, with an application to combinatorial auctions Guido Proietti Dipartimento.
Beyond Routing Games: Network (Formation) Games. Network Games (NG) NG model the various ways in which selfish users (i.e., players) strategically interact.
Networks and Games Christos H. Papadimitriou UC Berkeley christos.
Mechanisms with Verification Carmine Ventre [Penna & V, 2007] [V, WINE ‘06]
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish agents strategically interact in using a network They.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
Vasilis Syrgkanis Cornell University
Algorithmic Mechanism Design Shuchi Chawla 11/7/2001.
Free-Riders in Steiner Tree Cost-Sharing Games Paolo Penna and Carmine Ventre Università di Salerno.
Bayesian Algorithmic Mechanism Design Jason Hartline Northwestern University Brendan Lucier University of Toronto.
The Price of Routing Unsplittable Flow Yossi Azar Joint work with B. Awerbuch and A. Epstein.
Network Formation Games. NFGs model distinct ways in which selfish agents might create and evaluate networks We’ll see two models: Global Connection Game.
(Algorithmic) Mechanism Design Paolo Penna. Mechanism Design Find correct rules/incentives.
Algorithmic Problems Related To The Internet
The Price of Routing Unsplittable Flow
Presentation transcript:

CRESCCO Project IST Work Package 2 Critical Resources and Selfish Agents Paolo Penna Università di Salerno Project funded by the Future and Emerging Technologies arm of the IST Programme – FET Proactive initiative “Global Computing” M.I.T. (majana institute of technology)

DIFFERENT SOCIO-ECONOMIC ENTITIES DIFFERENT GOALS INTERNET SELFISH ENTITIES THAT COOPERATE INTERNET PROVIDERS AUTONOMOUS SYSTEMS UNIVERSITIES PRIVATE COMPANIES

The Internet Open, self organized, no central authority, anarchic: 1. A router may forward packets to optimize its own traffic 2. A client may “ignore” the server ackws and not follow the TCP packet transmission rate 3. An Autonomous System may report false link status to redirect traffic to another AS

Main Goals 1. A deeper understanding of basic principles of a complex system (Internet) 2. Methodology to develop good solutions 3. New concepts, mathematical tools and algorithmic techniques Strict and centralized vs loose and local control What is the price of anarchy? Design a new “TCP/IP protocol” robust wrt selfish users M.I.T. (majana institute of technology)

Mathematical Tools Theory of Computing Computational complexity Design and Analysis of Algorithms Microeconomics and Game Theory Nash equilibria Mechanism design

Research Progress 1.P. Ambrosio and V. Auletta. Deterministic Monotone Algorithms for Scheduling on Related Machines. In Proc. of WAOA, V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, V. Auletta, R. De Prisco, P. Penna, and G. Persiano. Monotone algorithms characterize mechanisms for selfish jobs. CRESCCO TR, V. Auletta, A.V. Fishkin, and G. Persiano. On gaining a control over two links occupied by selfish agents. CRESCCO TR, P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, P. Penna and C. Ventre. When is cost-sharing possible? CRESCCO TR, P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, SCHEDULING/ROUTING (WP1): [1,2,3,4]NEW GAME THEORY: [2,5,6,7]EXPERIMENTS (WP5): [7]APPLICATIONS (workpackages):WIRELESS NETWORKS (WP1): [5,6,7]

Routing/Scheduling Unsplittable traffic J 1, J 2,…,J n We look at the network congestion (makespan) sourcedestination Scheduling Selfish Machines: Selfish users own the links and privately know their speeds s1s1 smsm s2s2    0 0 0

Mechanism design Mechanism: M=(A,P) Computes a solution X=A(r 1,r 2,…, r i,…,r n ) Provides a payment P i (r 1,r 2,…, r i,…,r n ) Agents’ GOAL: maximize their own utility u i (r i ) := P i (r 1,r 2,…, r i,…,r n ) – cost i (X,t i ) cost i (X,t i ) t 1,t 2,…, t i,…,t n true input

Mechanism design Strategyproof mechanisms: no incentive to lie (report r i  t i ) u i (t i )  u i (r i ) (truth-telling is the best strategy)

Mechanism design Question: Given A, is there P s.t. M=(A,P) is strategyproof? In general, NO!

Scheduling Selfish Machines Monotone algorithms: an agent declaring a higher speed does not get less work/load. A monotone M=(A,P) strategyproof [Archer and Tardos, STOC 2001]

Translation techniques A’AM=(A’,P) AlgorithmMechanism M=(A,P)A hard loss of performance

Translation techniques A black-box, polytime A’A “easy” c-apx c’-apx offline: c’ = c(1+  ) online: c < c’  c  A’=AA Not needed [1] P. Ambrosio and V. Auletta. Deterministic Monotone Algorithms for Scheduling on Related Machines. In Proc. of WAOA, [2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, greedy (like) and speeds s i =2 k (selfish machines)

Loss of performance [2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, Online vs Offline (m=2) offline online selfishunselfish (1+  ) 3/2  c   c’  c1.78 “<“ is possible hardest

“Unknown” input [2] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. On designing truthful mechanisms for online scheduling. Proc. of SIROCCO, Input: jobsspeeds loss 1+  [3] V. Auletta, R. De Prisco, P. Penna, and G. Persiano. Monotone algorithms characterize mechanisms for selfish jobs. CRESCCO TR, selfish   loss < 1.83 selfish future  < loss <  selfish future selfish  < loss <  Verification [Auletta et al, ICALP’04]

Cost-Sharing Games U Q 1.Which customers to service? 2.At which price? S Service providerCustomers t i = willingness to pay

Cost-Sharing Games U Q S Service providerCustomers 1. Budget balanced: Cost(Q) =  P i 2. Users can form coalitions  Group strategyproof mechanisms

Cost-Sharing Games U Q S Service providerCustomers S Multicast: S wiredwireless

Cost-Sharing Games M=(A,P) [Moulin-Shenker’97] A A=OPT (1+  )-APX NP-hard A  any OPT (wired:polytime) M=(A,P) [7] A [7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA,  (wireless: NP-hard)

Cost-Sharing Games M=(A,P)A A=OPT (1+  )-APX NP-hard Free-riders (fairness) [5] P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, M=(A,P) [7] A [7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, 2004.

Cost-Sharing Games M=(A,P)A A=OPT (1+  )-APX NP-hard [5] P. Penna and C. Ventre. Free-riders in Steiner tree cost-sharing games. Proc. of SIROCCO, M=(A,P) [7] A [7] P. Penna and C. Ventre. More powerful and simpler cost-sharing methods. Proc. of WAOA, [6] P. Penna and C. Ventre. When is cost-sharing possible? CRESCCO TR, [6] characterization

Recommendations and future plans (from 2nd year review talk) 1.Consider Algorithms and Game Theory jointly 2.Technological Issues 1.Wireless vs Wired 2.Assumptions (e.g., link speeds) 3.How much technology can help (e.g. verification, known users traffic vs known router speeds) 3.New concepts, new mathematical tools and new algorithmic techniques  Cross fertilization between TCS, micro-economics and game theory [5,6,7] [1,4] [2,3] [2,5,6,7] M.I.T. (majana institute of technology) This year:

Answered Questions 1.When verification helps: Online YES, offline NO [2] 2.Online Setting: More difficult! [2] 3.Selfish Jobs vs Selfish Machines: Constant loss [3] 4.Wireless Networks: Budget-balance, Wireless vs Wired [6,7] 5.Mechanism Design Theory: Problem restrictions [6,7]

Important Issues (2nd year review talk) Computational issues Efficiency Technological issues Different assumptions Existing game theory Not always suitable New Algorithms [1-4,7,8] New Game Theory [6,3], extract infos Provably Better 2 nd year work: ICALP (2), IFIP-TCS, SPAA, STACS, SIROCCO, Theor. Comp. Sci. [1-4] [2,3,5-6] 3rd Technology Helps Theory

Thank You

M.I.T. (majana institute of technology)

Theory of ComputingGame Theory Combining Tools EfficientIncentive compatible  (strategyproof mechanism)(polytime apx algorithm) Which part do we change? “Good Protocol”: 1.Run fast, optimal resource allocation 2.Agents “follow” the protocol ?

New Game Theory: Helpful? Verification: 1. Offline Scheduling, NO 2. Online Scheduling, YES Cost-Sharing Methods 1. YES Other Issues: 1. Technology 2. Fairness M.I.T. (majana institute of technology)

New Game Theory A’AM=(A’,P) loss hard game theory new A’AM=(A’,P) easier no loss, provably better

Nash equilibria When no selfish agent has an incentive in unilaterally changing his/her strategy: (5,1)(0,0) (1,5) he she F T FT Football or Theater

Scheduling Selfish Jobs No selfish routing  Use a scheduler 1.Users cannot refuse the allocation 2.May lie about their traffic weights Provide correct incentives (mechanism design) [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, 2003.

Mechanisms for Wireless Networks Wireless Cost-Sharing: Source (e.g., popular sport event) [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, Also submitted for publication. 10E 3E 2E11E2E 10E GOAL: maximize benefits-costs 8E1E

Mechanism Design Theory [6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003 Utilitarian problems Consistent problems VCG [1961] ProblemsMost Reliable Path Arbitrage Task Scheduling Knapsack M.I.T. (majana institute of technology)

Mechanism Design Theory [6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003 VCG mechanisms: 1.Objective function m(X) =  i  X COST i (X,t i ) 2.u i = P i - COST i (X,t i ) MRP problem: 1.Objective function m(X) =  e  X q i 2.u i = P i q i Utilitarian problems

Mechanism Design Theory Probability of link failure GOAL: find the Most Reliable Path [6] G. Melideo, P. Penna, G. Proietti, R. Wattenhofer, and P. Widmayer. Truthful mechanisms for generalized utilitarian problems. Technical report of CRESCCO, 2003 Payments: pay P e iff link e succeds  Utility: u e =q e ·P e Expected GAIN destination source Not ADDITIVE

Mechanisms for Wireless Networks [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, Polynomial-time mechanisms: Lower boundUpper bound General graphs No R-APX, every R>1 Trees, “Metric-tree” graphs OPT, distributed mechanism Distributed APX mechanism for other casesSuggests a better new broadcast algorithm [7] P. Penna and C. Ventre. Energy-efficient broadcasting in ad-hoc networks: combining MSTs with shortest-path trees. Technical report of CRESCCO, 2003.

Mechanisms for Wireless Networks Polynomial-time VCG-based mechanisms: [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, Also accepted in Theoretical Computer Science. Lower bound Upper bound General graphs No R-APX, every R>1 Metric, Well-spread remain NP-hard 1.5-APX O(1)-APX

Mechanisms for Wireless Networks Ad Hoc Nets: i power i (j) j Private knowledge of i [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, Also accepted in Theoretical Computer Science. GOAL: Strong connectivity, minimal total power k

Mechanisms for Wireless Networks Ad Hoc Nets: i repow i (j) >> power i (j) j Reported power repow i (j)k [1] C. Ambuehl, A. Clementi, P. Penna, G. Rossi, and R. Silvestri. Energy Consumption in Radio Networks: Selfish Agents and Rewarding Mechanisms. In Proc. of SIROCCO, Also accepted in Theoretical Computer Science.

Nash equilibria for selfish routing [5] S. Kontogiannis, D. Fotakis and P. Spirakis. Selfish unsplittable flows. Technical report, Computer Technology Institute, Theorem [5]: Every l-layered network has coordination ratio at most O(log m/log log m) 1 … 2l Layered graphs Identical links source destination Corollary: 1-layered graphs are the worst instances. Theorem [5]: Some l-layered networks do not have pure Nash equilibria.

Scheduling Selfish Jobs [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, Speed ratio r=smax/smin Lower boundUpper bound identical speeds No exact with dominant strategies Exact (non polytime) (polytime) Bayesian-Nash Different speeds, one job per agent, Bayesian-Nash M.I.T. (majana institute of technology) Bayesian-Nash

Scheduling Selfish Jobs [2] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. How to tax and route selfish unsplittable traffic. Technical report of CRESCCO, Also submitted for publication k vs mLower boundUpper bound Identical speeds, k jobs per agent, Bayesian-Nash

Scheduling Selfish Machines [1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004 Machine speeds Our resultPrevious results [ArcTar01] Any 4+  3+  Divisible 2 +  3+  Randomized, no dominant strategies Deterministic, dominant strategies

Scheduling Selfish Machines [1] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. Deterministic truthful approximation mechanisms for scheduling related machines. In Proc. of STACS, 2004 Machine speeds Our resultPrevious results [ArcTar01] Any 4+  3+  Divisible 2 +  3+  Real cases (e.g., Sonet/SDH standards)

Applications of restricted one-parameter agents: Selfish Jobs 1. (1+  )-APX mechanism ( breaks lower bounds in [2]) Selfish Machines: 1.first (1+  )-APX mechanism 2.breaks a lower bound in [ArcTar01] for a weighted variant of scheduling Approximation and selfish agents [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, Also submitted for publication Verification helps!

Approximation and selfish agents [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO,  No need for new algorithms! (TCS gets its revenge) We introduce restricted one-parameter agents

Approximation and selfish agents [3] V. Auletta, R. De Prisco, P. Penna, and P. Persiano. The benefits of verification for one-parameter agents. Technical report of CRESCCO, We introduce restricted one-parameter agents Theorem [3]: Polynomial-time c-approximation algorithm A  M = (A , P) truthful polynomial-time (c+  )- approximation

Mechanism design Mechanism: M=(A,P) Computes a solution X=A(r 1,r 2,…, r i,…,r n ) Provides a payment P i (r 1,r 2,…, r i,…,r n ) cost i (X,t i ) Agents’ GOAL: maximize their own utility u i (r 1,r 2,…, r i,…,r n ) := P i (r 1,r 2,…, r i,…,r n ) – cost i (X,t i )

Mechanism design Strategyproof mechanisms: no incentive to lie 1. Bayesian-Nash u i (t 1,t 2,…, t i,…,t n )  u i (t 1,t 2,…, r i,…,t n ) (truth-telling is Nash equilibrium) 2.With dominant strategies u i (r 1,r 2,…, t i,…,r n )  u i (r 1,r 2,…, r i,…,r n ) (truth-telling is always the best strategy)

Mechanisms for Wireless Networks Wireless Cost-Sharing: Source (e.g., popular sport event) [8] P. Penna and C. Ventre. Sharing the cost of multicast transmissions in wireless networks. Technical report of CRESCCO, E 3E 2E11E2E 10E GOAL: maximize benefits-costs

Nash equilibria for selfish routing … 111 Expected MAX LOAD: 1 1/m Expected MAX LOAD: Θ(ln m/ln ln m) Price of anarchy Worst-case equilibria Coordination ratio M.I.T. (majana institute of technology)

Routing/Scheduling m links with different speeds s 1, s 2,…,s m Unsplittable traffic t 1, t 2,…, t n We look at the network congestion (makespan) sourcedestination Selfish Routing: users choose the best path for their own traffic Scheduling Selfish Jobs: Selfish users own the traffic and privately know their weights Scheduling Selfish Machines: Selfish users own the links and privately know their speeds

Routing/Scheduling m links with different speeds s 1, s 2,…,s m Unsplittable traffic t 1, t 2,…, t n We look at the network congestion (makespan) sourcedestination Scheduling Selfish Jobs: Selfish users own the traffic and privately know their weights Scheduling Selfish Machines: Selfish users own the links and privately know their speeds