Hierarchical Well-Separated Trees (HST) Edges’ distances are uniform across a level of the tree Stretch  = factor by which distances decrease from root.

Slides:



Advertisements
Similar presentations
Truthful Mechanisms for Combinatorial Auctions with Subadditive Bidders Speaker: Shahar Dobzinski Based on joint works with Noam Nisan & Michael Schapira.
Advertisements

1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Introduction to Algorithms 6.046J
S. Sudarshan Based partly on material from Fawzi Emad & Chau-Wen Tseng
Centrality of Trees for Capacitated k-Center Hyung-Chan An École Polytechnique Fédérale de Lausanne July 29, 2013 Joint work with Aditya Bhaskara & Ola.
Theory of Computing Lecture 3 MAS 714 Hartmut Klauck.
Study Group Randomized Algorithms 21 st June 03. Topics Covered Game Tree Evaluation –its expected run time is better than the worst- case complexity.
Interchanging distance and capacity in probabilistic mappings Uriel Feige Weizmann Institute.
Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design Problems Mohammad R. Salavatipour Department of Computing Science University of Alberta.
The Cache Location Problem IEEE/ACM Transactions on Networking, Vol. 8, No. 5, October 2000 P. Krishnan, Danny Raz, Member, IEEE, and Yuval Shavitt, Member,
Oblivious Routing for the L p -norm Matthias Englert Harald Räcke 1.
The main idea of the article is to prove that there exist a tester of monotonicity with query and time complexity.
Online Algorithms, Linear Programming, and the k-Server Problem Seffi Naor Computer Science Dept. Technion Approximation Algorithms: The Last Decade and.
Tirgul 10 Rehearsal about Universal Hashing Solving two problems from theoretical exercises: –T2 q. 1 –T3 q. 2.
The master method The master method applies to recurrences of the form T(n) = a T(n/b) + f (n), where a  1, b > 1, and f is asymptotically positive.
The Evolution Trees From: Computational Biology by R. C. T. Lee S. J. Shyu Department of Computer Science Ming Chuan University.
Karger’s Min-Cut Algorithm Amihood Amir Bar-Ilan University, 2009.
6/14/2015 6:48 AM(2,4) Trees /14/2015 6:48 AM(2,4) Trees2 Outline and Reading Multi-way search tree (§3.3.1) Definition Search (2,4)
TCSS 342 AVL Trees v1.01 AVL Trees Motivation: we want to guarantee O(log n) running time on the find/insert/remove operations. Idea: keep the tree balanced.
Approximating metrics by tree metrics Kunal Talwar Microsoft Research Silicon Valley Joint work with Jittat Fakcharoenphol Kasetsart University Thailand.
Online Algorithms for Network Design Adam Meyerson UCLA.
Augmenting Paths, Witnesses and Improved Approximations for Bounded Degree MSTs K. Chaudhuri, S. Rao, S. Riesenfeld, K. Talwar UC Berkeley.
K-Server on Hierarchical Binary Trees
The k-server Problem Study Group: Randomized Algorithm Presented by Ray Lam August 16, 2003.
Facility Location with Nonuniform Hard Capacities Martin Pál Éva Tardos Tom Wexler Cornell University.
Hierarchical Graph Cuts for Semi-Metric Labeling M. Pawan Kumar Joint work with Daphne Koller.
DAST 2005 Week 4 – Some Helpful Material Randomized Quick Sort & Lower bound & General remarks…
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Priority Models Sashka Davis University of California, San Diego June 1, 2003.
Assignment 4. (Due on Dec 2. 2:30 p.m.) This time, Prof. Yao and I can explain the questions, but we will NOT tell you how to solve the problems. Question.
. Phylogenetic Trees (2) Lecture 12 Based on: Durbin et al Section 7.3, 7.8, Gusfield: Algorithms on Strings, Trees, and Sequences Section 17.
A polylog competitive algorithm for the k-server problem Nikhil Bansal (Eindhoven) Niv Buchbinder (Open Univ., Israel) Aleksander Madry (MIT) Seffi Naor.
Approximation Algorithms for Stochastic Combinatorial Optimization Part I: Multistage problems Anupam Gupta Carnegie Mellon University.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
CS-424 Gregory Dudek Today’s outline Administrative issues –Assignment deadlines: 1 day = 24 hrs (holidays are special) –The project –Assignment 3 –Midterm.
Network Aware Resource Allocation in Distributed Clouds.
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
Analysis of Algorithms
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Randomized Online Algorithm for Minimum Metric Bipartite Matching Adam Meyerson UCLA.
On a Network Creation Game PoA Seminar Presenting: Oren Gilon Based on an article by Fabrikant et al 1.
Princeton University COS 423 Theory of Algorithms Spring 2001 Kevin Wayne Approximation Algorithms These lecture slides are adapted from CLRS.
 Rooted tree and binary tree  Theorem 5.19: A full binary tree with t leaves contains i=t-1 internal vertices.
5.5.3 Rooted tree and binary tree  Definition 25: A directed graph is a directed tree if the graph is a tree in the underlying undirected graph.  Definition.
A polylog competitive algorithm for the k-server problem Nikhil Bansal (IBM) Niv Buchbinder (Open Univ.) Aleksander Madry (MIT) Seffi Naor (Technion)
A Optimal On-line Algorithm for k Servers on Trees Author : Marek Chrobak Lawrence L. Larmore 報告人:羅正偉.
Foundation of Computing Systems
Recurrences – II. Comp 122, Spring 2004.
Lecture 5 Today, how to solve recurrences We learned “guess and proved by induction” We also learned “substitution” method Today, we learn the “master.
Improved Competitive Ratios for Submodular Secretary Problems ? Moran Feldman Roy SchwartzJoseph (Seffi) Naor Technion – Israel Institute of Technology.
A Unified Continuous Greedy Algorithm for Submodular Maximization Moran Feldman Roy SchwartzJoseph (Seffi) Naor Technion – Israel Institute of Technology.
Introduction to the k-Server Problem Marcel Birkner.
11 -1 Chapter 12 On-Line Algorithms On-Line Algorithms On-line algorithms are used to solve on-line problems. The disk scheduling problem The requests.
Approximation Algorithms based on linear programming.
5.6 Prefix codes and optimal tree Definition 31: Codes with this property which the bit string for a letter never occurs as the first part of the bit string.
Equal costs at all levels
Approximating Graphs by Trees Marcin Bieńkowski University of Wrocław
Binary Search Trees A binary search tree is a binary tree
Exercise Exercise Proof that
(2,4) Trees (2,4) Trees 1 (2,4) Trees (2,4) Trees
Recursion-tree method
(2,4) Trees (2,4) Trees (2,4) Trees.
(2,4) Trees 2/15/2019 (2,4) Trees (2,4) Trees.
Online Algorithms via Projections set cover, paging, k-server
(2,4) Trees (2,4) Trees (2,4) Trees.
Compact routing schemes with improved stretch
Randomized Online Algorithm for Minimum Metric Bipartite Matching
Clustering.
Presentation transcript:

Hierarchical Well-Separated Trees (HST) Edges’ distances are uniform across a level of the tree Stretch  = factor by which distances decrease from root to leaf Distortion = factor by which distance between 2 points increases when HST is used to traverse instead of direct distance – Upper bound is O(  log  n) Diagram from Fakcharoenphol, Rao & Talwar 2003

Pure Randomized vs. Fractional Algorithms “Fractional view” = keep track only of marginal distributions of some quantities Lossy compared to pure randomized Which marginals to track? Claim: for some algorithms, fractional view can be converted back to randomized algorithm with little loss

For node j, let T(j) = leaves of the subtree of T rooted in j At time step t, for leaf i, p i t = probability of having a server at i If there is a request at i on time t, p i t should be 1 Expected number of servers across T(j) = k t (j) =  i ∈ T(j) p i t Movement cost to get servers at j =  j ∈ T W(j) |k t (j) – k t-1 (j)| Fractional View of K-server Problem Parts of diagram from Bansal 2011 j T(j)T(j) i

The Allocation Problem Decide how to (re-)distribute  servers among d locations (each location of uniform distance from a center and may request arbitrary no. of servers) Each location i has a request denoted as {h t (0), h t (1), … h t (  )} h t (j) = cost of serving request using j servers Ex.: request at i=0 is {∞, 2, 1, 0, 0} (monotonic decrease) Total cost = hit cost + movement cost Parts of diagram from Bansal 2011 I can work with 1, but I’d like 3!

Fractional View of Allocation Problem Let x i,j t = (non-negative) probability of having j servers at location i at time t Sum of probabilities  j x i,j t = 1 No. of servers used must not exceed no. available  i  j j ∙ x i,j t ≤  Hit cost incurred =  j h t (j) ∙ x i,j t Movement cost incurred =  i  j (|  j’<j x i,j t –  j’<j x i,j t-1 |) Note: fractional A.P. too weak to obtain randomized A.P. algorithm – But we don’t really care about A.P., we care about K-server problem!

From Allocation to K-Server Theorem 2: It suffices to have a (1+ ,  (  ))- competitive fractional AP algorithm on uniform metric to get a k-server algorithm that is O(β l )-competitive algorithm (Coté et al. 2008) Theorem 1: Bansal et al.’s k-server algorithm has a competitive ratio of Õ(log 2 k log 3 n)

The Main Algorithm 1.Embed the n points into a distribution  over  - HSTs with stretch  =  (log n log(k log n)) – (No time to discuss, this step is essentially from the paper of Fakcharoenphol, Rao & Talwar 2003) 2.According to distribution , pick a random HST T – Extra step: Transform the HST to a weighted HST (We’ll briefly touch on this) Diagram from Bansal 2011

The Main Algorithm 3.Solve the (fractional) allocation problem on T’s root node + immediate children, then recursively solve the same problem on each child – Intuitive application of Theorem 2 – d = immediate children of a given node – At root node:  = all k servers – At internal node i:  = resulting (re)allocation of servers from i’s parent Allocation instances Diagram from Bansal 2011

Detour: Weighted HST Degenerate case of normal HST: Depth l = O(n) (can happen if n points are on a line with geometrically increasing distances)

Detour: Weighted HST Solution: allow lengths of edges to be non-uniform Allow distortion from leaf-to-leaf to be at most 2  /(  –1) Depth l = O(log n) Consequence: Uniform A.P. becomes weighted-star A.P.

Proving the Main Algorithm Theorem 1: Bansal et al.’s k-server algorithm has a competitive ratio of Õ(log 2 k log 3 n) Idea of proof: How does competitive ratio and distortion evolve as we transform: Fractional allocation algorithm ↓ Fractional k-server algorithm on HST ↓ Randomized k-server algorithm on HST

Supplemental Theorems Theorem 3: For  > 0, there exists a fractional A.P. algorithm on a weighted-star metric that is (1+ , O(log(k/  )))- competitive (Refinement of theorem 2, to be discussed by Tanvirul) Theorem 4: If T is a weighted  -HST with depth l, if Theorem 3 holds, then there is a fractional k-server algorithm that is O( l log(k l ))-competitive as long as  =  ( l log(k l )) Theorem 5: If T is a  -HST with  >5, then any fractional k- server algorithm on T converts to a randomized k-server algorithm on T that is about as competitive (only O(1) loss) Theorem 6: If T is a  -HST with n leaves and any depth, it can transform to a weighted  -HST with identical leaves but with depth O(log n) and leaf-to-leaf distance distorted only by at most 2  /(  –1)

Proof of Theorem 1 1.Embed the n points into a distribution  over  - HSTs with stretch  =  (log n log(k log n)) – Distortion at O(  log  n) – Resulting HSTs may have depth l up to O(n) 2.According to distribution , pick a random HST T and transform to a weighted HST – From Theorem 6, depth l reduced to O(log n) – Stretch  is now  ( l log (k l )))

Proof of Theorem 1 3.Solve the (fractional) allocation problem on T’s root node + immediate children, then recursively solve the allocation problem on children – This is explicitly Theorem 2 refined by Theorem 3 – Stretch  =  ( l log (k l ))), so Theorem 4 is applicable! – Transform to a fractional k-server algorithm with competitiveness = O( l log (k l ))) = O(log n log (k log n)) – Applying Theorem 5, we get similar competitiveness for the randomized k-server algorithm

Proof of Theorem 1 Expected distortion to optimal solution Opt* M, given the cost of the solution on T, c T : E  [c T ] = O(  log  n) ∙ Opt* M Alg M ≤ Alg T ≤ O(log n log (k log n)) ∙ c T E  [Alg M ] = O(log n log (k log n)) ∙ E  [c T ] = O(log n log (k log n)) ∙ O(  log  n) ∙ Opt* M

Proof of Theorem 1 E  [Alg M ] = O(log n log (k log n)) ∙ O(  log  n) ∙ Opt* M This implies a competitive ratio of: O(log n log (k log n)) ∙ O(  log  n) = O(log n log (k log n)) ∙ O(  (log n / log  )) = O{[log 3 n (log (k log n)) 2 ] / log log n} = O(log 2 k log 3 n log log n) = Õ(log 2 k log 3 n)