-
The State Complexity of Lexicographically Smallest Words and Computing Successors
Authors:
Lukas Fleischer,
Jeffrey Shallit
Abstract:
Given a regular language L over an ordered alphabet $Σ$, the set of lexicographically smallest (resp., largest) words of each length is itself regular. Moreover, there exists an unambiguous finite-state transducer that, on a given word w, outputs the length-lexicographically smallest word larger than w (henceforth called the L-successor of w). In both cases, naive constructions result in an expone…
▽ More
Given a regular language L over an ordered alphabet $Σ$, the set of lexicographically smallest (resp., largest) words of each length is itself regular. Moreover, there exists an unambiguous finite-state transducer that, on a given word w, outputs the length-lexicographically smallest word larger than w (henceforth called the L-successor of w). In both cases, naive constructions result in an exponential blowup in the number of states. We prove that if L is recognized by a DFA with n states, then $2^{Θ(\sqrt{n \log n})}$ states are sufficient for a DFA to recognize the subset S(L) of L composed of its lexicographically smallest words. We give a matching lower bound that holds even if S(L) is represented as an NFA. We then show that the same upper and lower bounds hold for an unambiguous finite-state transducer that computes L-successors.
△ Less
Submitted 18 March, 2020;
originally announced March 2020.
-
New Bounds on Antipowers in Words
Authors:
Lukas Fleischer,
Samin Riasat,
Jeffrey Shallit
Abstract:
Fici et al. defined a word to be a k-power if it is the concatenation of k consecutive identical blocks, and an r-antipower if it is the concatenation of r pairwise distinct blocks of the same size. They defined N (k, r) as the smallest l such that every binary word of length l contains either a k-power or an r-antipower. In this note we obtain some new upper and lower bounds on N (k, r). We also…
▽ More
Fici et al. defined a word to be a k-power if it is the concatenation of k consecutive identical blocks, and an r-antipower if it is the concatenation of r pairwise distinct blocks of the same size. They defined N (k, r) as the smallest l such that every binary word of length l contains either a k-power or an r-antipower. In this note we obtain some new upper and lower bounds on N (k, r). We also consider avoiding 3-antipowers and 4-antipowers over larger alphabets, and obtain a lower bound for N (k, 5) in the binary case.
△ Less
Submitted 4 July, 2020; v1 submitted 17 December, 2019;
originally announced December 2019.
-
Words With Few Palindromes, Revisited
Authors:
Lukas Fleischer,
Jeffrey Shallit
Abstract:
In 2013, Fici and Zamboni proved a number of theorems about finite and infinite words having only a small number of factors that are palindromes. In this paper we rederive some of their results, and obtain some new ones, by a different method based on finite automata.
In 2013, Fici and Zamboni proved a number of theorems about finite and infinite words having only a small number of factors that are palindromes. In this paper we rederive some of their results, and obtain some new ones, by a different method based on finite automata.
△ Less
Submitted 4 January, 2020; v1 submitted 27 November, 2019;
originally announced November 2019.
-
Words Avoiding Reversed Factors, Revisited
Authors:
Lukas Fleischer,
Jeffrey Shallit
Abstract:
In 2005, Rampersad and the second author proved a number of theorems about infinite words x with the property that if w is any sufficiently long finite factor of x, then its reversal w^R is not a factor of x. In this note we revisit these results, reproving them in more generality, using machine computations only. Two different techniques are presented.
In 2005, Rampersad and the second author proved a number of theorems about infinite words x with the property that if w is any sufficiently long finite factor of x, then its reversal w^R is not a factor of x. In this note we revisit these results, reproving them in more generality, using machine computations only. Two different techniques are presented.
△ Less
Submitted 9 December, 2019; v1 submitted 26 November, 2019;
originally announced November 2019.
-
On the Complexity of Properties of Transformation Semigroups
Authors:
Lukas Fleischer,
Trevor Jack
Abstract:
We investigate the computational complexity for determining various properties of a finite transformation semigroup given by generators. We introduce a simple framework to describe transformation semigroup properties that are decidable in $\mathsf{AC^0}$. This framework is then used to show that the problems of deciding whether a transformation semigroup is a group, commutative or a semilattice ar…
▽ More
We investigate the computational complexity for determining various properties of a finite transformation semigroup given by generators. We introduce a simple framework to describe transformation semigroup properties that are decidable in $\mathsf{AC^0}$. This framework is then used to show that the problems of deciding whether a transformation semigroup is a group, commutative or a semilattice are in $\mathsf{AC^0}$. Deciding whether a semigroup has a left (resp.right) zero is shown to be $\mathsf{NL}$-complete, as are the problems of testing whether a transformation semigroup is nilpotent, $\mathcal{R}$-trivial or has central idempotents. We also give $\mathsf{NL}$ algorithms for testing whether a transformation semigroup is idempotent, orthodox, completely regular, Clifford or has commuting idempotents. Some of these algorithms are direct consequences of the more general result that arbitrary fixed semigroup equations can be tested in~$\mathsf{NL}$. Moreover, we show how to compute left and right identities of a transformation semigroup in polynomial time. Finally, we show that checking whether an element is regular is $\mathsf{PSPACE}$-complete. \
△ Less
Submitted 28 August, 2019; v1 submitted 31 October, 2018;
originally announced November 2018.
-
The Intersection Problem for Finite Semigroups
Authors:
Lukas Fleischer
Abstract:
We investigate the intersection problem for finite semigroups, which asks for a given set of regular languages, represented by recognizing morphisms to finite semigroups, whether there exists a word contained in their intersection. We introduce compressibility measures as a useful tool to classify the intersection problem for certain classes of finite semigroups into circuit complexity classes and…
▽ More
We investigate the intersection problem for finite semigroups, which asks for a given set of regular languages, represented by recognizing morphisms to finite semigroups, whether there exists a word contained in their intersection. We introduce compressibility measures as a useful tool to classify the intersection problem for certain classes of finite semigroups into circuit complexity classes and Turing machine complexity classes. Using this framework, we obtain a new and simple proof that for groups and commutative semigroups, the problem is contained in NP. We uncover certain structural and non-structural properties determining the complexity of the intersection problem for varieties of semigroups containing only trivial submonoids. More specifically, we prove NP-hardness for classes of semigroups having a property called unbounded order and for the class of all nilpotent semigroups of bounded order. On the contrary, we show that bounded order and commutativity imply containment in the circuit complexity class qAC^k (for some k) and decidability in quasi-polynomial time. We also establish connections to the monoid variant of the problem.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Efficient Membership Testing for Pseudovarieties of Finite Semigroups
Authors:
Lukas Fleischer
Abstract:
We consider the complexity of deciding membership of a given finite semigroup to a fixed pseudovariety. While it is known that there exist pseudovarieties with NP-complete or even undecidable membership problems, for many well-known pseudovarieties the problem is known to be decidable in polynomial time. We show that for many of these pseudovarieties, the membership problem is actually in AC^0. To…
▽ More
We consider the complexity of deciding membership of a given finite semigroup to a fixed pseudovariety. While it is known that there exist pseudovarieties with NP-complete or even undecidable membership problems, for many well-known pseudovarieties the problem is known to be decidable in polynomial time. We show that for many of these pseudovarieties, the membership problem is actually in AC^0. To this end, we show that these pseudovarieties can be characterized by first-order sentences with multiplication as the only predicate. We prove closure properties of the class of pseudovarieties with such first-order descriptions under various well-known operations; in particular, if V can be described by a first-order sentence, then DV, LV, and the Mal'cev products of K, D, N, LI, and LG with V are first-order definable as well. Moreover, if H is a first-order definable pseudovariety of finite groups, then the pseudovariety of all finite semigroups whose subgroups are in H is first-order definable. Our formalism is also powerful enough to capture all pseudovarieties characterized by finite sets of omega-identities. In view of lower bounds from circuit complexity, we obtain a new technique to prove that a pseudovariety V cannot be defined by such a set: if membership in V is hard for PARITY, it cannot be defined in this logic and thus cannot be described by finitely many omega-identities. We show that membership to EA is L-complete, thereby improving previous complexity results and obtaining a new proof that the pseudovariety cannot be described by finitely many omega-identities at the same time.
△ Less
Submitted 15 June, 2018; v1 submitted 2 May, 2018;
originally announced May 2018.
-
Testing Simon's congruence
Authors:
Lukas Fleischer,
Manfred Kufleitner
Abstract:
Piecewise testable languages are a subclass of the regular languages. There are many equivalent ways of defining them; Simon's congruence $\sim_k$ is one of the most classical approaches. Two words are $\sim_k$-equivalent if they have the same set of (scattered) subwords of length at most k. A language L is piecewise testable if there exists some k such that L is a union of $\sim_k$-classes. For e…
▽ More
Piecewise testable languages are a subclass of the regular languages. There are many equivalent ways of defining them; Simon's congruence $\sim_k$ is one of the most classical approaches. Two words are $\sim_k$-equivalent if they have the same set of (scattered) subwords of length at most k. A language L is piecewise testable if there exists some k such that L is a union of $\sim_k$-classes. For each equivalence class of $\sim_k$, one can define a canonical representative in shortlex normal form, that is, the minimal word with respect to the lexicographic order among the shortest words in $\sim_k$. We present an algorithm for computing the canonical representative of the $\sim_k$-class of a given word $w \in A^*$ of length n. The running time of our algorithm is in O(|A|n) even if $k \le n$ is part of the input. This is surprising since the number of possible subwords grows exponentially in k. The case $k > n$ is not interesting since then, the equivalence class of w is a singleton. If the alphabet is fixed, the running time of our algorithm is linear in the size of the input word. Moreover, for fixed alphabet, we show that the computation of shortlex normal forms for $\sim_k$ is possible in deterministic logarithmic space. One of the consequences of our algorithm is that one can check with the same complexity whether two words are $\sim_k$-equivalent (with k being part of the input).
△ Less
Submitted 27 April, 2018;
originally announced April 2018.
-
On the Complexity of the Cayley Semigroup Membership Problem
Authors:
Lukas Fleischer
Abstract:
We investigate the complexity of deciding, given a multiplication table representing a semigroup S, a subset X of S and an element t of S, whether t can be expressed as a product of elements of X. It is well-known that this problem is NL-complete and that the more general Cayley groupoid membership problem, where the multiplication table is not required to be associative, is P-complete. For groups…
▽ More
We investigate the complexity of deciding, given a multiplication table representing a semigroup S, a subset X of S and an element t of S, whether t can be expressed as a product of elements of X. It is well-known that this problem is NL-complete and that the more general Cayley groupoid membership problem, where the multiplication table is not required to be associative, is P-complete. For groups, the problem can be solved in deterministic log-space which raised the question of determining the exact complexity of this variant. Barrington, Kadau, Lange and McKenzie showed that for Abelian groups and for certain solvable groups, the problem is contained in the complexity class FOLL and they concluded that these variants are not hard for any complexity class containing PARITY. The more general case of arbitrary groups remained open. In this work, we show that for both groups and for commutative semigroups, the problem is solvable in qAC^0 (quasi-polynomial size circuits of constant depth with unbounded fan-in) and conclude that these variants are also not hard for any class containing PARITY. Moreover, we prove that NL-completeness already holds for the classes of 0-simple semigroups and nilpotent semigroups. Together with our results on groups and commutative semigroups, we prove the existence of a natural class of finite semigroups which generates a variety of finite semigroups with NL-complete Cayley semigroup membership, while the Cayley semigroup membership problem for the class itself is not NL-hard. We also discuss applications of our technique to FOLL.
△ Less
Submitted 14 April, 2018; v1 submitted 2 February, 2018;
originally announced February 2018.
-
The Intersection Problem for Finite Monoids
Authors:
Lukas Fleischer,
Manfred Kufleitner
Abstract:
We investigate the intersection problem for finite monoids, which asks for a given set of regular languages, represented by recognizing morphisms to finite monoids from a variety V, whether there exists a word contained in their intersection. Our main result is that the problem is PSPACE-complete if V is contained in DS and NP-complete if V is non-trivial and contained in DO. Our NP-algorithm for…
▽ More
We investigate the intersection problem for finite monoids, which asks for a given set of regular languages, represented by recognizing morphisms to finite monoids from a variety V, whether there exists a word contained in their intersection. Our main result is that the problem is PSPACE-complete if V is contained in DS and NP-complete if V is non-trivial and contained in DO. Our NP-algorithm for the case that V is contained in DO uses novel methods, based on compression techniques and combinatorial properties of DO. We also show that the problem is log-space reducible to the intersection problem for deterministic finite automata (DFA) and that a variant of the problem is log-space reducible to the membership problem for transformation monoids. In light of these reductions, our hardness results can be seen as a generalization of both a classical result by Kozen and a theorem by Beaudry, McKenzie and Therien.
△ Less
Submitted 2 February, 2018; v1 submitted 23 November, 2017;
originally announced November 2017.
-
Church-Rosser Systems, Codes with Bounded Synchronization Delay and Local Rees Extensions
Authors:
Volker Diekert,
Lukas Fleischer
Abstract:
What is the common link, if there is any, between Church-Rosser systems, prefix codes with bounded synchronization delay, and local Rees extensions? The first obvious answer is that each of these notions relates to topics of interest for WORDS: Church-Rosser systems are certain rewriting systems over words, codes are given by sets of words which form a basis of a free submonoid in the free monoid…
▽ More
What is the common link, if there is any, between Church-Rosser systems, prefix codes with bounded synchronization delay, and local Rees extensions? The first obvious answer is that each of these notions relates to topics of interest for WORDS: Church-Rosser systems are certain rewriting systems over words, codes are given by sets of words which form a basis of a free submonoid in the free monoid of all words (over a given alphabet) and local Rees extensions provide structural insight into regular languages over words. So, it seems to be a legitimate title for an extended abstract presented at the conference WORDS 2017. However, this work is more ambitious, it outlines some less obvious but much more interesting link between these topics. This link is based on a structure theory of finite monoids with varieties of groups and the concept of local divisors playing a prominent role. Parts of this work appeared in a similar form in conference proceedings where proofs and further material can be found.
△ Less
Submitted 1 July, 2017;
originally announced July 2017.
-
Green's Relations in Finite Transformation Semigroups
Authors:
Lukas Fleischer,
Manfred Kufleitner
Abstract:
We consider the complexity of Green's relations when the semigroup is given by transformations on a finite set. Green's relations can be defined by reachability in the (right/left/two-sided) Cayley graph. The equivalence classes then correspond to the strongly connected components. It is not difficult to show that, in the worst case, the number of equivalence classes is in the same order of magnit…
▽ More
We consider the complexity of Green's relations when the semigroup is given by transformations on a finite set. Green's relations can be defined by reachability in the (right/left/two-sided) Cayley graph. The equivalence classes then correspond to the strongly connected components. It is not difficult to show that, in the worst case, the number of equivalence classes is in the same order of magnitude as the number of elements. Another important parameter is the maximal length of a chain of components. Our main contribution is an exponential lower bound for this parameter. There is a simple construction for an arbitrary set of generators. However, the proof for constant alphabet is rather involved. Our results also apply to automata and their syntactic semigroups.
△ Less
Submitted 15 March, 2017;
originally announced March 2017.
-
Operations on Weakly Recognizing Morphisms
Authors:
Lukas Fleischer,
Manfred Kufleitner
Abstract:
Weakly recognizing morphisms from free semigroups onto finite semigroups are a classical way for defining the class of omega-regular languages, i.e., a set of infinite words is weakly recognizable by such a morphism if and only if it is accepted by some Büchi automaton. We consider the descriptional complexity of various constructions for weakly recognizing morphisms. This includes the conversion…
▽ More
Weakly recognizing morphisms from free semigroups onto finite semigroups are a classical way for defining the class of omega-regular languages, i.e., a set of infinite words is weakly recognizable by such a morphism if and only if it is accepted by some Büchi automaton. We consider the descriptional complexity of various constructions for weakly recognizing morphisms. This includes the conversion from and to Büchi automata, the conversion into strongly recognizing morphisms, and complementation. For some problems, we are able to give more precise bounds in the case of binary alphabets or simple semigroups.
△ Less
Submitted 27 April, 2016; v1 submitted 17 March, 2016;
originally announced March 2016.
-
Efficient Algorithms for Morphisms over Omega-Regular Languages
Authors:
Lukas Fleischer,
Manfred Kufleitner
Abstract:
Morphisms to finite semigroups can be used for recognizing omega-regular languages. The so-called strongly recognizing morphisms can be seen as a deterministic computation model which provides minimal objects (known as the syntactic morphism) and a trivial complementation procedure. We give a quadratic-time algorithm for computing the syntactic morphism from any given strongly recognizing morphism…
▽ More
Morphisms to finite semigroups can be used for recognizing omega-regular languages. The so-called strongly recognizing morphisms can be seen as a deterministic computation model which provides minimal objects (known as the syntactic morphism) and a trivial complementation procedure. We give a quadratic-time algorithm for computing the syntactic morphism from any given strongly recognizing morphism, thereby showing that minimization is easy as well. In addition, we give algorithms for efficiently solving various decision problems for weakly recognizing morphisms. Weakly recognizing morphism are often smaller than their strongly recognizing counterparts. Finally, we describe the language operations needed for converting formulas in monadic second-order logic (MSO) into strongly recognizing morphisms, and we give some experimental results.
△ Less
Submitted 9 November, 2015; v1 submitted 21 September, 2015;
originally announced September 2015.
-
Approximately Optimal Auctions for Selling Privacy when Costs are Correlated with Data
Authors:
Lisa Fleischer,
Yu-Han Lyu
Abstract:
We consider a scenario in which a database stores sensitive data of users and an analyst wants to estimate statistics of the data. The users may suffer a cost when their data are used in which case they should be compensated. The analyst wishes to get an accurate estimate, while the users want to maximize their utility. We want to design a mechanism that can estimate statistics accurately without…
▽ More
We consider a scenario in which a database stores sensitive data of users and an analyst wants to estimate statistics of the data. The users may suffer a cost when their data are used in which case they should be compensated. The analyst wishes to get an accurate estimate, while the users want to maximize their utility. We want to design a mechanism that can estimate statistics accurately without compromising users' privacy.
Since users' costs and sensitive data may be correlated, it is important to protect the privacy of both data and cost. We model this correlation by assuming that a user's unknown sensitive data determines a distribution from a set of publicly known distributions and a user's cost is drawn from that distribution. We propose a stronger model of privacy preserving mechanism where users are compensated whenever they reveal information about their data to the mechanism. In this model, we design a Bayesian incentive compatible and privacy preserving mechanism that guarantees accuracy and protects the privacy of both cost and data.
△ Less
Submitted 18 April, 2012;
originally announced April 2012.
-
Online Mixed Packing and Covering
Authors:
Umang Bhaskar,
Lisa Fleischer
Abstract:
In many problems, the inputs arrive over time, and must be dealt with irrevocably when they arrive. Such problems are online problems. A common method of solving online problems is to first solve the corresponding linear program, and then round the fractional solution online to obtain an integral solution.
We give algorithms for solving linear programs with mixed packing and covering constraints…
▽ More
In many problems, the inputs arrive over time, and must be dealt with irrevocably when they arrive. Such problems are online problems. A common method of solving online problems is to first solve the corresponding linear program, and then round the fractional solution online to obtain an integral solution.
We give algorithms for solving linear programs with mixed packing and covering constraints online. We first consider mixed packing and covering linear programs, where packing constraints are given offline and covering constraints are received online. The objective is to minimize the maximum multiplicative factor by which any packing constraint is violated, while satisfying the covering constraints. No prior sublinear competitive algorithms are known for this problem. We give the first such --- a polylogarithmic-competitive algorithm for solving mixed packing and covering linear programs online. We also show a nearly tight lower bound.
Our techniques for the upper bound use an exponential penalty function in conjunction with multiplicative updates. While exponential penalty functions are used previously to solve linear programs offline approximately, offline algorithms know the constraints beforehand and can optimize greedily. In contrast, when constraints arrive online, updates need to be more complex.
We apply our techniques to solve two online fixed-charge problems with congestion. These problems are motivated by applications in machine scheduling and facility location. The linear program for these problems is more complicated than mixed packing and covering, and presents unique challenges. We show that our techniques combined with a randomized rounding procedure give polylogarithmic-competitive integral solutions. These problems generalize online set-cover, for which there is a polylogarithmic lower bound. Hence, our results are close to tight.
△ Less
Submitted 2 April, 2012; v1 submitted 29 March, 2012;
originally announced March 2012.
-
When the Cut Condition is Enough: A Complete Characterization for Multiflow Problems in Series-Parallel Networks
Authors:
Amit Chakrabarti,
Lisa Fleischer,
Christophe Weibel
Abstract:
Let $G=(V,E)$ be a supply graph and $H=(V,F)$ a demand graph defined on the same set of vertices. An assignment of capacities to the edges of $G$ and demands to the edges of $H$ is said to satisfy the \emph{cut condition} if for any cut in the graph, the total demand crossing the cut is no more than the total capacity crossing it. The pair $(G,H)$ is called \emph{cut-sufficient} if for any assignm…
▽ More
Let $G=(V,E)$ be a supply graph and $H=(V,F)$ a demand graph defined on the same set of vertices. An assignment of capacities to the edges of $G$ and demands to the edges of $H$ is said to satisfy the \emph{cut condition} if for any cut in the graph, the total demand crossing the cut is no more than the total capacity crossing it. The pair $(G,H)$ is called \emph{cut-sufficient} if for any assignment of capacities and demands that satisfy the cut condition, there is a multiflow routing the demands defined on $H$ within the network with capacities defined on $G$. We prove a previous conjecture, which states that when the supply graph $G$ is series-parallel, the pair $(G,H)$ is cut-sufficient if and only if $(G,H)$ does not contain an \emph{odd spindle} as a minor; that is, if it is impossible to contract edges of $G$ and delete edges of $G$ and $H$ so that $G$ becomes the complete bipartite graph $K_{2,p}$, with $p\geq 3$ odd, and $H$ is composed of a cycle connecting the $p$ vertices of degree 2, and an edge connecting the two vertices of degree $p$. We further prove that if the instance is \emph{Eulerian} --- that is, the demands and capacities are integers and the total of demands and capacities incident to each vertex is even --- then the multiflow problem has an integral solution. We provide a polynomial-time algorithm to find an integral solution in this case. In order to prove these results, we formulate properties of tight cuts (cuts for which the cut condition inequality is tight) in cut-sufficient pairs. We believe these properties might be useful in extending our results to planar graphs.
△ Less
Submitted 19 March, 2012;
originally announced March 2012.
-
Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines
Authors:
Lisa Fleischer,
Zhenghui Wang
Abstract:
We study problems of scheduling jobs on related machines so as to minimize the makespan in the setting where machines are strategic agents. In this problem, each job $j$ has a length $l_{j}$ and each machine $i$ has a private speed $t_{i}$. The running time of job $j$ on machine $i$ is $t_{i}l_{j}$. We seek a mechanism that obtains speed bids of machines and then assign jobs and payments to machin…
▽ More
We study problems of scheduling jobs on related machines so as to minimize the makespan in the setting where machines are strategic agents. In this problem, each job $j$ has a length $l_{j}$ and each machine $i$ has a private speed $t_{i}$. The running time of job $j$ on machine $i$ is $t_{i}l_{j}$. We seek a mechanism that obtains speed bids of machines and then assign jobs and payments to machines so that the machines have incentive to report true speeds and the allocation and payments are also envy-free. We show that
1. A deterministic envy-free, truthful, individually rational, and anonymous mechanism cannot approximate the makespan strictly better than $2-1/m$, where $m$ is the number of machines. This result contrasts with prior work giving a deterministic PTAS for envy-free anonymous assignment and a distinct deterministic PTAS for truthful anonymous mechanism.
2. For two machines of different speeds, the unique deterministic scalable allocation of any envy-free, truthful, individually rational, and anonymous mechanism is to allocate all jobs to the quickest machine. This allocation is the same as that of the VCG mechanism, yielding a 2-approximation to the minimum makespan.
3. No payments can make any of the prior published monotone and locally efficient allocations that yield better than an $m$-approximation for $\qcmax$ \cite{aas, at,ck10, dddr, kovacs} a truthful, envy-free, individually rational, and anonymous mechanism.
△ Less
Submitted 14 July, 2011;
originally announced July 2011.
-
Discrete Price Updates Yield Fast Convergence in Ongoing Markets with Finite Warehouses
Authors:
Richard Cole,
Lisa Fleischer,
Ashish Rastogi
Abstract:
This paper shows that in suitable markets, even with out-of-equilibrium trade allowed, a simple price update rule leads to rapid convergence toward the equilibrium. In particular, this paper considers a Fisher market repeated over an unbounded number of time steps, with the addition of finite sized warehouses to enable non-equilibrium trade. The main result is that suitable tatonnement style price…
▽ More
This paper shows that in suitable markets, even with out-of-equilibrium trade allowed, a simple price update rule leads to rapid convergence toward the equilibrium. In particular, this paper considers a Fisher market repeated over an unbounded number of time steps, with the addition of finite sized warehouses to enable non-equilibrium trade. The main result is that suitable tatonnement style price updates lead to convergence in a significant subset of markets satisfying the Weak Gross Substitutes property. Throughout this process the warehouse are always able to store or meet demand imbalances (the needed capacity depends on the initial imbalances). Finally, our price update rule is robust in a variety of regards: 1. The updates for each good depend only on information about that good (its current price, its excess demand since its last update) and occur asynchronously from updates to other prices. 2. The process is resilient to error in the excess demand data. 3. Likewise, the process is resilient to discreteness, i.e. a limit to divisibility, both of goods and money.
△ Less
Submitted 9 December, 2010;
originally announced December 2010.
-
A Stackelberg Strategy for Routing Flow over Time
Authors:
Umang Bhaskar,
Lisa Fleischer,
Elliot Anshelevich
Abstract:
Routing games are used to to understand the impact of individual users' decisions on network efficiency. Most prior work on routing games uses a simplified model of network flow where all flow exists simultaneously, and users care about either their maximum delay or their total delay. Both of these measures are surrogates for measuring how long it takes to get all of a user's traffic through the n…
▽ More
Routing games are used to to understand the impact of individual users' decisions on network efficiency. Most prior work on routing games uses a simplified model of network flow where all flow exists simultaneously, and users care about either their maximum delay or their total delay. Both of these measures are surrogates for measuring how long it takes to get all of a user's traffic through the network. We attempt a more direct study of how competition affects network efficiency by examining routing games in a flow over time model. We give an efficiently computable Stackelberg strategy for this model and show that the competitive equilibrium under this strategy is no worse than a small constant times the optimal, for two natural measures of optimality.
△ Less
Submitted 14 October, 2010;
originally announced October 2010.
-
Submodular approximation: sampling-based algorithms and lower bounds
Authors:
Zoya Svitkina,
Lisa Fleischer
Abstract:
We introduce several generalizations of classical computer science problems obtained by replacing simpler objective functions with general submodular functions. The new problems include submodular load balancing, which generalizes load balancing or minimum-makespan scheduling, submodular sparsest cut and submodular balanced cut, which generalize their respective graph cut problems, as well as subm…
▽ More
We introduce several generalizations of classical computer science problems obtained by replacing simpler objective functions with general submodular functions. The new problems include submodular load balancing, which generalizes load balancing or minimum-makespan scheduling, submodular sparsest cut and submodular balanced cut, which generalize their respective graph cut problems, as well as submodular function minimization with a cardinality lower bound. We establish upper and lower bounds for the approximability of these problems with a polynomial number of queries to a function-value oracle. The approximation guarantees for most of our algorithms are of the order of sqrt(n/ln n). We show that this is the inherent difficulty of the problems by proving matching lower bounds. We also give an improved lower bound for the problem of approximately learning a monotone submodular function. In addition, we present an algorithm for approximately learning submodular functions with special structure, whose guarantee is close to the lower bound. Although quite restrictive, the class of functions with this structure includes the ones that are used for lower bounds both by us and in previous work. This demonstrates that if there are significantly stronger lower bounds for this problem, they rely on more general submodular functions.
△ Less
Submitted 31 May, 2010; v1 submitted 7 May, 2008;
originally announced May 2008.
-
A Combinatorial, Strongly Polynomial-Time Algorithm for Minimizing Submodular Functions
Authors:
Satoru Iwata,
Lisa Fleischer,
Satoru Fujishige
Abstract:
This paper presents the first combinatorial polynomial-time algorithm for minimizing submodular set functions, answering an open question posed in 1981 by Grotschel, Lovasz, and Schrijver. The algorithm employs a scaling scheme that uses a flow in the complete directed graph on the underlying set with each arc capacity equal to the scaled parameter. The resulting algorithm runs in time bounded b…
▽ More
This paper presents the first combinatorial polynomial-time algorithm for minimizing submodular set functions, answering an open question posed in 1981 by Grotschel, Lovasz, and Schrijver. The algorithm employs a scaling scheme that uses a flow in the complete directed graph on the underlying set with each arc capacity equal to the scaled parameter. The resulting algorithm runs in time bounded by a polynomial in the size of the underlying set and the largest length of the function value. The paper also presents a strongly polynomial-time version that runs in time bounded by a polynomial in the size of the underlying set independent of the function value.
△ Less
Submitted 13 April, 2000;
originally announced April 2000.