-
Stability of P2P Networks Under Greedy Peering (Full Version)
Authors:
Lucianna Kiffer,
Rajmohan Rajaraman
Abstract:
Major cryptocurrency networks have relied on random peering choice rules for making connections in their peer-to-peer networks. Generally, these choices have good properties, particularly for open, permissionless networks. Random peering choices however do not take into account that some actors may choose to optimize who they connect to such that they are quicker to hear about information being pr…
▽ More
Major cryptocurrency networks have relied on random peering choice rules for making connections in their peer-to-peer networks. Generally, these choices have good properties, particularly for open, permissionless networks. Random peering choices however do not take into account that some actors may choose to optimize who they connect to such that they are quicker to hear about information being propagated in the network. In this paper, we explore the dynamics of such greedy strategies. We study a model in which nodes select peers with the objective of minimizing their average distance to a designated subset of nodes in the network, and consider the impact of several factors including the peer selection process, degree constraints, and the size of the designated subset. The latter is particularly interesting in the context of blockchain networks as generally only a subset of nodes are the propagation source for content.
We first analyze an idealized version of the game where each node has full knowledge of the current network and aims to select the $d$ best connections, and prove the existence of equilibria under various model assumptions. Since in reality nodes only have local knowledge based on their peers' behavior, we also study a greedy protocol which runs in rounds, with each node replacing its worst-performing edge with a new random edge. We exactly characterize stability properties of networks that evolve with this peering rule and derive regimes where stability is possible and even inevitable. We also run extensive simulations with this peering rule examining both how the network evolves and how different network parameters affect the stability properties of the network. Our findings generally show that the only stable networks that arise from greedy peering choices are low-diameter and result in disparate performance for nodes in the network.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Scheduling Splittable Jobs on Configurable Machines
Authors:
Matthew Casey,
Rajmohan Rajaraman,
David Stalfa
Abstract:
Motivated by deep neural network applications, we study the problem of scheduling splittable jobs (e.g., neural network inference tasks) on configurable machines (e.g., multi-instance GPUs). We are given $n$ jobs and a set $C$ of configurations (e.g, representing ways to configure a GPU) consisting of multisets of blocks (e.g., representing GPU instances). A schedule consists of a set of machines,…
▽ More
Motivated by deep neural network applications, we study the problem of scheduling splittable jobs (e.g., neural network inference tasks) on configurable machines (e.g., multi-instance GPUs). We are given $n$ jobs and a set $C$ of configurations (e.g, representing ways to configure a GPU) consisting of multisets of blocks (e.g., representing GPU instances). A schedule consists of a set of machines, each assigned some configuration in $C$ with each block in the configuration assigned to process one job. The amount of a job's demand that is satisfied by a given block is an arbitrary function of the job and block. The objective is to satisfy all demands on as few machines as possible. We provide a tight logarithmic approximation algorithm for this problem in the general setting, an asymptotic $(2 + \varepsilon)$-approximation with $O(1)$ input configurations for arbitrary $\varepsilon > 0$, and a polynomial time approximation scheme when both the number and size of configurations are $O(1)$.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Sample Complexity of Opinion Formation on Networks
Authors:
Haolin Liu,
Rajmohan Rajaraman,
Ravi Sundaram,
Anil Vullikanti,
Omer Wasim,
Haifeng Xu
Abstract:
Consider public health officials aiming to spread awareness about a new vaccine in a community interconnected by a social network. How can they distribute information with minimal resources, ensuring community-wide understanding that aligns with the actual facts? This concern mirrors numerous real-world situations. In this paper, we initialize the study of sample complexity in opinion formation to…
▽ More
Consider public health officials aiming to spread awareness about a new vaccine in a community interconnected by a social network. How can they distribute information with minimal resources, ensuring community-wide understanding that aligns with the actual facts? This concern mirrors numerous real-world situations. In this paper, we initialize the study of sample complexity in opinion formation to solve this problem. Our model is built on the recognized opinion formation game, where we regard each agent's opinion as a data-derived model parameter, not just a real number as in prior studies. Such an extension offers a wider understanding of opinion formation and ties closely with federated learning. Through this formulation, we characterize the sample complexity bounds for any network and also show asymptotically tight bounds for specific network structures. Intriguingly, we discover optimal strategies often allocate samples inversely to the degree, hinting at vital policy implications. Our findings are empirically validated on both synthesized and real-world networks.
△ Less
Submitted 4 November, 2023;
originally announced November 2023.
-
One Tree to Rule Them All: Poly-Logarithmic Universal Steiner Tree
Authors:
Costas Busch,
Da Qi Chen,
Arnold Filtser,
Daniel Hathcock,
D Ellis Hershkowitz,
Rajmohan Rajaraman
Abstract:
A spanning tree $T$ of graph $G$ is a $ρ$-approximate universal Steiner tree (UST) for root vertex $r$ if, for any subset of vertices $S$ containing $r$, the cost of the minimal subgraph of $T$ connecting $S$ is within a $ρ$ factor of the minimum cost tree connecting $S$ in $G$. Busch et al. (FOCS 2012) showed that every graph admits $2^{O(\sqrt{\log n})}$-approximate USTs by showing that USTs are…
▽ More
A spanning tree $T$ of graph $G$ is a $ρ$-approximate universal Steiner tree (UST) for root vertex $r$ if, for any subset of vertices $S$ containing $r$, the cost of the minimal subgraph of $T$ connecting $S$ is within a $ρ$ factor of the minimum cost tree connecting $S$ in $G$. Busch et al. (FOCS 2012) showed that every graph admits $2^{O(\sqrt{\log n})}$-approximate USTs by showing that USTs are equivalent to strong sparse partition hierarchies (up to poly-logs). Further, they posed poly-logarithmic USTs and strong sparse partition hierarchies as open questions.
We settle these open questions by giving polynomial-time algorithms for computing both $O(\log ^ 7 n)$-approximate USTs and poly-logarithmic strong sparse partition hierarchies. For graphs with constant doubling dimension or constant pathwidth we improve this to $O(\log n)$-approximate USTs and $O(1)$ strong sparse partition hierarchies. Our doubling dimension result is tight up to second order terms. We reduce the existence of these objects to the previously studied cluster aggregation problem and what we call dangling nets.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Scheduling under Non-Uniform Job and Machine Delays
Authors:
Rajmohan Rajaraman,
David Stalfa,
Sheng Yang
Abstract:
We study the problem of scheduling precedence-constrained jobs on heterogenous machines in the presence of non-uniform job and machine communication delays. We are given as input $n$ unit size precedence-ordered jobs and $m$ related machines such that machine $i$ can execute up to $m_i$ jobs at a time. Each machine $i$ has an in-delay $ρ^{\mathrm{in}}_i$ and out-delay $ρ^{\mathrm{out}}_i$. Likewis…
▽ More
We study the problem of scheduling precedence-constrained jobs on heterogenous machines in the presence of non-uniform job and machine communication delays. We are given as input $n$ unit size precedence-ordered jobs and $m$ related machines such that machine $i$ can execute up to $m_i$ jobs at a time. Each machine $i$ has an in-delay $ρ^{\mathrm{in}}_i$ and out-delay $ρ^{\mathrm{out}}_i$. Likewise, each job $v$ has an in-delay $ρ^{\mathrm{in}}_v$ and out-delay $ρ^{\mathrm{out}}_v$. In a schedule, job $v$ may be executed on machine $i$ at time $t$ if each predecessor $u$ of $v$ is completed on $i$ before time $t$ or on any machine $j$ before time $t - (ρ^{\mathrm{in}}_i + ρ^{\mathrm{out}}_j + ρ^{\mathrm{out}}_u + ρ^{\mathrm{in}}_v)$. The goal is to construct a schedule that minimizes makespan.
We consider schedules that allow duplication of jobs as well as schedules which do not. When duplication is allowed, we provide an asymptotic $\mathrm{polylog}(n)$-approximation algorithms both when duplication is allowed and when it is not. We also obtain a true $\mathrm{polylog}(n)$-approximation for symmetric machine and job delays. These are the first polylogarithmic approximation algorithms for scheduling with non-uniform communication delays.
We also consider a more general model, where the delay can be an arbitrary function of the job and the machine executing it: job $v$ can be executed on machine $i$ at time $t$ if all of $v$'s predecessors are executed on $i$ by time $t-1$ or on any machine by time $t - ρ_{v,i}$. We present an approximation-preserving reduction from the Unique Machines Precedence-constrained Scheduling (UMPS) problem, first defined in [DKRSTZ22], to this job-machine delay model. The reduction entails logarithmic hardness for this delay setting, as well as polynomial hardness if the conjectured hardness of UMPS holds.
△ Less
Submitted 21 November, 2022; v1 submitted 26 July, 2022;
originally announced July 2022.
-
Online Paging with Heterogeneous Cache Slots
Authors:
Marek Chrobak,
Samuel Haney,
Mehraneh Liaee,
Debmalya Panigrahi,
Rajmohan Rajaraman,
Ravi Sundaram,
Neal E. Young
Abstract:
It is natural to generalize the online $k$-Server problem by allowing each request to specify not only a point $p$, but also a subset $S$ of servers that may serve it. For uniform metrics, the problem is equivalent to a generalization of Paging in which each request specifies not only a page $p$, but also a subset $S$ of cache slots, and is satisfied by having a copy of $p$ in some slot in $S$. We…
▽ More
It is natural to generalize the online $k$-Server problem by allowing each request to specify not only a point $p$, but also a subset $S$ of servers that may serve it. For uniform metrics, the problem is equivalent to a generalization of Paging in which each request specifies not only a page $p$, but also a subset $S$ of cache slots, and is satisfied by having a copy of $p$ in some slot in $S$. We call this problem Slot-Heterogenous Paging.
We parameterize the problem by specifying a family $\mathcal S \subseteq 2^{[k]}$ of requestable slot sets, and we establish bounds on the competitive ratio as a function of the cache size $k$ and family $\mathcal S$:
- If all request sets are allowed ($\mathcal S=2^{[k]}\setminus\{\emptyset\}$), the optimal deterministic and randomized competitive ratios are exponentially worse than for standard \Paging ($\mathcal S=\{[k]\}$).
- As a function of $|\mathcal S|$ and $k$, the optimal deterministic ratio is polynomial: at most $O(k^2|\mathcal S|)$ and at least $Ω(\sqrt{|\mathcal S|})$.
- For any laminar family $\mathcal S$ of height $h$, the optimal ratios are $O(hk)$ (deterministic) and $O(h^2\log k)$ (randomized).
- The special case of laminar $\mathcal S$ that we call All-or-One Paging extends standard Paging by allowing each request to specify a specific slot to put the requested page in. The optimal deterministic ratio for weighted All-or-One Paging is $Θ(k)$. Offline All-or-One Paging is NP-hard.
Some results for the laminar case are shown via a reduction to the generalization of Paging in which each request specifies a set $\mathcal P of pages, and is satisfied by fetching any page from $\mathcal P into the cache. The optimal ratios for the latter problem (with laminar family of height $h$) are at most $hk$ (deterministic) and $h\,H_k$ (randomized).
△ Less
Submitted 23 February, 2023; v1 submitted 11 June, 2022;
originally announced June 2022.
-
Improved Bounds for Scheduling Flows under Endpoint Capacity Constraints
Authors:
Searidang Pa,
Rajmohan Rajaraman,
David Stalfa
Abstract:
We study flow scheduling under node capacity constraints. We are given capacitated nodes and an online sequence of jobs, each with a release time and a demand to be routed between two nodes. A schedule specifies which jobs are routed in each step, guaranteeing that the total demand on a node in any step is at most its capacity. A key metric in this scenario is response time: the time between a job…
▽ More
We study flow scheduling under node capacity constraints. We are given capacitated nodes and an online sequence of jobs, each with a release time and a demand to be routed between two nodes. A schedule specifies which jobs are routed in each step, guaranteeing that the total demand on a node in any step is at most its capacity. A key metric in this scenario is response time: the time between a job's release and its completion. Prior work shows no un-augmented algorithm is competitive for average response time, and that a constant factor competitive ratio is achievable with augmentation exceeding 2 (Dinitz-Moseley Infocom 2020). For maximum response time, the best known result is a 2-competitive algorithm with a augmentation 4 (Jahanjou et al SPAA 2020). We improve these bounds under various response time objectives. We show that, without resource augmentation, the best competitive ratio for maximum response time is $Ω(n)$, where $n$ is the number of nodes. Our Proportional Allocation algorithm uses $(1+\varepsilon)$ resource augmentation to achieve a $(1/\varepsilon)$-competitive ratio in the setting with general demands and capacities, and splittable jobs. Our Batch Decomposition algorithm is $2$-competitive (resp., optimal) for maximum response time using resource augmentation 2 (resp., 4) in the setting with unit demands and capacities, and unsplittable jobs. We also derive bounds for the simultaneous approximation of average and maximum response time metrics.
△ Less
Submitted 15 November, 2021;
originally announced November 2021.
-
HaPPY-Mine: Designing a Mining Reward Function
Authors:
Lucianna Kiffer,
Rajmohan Rajaraman
Abstract:
In cryptocurrencies, the block reward is meant to serve as the incentive mechanism for miners to commit resources to create blocks and in effect secure the system. Existing systems primarily divide the reward in proportion to expended resources and follow one of two static models for total block reward: (i) a fixed reward for each block (e.g., Ethereum), or (ii) one where the block reward halves e…
▽ More
In cryptocurrencies, the block reward is meant to serve as the incentive mechanism for miners to commit resources to create blocks and in effect secure the system. Existing systems primarily divide the reward in proportion to expended resources and follow one of two static models for total block reward: (i) a fixed reward for each block (e.g., Ethereum), or (ii) one where the block reward halves every set number of blocks (e.g., the Bitcoin model of halving roughly every 4 years) but otherwise remains fixed between halvings. In recent work, a game-theoretic analysis of the static model under asymmetric miner costs showed that an equilibrium always exists and is unique. Their analysis also reveals how asymmetric costs can lead to large-scale centralization in blockchain mining, a phenomenon that has been observed in Bitcoin and Ethereum and highlighted by other studies. In this work we introduce a novel family of mining reward functions, HaPPY-Mine (HAsh-Pegged Proportional Yield), which peg the value of the reward to the hashrate of the system, decreasing the reward as the hashrate increases. HaPPY-Mine distributes rewards in proportion to expended hashrate and inherits the safety properties of the generalized proportional reward function. We study HaPPY-Mine under a heterogeneous miner cost model and show that an equilibrium always exists with a unique set of miner participants and a unique total hashrate. Significantly, we prove that a HaPPY-Mine equilibrium is more decentralized than the static model equilibrium under a set of metrics including number of mining participants and hashrate distribution. Finally, we show that any HaPPY-Mine equilibrium is also safe against collusion and sybil attacks, and explore how the market value of the currency affects the equilibrium.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Porous Structured Au Colloids: Insights in to Morphology, Optical and Antimicrobial Activity
Authors:
G. Nirmala Devi,
R. N. Viswanath,
C. Lakshmanan,
G. Suresh,
R. Rajaraman
Abstract:
Porous structured Au colloids have been prepared from bulk nanoporous Au by means of an element dissociation method. The microscopic techniques (scanning electron microscope and atomic force microscope), UV-Vis spectroscopy and zone diffusion method have been employed to study their morphology, optical property and anti-microbial activity against Gram-positive and Gram-negative bacterial strains,…
▽ More
Porous structured Au colloids have been prepared from bulk nanoporous Au by means of an element dissociation method. The microscopic techniques (scanning electron microscope and atomic force microscope), UV-Vis spectroscopy and zone diffusion method have been employed to study their morphology, optical property and anti-microbial activity against Gram-positive and Gram-negative bacterial strains, respectively. It is shown that the porous structured Au colloidal suspension exhibit excellent optical and antimicrobial properties. The noticeable features present in the optical studies are two Plasmon resonance peaks at 477 and 546 nm with overlap** of these peaks at a wavelength of 520 nm. The morphology studies by SEM and AFM indicate that the Au colloids are rod shaped with an assembly of skeletal pore and ligament structure. The analysis of the antimicrobial activity testing reveals that the porous structured Au colloids have greater inhibitory effect against the tested Gram-positive and Gram-negative bacterial strains.
△ Less
Submitted 19 November, 2020;
originally announced November 2020.
-
Competitive Data-Structure Dynamization
Authors:
Claire Mathieu,
Rajmohan Rajaraman,
Neal E. Young,
Arman Yousefi
Abstract:
Data-structure dynamization is a general approach for making static data structures dynamic. It is used extensively in geometric settings and in the guise of so-called merge (or compaction) policies in big-data databases such as Google Bigtable and LevelDB (our focus). Previous theoretical work is based on worst-case analyses for uniform inputs -- insertions of one item at a time and constant read…
▽ More
Data-structure dynamization is a general approach for making static data structures dynamic. It is used extensively in geometric settings and in the guise of so-called merge (or compaction) policies in big-data databases such as Google Bigtable and LevelDB (our focus). Previous theoretical work is based on worst-case analyses for uniform inputs -- insertions of one item at a time and constant read rate. In practice, merge policies must not only handle batch insertions and varying read/write ratios, they can take advantage of such non-uniformity to reduce cost on a per-input basis.
To model this, we initiate the study of data-structure dynamization through the lens of competitive analysis, via two new online set-cover problems. For each, the input is a sequence of disjoint sets of weighted items. The sets are revealed one at a time. The algorithm must respond to each with a set cover that covers all items revealed so far. It obtains the cover incrementally from the previous cover by adding one or more sets and optionally removing existing sets. For each new set the algorithm incurs build cost equal to the weight of the items in the set. In the first problem the objective is to minimize total build cost plus total query cost, where the algorithm incurs a query cost at each time $t$ equal to the current cover size. In the second problem, the objective is to minimize the build cost while kee** the query cost from exceeding $k$ (a given parameter) at any time. We give deterministic online algorithms for both variants, with competitive ratios of $Θ(\log^* n)$ and $k$, respectively. The latter ratio is optimal for the second variant.
△ Less
Submitted 9 December, 2021; v1 submitted 4 November, 2020;
originally announced November 2020.
-
Scheduling Flows on a Switch to Optimize Response Times
Authors:
Hamidreza Jahanjou,
Rajmohan Rajaraman,
David Stalfa
Abstract:
We study the scheduling of flows on a switch with the goal of optimizing metrics related to the response time of the flows. The input to the problem is a sequence of flow requests on a switch, where the switch is represented by a bipartite graph with a capacity on each vertex (or port), and a flow request is an edge with associated demand. In each round, a subset of edges can be scheduled subject…
▽ More
We study the scheduling of flows on a switch with the goal of optimizing metrics related to the response time of the flows. The input to the problem is a sequence of flow requests on a switch, where the switch is represented by a bipartite graph with a capacity on each vertex (or port), and a flow request is an edge with associated demand. In each round, a subset of edges can be scheduled subject to the constraint that the total demand of the scheduled edges incident on any vertex is at most the capacity of the vertex. Previous work has essentially settled the complexity of metrics based on {\em completion time}. The objective of average or maximum {\em response time}, however, is much more challenging.
We present approximation algorithms for flow scheduling over a switch to optimize response time based metrics. For the average response time metric, whose NP-hardness follows directly from past work, we present an offline $O(1 + O(\log(n))/c)$ approximation algorithm for unit flows, assuming that the port capacities of the switch can be increased by a factor of $1 + c$, for any given positive integer $c$. For the maximum response time metric, we first establish that it is NP-hard to achieve an approximation factor of better than 4/3 without augmenting capacity. We then present an offline algorithm that achieves {\em optimal maximum response time}, assuming the capacity of each port is increased by at most $2 d_{max} - 1$, where $d_{max}$ is the maximum demand of any flow. Both algorithms are based on linear programming relaxations. We also study the online version of flow scheduling using the lens of competitive analysis, and present preliminary results along with experiments that evaluate the performance of fast online heuristics.
△ Less
Submitted 27 May, 2020; v1 submitted 19 May, 2020;
originally announced May 2020.
-
Scheduling Precedence-Constrained Jobs on Related Machines with Communication Delay
Authors:
Biswaroop Maiti,
Rajmohan Rajaraman,
David Stalfa,
Zoya Svitkina,
Aravindan Vijayaraghavan
Abstract:
We consider the problem of scheduling $n$ precedence-constrained jobs on $m$ uniformly-related machines in the presence of an arbitrary, fixed communication delay $ρ$. We consider a model that allows job duplication, i.e. processing of the same job on multiple machines, which, as we show, can reduce the length of a schedule (i.e., its makespan) by a logarithmic factor. Our main result is an…
▽ More
We consider the problem of scheduling $n$ precedence-constrained jobs on $m$ uniformly-related machines in the presence of an arbitrary, fixed communication delay $ρ$. We consider a model that allows job duplication, i.e. processing of the same job on multiple machines, which, as we show, can reduce the length of a schedule (i.e., its makespan) by a logarithmic factor. Our main result is an $O(\log m \log ρ/ \log \log ρ)$-approximation algorithm for minimizing makespan, assuming the minimum makespan is at least $ρ$. Our algorithm is based on rounding a linear programming relaxation for the problem, which includes carefully designed constraints capturing the interaction among communication delay, precedence requirements, varying speeds, and job duplication. Our result builds on two previous lines of work, one with communication delay but identical machines (Lepere, Rapine 2002) and the other with uniformly-related machines but no communication delay (Chudak, Shmoys 1999). We next show that the integrality gap of our mathematical program is $Ω(\sqrt{\log ρ})$. Our gap construction employs expander graphs and exploits a property of robust expansion and its generalization to paths of longer length. Finally, we quantify the advantage of duplication in scheduling with communication delay. We show that the best schedule without duplication can have makespan $Ω(ρ/\log ρ)$ or $Ω(\log m/\log\log m)$ or $Ω(\log n/\log \log n)$ times that of an optimal schedule allowing duplication. Nevertheless, we present a polynomial time algorithm to transform any schedule to a schedule without duplication at the cost of a $O(\log^2 n \log m)$ factor increase in makespan. Together with our makespan approximation algorithm for schedules allowing duplication, this also yields a polylogarithmic-approximation algorithm for the setting where duplication is not allowed.
△ Less
Submitted 22 April, 2020;
originally announced April 2020.
-
Retracting Graphs to Cycles
Authors:
Samuel Haney,
Mehraneh Liaee,
Bruce M. Maggs,
Debmalya Panigrahi,
Rajmohan Rajaraman,
Ravi Sundaram
Abstract:
We initiate the algorithmic study of retracting a graph into a cycle in the graph, which seeks a map** of the graph vertices to the cycle vertices, so as to minimize the maximum stretch of any edge, subject to the constraint that the restriction of the map** to the cycle is the identity map. This problem has its roots in the rich theory of retraction of topological spaces, and has strong ties…
▽ More
We initiate the algorithmic study of retracting a graph into a cycle in the graph, which seeks a map** of the graph vertices to the cycle vertices, so as to minimize the maximum stretch of any edge, subject to the constraint that the restriction of the map** to the cycle is the identity map. This problem has its roots in the rich theory of retraction of topological spaces, and has strong ties to well-studied metric embedding problems such as minimum bandwidth and 0-extension.
Our first result is an O(min{k, sqrt{n}})-approximation for retracting any graph on n nodes to a cycle with k nodes. We also show a surprising connection to Sperner's Lemma that rules out the possibility of improving this result using natural convex relaxations of the problem. Nevertheless, if the problem is restricted to planar graphs, we show that we can overcome these integrality gaps using an exact combinatorial algorithm, which is the technical centerpiece of the paper. Building on our planar graph algorithm, we also obtain a constant-factor approximation algorithm for retraction of points in the Euclidean plane to a uniform cycle.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
Improved Algorithms for Scheduling Unsplittable Flows on Paths
Authors:
Hamidreza Jahanjou,
Erez Kantor,
Rajmohan Rajaraman
Abstract:
In this paper, we investigate offline and online algorithms for rufpp, the problem of minimizing the number of rounds required to schedule a set of unsplittable flows of non-uniform sizes on a given path with non-uniform edge capacities. rufpp is NP-hard and constant-factor approximation algorithms are known under the no bottleneck assumption (NBA), which stipulates that maximum size of a flow is…
▽ More
In this paper, we investigate offline and online algorithms for rufpp, the problem of minimizing the number of rounds required to schedule a set of unsplittable flows of non-uniform sizes on a given path with non-uniform edge capacities. rufpp is NP-hard and constant-factor approximation algorithms are known under the no bottleneck assumption (NBA), which stipulates that maximum size of a flow is at most the minimum edge capacity. We study rufpp without the NBA, and present improved online and offline algorithms. We first study offline rufpp for a restricted class of instances called $α$-small, where the size of each flow is at most $α$ times the capacity of its bottleneck edge, and present an $O(\log(1/(1-α)))$-approximation algorithm. Our main result is an online $O(\log\log c_{\max})$-competitive algorithm for rufpp for general instances, where $c_{\max}$ is the largest edge capacities, improving upon the previous best bound of $O(\log c_{\max})$ due to Epstein et al. Our result leads to an offline $O(\min(\log n, \log m, \log\log c_{\max}))$-approximation algorithm and an online $O(\min(\log m, \log\log c_{\max}))$-competitive algorithm for rufpp, where $n$ is the number of flows and $m$ is the number of edges.
△ Less
Submitted 31 July, 2017;
originally announced August 2017.
-
Plane Gossip: Approximating rumor spread in planar graphs
Authors:
Jennifer Iglesias,
Rajmohan Rajaraman,
R Ravi,
Ravi Sundaram
Abstract:
We study the design of schedules for multi-commodity multicast; we are given an undirected graph $G$ and a collection of source destination pairs, and the goal is to schedule a minimum-length sequence of matchings that connects every source with its respective destination. Multi-commodity multicast models a classic information dissemination problem in networks where the primary communication const…
▽ More
We study the design of schedules for multi-commodity multicast; we are given an undirected graph $G$ and a collection of source destination pairs, and the goal is to schedule a minimum-length sequence of matchings that connects every source with its respective destination. Multi-commodity multicast models a classic information dissemination problem in networks where the primary communication constraint is the number of connections that a node can make, not link bandwidth.
Multi-commodity multicast is closely related to the problem of finding a subgraph, $H$, of optimal poise, where the poise is defined as the sum of the maximum degree of $H$ and the maximum distance between any source-destination pair in $H$. We first show that the minimum poise subgraph for single-commodity multicast can be approximated to within a factor of $O(\log k)$ with respect to the value of a natural LP relaxation in an instance with $k$ terminals. This is the first upper bound on the integrality gap of the natural LP. Using this poise result and shortest-path separators in planar graphs, we obtain a $O(\log^3 k\log n/(\log\log n))$-approximation for multi-commodity multicast for planar graphs.
We also study the minimum-time radio gossip problem in planar graphs where a message from each node must be transmitted to all other nodes under a model where nodes can broadcast to all neighbors in a single step but only nodes with a single broadcasting neighbor get a message. We give an $O(\log^2 n)$-approximation for radio gossip in planar graphs breaking previous barriers. This is the first bound for radio gossip that does not rely on the maximum degree of the graph.
Finally, we show that our techniques for planar graphs extend to graphs with excluded minors. We establish polylogarithmic-approximation algorithms for both multi-commodity multicast and radio gossip problems in minor-free graphs.
△ Less
Submitted 14 July, 2017; v1 submitted 5 December, 2016;
originally announced December 2016.
-
Information Spreading in Dynamic Networks under Oblivious Adversaries
Authors:
John Augustine,
Chen Avin,
Mehraneh Liaee,
Gopal Pandurangan,
Rajmohan Rajaraman
Abstract:
We study the problem of gossip in dynamic networks controlled by an adversary that can modify the network arbitrarily from one round to another, provided that the network is always connected. In the gossip problem, $n$ tokens are arbitrarily distributed among the $n$ network nodes, and the goal is to disseminate all the $n$ tokens to every node. Our focus is on token-forwarding algorithms, which d…
▽ More
We study the problem of gossip in dynamic networks controlled by an adversary that can modify the network arbitrarily from one round to another, provided that the network is always connected. In the gossip problem, $n$ tokens are arbitrarily distributed among the $n$ network nodes, and the goal is to disseminate all the $n$ tokens to every node. Our focus is on token-forwarding algorithms, which do not manipulate tokens in any way other than storing, copying, and forwarding them. Gossip can be completed in linear time in any static network, but a basic open question for dynamic networks is the existence of a distributed protocol that can do significantly better than an easily achievable bound of $O(n^2)$ rounds.
In previous work, it has been shown that under adaptive adversaries, every token forwarding algorithm requires $Ω(n^2/\log n)$ rounds. In this paper, we study oblivious adversaries, which differ from adaptive adversaries in one crucial aspect--- they are oblivious to random choices made by the protocol. We present an $\tildeΩ(n^{3/2})$ lower bound under an oblivious adversary for RANDDIFF, a natural algorithm in which neighbors exchange a token chosen uniformly at random from the difference of their token sets. We also present an $\tildeΩ(n^{4/3})$ bound under a stronger notion of oblivious adversary for symmetric knowledge-based algorithms. On the positive side, we present a centralized algorithm that completes gossip in $\tilde{O}(n^{3/2})$ rounds. We also show an $\tilde{O}(n^{5/3})$ upper bound for RANDDIFF in a restricted class of oblivious adversaries, which we call paths-respecting.
△ Less
Submitted 19 July, 2016;
originally announced July 2016.
-
Asymptotically Optimal Approximation Algorithms for Coflow Scheduling
Authors:
Hamidreza Jahanjou,
Erez Kantor,
Rajmohan Rajaraman
Abstract:
Many modern datacenter applications involve large-scale computations composed of multiple data flows that need to be completed over a shared set of distributed resources. Such a computation completes when all of its flows complete. A useful abstraction for modeling such scenarios is a {\em coflow}, which is a collection of flows (e.g., tasks, packets, data transmissions) that all share the same pe…
▽ More
Many modern datacenter applications involve large-scale computations composed of multiple data flows that need to be completed over a shared set of distributed resources. Such a computation completes when all of its flows complete. A useful abstraction for modeling such scenarios is a {\em coflow}, which is a collection of flows (e.g., tasks, packets, data transmissions) that all share the same performance goal.
In this paper, we present the first approximation algorithms for scheduling coflows over general network topologies with the objective of minimizing total weighted completion time. We consider two different models for coflows based on the nature of individual flows: circuits, and packets. We design constant-factor polynomial-time approximation algorithms for scheduling packet-based coflows with or without given flow paths, and circuit-based coflows with given flow paths. Furthermore, we give an $O(\log n/\log \log n)$-approximation polynomial time algorithm for scheduling circuit-based coflows where flow paths are not given (here $n$ is the number of network edges).
We obtain our results by develo** a general framework for coflow schedules, based on interval-indexed linear programs, which may extend to other coflow models and objective functions and may also yield improved approximation bounds for specific network scenarios. We also present an experimental evaluation of our approach for circuit-based coflows that show a performance improvement of at least 22% on average over competing heuristics.
△ Less
Submitted 8 March, 2018; v1 submitted 20 June, 2016;
originally announced June 2016.
-
Balls and Funnels: Energy Efficient Group-to-Group Anycasts
Authors:
Jennifer Iglesias,
Rajmohan Rajaraman,
R. Ravi,
Ravi Sundaram
Abstract:
We introduce group-to-group anycast (g2g-anycast), a network design problem of substantial practical importance and considerable generality. Given a collection of groups and requirements for directed connectivity from source groups to destination groups, the solution network must contain, for each requirement, an omni-directional down-link broadcast, centered at any node of the source group, calle…
▽ More
We introduce group-to-group anycast (g2g-anycast), a network design problem of substantial practical importance and considerable generality. Given a collection of groups and requirements for directed connectivity from source groups to destination groups, the solution network must contain, for each requirement, an omni-directional down-link broadcast, centered at any node of the source group, called the ball; the ball must contain some node from the destination group in the requirement and all such destination nodes in the ball must aggregate into a tree directed towards the source, called the funnel-tree. The solution network is a collection of balls along with the funnel-trees they contain. g2g-anycast models DBS (Digital Broadcast Satellite), Cable TV systems and drone swarms. It generalizes several well known network design problems including minimum energy unicast, multicast, broadcast, Steiner-tree, Steiner-forest and Group-Steiner tree. Our main achievement is an $O(\log^4 n)$ approximation, counterbalanced by an $\log^{(2-ε)}n$ hardness of approximation, for general weights. Given the applicability to wireless communication, we present a scalable and easily implemented $O(\log n)$ approximation algorithm, Cover-and-Grow for fixed-dimensional Euclidean space with path-loss exponent at least 2.
△ Less
Submitted 23 May, 2016;
originally announced May 2016.
-
Effect of Sb substitution on the Topological Surface States in Bi_{2}Se_{3} single crystals: a magneto-transport study
Authors:
T. R. Devidas,
E. P. Amaladass,
Shilpam Sharma,
Awadhesh Mani,
R. Rajaraman,
C. S. Sundar,
A. Bharathi
Abstract:
Magneto-transport measurements have been carried out on Bi2-xSbxSe3 (x = 0, 0.05, 0.1, 0.3, 0.5) single crystals at 4.2 K temperature in the magnetic field range of -15 T to 15 T. Shubnikov-de Haas (SdH) oscillations of 2D nature were observed in samples with Sb concentration upto x = 0.3. The analyses of SdH oscillations observed in magneto-resistance data using Lifshitz-Kosevich equation reveal…
▽ More
Magneto-transport measurements have been carried out on Bi2-xSbxSe3 (x = 0, 0.05, 0.1, 0.3, 0.5) single crystals at 4.2 K temperature in the magnetic field range of -15 T to 15 T. Shubnikov-de Haas (SdH) oscillations of 2D nature were observed in samples with Sb concentration upto x = 0.3. The analyses of SdH oscillations observed in magneto-resistance data using Lifshitz-Kosevich equation reveal a systematic decrease in the Fermi surface area with Sb substitution. The Berry phase obtained from the Landau Level fan diagram suggests the occurrence of 2D oscillations arising from a Topological Surface State (TSS) for Sb concentrations of x = 0, 0.05 and 0.1; while 2D oscillation seen at higher Sb concentration is attributed to surface 2D electron gas consequent to downward band bending.
△ Less
Submitted 13 May, 2016;
originally announced May 2016.
-
Better bounds for coalescing-branching random walks
Authors:
Michael Mitzenmacher,
Rajmohan Rajaraman,
Scott Roche
Abstract:
Coalescing-branching random walks, or {\em cobra walks} for short, are a natural variant of random walks on graphs that can model the spread of disease through contacts or the spread of information in networks. In a $k$-cobra walk, at each time step a subset of the vertices are active; each active vertex chooses $k$ random neighbors (sampled independently and uniformly with replacement) that becom…
▽ More
Coalescing-branching random walks, or {\em cobra walks} for short, are a natural variant of random walks on graphs that can model the spread of disease through contacts or the spread of information in networks. In a $k$-cobra walk, at each time step a subset of the vertices are active; each active vertex chooses $k$ random neighbors (sampled independently and uniformly with replacement) that become active at the next step, and these are the only active vertices at the next step. A natural quantity to study for cobra walks is the cover time, which corresponds to the expected time when all nodes have become infected or received the disseminated information.
In this work, we extend previous results for cobra walks in multiple ways. We show that the cover time for the 2-cobra walk on $[0,n]^d$ is $O(n)$ (where the order notation hides constant factors that depend on $d$); previous work had shown the cover time was $O(n \cdot polylog(n))$. We show that the cover time for a 2-cobra walk on an $n$-vertex $d$-regular graph with conductance $φ_G$ is $O(φ_G^{-2} \log^2 n)$, significantly generalizing a previous result that held only for expander graphs with sufficiently high expansion. And finally we show that the cover time for a 2-cobra walk on a graph with $n$ vertices is always $O(n^{11/4} \log n)$; this is the first result showing that the bound of $Θ(n^3)$ for the worst-case cover time for random walks can be beaten using 2-cobra walks.
△ Less
Submitted 19 March, 2016;
originally announced March 2016.
-
Role of Se vacancies on Shubnikov de Haas oscillations in Bi2Se3: a combined magneto-resistance and positron annihilation study
Authors:
T. R. Devidas,
E. P. Amaladass,
Shilpam Sharma,
R. Rajaraman,
D. Sornadurai,
N. Subramanian,
Awadhesh Mani,
C. S. Sundar,
A. Bharathi
Abstract:
Magneto resistance measurements coupled with positron lifetime measurements, to characterize the vacancy type defects, have been carried out on the topological insulator (TI) system Bi2Se3, of varying Se/Bi ratio. Pronounced Shubnikov de Haas (SdH) oscillations are seen in nominal Bi2Se3.1 crystals for measurements performed in magnetic fields up to 15 T in the 4 K to 10 K temperature range, with…
▽ More
Magneto resistance measurements coupled with positron lifetime measurements, to characterize the vacancy type defects, have been carried out on the topological insulator (TI) system Bi2Se3, of varying Se/Bi ratio. Pronounced Shubnikov de Haas (SdH) oscillations are seen in nominal Bi2Se3.1 crystals for measurements performed in magnetic fields up to 15 T in the 4 K to 10 K temperature range, with field applied perpendicular to the (001) plane of the crystal. The quantum oscillations, characteristic of 2D electronic structure, are seen only in the crystals that have a lower concentration of Se vacancies, as inferred from positron annihilation spectroscopy.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.
-
Global Information Sharing under Network Dynamics
Authors:
Chinmoy Dutta,
Gopal Pandurangan,
Rajmohan Rajaraman,
Zhifeng Sun,
Emanuele Viola
Abstract:
We study how to spread $k$ tokens of information to every node on an $n$-node dynamic network, the edges of which are changing at each round. This basic {\em gossip problem} can be completed in $O(n + k)$ rounds in any static network, and determining its complexity in dynamic networks is central to understanding the algorithmic limits and capabilities of various dynamic network models. Our focus i…
▽ More
We study how to spread $k$ tokens of information to every node on an $n$-node dynamic network, the edges of which are changing at each round. This basic {\em gossip problem} can be completed in $O(n + k)$ rounds in any static network, and determining its complexity in dynamic networks is central to understanding the algorithmic limits and capabilities of various dynamic network models. Our focus is on token-forwarding algorithms, which do not manipulate tokens in any way other than storing, copying and forwarding them.
We first consider the {\em strongly adaptive} adversary model where in each round, each node first chooses a token to broadcast to all its neighbors (without knowing who they are), and then an adversary chooses an arbitrary connected communication network for that round with the knowledge of the tokens chosen by each node. We show that $Ω(nk/\log n + n)$ rounds are needed for any randomized (centralized or distributed) token-forwarding algorithm to disseminate the $k$ tokens, thus resolving an open problem raised in~\cite{kuhn+lo:dynamic}. The bound applies to a wide class of initial token distributions, including those in which each token is held by exactly one node and {\em well-mixed} ones in which each node has each token independently with a constant probability.
We also show several upper bounds in varying models.
△ Less
Submitted 27 September, 2014;
originally announced September 2014.
-
Discovery through Gossip
Authors:
Bernhard Haeupler,
Gopal Pandurangan,
David Peleg,
Rajmohan Rajaraman,
Zhifeng Sun
Abstract:
We study randomized gossip-based processes in dynamic networks that are motivated by discovery processes in large-scale distributed networks like peer-to-peer or social networks.
A well-studied problem in peer-to-peer networks is the resource discovery problem. There, the goal for nodes (hosts with IP addresses) is to discover the IP addresses of all other hosts. In social networks, nodes (peopl…
▽ More
We study randomized gossip-based processes in dynamic networks that are motivated by discovery processes in large-scale distributed networks like peer-to-peer or social networks.
A well-studied problem in peer-to-peer networks is the resource discovery problem. There, the goal for nodes (hosts with IP addresses) is to discover the IP addresses of all other hosts. In social networks, nodes (people) discover new nodes through exchanging contacts with their neighbors (friends). In both cases the discovery of new nodes changes the underlying network - new edges are added to the network - and the process continues in the changed network. Rigorously analyzing such dynamic (stochastic) processes with a continuously self-changing topology remains a challenging problem with obvious applications.
This paper studies and analyzes two natural gossip-based discovery processes. In the push process, each node repeatedly chooses two random neighbors and puts them in contact (i.e., "pushes" their mutual information to each other). In the pull discovery process, each node repeatedly requests or "pulls" a random contact from a random neighbor. Both processes are lightweight, local, and naturally robust due to their randomization.
Our main result is an almost-tight analysis of the time taken for these two randomized processes to converge. We show that in any undirected n-node graph both processes take O(n log^2 n) rounds to connect every node to all other nodes with high probability, whereas Omega(n log n) is a lower bound. In the directed case we give an O(n^2 log n) upper bound and an Omega(n^2) lower bound for strongly connected directed graphs. A key technical challenge that we overcome is the analysis of a randomized process that itself results in a constantly changing network which leads to complicated dependencies in every round.
△ Less
Submitted 9 February, 2012;
originally announced February 2012.
-
Information Spreading in Dynamic Networks
Authors:
Chinmoy Dutta,
Gopal Pandurangan,
Rajmohan Rajaraman,
Zhifeng Sun
Abstract:
We study the fundamental problem of information spreading (also known as gossip) in dynamic networks. In gossip, or more generally, $k$-gossip, there are $k$ pieces of information (or tokens) that are initially present in some nodes and the problem is to disseminate the $k$ tokens to all nodes. The goal is to accomplish the task in as few rounds of distributed computation as possible. The problem…
▽ More
We study the fundamental problem of information spreading (also known as gossip) in dynamic networks. In gossip, or more generally, $k$-gossip, there are $k$ pieces of information (or tokens) that are initially present in some nodes and the problem is to disseminate the $k$ tokens to all nodes. The goal is to accomplish the task in as few rounds of distributed computation as possible. The problem is especially challenging in dynamic networks where the network topology can change from round to round and can be controlled by an on-line adversary.
The focus of this paper is on the power of token-forwarding algorithms, which do not manipulate tokens in any way other than storing and forwarding them. We first consider a worst-case adversarial model first studied by Kuhn, Lynch, and Oshman~\cite{kuhn+lo:dynamic} in which the communication links for each round are chosen by an adversary, and nodes do not know who their neighbors for the current round are before they broadcast their messages. Our main result is an $Ω(nk/\log n)$ lower bound on the number of rounds needed for any deterministic token-forwarding algorithm to solve $k$-gossip. This resolves an open problem raised in~\cite{kuhn+lo:dynamic}, improving their lower bound of $Ω(n \log k)$, and matching their upper bound of $O(nk)$ to within a logarithmic factor.
We next show that token-forwarding algorithms can achieve subquadratic time in the offline version of the problem where the adversary has to commit all the topology changes in advance at the beginning of the computation, and present two polynomial-time offline token-forwarding algorithms. Our results are a step towards understanding the power and limitation of token-forwarding algorithms in dynamic networks.
△ Less
Submitted 1 December, 2011;
originally announced December 2011.
-
On Strong Graph Partitions and Universal Steiner Trees
Authors:
Costas Busch,
Chinmoy Dutta,
Jaikumar Radhakrishnan,
Rajmohan Rajaraman,
Srivathsan Srinivasagopalan
Abstract:
We study the problem of constructing universal Steiner trees for undirected graphs. Given a graph $G$ and a root node $r$, we seek a single spanning tree $T$ of minimum {\em stretch}, where the stretch of $T$ is defined to be the maximum ratio, over all terminal sets $X$, of the cost of the minimal sub-tree $T_X$ of $T$ that connects $X$ to $r$ to the cost of an optimal Steiner tree connecting…
▽ More
We study the problem of constructing universal Steiner trees for undirected graphs. Given a graph $G$ and a root node $r$, we seek a single spanning tree $T$ of minimum {\em stretch}, where the stretch of $T$ is defined to be the maximum ratio, over all terminal sets $X$, of the cost of the minimal sub-tree $T_X$ of $T$ that connects $X$ to $r$ to the cost of an optimal Steiner tree connecting $X$ to $r$ in $G$. Universal Steiner trees (USTs) are important for data aggregation problems where computing the Steiner tree from scratch for every input instance of terminals is costly, as for example in low energy sensor network applications.
We provide a polynomial time \ust\ construction for general graphs with $2^{O(\sqrt{\log n})}$-stretch. We also give a polynomial time $\polylog(n)$-stretch construction for minor-free graphs. One basic building block of our algorithms is a hierarchy of graph partitions, each of which guarantees small strong diameter for each cluster and bounded neighbourhood intersections for each node. We show close connections between the problems of constructing USTs and building such graph partitions. Our construction of partition hierarchies for general graphs is based on an iterative cluster merging procedure, while the one for minor-free graphs is based on a separator theorem for such graphs and the solution to a cluster aggregation problem that may be of independent interest even for general graphs. To our knowledge, this is the first subpolynomial-stretch ($o(n^ε)$ for any $ε> 0$) UST construction for general graphs, and the first polylogarithmic-stretch UST construction for minor-free graphs.
△ Less
Submitted 1 March, 2015; v1 submitted 21 November, 2011;
originally announced November 2011.
-
Dislocation Driven Chromium Precipitation in Fe-9Cr Binary Alloy: A Positron Lifetime Study
Authors:
S. Hari Babu,
R. Rajaraman,
G. Amarendra,
R. Govindaraj,
N. P. Lalla,
Arup Dasgupta,
Gopal Bhalerao,
C. S. Sundar
Abstract:
The influence of initial heat treatment on anomalous Cr precipitation within high temperature solubility region in Fe-9Cr alloy has been investigated using positron lifetime studies. Air-quenched samples with pre-existing dislocations exhibited a distinct annealing stage in positron lifetime between 800 and 1100 K corresponding to Cr-precipitation. During this stage, Transmission Electron Microsco…
▽ More
The influence of initial heat treatment on anomalous Cr precipitation within high temperature solubility region in Fe-9Cr alloy has been investigated using positron lifetime studies. Air-quenched samples with pre-existing dislocations exhibited a distinct annealing stage in positron lifetime between 800 and 1100 K corresponding to Cr-precipitation. During this stage, Transmission Electron Microscopy showed fine precipitates of average size 4 nm, dispersed throughout the sample and from EDS analysis they are found to be Cr-enriched. The existence of dislocations is found to be responsible for Cr precipitation.
△ Less
Submitted 12 September, 2011; v1 submitted 30 May, 2011;
originally announced May 2011.
-
Cache Me If You Can: Capacitated Selfish Replication Games in Networks
Authors:
Ragavendran Gopalakrishnan,
Dimitrios Kanoulas,
Naga Naresh Karuturi,
C. Pandu Rangan,
Rajmohan Rajaraman,
Ravi Sundaram
Abstract:
In Peer-to-Peer (P2P) network systems, content (object) delivery between nodes is often required. One way to study such a distributed system is by defining games, which involve selfish nodes that make strategic choices on replicating content in their local limited memory (cache) or accessing content from other nodes for a cost. These Selfish Replication games have been introduced in [8] for nodes…
▽ More
In Peer-to-Peer (P2P) network systems, content (object) delivery between nodes is often required. One way to study such a distributed system is by defining games, which involve selfish nodes that make strategic choices on replicating content in their local limited memory (cache) or accessing content from other nodes for a cost. These Selfish Replication games have been introduced in [8] for nodes that do not have any capacity limits, leaving the capacitated problem, i.e. Capacitated Selfish Replication (CSR) games, open.
In this work, we first form the model of the CSR games, for which we perform a Nash equilibria analysis. In particular, we focus on hierarchical networks, given their extensive use to model communication costs of content delivery in P2P systems. We present an exact polynomial-time algorithm for any hierarchical network, under two constraints on the utility functions: 1) "Nearer is better", i.e. the closest the content is to the node the less its access cost is, and 2) "Independence of irrelevant alternatives", i.e. aggregation of individual node preferences. This generalization represents a vast class of utilities and more interestingly allows each of the nodes to have simultaneously completely different functional forms of utility functions. In this general framework, we present CSR games results on arbitrary networks and outline the boundary between intractability and effective computability in terms of the network structure, object preferences, and the total number of objects. Moreover, we prove that the problem of equilibria existence becomes NP-hard for general CSR games.
△ Less
Submitted 21 June, 2019; v1 submitted 16 July, 2010;
originally announced July 2010.
-
Approximation Algorithms for Key Management in Secure Multicast
Authors:
Agnes Chan,
Rajmohan Rajaraman,
Zhifeng Sun,
Feng Zhu
Abstract:
Many data dissemination and publish-subscribe systems that guarantee the privacy and authenticity of the participants rely on symmetric key cryptography. An important problem in such a system is to maintain the shared group key as the group membership changes. We consider the problem of determining a key hierarchy that minimizes the average communication cost of an update, given update frequenci…
▽ More
Many data dissemination and publish-subscribe systems that guarantee the privacy and authenticity of the participants rely on symmetric key cryptography. An important problem in such a system is to maintain the shared group key as the group membership changes. We consider the problem of determining a key hierarchy that minimizes the average communication cost of an update, given update frequencies of the group members and an edge-weighted undirected graph that captures routing costs. We first present a polynomial-time approximation scheme for minimizing the average number of multicast messages needed for an update. We next show that when routing costs are considered, the problem is NP-hard even when the underlying routing network is a tree network or even when every group member has the same update frequency. Our main result is a polynomial time constant-factor approximation algorithm for the general case where the routing network is an arbitrary weighted graph and group members have nonuniform update frequencies.
△ Less
Submitted 27 April, 2009;
originally announced April 2009.
-
Reducibility Among Fractional Stability Problems
Authors:
Shiva Kintali,
Laura J. Poplawski,
Rajmohan Rajaraman,
Ravi Sundaram,
Shang-Hua Teng
Abstract:
In this paper, we resolve the computational complexity of a number of outstanding open problems with practical applications. Here is the list of problems we show to be PPAD-complete, along with the domains of practical significance: Fractional Stable Paths Problem (FSPP) [21] - Internet routing; Core of Balanced Games [41] - Economics and Game theory; Scarf's Lemma [41] - Combinatorics; Hypergra…
▽ More
In this paper, we resolve the computational complexity of a number of outstanding open problems with practical applications. Here is the list of problems we show to be PPAD-complete, along with the domains of practical significance: Fractional Stable Paths Problem (FSPP) [21] - Internet routing; Core of Balanced Games [41] - Economics and Game theory; Scarf's Lemma [41] - Combinatorics; Hypergraph Matching [1]- Social Choice and Preference Systems; Fractional Bounded Budget Connection Games (FBBC) [30] - Social networks; and Strong Fractional Kernel [2]- Graph Theory. In fact, we show that no fully polynomial-time approximation schemes exist (unless PPAD is in FP).
This paper is entirely a series of reductions that build in nontrivial ways on the framework established in previous work. In the course of deriving these reductions, we created two new concepts - preference games and personalized equilibria. The entire set of new reductions can be presented as a lattice with the above problems sandwiched between preference games (at the "easy" end) and personalized equilibria (at the "hard" end). Our completeness results extend to natural approximate versions of most of these problems. On a technical note, we wish to highlight our novel "continuous-to-discrete" reduction from exact personalized equilibria to approximate personalized equilibria using a linear program augmented with an exponential number of "min" constraints of a specific form. In addition to enhancing our repertoire of PPAD-complete problems, we expect the concepts and techniques in this paper to find future use in algorithmic game theory.
△ Less
Submitted 8 April, 2009;
originally announced April 2009.
-
Preference Games and Personalized Equilibria, with Applications to Fractional BGP
Authors:
Laura J. Poplawski,
Rajmohan Rajaraman,
Ravi Sundaram,
Shang-Hua Teng
Abstract:
We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al…
▽ More
We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al) follow in the tradition of the large body of work on network formation games and capture a variety of applications ranging from social networks and overlay networks to peer-to-peer networks.
The central result of this paper is that there are no fully polynomial-time approximation schemes (unless PPAD is in FP) for computing equilibria in both fractional BGP games and fractional BBC games. We obtain this result by proving the hardness for a new and surprisingly simple game, the fractional preference game, which is reducible to both fractional BGP and BBC games.
We define a new flow-based notion of equilibrium for matrix games -- personalized equilibria -- generalizing both fractional BBC and fractional BGP games. We prove not just the existence, but the existence of rational personalized equilibria for all matrix games, which implies the existence of rational equilibria for fractional BGP and BBC games. In particular, this provides an alternative proof and strengthening of the main result in [Haxell, Wilfong]. For k-player matrix games, where k = 2, we provide a combinatorial characterization leading to a polynomial-time algorithm for computing all personalized equilibria. For k >= 5, we prove that personalized equilibria are PPAD-hard to approximate in fully polynomial time. We believe that the concept of personalized equilibria has potential for real-world significance.
△ Less
Submitted 5 December, 2008; v1 submitted 2 December, 2008;
originally announced December 2008.
-
Bounded Budget Connection (BBC) Games or How to make friends and influence people, on a budget
Authors:
Nikolaos Laoutaris,
Laura J. Poplawski,
Rajmohan Rajaraman,
Ravi Sundaram,
Shang-Hua Teng
Abstract:
Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players or nodes each of whom has a budget for purchasing links; each link has a cost as well as a length and each node has a set of preference weights for each of the remaining nodes; the objective of each node is to use its bu…
▽ More
Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players or nodes each of whom has a budget for purchasing links; each link has a cost as well as a length and each node has a set of preference weights for each of the remaining nodes; the objective of each node is to use its budget to buy a set of outgoing links so as to minimize its sum of preference-weighted distances to the remaining nodes.
We study the structural and complexity-theoretic properties of pure Nash equilibria in BBC games. We show that determining the existence of a pure Nash equilibrium in general BBC games is NP-hard. However, in a natural variant, fractional BBC games - where it is permitted to buy fractions of links - a pure Nash equilibrium always exists. A major focus is the study of (n,k)-uniform BBC games - those in which all link costs, link lengths and preference weights are equal (to 1) and all budgets are equal (to k). We show that a pure Nash equilibrium or stable graph exists for all (n,k)-uniform BBC games and that all stable graphs are essentially fair (i.e. all nodes have similar costs). We provide an explicit construction of a family of stable graphs that spans the spectrum from minimum total social cost to maximum total social cost. We also study a special family of regular graphs in which all nodes imitate the "same" buying pattern, and show that if n is sufficiently large no such regular graph can be a pure Nash equilibrium. We analyze best-response walks on the configuration defined by the uniform game. Lastly, we extend our results to the case where each node seeks to minimize its maximum distance to the other nodes.
△ Less
Submitted 10 June, 2008;
originally announced June 2008.
-
Approximation Algorithms for Multiprocessor Scheduling under Uncertainty
Authors:
Guolong Lin,
Rajmohan Rajaraman
Abstract:
Motivated by applications in grid computing and project management, we study multiprocessor scheduling in scenarios where there is uncertainty in the successful execution of jobs when assigned to processors. We consider the problem of multiprocessor scheduling under uncertainty, in which we are given n unit-time jobs and m machines, a directed acyclic graph C giving the dependencies among the jo…
▽ More
Motivated by applications in grid computing and project management, we study multiprocessor scheduling in scenarios where there is uncertainty in the successful execution of jobs when assigned to processors. We consider the problem of multiprocessor scheduling under uncertainty, in which we are given n unit-time jobs and m machines, a directed acyclic graph C giving the dependencies among the jobs, and for every job j and machine i, the probability p_{ij} of the successful completion of job j when scheduled on machine i in any given particular step. The goal of the problem is to find a schedule that minimizes the expected makespan, that is, the expected completion time of all the jobs.
The problem of multiprocessor scheduling under uncertainty was introduced by Malewicz and was shown to be NP-hard even when all the jobs are independent. In this paper, we present polynomial-time approximation algorithms for the problem, for special cases of the dag C. We obtain an O(log(n))-approximation for the case of independent jobs, an O(log(m)log(n)log(n+m)/loglog(n+m))-approximation when C is a collection of disjoint chains, an O(log(m)log^2(n))-approximation when C is a collection of directed out- or in-trees, and an O(log(m)log^2(n)log(n+m)/loglog(n+m))-approximation when C is a directed forest.
△ Less
Submitted 21 March, 2007;
originally announced March 2007.
-
A bounded-degree network formation game
Authors:
Nikolaos Laoutaris,
Rajmohan Rajaraman,
Ravi Sundaram,
Shang-Hua Teng
Abstract:
Motivated by applications in peer-to-peer and overlay networks we define and study the \emph{Bounded Degree Network Formation} (BDNF) game. In an $(n,k)$-BDNF game, we are given $n$ nodes, a bound $k$ on the out-degree of each node, and a weight $w_{vu}$ for each ordered pair $(v,u)$ representing the traffic rate from node $v$ to node $u$. Each node $v$ uses up to $k$ directed links to connect t…
▽ More
Motivated by applications in peer-to-peer and overlay networks we define and study the \emph{Bounded Degree Network Formation} (BDNF) game. In an $(n,k)$-BDNF game, we are given $n$ nodes, a bound $k$ on the out-degree of each node, and a weight $w_{vu}$ for each ordered pair $(v,u)$ representing the traffic rate from node $v$ to node $u$. Each node $v$ uses up to $k$ directed links to connect to other nodes with an objective to minimize its average distance, using weights $w_{vu}$, to all other destinations. We study the existence of pure Nash equilibria for $(n,k)$-BDNF games. We show that if the weights are arbitrary, then a pure Nash wiring may not exist. Furthermore, it is NP-hard to determine whether a pure Nash wiring exists for a given $(n,k)$-BDNF instance. A major focus of this paper is on uniform $(n,k)$-BDNF games, in which all weights are 1. We describe how to construct a pure Nash equilibrium wiring given any $n$ and $k$, and establish that in all pure Nash wirings the cost of individual nodes cannot differ by more than a factor of nearly 2, whereas the diameter cannot exceed $O(\sqrt{n \log_k n})$. We also analyze best-response walks on the configuration space defined by the uniform game, and show that starting from any initial configuration, strong connectivity is reached within $Θ(n^2)$ rounds. Convergence to a pure Nash equilibrium, however, is not guaranteed. We present simulation results that suggest that loop-free best-response walks always exist, but may not be polynomially bounded. We also study a special family of \emph{regular} wirings, the class of Abelian Cayley graphs, in which all nodes imitate the same wiring pattern, and show that if $n$ is sufficiently large no such regular wiring can be a pure Nash equilibrium.
△ Less
Submitted 23 August, 2007; v1 submitted 10 January, 2007;
originally announced January 2007.
-
CP_N Solitons in Quantum Hall Systems
Authors:
R. Rajaraman
Abstract:
We will present here an elementary pedagogical introduction to $CP_N$ solitons in quantum Hall systems. We begin with a brief introduction to both $CP_N$ models and to quantum Hall (QH) physics. Then we focus on spin and layer-spin degrees of freedom in QH systems and point out that these are in fact $CP_N$ fields for N=1 and N=3. Excitations in these degrees of freedom will be shown to be topol…
▽ More
We will present here an elementary pedagogical introduction to $CP_N$ solitons in quantum Hall systems. We begin with a brief introduction to both $CP_N$ models and to quantum Hall (QH) physics. Then we focus on spin and layer-spin degrees of freedom in QH systems and point out that these are in fact $CP_N$ fields for N=1 and N=3. Excitations in these degrees of freedom will be shown to be topologically non-trivial soliton solutions of the corresponding $CP_N$ field equations. This is followed by a brief summary of our own recent work in this area, done with Sankalpa Ghosh. [ Invited Plenary Lecture at the International Conference on Geometry, Integrability and Nonlinearity in Condensed Matter & Soft Condensed Matter Physics held at Bansko, Bulgaria, July 15-20, 2001. ]
△ Less
Submitted 29 December, 2001;
originally announced December 2001.
-
Fractional Charge
Authors:
R. Rajaraman
Abstract:
The origin and quantum status of Fractional Charge in polyacetylne and field theory are reviewed, along with reminiscences of collaboration with John Bell on the subject.
The origin and quantum status of Fractional Charge in polyacetylne and field theory are reviewed, along with reminiscences of collaboration with John Bell on the subject.
△ Less
Submitted 17 March, 2001;
originally announced March 2001.
-
Effective attraction between like-charged colloids in a 2D plasma
Authors:
Ning Ma,
S. M. Girvin,
R. Rajaraman
Abstract:
The existence of attractions between like-charged colloids immersed in ionic solution have been discovered in recent experiments. This phenomenon contradicts the predictions of DLVO theory and indicates a failure of mean field theory. We study a toy model based on a two dimensional one-component plasma, which is exactly soluble at one particular coupling constant. We show that colloidal interact…
▽ More
The existence of attractions between like-charged colloids immersed in ionic solution have been discovered in recent experiments. This phenomenon contradicts the predictions of DLVO theory and indicates a failure of mean field theory. We study a toy model based on a two dimensional one-component plasma, which is exactly soluble at one particular coupling constant. We show that colloidal interaction results from a competition between ion-ion repulsion and longer ranged ion-void attraction.
△ Less
Submitted 14 August, 2000;
originally announced August 2000.
-
Quantum Hall Solitons with Intertwined Spin and Pseudospin at $ν= \ 1$
Authors:
Sankalpa Ghosh,
R. Rajaraman
Abstract:
In this paper we study in detail different types of topological solitons which are possible in bilayer quantum Hall systems at filling fraction $ν=1$ when spin degrees of freedom are included. Starting from a microscopic Hamiltonian we derive an effective energy functional for studying such excitations. The gauge invariance and $CP^{3}$ character of this energy fuctional and their consequences a…
▽ More
In this paper we study in detail different types of topological solitons which are possible in bilayer quantum Hall systems at filling fraction $ν=1$ when spin degrees of freedom are included. Starting from a microscopic Hamiltonian we derive an effective energy functional for studying such excitations. The gauge invariance and $CP^{3}$ character of this energy fuctional and their consequences are examined. Then we identify permissible classes of finite energy solutions which are topologically non-trivial. We also numerically evaulate a representative solution in which a pseudospin (layer degrees of freedom) bimeron in a given spin component is intertwined with spin-skyrmions in each layer, and and discuss whether it is energetically favoured as the lowest lying excitation in such system with some numerical results.
△ Less
Submitted 31 July, 2000; v1 submitted 17 January, 2000;
originally announced January 2000.
-
Broken Symmetry Ground States in ν=2 Bilayer Quantum Hall Systems
Authors:
A. H. MacDonald,
R. Rajaraman,
T. Jungwirth
Abstract:
We report on a study of a bilayer two-dimensional electron gas at Landau level filling factor $ν=2$. The system exhibits both magnetic and spontaneous interlayer phase coherence broken symmetries. We propose a 3-parameter Slater determinant variational wavefunction which describes the ground state over the full range of bias potential ($Δ_V$) Zeeman coupling ($Δ_z$) and interlayer tunneling ampl…
▽ More
We report on a study of a bilayer two-dimensional electron gas at Landau level filling factor $ν=2$. The system exhibits both magnetic and spontaneous interlayer phase coherence broken symmetries. We propose a 3-parameter Slater determinant variational wavefunction which describes the ground state over the full range of bias potential ($Δ_V$) Zeeman coupling ($Δ_z$) and interlayer tunneling amplitude ($Δ_t$) strengths. Broken symmetry states occur inside a volume in this three-dimensional phase diagram near the $Δ_z^2=Δ_V^2+Δ_t^2$ surface. We have obtained analytic results for the intersections of the phase diagram with the $Δ_t=0$, $Δ_z=0$, and $Δ_V=0$, planes and show that the differential capacitance of the bilayer system is singular at the phase boundary.
△ Less
Submitted 20 March, 1999;
originally announced March 1999.
-
Bimerons in Double Layer Quantum Hall Systems
Authors:
Sankalpa Ghosh,
R. Rajaraman
Abstract:
In this paper we discuss bimeron pseudo spin textures for double layer quantum hall systems with filling factor $ν=1$. Bimerons are excitations corresponding to bound pairs of merons and anti-merons.
Bimeron solutions have already been studied at great length by other groups by minimising the microsopic Hamiltonian between microscopic trial wavefunctions. Here we calculate them by numerically…
▽ More
In this paper we discuss bimeron pseudo spin textures for double layer quantum hall systems with filling factor $ν=1$. Bimerons are excitations corresponding to bound pairs of merons and anti-merons.
Bimeron solutions have already been studied at great length by other groups by minimising the microsopic Hamiltonian between microscopic trial wavefunctions. Here we calculate them by numerically solving coupled nonlinear partial differential equations arising from extremisation of the effective action for pseudospin textures. We also calculate the different contributions to the energy of our bimerons, coming from pseudospin stiffness, capacitance and coulomb interactions between the merons. Apart from augmenting earlier results, this allows us to check how good an approximation it is to think of the bimeron as a pair of rigid objects (merons) with logarithmically growing energy, and with electric charge ${1 \over 2}$. Our differential equation approach also allows us to study the dependence of the spin texture as a function of the distance between merons, and the inter layer distance. Lastly, the technical problem of solving coupled nonlinear partial differential equations, subject to the special boundary conditions of bimerons is interesting in its own right.
△ Less
Submitted 20 July, 1998;
originally announced July 1998.
-
Meron Pseudospin Solutions in Quantum Hall Systems
Authors:
Sankalpa Ghosh,
R. Rajaraman
Abstract:
In this paper we report calculations of some pseudospin textures for bilayer quantum hall systems with filling factor $ ν=1$. The textures we study are isolated single meron solutions. Meron solutions have already been studied at great length by others by minimising the microscopic Hamiltonian between microscopic trial wavefunctions. Our approach is somewhat different. We calculate them by numer…
▽ More
In this paper we report calculations of some pseudospin textures for bilayer quantum hall systems with filling factor $ ν=1$. The textures we study are isolated single meron solutions. Meron solutions have already been studied at great length by others by minimising the microscopic Hamiltonian between microscopic trial wavefunctions. Our approach is somewhat different. We calculate them by numerically solving the nonlinear integro -differential equations arising from extremisation of the effective action for pseudospin textures. Our results can be viewed as augmenting earlier results and providing a basis for comparison.Our differential equation approach also allows us to dilineate the impact of different physical effects like the pseudospin stiffness and the capacitance energy on the meron solution.
△ Less
Submitted 14 November, 1997;
originally announced November 1997.
-
Generalised Chern-Simons Theory of Composite Fermions in Bilayer Hall Systems
Authors:
R. Rajaraman
Abstract:
We present a field theory of Jain's composite fermion model as generalised to the bilayer quantum Hall systems. We define operators which create composite fermions and write the Hamiltonian exactly in terms of these operators. This is seen to be a complexified version of the familiar Chern Simons theory. In the mean-field approximation, the composite fermions feel a modified effective magnetic f…
▽ More
We present a field theory of Jain's composite fermion model as generalised to the bilayer quantum Hall systems. We define operators which create composite fermions and write the Hamiltonian exactly in terms of these operators. This is seen to be a complexified version of the familiar Chern Simons theory. In the mean-field approximation, the composite fermions feel a modified effective magnetic field exactly as happens in usual Chern Simons theories, and plateaus are predicted at the same values of filling factors as Lopez and Fradkin and Halperin . But unlike normal Chern Simons theories, we obtain all features of the first-quantised wavefunctions including its phase, modulus and correct gaussian factors at the mean field level. The familiar Jain relations for monolayers and the Halperin wavefunction for bilayers come out as special cases.
△ Less
Submitted 10 February, 1997;
originally announced February 1997.
-
Umklapp Processes for Electrons and Their Renormalisation Group Flow
Authors:
Deepak Kumar,
R. Rajaraman
Abstract:
We study Umklapp couplings and their renormalisation group flow for electrons in a two dimensional lattice. It is shown that the effective low energy Hamiltonian involves not only forward scattering, but also considerable nonforward umklapp scattering, when the electrons fill a substantial fraction of the valence band. The behaviour of these couplings under renormalisation group is studied. It i…
▽ More
We study Umklapp couplings and their renormalisation group flow for electrons in a two dimensional lattice. It is shown that the effective low energy Hamiltonian involves not only forward scattering, but also considerable nonforward umklapp scattering, when the electrons fill a substantial fraction of the valence band. The behaviour of these couplings under renormalisation group is studied. It is shown that they remain marginal. We conclude with the possible consequences of this on properties of such electronic systems and their Fermi liquid theory.
△ Less
Submitted 20 May, 1996;
originally announced May 1996.
-
A Field Theory for the Read Operator
Authors:
R. Rajaraman,
S. L. Sondhi
Abstract:
We introduce a new field theory for studying quantum Hall systems. The quantum field is a modified version of the bosonic operator introduced by Read. In contrast to Read's original work we do {\em not} work in the lowest Landau level alone, and this leads to a much simpler formalism. We identify an appropriate canonical conjugate field, and write a Hamiltonian that governs the exact dynamics of…
▽ More
We introduce a new field theory for studying quantum Hall systems. The quantum field is a modified version of the bosonic operator introduced by Read. In contrast to Read's original work we do {\em not} work in the lowest Landau level alone, and this leads to a much simpler formalism. We identify an appropriate canonical conjugate field, and write a Hamiltonian that governs the exact dynamics of our bosonic field operators. We describe a Lagrangian formalism, derive the equations of motion for the fields and present a family of mean-field solutions. Finally, we show that these mean field solutions are precisely the Laughlin states. We do not, in this work, address the treatment of fluctuations.
△ Less
Submitted 25 January, 1996;
originally announced January 1996.
-
Landau Level Mixing and Solenoidal Terms in Lowest Landau Level Currents
Authors:
R. Rajaraman,
S. L. Sondhi
Abstract:
We calculate the lowest Landau level (LLL) current by working in the full Hilbert space of a two dimensional electron system in a magnetic field and kee** all the non-vanishing terms in the high field limit. The answer a) is not represented by a simple LLL operator and b) differs from the current operator, recently derived by Martinez and Stone in a field theoretic LLL formalism, by solenoidal…
▽ More
We calculate the lowest Landau level (LLL) current by working in the full Hilbert space of a two dimensional electron system in a magnetic field and kee** all the non-vanishing terms in the high field limit. The answer a) is not represented by a simple LLL operator and b) differs from the current operator, recently derived by Martinez and Stone in a field theoretic LLL formalism, by solenoidal terms. Though that is consistent with the inevitable ambiguities of their Noether construction, we argue that the correct answer cannot arise naturally in the LLL formalism.
△ Less
Submitted 3 June, 1994;
originally announced June 1994.
-
Chiral Vertex Operators in Off-Conformal Theory: The Sine-Gordon Example
Authors:
Shau-** Chang,
R. Rajaraman
Abstract:
We study chiral vertex operators in the sine-Gordon [SG] theory, viewed as an off-conformal system. We find that these operators, which would have been primary fields in the conformal limit, have interesting and, in some ways, unexpected properties in the SG model. Some of them continue to have scale- invariant dynamics even in the presence of the non-conformal cosine interaction. For instance,…
▽ More
We study chiral vertex operators in the sine-Gordon [SG] theory, viewed as an off-conformal system. We find that these operators, which would have been primary fields in the conformal limit, have interesting and, in some ways, unexpected properties in the SG model. Some of them continue to have scale- invariant dynamics even in the presence of the non-conformal cosine interaction. For instance, it is shown that the Mandelstam operator for the bosonic representation of the Fermi field does {\it not} develop a mass term in the SG theory, contrary to what the real Fermi field in the massive Thirring model is expected to do. It is also shown that in the presence of the non-conformal interactions, some vertex operators have unique Lorentz spins, while others do not.
△ Less
Submitted 18 November, 1993;
originally announced November 1993.