SlideShare une entreprise Scribd logo
1  sur  29
The Price of Anarchy is Independent of the Network Topology Tim Roughgarden (presented by Aleksandr Yampolskiy)
Outline ,[object Object],[object Object],[object Object],[object Object]
Q:  Which route would you take? suburb train station ? wide, circuitous road:  1 hour delay narrow, straight road: 20 minute delay
A:  Most drivers would take the narrow road suburb train station resulting in traffic congestion
What if… ,[object Object],[object Object],suburb train station red sedan must take the longer route
Outline ,[object Object],[object Object],[object Object],[object Object]
The Model ,[object Object],[object Object],[object Object],[object Object],[object Object],} ( G ,  r ,  l ) s 1 t 1 v x x 1 1 0 r 1  = 1 w s 1 ->w->t 1 s 1 -> v -> w ->t 1 s 1 ->v->t 1 Simple Paths
Flows ,[object Object],[object Object],[object Object],s 1 t 1 v x x 1 1 0 r 1  = 1 w f p 2  =  ½ f p 1  =  ½ edge  e =  ( w , t 1 ): f e  = ½ + ½ = 1 l e (f e )  =  1
The Cost of a Flow ,[object Object],[object Object],s 1 t 1 v x x 1 1 0 r 1  = 1 w f p 2  =  ½ f p 1  =  ½ l p 1 ( f )  = ½  + 1 = 1.5 l p 2 ( f )  = ½ +  0 + 1 = 1.5 C ( f ) =  ½ * 1.5 + ½ * 1.5 = 1.5
Some Assumptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Nash Flows ,[object Object],[object Object],[object Object],[object Object],[object Object]
More on Nash Flows  ,[object Object],s 1 t 1 1 x r 1  = 1 flow =  ½ flow =  ½ s 1 t 1 1 x r 1  = 1 flow =  0 flow = 1 C ( f* ) =  ½  *  1  +  ½  *  ½  = ¾ C ( f ) =  0  *  1  +  1  *  1  = 1 optimal flow Nash flow [Pigou 1920]
Optimal Flows ,[object Object],[object Object],s 1 t 1 1 x r 1  = 1 s 1 t 1 1 2x r 1  = 1 latency functions marginal cost functions flow = ½ flow = ½ flow = ½ flow = ½ optimal flow Nash flow
The Price of Anarchy ,[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
Linear Latency Functions ,[object Object],s 1 t 1 1 2x r  = 1 flow =  ½ flow =  ½ s 1 t 1 1 x r  = 1 flow =  0 flow = 1 C ( f* ) =  ½  *  1  +  ½  *  ½  = ¾ C ( f ) =  0  *  1  +  1  *  1  = 1  latency functions marginal cost functions Nash flow: Optimal flow:
Linear Latency Functions (cont.)  ,[object Object],[object Object],[object Object]
Proof Idea ,[object Object],[object Object],[object Object],[object Object],s 1 t 1 1 x r  =  1 flow = ½ flow = 0 flow =  ½ flow =0 r  =  ½
Proof Idea ,[object Object],[object Object],[object Object],[object Object],cost of  f*   at rate  r = cost of  f/2   at rate  r/2 + cost of augmenting flow to rate  r ≥  ¼  C ( f ) (easy) ≥  ½ C( f ) (hard) ≥  ¾ C( f )
General Latency Functions  ,[object Object],[object Object],s 1 t 1 1 x p r  = 1 s 1 t 1 1 r  = 1 latency functions marginal cost functions ( p  +1) x p   flow = 1 flow = 0 flow = ( p  + 1) -1/p flow = 1 – ( p  + 1) -1/p Nash flow: Optimal flow: C ( f ) = 1   C ( f* ) = 1 –  p ¢ ( p  +1) -(p+1)/p  =   (  )
Main Theorem  ,[object Object],[object Object]
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) ,[object Object],[object Object]
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) (cont.) ,[object Object],[object Object]
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) (cont.) ,[object Object],[object Object],[object Object],[object Object],s 1 t 1 1 x 2 r  =  1 flow = 1/√3 flow = 1 - 1/√3 l(x) = x 2 , l * (x) = 3x 2 .  Want 3(    x ) 2  =  x 2   )    =  √ 1/3
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) (cont.) ,[object Object]
Lower Bound:  ρ ( G ,  r ,  l )  ≥    ( L )
Computing the Price of Anarchy ,[object Object],[object Object],s 1 t 1 constant  · l r
Computing the Price of Anarchy (cont.)
Conclusion

Contenu connexe

Tendances

RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executionsRedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executionsRedis Labs
 
Queueing theory eq
Queueing theory eqQueueing theory eq
Queueing theory eqKoko Bakhat
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mappingsatrajit
 
APassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamerAPassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamerPeter Sels
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalencesatrajit
 
TimetablingForPassengers-2
TimetablingForPassengers-2TimetablingForPassengers-2
TimetablingForPassengers-2Peter Sels
 
bask, bfsk, bpsk
bask, bfsk, bpskbask, bfsk, bpsk
bask, bfsk, bpskblzz2net
 
matlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequencesmatlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequencesRakesh kumar jha
 
MATLAB CODE OF Shifting sequence
MATLAB  CODE  OF Shifting sequenceMATLAB  CODE  OF Shifting sequence
MATLAB CODE OF Shifting sequenceRakesh kumar jha
 
Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14Naor Ami
 
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUBPresentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUBWorld University of Bangladesh
 
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...Parhamsagharchi
 
Chap5 - ADSP 21K Manual
Chap5 - ADSP 21K ManualChap5 - ADSP 21K Manual
Chap5 - ADSP 21K ManualSethCopeland
 
B field homogenous sphere
B field homogenous sphereB field homogenous sphere
B field homogenous sphereFFMdeMul
 
Efficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeEfficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeVissarion Fisikopoulos
 
Control system concepts by using matlab
Control system concepts by using matlabControl system concepts by using matlab
Control system concepts by using matlabCharltonInao1
 

Tendances (20)

RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executionsRedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
 
Queueing theory eq
Queueing theory eqQueueing theory eq
Queueing theory eq
 
Bellmanford
BellmanfordBellmanford
Bellmanford
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mapping
 
APassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamerAPassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamer
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalence
 
TimetablingForPassengers-2
TimetablingForPassengers-2TimetablingForPassengers-2
TimetablingForPassengers-2
 
bask, bfsk, bpsk
bask, bfsk, bpskbask, bfsk, bpsk
bask, bfsk, bpsk
 
matlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequencesmatlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequences
 
MATLAB CODE OF Shifting sequence
MATLAB  CODE  OF Shifting sequenceMATLAB  CODE  OF Shifting sequence
MATLAB CODE OF Shifting sequence
 
Shortest Path in Graph
Shortest Path in GraphShortest Path in Graph
Shortest Path in Graph
 
Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14
 
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUBPresentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
 
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
 
Chap5 - ADSP 21K Manual
Chap5 - ADSP 21K ManualChap5 - ADSP 21K Manual
Chap5 - ADSP 21K Manual
 
SINGLE-SOURCE SHORTEST PATHS
SINGLE-SOURCE SHORTEST PATHS SINGLE-SOURCE SHORTEST PATHS
SINGLE-SOURCE SHORTEST PATHS
 
B field homogenous sphere
B field homogenous sphereB field homogenous sphere
B field homogenous sphere
 
Pass&fr trains planning
Pass&fr trains planningPass&fr trains planning
Pass&fr trains planning
 
Efficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeEfficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope Volume
 
Control system concepts by using matlab
Control system concepts by using matlabControl system concepts by using matlab
Control system concepts by using matlab
 

Similaire à Price of anarchy is independent of network topology

Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptWahyuAde4
 
Minimum cost maximum flow
Minimum cost maximum flowMinimum cost maximum flow
Minimum cost maximum flowSaruarChowdhury
 
First Order Active RC Sections
First Order Active RC SectionsFirst Order Active RC Sections
First Order Active RC SectionsHoopeer Hoopeer
 
Analysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fittingAnalysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fittingTarik Kazaz
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptxHirazNor
 
Large Scale Fading and Network Deployment.pdf
Large	Scale	Fading	and Network Deployment.pdfLarge	Scale	Fading	and Network Deployment.pdf
Large Scale Fading and Network Deployment.pdfmshanajoel6
 
Parallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsParallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsJonny Daenen
 
Gibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inferenceGibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inferenceJeremyHeng10
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptxHirazNor
 
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...Arthur Weglein
 
ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012László Nádai
 
Module1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptxModule1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptxrealme6igamerr
 

Similaire à Price of anarchy is independent of network topology (20)

Signal & system
Signal & systemSignal & system
Signal & system
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
Minimum cost maximum flow
Minimum cost maximum flowMinimum cost maximum flow
Minimum cost maximum flow
 
Dsp manual
Dsp manualDsp manual
Dsp manual
 
Ec gate 13
Ec gate 13Ec gate 13
Ec gate 13
 
First Order Active RC Sections
First Order Active RC SectionsFirst Order Active RC Sections
First Order Active RC Sections
 
Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
 
Analysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fittingAnalysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fitting
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
 
Chap04
Chap04Chap04
Chap04
 
maxflow.ppt
maxflow.pptmaxflow.ppt
maxflow.ppt
 
Large Scale Fading and Network Deployment.pdf
Large	Scale	Fading	and Network Deployment.pdfLarge	Scale	Fading	and Network Deployment.pdf
Large Scale Fading and Network Deployment.pdf
 
Parallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsParallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-Joins
 
Dsp lab manual
Dsp lab manualDsp lab manual
Dsp lab manual
 
Gibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inferenceGibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inference
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
Chang etal 2012a
Chang etal 2012aChang etal 2012a
Chang etal 2012a
 
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
 
ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012
 
Module1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptxModule1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptx
 

Plus de Aleksandr Yampolskiy

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionAleksandr Yampolskiy
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter BellAleksandr Yampolskiy
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsAleksandr Yampolskiy
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItAleksandr Yampolskiy
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsAleksandr Yampolskiy
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of virusesAleksandr Yampolskiy
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Aleksandr Yampolskiy
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networksAleksandr Yampolskiy
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelementAleksandr Yampolskiy
 

Plus de Aleksandr Yampolskiy (20)

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of viruses
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
 

Price of anarchy is independent of network topology

  • 1. The Price of Anarchy is Independent of the Network Topology Tim Roughgarden (presented by Aleksandr Yampolskiy)
  • 2.
  • 3. Q: Which route would you take? suburb train station ? wide, circuitous road: 1 hour delay narrow, straight road: 20 minute delay
  • 4. A: Most drivers would take the narrow road suburb train station resulting in traffic congestion
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Lower Bound: ρ ( G , r , l ) ≥  ( L )
  • 27.
  • 28. Computing the Price of Anarchy (cont.)