-
Online Resource Sharing: Better Robust Guarantees via Randomized Strategies
Authors:
David X. Lin,
Daniel Hall,
Giannis Fikioris,
Siddhartha Banerjee,
Éva Tardos
Abstract:
We study the problem of fair online resource allocation via non-monetary mechanisms, where multiple agents repeatedly share a resource without monetary transfers. Previous work has shown that every agent can guarantee $1/2$ of their ideal utility (the highest achievable utility given their fair share of resources) robustly, i.e., under arbitrary behavior by the other agents. While this $1/2$-robus…
▽ More
We study the problem of fair online resource allocation via non-monetary mechanisms, where multiple agents repeatedly share a resource without monetary transfers. Previous work has shown that every agent can guarantee $1/2$ of their ideal utility (the highest achievable utility given their fair share of resources) robustly, i.e., under arbitrary behavior by the other agents. While this $1/2$-robustness guarantee has now been established under very different mechanisms, including pseudo-markets and dynamic max-min allocation, improving on it has appeared difficult.
In this work, we obtain the first significant improvement on the robustness of online resource sharing. In more detail, we consider the widely-studied repeated first-price auction with artificial currencies. Our main contribution is to show that a simple randomized bidding strategy can guarantee each agent a $2 - \sqrt 2 \approx 0.59$ fraction of her ideal utility, irrespective of others' bids. Specifically, our strategy requires each agent with fair share $α$ to use a uniformly distributed bid whenever her value is in the top $α$-quantile of her value distribution. Our work almost closes the gap to the known $1 - 1/e \approx 0.63$ hardness for robust resource sharing; we also show that any static (i.e., budget independent) bidding policy cannot guarantee more than a $0.6$-fraction of the ideal utility, showing our technique is almost tight.
△ Less
Submitted 25 May, 2025; v1 submitted 19 May, 2025;
originally announced May 2025.
-
Robust Equilibria in Shared Resource Allocation via Strengthening Border's Theorem
Authors:
David X. Lin,
Siddhartha Banerjee,
Giannis Fikioris,
Éva Tardos
Abstract:
We consider repeated allocation of a shared resource via a non-monetary mechanism, wherein a single item must be allocated to one of multiple agents in each round. We assume that each agent has i.i.d. values for the item across rounds, and additive utilities. Past work on this problem has proposed mechanisms where agents can get one of two kinds of guarantees: $(i)$ (approximate) Bayes-Nash equili…
▽ More
We consider repeated allocation of a shared resource via a non-monetary mechanism, wherein a single item must be allocated to one of multiple agents in each round. We assume that each agent has i.i.d. values for the item across rounds, and additive utilities. Past work on this problem has proposed mechanisms where agents can get one of two kinds of guarantees: $(i)$ (approximate) Bayes-Nash equilibria via linkage-based mechanisms which need extensive knowledge of the value distributions, and $(ii)$ simple distribution-agnostic mechanisms with robust utility guarantees for each individual agent, which are worse than the Nash outcome, but hold irrespective of how others behave (including possibly collusive behavior). Recent work has hinted at barriers to achieving both simultaneously. Our work however establishes this is not the case, by proposing the first mechanism in which each agent has a natural strategy that is both a Bayes-Nash equilibrium and also comes with strong robust guarantees for individual agent utilities.
Our mechanism comes out of a surprising connection between the online shared resource allocation problem and implementation theory. In particular, we show that establishing robust equilibria in this setting reduces to showing that a particular subset of the Border polytope is non-empty. We establish this via a novel joint Schur-convexity argument. This strengthening of Border's criterion for obtaining a stronger conclusion is of independent technical interest, as it may prove useful in other settings.
△ Less
Submitted 16 May, 2025;
originally announced May 2025.
-
Allocating Public Goods via Dynamic Max-Min Fairness: Long-Run Behavior and Competitive Equilibria
Authors:
Chido Onyeze,
Siddhartha Banerjee,
Giannis Fikioris,
Éva Tardos
Abstract:
Dynamic max-min fair allocation (DMMF) is a simple and popular mechanism for the repeated allocation of a shared resource among competing agents: in each round, each agent can choose to request or not for the resource, which is then allocated to the requesting agent with the least number of allocations received till then. Recent work has shown that under DMMF, a simple threshold-based request poli…
▽ More
Dynamic max-min fair allocation (DMMF) is a simple and popular mechanism for the repeated allocation of a shared resource among competing agents: in each round, each agent can choose to request or not for the resource, which is then allocated to the requesting agent with the least number of allocations received till then. Recent work has shown that under DMMF, a simple threshold-based request policy enjoys surprisingly strong robustness properties, wherein each agent can realize a significant fraction of her optimal utility irrespective of how other agents' behave. While this goes some way in mitigating the possibility of a 'tragedy of the commons' outcome, the robust policies require that an agent defend against arbitrary (possibly adversarial) behavior by other agents. This however may be far from optimal compared to real world settings, where other agents are selfish optimizers rather than adversaries. Therefore, robust guarantees give no insight on how agents behave in an equilibrium, and whether outcomes are improved under one.
Our work aims to bridge this gap by studying the existence and properties of equilibria under DMMF. To this end, we first show that despite the strong robustness guarantees of the threshold based strategies, no Nash equilibrium exists when agents participate in DMMF, each using some fixed threshold-based policy. On the positive side, however, we show that for the symmetric case, a simple data-driven request policy guarantees that no agent benefits from deviating to a different fixed threshold policy. In our proposed policy agents aim to match the historical allocation rate with a vanishing drift towards the rate optimizing overall welfare for all users. Furthermore, the resulting equilibrium outcome can be significantly better compared to what follows from the robustness guarantees.
△ Less
Submitted 24 January, 2025;
originally announced January 2025.
-
Learning in Budgeted Auctions with Spacing Objectives
Authors:
Giannis Fikioris,
Robert Kleinberg,
Yoav Kolumbus,
Raunak Kumar,
Yishay Mansour,
Éva Tardos
Abstract:
In many repeated auction settings, participants care not only about how frequently they win but also how their winnings are distributed over time. This problem arises in various practical domains where avoiding congested demand is crucial, such as online retail sales and compute services, as well as in advertising campaigns that require sustained visibility over time. We introduce a simple model o…
▽ More
In many repeated auction settings, participants care not only about how frequently they win but also how their winnings are distributed over time. This problem arises in various practical domains where avoiding congested demand is crucial, such as online retail sales and compute services, as well as in advertising campaigns that require sustained visibility over time. We introduce a simple model of this phenomenon, modeling it as a budgeted auction where the value of a win is a concave function of the time since the last win. This implies that for a given number of wins, even spacing over time is optimal. We also extend our model and results to the case when not all wins result in "conversions" (realization of actual gains), and the probability of conversion depends on a context. The goal is to maximize and evenly space conversions rather than just wins.
We study the optimal policies for this setting in second-price auctions and offer learning algorithms for the bidders that achieve low regret against the optimal bidding policy in a Bayesian online setting. Our main result is a computationally efficient online learning algorithm that achieves $\tilde O(\sqrt T)$ regret. We achieve this by showing that an infinite-horizon Markov decision process (MDP) with the budget constraint in expectation is essentially equivalent to our problem, even when limiting that MDP to a very small number of states. The algorithm achieves low regret by learning a bidding policy that chooses bids as a function of the context and the system's state, which will be the time elapsed since the last win (or conversion). We show that state-independent strategies incur linear regret even without uncertainty of conversions. We complement this by showing that there are state-independent strategies that, while still having linear regret, achieve a $(1-\frac 1 e)$ approximation to the optimal reward.
△ Less
Submitted 7 November, 2024;
originally announced November 2024.
-
Fundamentals of a Null Field Method-Surface Equivalence Principle Approach for Scattering by Dielectric Cylinders
Authors:
Minas Kouroublakis,
Nikolaos L. Tsitsas,
George Fikioris
Abstract:
The null-field method (NFM) and the method of auxiliary sources (MAS) have been both used extensively for the numerical solution of boundary-value problems arising in diverse applications involving propagation and scattering of waves. It has been shown that, under certain conditions, the applicability of MAS may be restricted by issues concerning the divergence of the auxiliary currents, manifeste…
▽ More
The null-field method (NFM) and the method of auxiliary sources (MAS) have been both used extensively for the numerical solution of boundary-value problems arising in diverse applications involving propagation and scattering of waves. It has been shown that, under certain conditions, the applicability of MAS may be restricted by issues concerning the divergence of the auxiliary currents, manifested by the appearance of exponentially large oscillations. In this work, we combine the NFM with the surface equivalence principle (SEP) and investigate analytically the convergence properties of the combined NFM-SEP with reference to the problem of (internal or external) line-source excitation of a dielectric cylinder. Our main purpose is to prove that (contrary to the MAS) the discrete NFM-SEP currents, when properly normalized, always converge to the corresponding continuous current densities, and thus no divergence and oscillations phenomena appear. The theoretical analysis of the NFM-SEP is accompanied by detailed comparisons with the MAS as well as with representative numerical results illustrating the conclusions.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
No-Regret Algorithms in non-Truthful Auctions with Budget and ROI Constraints
Authors:
Gagan Aggarwal,
Giannis Fikioris,
Mingfei Zhao
Abstract:
Advertisers increasingly use automated bidding to optimize their ad campaigns on online advertising platforms. Autobidding optimizes an advertiser's objective subject to various constraints, e.g. average ROI and budget constraints. In this paper, we study the problem of designing online autobidding algorithms to optimize value subject to ROI and budget constraints when the platform is running any…
▽ More
Advertisers increasingly use automated bidding to optimize their ad campaigns on online advertising platforms. Autobidding optimizes an advertiser's objective subject to various constraints, e.g. average ROI and budget constraints. In this paper, we study the problem of designing online autobidding algorithms to optimize value subject to ROI and budget constraints when the platform is running any mixture of first and second price auction.
We consider the following stochastic setting: There is an item for sale in each of $T$ rounds. In each round, buyers submit bids and an auction is run to sell the item. We focus on one buyer, possibly with budget and ROI constraints. We assume that the buyer's value and the highest competing bid are drawn i.i.d. from some unknown (joint) distribution in each round. We design a low-regret bidding algorithm that satisfies the buyer's constraints. Our benchmark is the objective value achievable by the best possible Lipschitz function that maps values to bids, which is rich enough to best respond to many different correlation structures between value and highest competing bid. Our main result is an algorithm with full information feedback that guarantees a near-optimal $\tilde O(\sqrt T)$ regret with respect to the best Lipschitz function. Our result applies to a wide range of auctions, most notably any mixture of first and second price auctions (price is a convex combination of the first and second price). In addition, our result holds for both value-maximizing buyers and quasi-linear utility-maximizing buyers.
We also study the bandit setting, where we show an $Ω(T^{2/3})$ lower bound on the regret for first-price auctions, showing a large disparity between the full information and bandit settings. We also design an algorithm with $\tilde O(T^{3/4})$ regret, when the value distribution is known and is independent of the highest competing bid.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Convergence, divergence, and inherent oscillations in MFS solutions of two-dimensional Laplace-Neumann problems
Authors:
Georgios D. Kolezas,
George Fikioris,
John A. Roumeliotis
Abstract:
The method of fundamental solutions (MFS), also known as the method of auxiliary sources (MAS), is a well-known computational method for the solution of boundary-value problems. The final solution ("MAS solution") is obtained once we have found the amplitudes of $N$ auxiliary "MAS sources." Past studies have demonstrated that it is possible for the MAS solution to converge to the true solution eve…
▽ More
The method of fundamental solutions (MFS), also known as the method of auxiliary sources (MAS), is a well-known computational method for the solution of boundary-value problems. The final solution ("MAS solution") is obtained once we have found the amplitudes of $N$ auxiliary "MAS sources." Past studies have demonstrated that it is possible for the MAS solution to converge to the true solution even when the $N$ auxiliary sources diverge and oscillate. The present paper extends the past studies by demonstrating this possibility within the context of Laplace's equation with Neumann boundary conditions. One can thus obtain the correct solution from sources that, when $N$ is large, must be considered unphysical. We carefully explain the underlying reasons for the unphysical results, distinguish from other difficulties that might concurrently arise, and point to significant differences with time-dependent problems that were studied in the past.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Beyond Worst-Case Online Allocation via Dynamic Max-min Fairness
Authors:
Giannis Fikioris,
Siddhartha Banerjee,
Éva Tardos
Abstract:
We study the allocation of shared resources over multiple rounds among competing agents, via the dynamic max-min fair (DMMF) mechanism: the good in each round is allocated to the requesting agent with the least number of allocations received to date. We show that in large markets when an agent has i.i.d. values across rounds, under mild distributional assumptions (e.g., bounded PDF function), the…
▽ More
We study the allocation of shared resources over multiple rounds among competing agents, via the dynamic max-min fair (DMMF) mechanism: the good in each round is allocated to the requesting agent with the least number of allocations received to date. We show that in large markets when an agent has i.i.d. values across rounds, under mild distributional assumptions (e.g., bounded PDF function), the DMMF mechanism allows each agent to realize a $1 - o(1)$ fraction of her ideal utility -- her highest achievable utility given her nominal share of resources. This guarantee holds under arbitrary behavior by other agents and is achieved by characterizing the agent's utility under a rich space of strategies, wherein an agent can tune how aggressive to be in requesting the item. Our techniques also allow us to handle settings where an agent's values are correlated across rounds, thereby allowing an adversary to predict and block her future values. By tuning the aggressiveness, an agent can guarantee $Ω(γ)$ fraction of her ideal utility, where $γ\in [0, 1]$ is a parameter that quantifies dependence across rounds (with $γ= 1$ indicating full independence and lower values indicating more correlation). Finally, we extend our efficiency results to the case of reusable resources, where an agent might need to hold the item over multiple rounds to receive utility. Our results subsume previous guarantees obtained using a more complicated mechanism proving a half ideal utility guarantee under i.i.d. values sampled from worst-case distributions.
△ Less
Submitted 27 April, 2025; v1 submitted 13 October, 2023;
originally announced October 2023.
-
The Uniqueness Theorem for Nonlocal Hydrodynamic Media
Authors:
Christos Mystilidis,
George Fikioris,
Christos Tserkezis,
Guy A. E. Vandenbosch,
Xuezhi Zheng
Abstract:
We investigate a fundamental electromagnetic theorem, namely the uniqueness theorem, in the context of nonlocal electromagnetics, as simulated by a popular semiclassical model, the Hydrodynamic Drude Model (HDM) and extensions thereof such as the Generalized Nonlocal Optical Response (GNOR). The derivations and proofs presented here give a theoretical foundation to the use of the Additional Bounda…
▽ More
We investigate a fundamental electromagnetic theorem, namely the uniqueness theorem, in the context of nonlocal electromagnetics, as simulated by a popular semiclassical model, the Hydrodynamic Drude Model (HDM) and extensions thereof such as the Generalized Nonlocal Optical Response (GNOR). The derivations and proofs presented here give a theoretical foundation to the use of the Additional Boundary Conditions (ABCs), whose necessity is recognized and underlined in virtually all implementations and applications of HDM. Our proofs follow a mathematically relaxed style, borrowing from the literature of established electromagnetics textbooks that study the matter from an engineering perspective. Through this simpler route we deduce clear and intuitive material-response requirements for uniqueness to hold, while using a familiar parlance in a topic that is mostly studied through a physics perspective. Two numerical examples that examine the problem from either a semianalytical or a purely numerical viewpoint support our findings.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Karma: Resource Allocation for Dynamic Demands
Authors:
Midhul Vuppalapati,
Giannis Fikioris,
Rachit Agarwal,
Asaf Cidon,
Anurag Khandelwal,
Eva Tardos
Abstract:
We consider the problem of fair resource allocation in a system where user demands are dynamic, that is, where user demands vary over time. Our key observation is that the classical max-min fairness algorithm for resource allocation provides many desirable properties (e.g., Pareto efficiency, strategy-proofness, and fairness), but only under the strong assumption of user demands being static over…
▽ More
We consider the problem of fair resource allocation in a system where user demands are dynamic, that is, where user demands vary over time. Our key observation is that the classical max-min fairness algorithm for resource allocation provides many desirable properties (e.g., Pareto efficiency, strategy-proofness, and fairness), but only under the strong assumption of user demands being static over time. For the realistic case of dynamic user demands, the max-min fairness algorithm loses one or more of these properties.
We present Karma, a new resource allocation mechanism for dynamic user demands. The key technical contribution in Karma is a credit-based resource allocation algorithm: in each quantum, users donate their unused resources and are assigned credits when other users borrow these resources; Karma carefully orchestrates the exchange of credits across users (based on their instantaneous demands, donated resources and borrowed resources), and performs prioritized resource allocation based on users' credits. We theoretically establish Karma guarantees related to Pareto efficiency, strategy-proofness, and fairness for dynamic user demands. Empirical evaluations over production workloads show that these properties translate well into practice: Karma is able to reduce disparity in performance across users to a bare minimum while maintaining Pareto-optimal system-wide performance.
△ Less
Submitted 7 July, 2023; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Approximately Stationary Bandits with Knapsacks
Authors:
Giannis Fikioris,
Éva Tardos
Abstract:
Bandits with Knapsacks (BwK), the generalization of the Bandits problem under global budget constraints, has received a lot of attention in recent years. Previous work has focused on one of the two extremes: Stochastic BwK where the rewards and consumptions of the resources of each round are sampled from an i.i.d. distribution, and Adversarial BwK where these parameters are picked by an adversary.…
▽ More
Bandits with Knapsacks (BwK), the generalization of the Bandits problem under global budget constraints, has received a lot of attention in recent years. Previous work has focused on one of the two extremes: Stochastic BwK where the rewards and consumptions of the resources of each round are sampled from an i.i.d. distribution, and Adversarial BwK where these parameters are picked by an adversary. Achievable guarantees in the two cases exhibit a massive gap: No-regret learning is achievable in the stochastic case, but in the adversarial case only competitive ratio style guarantees are achievable, where the competitive ratio depends either on the budget or on both the time and the number of resources. What makes this gap so vast is that in Adversarial BwK the guarantees get worse in the typical case when the budget is more binding. While ``best-of-both-worlds'' type algorithms are known (single algorithms that provide the best achievable guarantee in each extreme case), their bounds degrade to the adversarial case as soon as the environment is not fully stochastic.
Our work aims to bridge this gap, offering guarantees for a workload that is not exactly stochastic but is also not worst-case. We define a condition, Approximately Stationary BwK, that parameterizes how close to stochastic or adversarial an instance is. Based on these parameters, we explore what is the best competitive ratio attainable in BwK. We explore two algorithms that are oblivious to the values of the parameters but guarantee competitive ratios that smoothly transition between the best possible guarantees in the two extreme cases, depending on the values of the parameters. Our guarantees offer great improvement over the adversarial guarantee, especially when the available budget is small. We also prove bounds on the achievable guarantee, showing that our results are approximately tight when the budget is small.
△ Less
Submitted 8 July, 2023; v1 submitted 28 February, 2023;
originally announced February 2023.
-
An extension to "A subsemigroup of the rook monoid"
Authors:
George Fikioris,
Giannis Fikioris
Abstract:
A recent paper studied an inverse submonoid $M_n$ of the rook monoid, by representing the nonzero elements of $M_n$ via certain triplets belonging to $\mathbb{Z}^3$. In this short note, we allow the triplets to belong to $\mathbb{R}^3$. We thus study a new inverse monoid $\overline{M}_n$, which is a supermonoid of $M_n$. We point out similarities and find essential differences. We show that…
▽ More
A recent paper studied an inverse submonoid $M_n$ of the rook monoid, by representing the nonzero elements of $M_n$ via certain triplets belonging to $\mathbb{Z}^3$. In this short note, we allow the triplets to belong to $\mathbb{R}^3$. We thus study a new inverse monoid $\overline{M}_n$, which is a supermonoid of $M_n$. We point out similarities and find essential differences. We show that $\overline{M}_n$ is a noncommutative, periodic, combinatorial, fundamental, completely semisimple, and strongly $E^*$-unitary inverse monoid.
△ Less
Submitted 30 August, 2023; v1 submitted 19 February, 2023;
originally announced February 2023.
-
Robust Pseudo-Markets for Reusable Public Resources
Authors:
Siddhartha Banerjee,
Giannis Fikioris,
Éva Tardos
Abstract:
We study non-monetary mechanisms for the fair and efficient allocation of reusable public resources, i.e., resources used for varying durations. We consider settings where a limited resource is repeatedly shared among a set of agents, each of whom may request to use the resource over multiple consecutive rounds, receiving utility only if they get to use the resource for the full duration of their…
▽ More
We study non-monetary mechanisms for the fair and efficient allocation of reusable public resources, i.e., resources used for varying durations. We consider settings where a limited resource is repeatedly shared among a set of agents, each of whom may request to use the resource over multiple consecutive rounds, receiving utility only if they get to use the resource for the full duration of their request. Such settings are of particular significance in scientific research where large-scale instruments such as electron microscopes, particle colliders, or telescopes are shared between multiple research groups; this model also subsumes and extends existing models of repeated non-monetary allocation where resources are required for a single round only.
We study a simple pseudo-market mechanism where upfront we endow each agent with a budget of artificial credits, proportional to the fair share of the resource we want the agent to receive. The endowments thus define for each agent her ideal utility as that which she derives from her favorite allocation with no competition, but subject to getting at most her fair share of the resource across rounds. Next, on each round, and for each available resource item, our mechanism runs a first-price auction with a selective reserve, wherein each agent submits a desired duration and a per-round-bid, which must be at least the reserve price if requesting for multiple rounds; the bidder with the highest per-round-bid wins, and gets to use the item for the desired duration. We consider this problem in a Bayesian setting and show that under a carefully chosen reserve price, irrespective of how others bid, each agent has a simple strategy that guarantees she receives a $1/2$ fraction of her ideal utility in expectation. We also show this result is tight, i.e., no mechanism can guarantee that all agents get more than half of their ideal utility.
△ Less
Submitted 16 October, 2023; v1 submitted 17 February, 2023;
originally announced February 2023.
-
Liquid Welfare Guarantees for No-Regret Learning in Sequential Budgeted Auctions
Authors:
Giannis Fikioris,
Éva Tardos
Abstract:
We study the liquid welfare in sequential first-price auctions with budget-limited buyers. We focus on first-price auctions, which are increasingly commonly used in many settings, and consider liquid welfare, a natural and well-studied generalization of social welfare for buyers with budgets. We use a behavioral model for the buyers, assuming a learning style guarantee: the resulting utility of ea…
▽ More
We study the liquid welfare in sequential first-price auctions with budget-limited buyers. We focus on first-price auctions, which are increasingly commonly used in many settings, and consider liquid welfare, a natural and well-studied generalization of social welfare for buyers with budgets. We use a behavioral model for the buyers, assuming a learning style guarantee: the resulting utility of each buyer is within a $γ$ factor (where $γ\ge 1$) of the utility achievable by shading her value with the same factor at each round. Under this assumption, we show a $γ+1/2+O(1/γ)$ price of anarchy for liquid welfare assuming buyers have additive valuations. This positive result is in contrast to sequential second-price auctions, where even with $γ=1$, the resulting liquid welfare can be arbitrarily smaller than the maximum liquid welfare. We prove a lower bound of $γ$ on the liquid welfare loss under the above assumption in first-price auctions, making our bound asymptotically tight. For the case when $γ= 1$ our theorem implies a price of anarchy upper bound that is about $2.41$; we show a lower bound of $2$ for that case.
We also give a learning algorithm that the players can use to achieve the guarantee needed for our liquid welfare result. Our algorithm achieves utility within a $γ=O(1)$ factor of the optimal utility even when a buyer's values and the bids of the other buyers are chosen adversarially, assuming the buyer's budget grows linearly with time. The competitiveness guarantee of the learning algorithm deteriorates somewhat as the budget grows slower than linearly with time.
Finally, we extend our liquid welfare results for the case where buyers have submodular valuations over the set of items they win across iterations with a slightly worse price of anarchy bound of $γ+1+O(1/γ)$ compared to the guarantee for the additive case.
△ Less
Submitted 14 May, 2024; v1 submitted 14 October, 2022;
originally announced October 2022.
-
A subsemigroup of the rook monoid
Authors:
George Fikioris,
Giannis Fikioris
Abstract:
We define a subsemigroup $S_n$ of the rook monoid $R_n$ and investigate its properties. To do this, we represent the nonzero elements of $S_n$ (which are $n\times n$ matrices) via certain triplets of integers, and develop a closed-form expression representing the product of two elements; these tools facilitate straightforward deductions of a great number of properties. For example, we show that…
▽ More
We define a subsemigroup $S_n$ of the rook monoid $R_n$ and investigate its properties. To do this, we represent the nonzero elements of $S_n$ (which are $n\times n$ matrices) via certain triplets of integers, and develop a closed-form expression representing the product of two elements; these tools facilitate straightforward deductions of a great number of properties. For example, we show that $S_n$ consists solely of idempotents and nilpotents, find the numbers of idempotents and nilpotents, and compute nilpotency indexes. Furthermore, we give a necessary and sufficient condition for the $j$th root of a nonzero element to exist in $S_n$, show that existence implies uniqueness, and compute the said root explicitly. We also point to several combinatorial aspects; describe a number of subsemigroups of $S_n$; and, using rook $n$-diagrams, graphically interpret many of our results.
△ Less
Submitted 25 May, 2022; v1 submitted 2 November, 2021;
originally announced November 2021.
-
Incentives in Dominant Resource Fair Allocation under Dynamic Demands
Authors:
Giannis Fikioris,
Rachit Agarwal,
Éva Tardos
Abstract:
Every computer system -- from schedulers in clouds (e.g. Amazon) to computer networks to operating systems -- performs resource allocation across system users. The defacto allocation policies are max-min fairness (MMF) for single resources and dominant resource fairness (DRF) for multiple resources which guarantee properties like incentive compatibility, envy-freeness, and Pareto efficiency, assum…
▽ More
Every computer system -- from schedulers in clouds (e.g. Amazon) to computer networks to operating systems -- performs resource allocation across system users. The defacto allocation policies are max-min fairness (MMF) for single resources and dominant resource fairness (DRF) for multiple resources which guarantee properties like incentive compatibility, envy-freeness, and Pareto efficiency, assuming user demands are static (time-independent). However, in real-world systems, user demands are dynamic, i.e. time-dependant. As a result, there is now a fundamental mismatch between the goals of computer systems and the properties enabled by classic resource allocation policies. We aim to bridge this mismatch. When demands are dynamic, instant-by-instant MMF can be extremely unfair over longer periods of time, i.e. lead to unbalanced user allocations as previous allocations have no effect in the present. We consider a natural generalization of MMF and DRF for multiple resources and users with dynamic demands: this algorithm ensures that user allocations are as max-min fair as possible up to any time instant, given past allocations. This dynamic mechanism remains Pareto optimal and envy-free, but not incentive compatible. However, our results show that the possible increase in utility by misreporting is bounded and, since this can lead to significant decrease in overall useful allocation, this suggests that it is not a useful strategy. Our main result is to show that our dynamic DRF algorithm is $(1+ρ)$-incentive compatible, where $ρ$ quantifies the relative importance of a resource for different users; we show that this factor is tight even with only two resources. We also present a $3/2$ upper bound and a $\sqrt 2$ lower bound for incentive compatibility when there is only one resource. We also offer extensions for the case when users are weighted to prioritize them differently.
△ Less
Submitted 15 February, 2022; v1 submitted 25 September, 2021;
originally announced September 2021.
-
Eigenvalue contour lines of Kac-Murdock-Szego matrices with a complex parameter
Authors:
George Fikioris,
Christos Papapanos
Abstract:
A previous paper studied the so-called borderline curves of the Kac--Murdock--Szegő matrix $K_{n}(ρ)=\left[ρ^{|j-k|}\right]_{j,k=1}^{n}$, where $ρ\in\mathbb{C}$. These are the level curves (contour lines) in the complex-$ρ$ plane on which $K_n(ρ)$ has a type-1 or type-2 eigenvalue of magnitude $n$, where $n$ is the matrix dimension. Those curves have cusps at all critical points $ρ=ρ_c$ at which m…
▽ More
A previous paper studied the so-called borderline curves of the Kac--Murdock--Szegő matrix $K_{n}(ρ)=\left[ρ^{|j-k|}\right]_{j,k=1}^{n}$, where $ρ\in\mathbb{C}$. These are the level curves (contour lines) in the complex-$ρ$ plane on which $K_n(ρ)$ has a type-1 or type-2 eigenvalue of magnitude $n$, where $n$ is the matrix dimension. Those curves have cusps at all critical points $ρ=ρ_c$ at which multiple (double) eigenvalues occur. The present paper determines corresponding curves pertaining to eigenvalues of magnitude $N\ne n$. We find that these curves no longer present cusps; and that, when $N<n$, the cusps have in a sense transformed into loops. We discuss the meaning of the winding numbers of our curves. Finally, we point out possible extensions to more general matrices.
△ Less
Submitted 10 May, 2021; v1 submitted 23 April, 2021;
originally announced April 2021.
-
Mechanism Design for Perturbation Stable Combinatorial Auctions
Authors:
Giannis Fikioris,
Dimitris Fotakis
Abstract:
Motivated by recent research on combinatorial markets with endowed valuations by (Babaioff et al., EC 2018) and (Ezra et al., EC 2020), we introduce a notion of perturbation stability in Combinatorial Auctions (CAs) and study the extend to which stability helps in social welfare maximization and mechanism design. A CA is $γ\textit{-stable}$ if the optimal solution is resilient to inflation, by a f…
▽ More
Motivated by recent research on combinatorial markets with endowed valuations by (Babaioff et al., EC 2018) and (Ezra et al., EC 2020), we introduce a notion of perturbation stability in Combinatorial Auctions (CAs) and study the extend to which stability helps in social welfare maximization and mechanism design. A CA is $γ\textit{-stable}$ if the optimal solution is resilient to inflation, by a factor of $γ\geq 1$, of any bidder's valuation for any single item. On the positive side, we show how to compute efficiently an optimal allocation for 2-stable subadditive valuations and that a Walrasian equilibrium exists for 2-stable submodular valuations. Moreover, we show that a Parallel 2nd Price Auction (P2A) followed by a demand query for each bidder is truthful for general subadditive valuations and results in the optimal allocation for 2-stable submodular valuations. To highlight the challenges behind optimization and mechanism design for stable CAs, we show that a Walrasian equilibrium may not exist for $γ$-stable XOS valuations for any $γ$, that a polynomial-time approximation scheme does not exist for $(2-ε)$-stable submodular valuations, and that any DSIC mechanism that computes the optimal allocation for stable CAs and does not use demand queries must use exponentially many value queries. We conclude with analyzing the Price of Anarchy of P2A and Parallel 1st Price Auctions (P1A) for CAs with stable submodular and XOS valuations. Our results indicate that the quality of equilibria of simple non-truthful auctions improves only for $γ$-stable instances with $γ\geq 3$.
△ Less
Submitted 15 July, 2020; v1 submitted 17 June, 2020;
originally announced June 2020.
-
Eigenvalue bifurcations in Kac-Murdock-Szego matrices with a complex parameter
Authors:
George Fikioris
Abstract:
For complex $ρ$, the spectral properties of the Toeplitz matrix $K_{n}(ρ)=\left[ρ^{|j-k|}\right]_{j,k=1}^{n}$, often called the Kac-Murdock-Szegο matrix, have been examined in detail in two recent papers. The second paper, in particular, introduced the concept of borderline curves. These are two closed curves in the complex-$ρ$ plane that consist of all the $ρ$ for which $K_n(ρ)$ possesses some ei…
▽ More
For complex $ρ$, the spectral properties of the Toeplitz matrix $K_{n}(ρ)=\left[ρ^{|j-k|}\right]_{j,k=1}^{n}$, often called the Kac-Murdock-Szegο matrix, have been examined in detail in two recent papers. The second paper, in particular, introduced the concept of borderline curves. These are two closed curves in the complex-$ρ$ plane that consist of all the $ρ$ for which $K_n(ρ)$ possesses some eigenvalue whose magnitude equals the matrix dimension $n$. The purpose of the present paper is to examine eigenvalue bifurcations in both a qualitative and a quantitative manner, and to discuss connections between bifurcations and the borderline curves.
△ Less
Submitted 18 May, 2020;
originally announced May 2020.
-
Optimizing Vessel Trajectory Compression
Authors:
Giannis Fikioris,
Kostas Patroumpas,
Alexander Artikis
Abstract:
In previous work we introduced a trajectory detection module that can provide summarized representations of vessel trajectories by consuming AIS positional messages online. This methodology can provide reliable trajectory synopses with little deviations from the original course by discarding at least 70% of the raw data as redundant. However, such trajectory compression is very sensitive to parame…
▽ More
In previous work we introduced a trajectory detection module that can provide summarized representations of vessel trajectories by consuming AIS positional messages online. This methodology can provide reliable trajectory synopses with little deviations from the original course by discarding at least 70% of the raw data as redundant. However, such trajectory compression is very sensitive to parametrization. In this paper, our goal is to fine-tune the selection of these parameter values. We take into account the type of each vessel in order to provide a suitable configuration that can yield improved trajectory synopses, both in terms of approximation error and compression ratio. Furthermore, we employ a genetic algorithm converging to a suitable configuration per vessel type. Our tests against a publicly available AIS dataset have shown that compression efficiency is comparable or even better than the one with default parametrization without resorting to a laborious data inspection.
△ Less
Submitted 11 May, 2020;
originally announced May 2020.
-
Alleviating Oscillatory Approximate-Kernel Solutions for Cylindrical Antennas Embedded in a Conducting Medium: a Numerical and Asymptotic Study
Authors:
Th. K. Mavrogordatos,
C. Mystilidis,
P. J. Papakanellos,
G. Fikioris
Abstract:
We alleviate the unnatural oscillations occurring in the current distribution along a linear cylindrical antenna center-driven by a delta-function generator and embedded in a conducting medium. The intensely fluctuating current arises as a small-$z_0$ asymptotic (or numerical) solution of the classical integral equations of antenna theory, for a cylindrical dipole of infinite (or finite) length, w…
▽ More
We alleviate the unnatural oscillations occurring in the current distribution along a linear cylindrical antenna center-driven by a delta-function generator and embedded in a conducting medium. The intensely fluctuating current arises as a small-$z_0$ asymptotic (or numerical) solution of the classical integral equations of antenna theory, for a cylindrical dipole of infinite (or finite) length, where $z_0$ is the discretization length. To alleviate the oscillations, we employ an appropriate effective current further to the recent remedy of oscillations attained for a perfectly conducting linear cylindrical antenna of finite length for the case where the surrounding medium is free space. We derive asymptotic formulas for the infinite antenna which are put to numerical test, and point to the physical significance of the effective current which transcends a mere computational device.
△ Less
Submitted 21 February, 2020; v1 submitted 25 January, 2020;
originally announced January 2020.
-
On the Application of Numerical Methods to Hallen's Equation: The Case of a Lossy Medium
Authors:
Christos Mystilidis,
Panagiotis J. Papakanellos,
George Fikioris,
Themistoklis K. Mavrogordatos
Abstract:
A previous paper analyzed in detail the difficulties associated with the application of numerical methods to Hallen's integral equation with the approximate kernel for the case of a lossless surrounding medium. The present paper extends to the case where the medium is conducting and points out similarities and differences between the two cases. Our main device is an analytical/asymptotic study of…
▽ More
A previous paper analyzed in detail the difficulties associated with the application of numerical methods to Hallen's integral equation with the approximate kernel for the case of a lossless surrounding medium. The present paper extends to the case where the medium is conducting and points out similarities and differences between the two cases. Our main device is an analytical/asymptotic study of the antenna of infinite length.
△ Less
Submitted 16 January, 2020;
originally announced January 2020.
-
An Effective-Current Approach for Hallén's Equation in Center-Fed Dipole Antennas with Finite Conductivity
Authors:
Themistoklis K. Mavrogordatos,
Anastasios Papathanasopoulos,
George Fikioris
Abstract:
We propose a remedy for the unphysical oscillations arising in the current distribution of carbon nanotube and imperfectly conducting antennas center-driven by a delta-function generator when the approximate kernel is used. We do so by formulating an effective current, which was studied in detail in a 2011 and a 2013 paper for a perfectly conducting linear cylindrical antenna of infinite length, w…
▽ More
We propose a remedy for the unphysical oscillations arising in the current distribution of carbon nanotube and imperfectly conducting antennas center-driven by a delta-function generator when the approximate kernel is used. We do so by formulating an effective current, which was studied in detail in a 2011 and a 2013 paper for a perfectly conducting linear cylindrical antenna of infinite length, with application to the finite-length antenna. We discuss our results in connection with the perfectly conducting antenna, providing perturbative corrections to the current distribution for a large conductance, as well as presenting a delta-sequence and the field of a Hertzian dipole for the effective current in the limit of vanishing conductance. To that end, we employ both analytical tools and numerical methods to compare with experimental results.
△ Less
Submitted 21 October, 2019; v1 submitted 20 February, 2019;
originally announced February 2019.
-
Double, borderline, and extraordinary eigenvalues of Kac-Murdock-Szegö matrices with a complex parameter
Authors:
George Fikioris,
Themistoklis K. Mavrogordatos
Abstract:
For all sufficiently large complex $ρ$, and for arbitrary matrix dimension $n$, it is shown that the Kac--Murdock--Szegő matrix $K_n(ρ)=\left[ρ^{|j-k|}\right]_{j,k=1}^{n}$ possesses exactly two eigenvalues whose magnitude is larger than $n$. We discuss a number of properties of the two "extraordinary" eigenvalues. Conditions are developed that, given $n$, allow us-without actually computing eigenv…
▽ More
For all sufficiently large complex $ρ$, and for arbitrary matrix dimension $n$, it is shown that the Kac--Murdock--Szegő matrix $K_n(ρ)=\left[ρ^{|j-k|}\right]_{j,k=1}^{n}$ possesses exactly two eigenvalues whose magnitude is larger than $n$. We discuss a number of properties of the two "extraordinary" eigenvalues. Conditions are developed that, given $n$, allow us-without actually computing eigenvalues-to find all values $ρ$ that give rise to eigenvalues of magnitude $n$, termed "borderline" eigenvalues. The aforementioned values of $ρ$ form two closed curves in the complex-$ρ$ plane. We describe these curves, which are $n$-dependent, in detail. An interesting borderline case arises when an eigenvalue of $K_n(ρ)$ equals $-n$: apart from certain exceptional cases, this occurs if and only if the eigenvalue is a double one; and if and only if the point $ρ$ is a cusp-like singularity of one of the two closed curves.
△ Less
Submitted 12 April, 2019; v1 submitted 16 December, 2018;
originally announced December 2018.
-
On the asymptotics of a cotangent sum related to the Estermann zeta function
Authors:
George Fikioris
Abstract:
The sum $c_0(1/k)=-\sum_{m=1}^{k-1}(m/k)\cot(mπ/k)$ is related to the Estermann zeta function. A recent paper computes the first two terms of the large-$k$ asymptotic expansion of $c_0(1/k)$. Using the Poisson summation formula for finite sums, we find three additional terms.
The sum $c_0(1/k)=-\sum_{m=1}^{k-1}(m/k)\cot(mπ/k)$ is related to the Estermann zeta function. A recent paper computes the first two terms of the large-$k$ asymptotic expansion of $c_0(1/k)$. Using the Poisson summation formula for finite sums, we find three additional terms.
△ Less
Submitted 23 July, 2018;
originally announced July 2018.
-
Spectral properties of Kac-Murdock-Szegö matrices with a complex parameter
Authors:
George Fikioris
Abstract:
When $0\lt ρ\lt 1$, the Kac-Murdock-Szegö matrix $K_n(ρ)=\left[ρ^{\lvert j-k \rvert}\right]_{j,k=1}^n$ is a Toeplitz correlation matrix with many applications and very well known spectral properties. We study the eigenvalues and eigenvectors of $K_n(ρ)$ for the general case where $ρ$ is complex, pointing out similarities and differences to the case $0\lt ρ\lt 1$. We then specialize our results to…
▽ More
When $0\lt ρ\lt 1$, the Kac-Murdock-Szegö matrix $K_n(ρ)=\left[ρ^{\lvert j-k \rvert}\right]_{j,k=1}^n$ is a Toeplitz correlation matrix with many applications and very well known spectral properties. We study the eigenvalues and eigenvectors of $K_n(ρ)$ for the general case where $ρ$ is complex, pointing out similarities and differences to the case $0\lt ρ\lt 1$. We then specialize our results to real $ρ$ with $ρ\gt 1$, emphasizing the continuity of the eigenvalues as functions of $ρ$. For $ρ\gt 1$, we develop simple approximate formulas for the eigenvalues and pinpoint all eigenvalues' locations. Our study starts from a certain polynomial whose zeros are connected to the eigenvalues by elementary formulas. We discuss relations of our results to earlier results of W. F. Trench.
△ Less
Submitted 22 April, 2018;
originally announced April 2018.
-
Suboscillations with arbitrary shape
Authors:
Ioannis Chremmos,
Yujie Chen,
George Fikioris
Abstract:
We report a method for constructing bandpass functions that approximate a given analytic function with arbitrary accuracy over a finite interval. A corollary is that bandpass functions can be obtained that oscillate arbitrarily slower than their minimum frequency component, a counter-intuitive phenomenon known as suboscillations.
We report a method for constructing bandpass functions that approximate a given analytic function with arbitrary accuracy over a finite interval. A corollary is that bandpass functions can be obtained that oscillate arbitrarily slower than their minimum frequency component, a counter-intuitive phenomenon known as suboscillations.
△ Less
Submitted 8 May, 2017;
originally announced May 2017.
-
Superoscillations with arbitrary polynomial shape
Authors:
Ioannis Chremmos,
George Fikioris
Abstract:
We present a method for constructing superoscillatory functions the superoscillatory part of which approximates a given polynomial with arbitrarily small error in a fixed interval. These functions are obtained as the product of the polynomial with a sufficiently flat, bandlimited envelope function whose Fourier transform has at least N-1 continuous derivatives and an N-th derivative of bounded var…
▽ More
We present a method for constructing superoscillatory functions the superoscillatory part of which approximates a given polynomial with arbitrarily small error in a fixed interval. These functions are obtained as the product of the polynomial with a sufficiently flat, bandlimited envelope function whose Fourier transform has at least N-1 continuous derivatives and an N-th derivative of bounded variation, N being the order of the polynomial. Polynomials of arbitrarily high order can be approximated if the Fourier transform of the envelope is smooth, i.e. a bump function.
△ Less
Submitted 19 April, 2015;
originally announced April 2015.