-
A 3.3904-Competitive Online Algorithm for List Update with Uniform Costs
Authors:
Mateusz Basiak,
Marcin Bienkowski,
Martin Böhm,
Marek Chrobak,
Łukasz Jeż,
Jiří Sgall,
Agnieszka Tatarczuk
Abstract:
We consider the List Update problem where the cost of each swap is assumed to be 1. This is in contrast to the ``standard'' model, in which an algorithm is allowed to swap the requested item with previous items for free. We construct an online algorithm Full-Or-Partial-Move (FPM), whose competitive ratio is at most $3.3904$, improving over the previous best known bound of $4$.
We consider the List Update problem where the cost of each swap is assumed to be 1. This is in contrast to the ``standard'' model, in which an algorithm is allowed to swap the requested item with previous items for free. We construct an online algorithm Full-Or-Partial-Move (FPM), whose competitive ratio is at most $3.3904$, improving over the previous best known bound of $4$.
△ Less
Submitted 29 April, 2025; v1 submitted 21 March, 2025;
originally announced March 2025.
-
Online Disjoint Set Covers: Randomization is not Necessary
Authors:
Marcin Bienkowski,
Jarosław Byrka,
Łukasz Jeż
Abstract:
In the online disjoint set covers problem, the edges of a hypergraph are revealed online, and the goal is to partition them into a maximum number of disjoint set covers. That is, n nodes of a hypergraph are given at the beginning, and then a sequence of hyperedges (subsets of [n]) is presented to an algorithm. For each hyperedge, an online algorithm must assign a color (an integer). Once an input…
▽ More
In the online disjoint set covers problem, the edges of a hypergraph are revealed online, and the goal is to partition them into a maximum number of disjoint set covers. That is, n nodes of a hypergraph are given at the beginning, and then a sequence of hyperedges (subsets of [n]) is presented to an algorithm. For each hyperedge, an online algorithm must assign a color (an integer). Once an input terminates, the gain of the algorithm is the number of colors that correspond to valid set covers (i.e., the union of hyperedges that have that color contains all n nodes).
We present a deterministic online algorithm that is O(log^2 n)-competitive, exponentially improving on the previous bound of O(n) and matching the performance of the best randomized algorithm by Emek et al. [ESA 2019].
For color selection, our algorithm uses a novel potential function, which can be seen as an online counterpart of the derandomization method of conditional probabilities and pessimistic estimators. There are only a few cases where derandomization has been successfully used in the field of online algorithms. In contrast to previous approaches, our result extends to the following new challenges: (i) the potential function derandomizes not only the Chernoff bound, but also the coupon collector's problem, (ii) the value of OPT of the maximization problem is not bounded a priori, and (iii) we do not produce a fractional solution first, but work directly on the input.
△ Less
Submitted 10 January, 2025; v1 submitted 23 April, 2024;
originally announced April 2024.
-
Lower bounds on the performance of online algorithms for relaxed packing problems
Authors:
János Balogh,
György Dósa,
Leah Epstein,
Łukasz Jeż
Abstract:
We prove new lower bounds for suitable competitive ratio measures of two relaxed online packing problems: online removable multiple knapsack, and a recently introduced online minimum peak appointment scheduling problem. The high level objective in both problems is to pack arriving items of sizes at most 1 into bins of capacity 1 as efficiently as possible, but the exact formalizations differ. In t…
▽ More
We prove new lower bounds for suitable competitive ratio measures of two relaxed online packing problems: online removable multiple knapsack, and a recently introduced online minimum peak appointment scheduling problem. The high level objective in both problems is to pack arriving items of sizes at most 1 into bins of capacity 1 as efficiently as possible, but the exact formalizations differ. In the appointment scheduling problem, every item has to be assigned to a position, which can be seen as a time interval during a workday of length 1. That is, items are not assigned to bins, but only once all the items are processed, the optimal number of bins subject to chosen positions is determined, and this is the cost of the online algorithm. On the other hand, in the removable knapsack problem there is a fixed number of bins, and the goal of packing items, which consists in choosing a particular bin for every packed item (and nothing else), is to pack as valuable a subset as possible. In this last problem it is possible to reject items, that is, deliberately not pack them, as well as to remove packed items at any later point in time, which adds flexibility to the problem.
△ Less
Submitted 16 January, 2022;
originally announced January 2022.
-
Unbounded lower bound for k-server against weak adversaries
Authors:
Marcin Bienkowski,
Jarosław Byrka,
Christian Coester,
Łukasz Jeż
Abstract:
We study the resource augmented version of the $k$-server problem, also known as the $k$-server problem against weak adversaries or the $(h,k)$-server problem. In this setting, an online algorithm using $k$ servers is compared to an offline algorithm using $h$ servers, where $h\le k$. For uniform metrics, it has been known since the seminal work of Sleator and Tarjan (1985) that for any $ε>0$, the…
▽ More
We study the resource augmented version of the $k$-server problem, also known as the $k$-server problem against weak adversaries or the $(h,k)$-server problem. In this setting, an online algorithm using $k$ servers is compared to an offline algorithm using $h$ servers, where $h\le k$. For uniform metrics, it has been known since the seminal work of Sleator and Tarjan (1985) that for any $ε>0$, the competitive ratio drops to a constant if $k=(1+ε) \cdot h$. This result was later generalized to weighted stars (Young 1994) and trees of bounded depth (Bansal et al. 2017). The main open problem for this setting is whether a similar phenomenon occurs on general metrics.
We resolve this question negatively. With a simple recursive construction, we show that the competitive ratio is at least $Ω(\log \log h)$, even as $k\to\infty$. Our lower bound holds for both deterministic and randomized algorithms. It also disproves the existence of a competitive algorithm for the infinite server problem on general metrics.
△ Less
Submitted 20 April, 2020; v1 submitted 4 November, 2019;
originally announced November 2019.
-
Better Bounds for Online Line Chasing
Authors:
Marcin Bienkowski,
Jarosław Byrka,
Marek Chrobak,
Christian Coester,
Łukasz Jeż,
Elias Koutsoupias
Abstract:
We study online competitive algorithms for the \emph{line chasing problem} in Euclidean spaces $\reals^d$, where the input consists of an initial point $P_0$ and a sequence of lines $X_1,X_2,...,X_m$, revealed one at a time. At each step $t$, when the line $X_t$ is revealed, the algorithm must determine a point $P_t\in X_t$. An online algorithm is called $c$-competitive if for any input sequence t…
▽ More
We study online competitive algorithms for the \emph{line chasing problem} in Euclidean spaces $\reals^d$, where the input consists of an initial point $P_0$ and a sequence of lines $X_1,X_2,...,X_m$, revealed one at a time. At each step $t$, when the line $X_t$ is revealed, the algorithm must determine a point $P_t\in X_t$. An online algorithm is called $c$-competitive if for any input sequence the path $P_0, P_1,...,P_m$ it computes has length at most $c$ times the optimum path. The line chasing problem is a variant of a more general convex body chasing problem, where the sets $X_t$ are arbitrary convex sets.
To date, the best competitive ratio for the line chasing problem was $28.1$, even in the plane. We significantly improve this bound, by providing a~$3$-competitive algorithm for any dimension $d$. We also improve the lower bound on the competitive ratio, from $1.412$ to $1.5358$.
△ Less
Submitted 19 September, 2019; v1 submitted 22 November, 2018;
originally announced November 2018.
-
Slaying Hydrae: Improved Bounds for Generalized k-Server in Uniform Metrics
Authors:
Marcin Bienkowski,
Łukasz Jeż,
Paweł Schmidt
Abstract:
The generalized $k$-server problem is an extension of the weighted $k$-server problem, which in turn extends the classic $k$-server problem. In the generalized $k$-server problem, each of $k$ servers $s_1, \dots, s_k$ remains in its own metric space $M_i$. A request is a tuple $(r_1,\dots,r_k)$, where $r_i \in M_i$, and to service it, an algorithm needs to move at least one server $s_i$ to the poi…
▽ More
The generalized $k$-server problem is an extension of the weighted $k$-server problem, which in turn extends the classic $k$-server problem. In the generalized $k$-server problem, each of $k$ servers $s_1, \dots, s_k$ remains in its own metric space $M_i$. A request is a tuple $(r_1,\dots,r_k)$, where $r_i \in M_i$, and to service it, an algorithm needs to move at least one server $s_i$ to the point $r_i$. The objective is to minimize the total distance traveled by all servers.
In this paper, we focus on the generalized $k$-server problem for the case where all $M_i$ are uniform metrics. We show an $O(k^2 \cdot \log k)$-competitive randomized algorithm improving over a recent result by Bansal et al. [SODA 2018], who gave an $O(k^3 \cdot \log k)$-competitive algorithm. To this end, we define an abstract online problem, called Hydra game, and we show that a randomized solution of low cost to this game implies a randomized algorithm to the generalized $k$-server problem with low competitive ratio.
We also show that no randomized algorithm can achieve competitive ratio lower than $Ω(k)$, thus improving the lower bound of $Ω(k / \log^2 k)$ by Bansal et al.
△ Less
Submitted 17 September, 2019; v1 submitted 1 October, 2018;
originally announced October 2018.
-
A $φ$-Competitive Algorithm for Scheduling Packets with Deadlines
Authors:
Pavel Veselý,
Marek Chrobak,
Łukasz Jeż,
Jiří Sgall
Abstract:
In the online packet scheduling problem with deadlines (PacketSchD, for short), the goal is to schedule transmissions of packets that arrive over time in a network switch and need to be sent across a link. Each packet has a deadline, representing its urgency, and a non-negative weight, that represents its priority. Only one packet can be transmitted in any time slot, so if the system is overloaded…
▽ More
In the online packet scheduling problem with deadlines (PacketSchD, for short), the goal is to schedule transmissions of packets that arrive over time in a network switch and need to be sent across a link. Each packet has a deadline, representing its urgency, and a non-negative weight, that represents its priority. Only one packet can be transmitted in any time slot, so if the system is overloaded, some packets will inevitably miss their deadlines and be dropped. In this scenario, the natural objective is to compute a transmission schedule that maximizes the total weight of packets that are successfully transmitted. The problem is inherently online, with the scheduling decisions made without the knowledge of future packet arrivals. The central problem concerning PacketSchD, that has been a subject of intensive study since 2001, is to determine the optimal competitive ratio of online algorithms, namely the worst-case ratio between the optimum total weight of a schedule (computed by an offline algorithm) and the weight of a schedule computed by a (deterministic) online algorithm.
We solve this open problem by presenting a $φ$-competitive online algorithm for PacketSchD (where $φ\approx 1.618$ is the golden ratio), matching the previously established lower bound.
△ Less
Submitted 20 October, 2023; v1 submitted 18 July, 2018;
originally announced July 2018.
-
Scheduling under dynamic speed-scaling for minimizing weighted completion time and energy consumption
Authors:
Christoph Dürr,
Łukasz Jeż,
Oscar C. Vásquez
Abstract:
Since a few years there is an increasing interest in minimizing the energy consumption of computing systems. However in a shared computing system, users want to optimize their experienced quality of service, at the price of a high energy consumption. In this work, we address the problem of optimizing and designing mechanisms for a linear combination of weighted completion time and energy consumpti…
▽ More
Since a few years there is an increasing interest in minimizing the energy consumption of computing systems. However in a shared computing system, users want to optimize their experienced quality of service, at the price of a high energy consumption. In this work, we address the problem of optimizing and designing mechanisms for a linear combination of weighted completion time and energy consumption on a single machine with dynamic speed-scaling. We show that minimizing linear combination reduces to a unit speed scheduling problem under a polynomial penalty function. In the mechanism design setting, we define a cost share mechanism and studied its properties, showing that it is truthful and the overcharging of total cost share is bounded by a constant.
△ Less
Submitted 29 May, 2018;
originally announced May 2018.
-
On Packet Scheduling with Adversarial Jamming and Speedup
Authors:
Martin Böhm,
Łukasz Jeż,
Jiří Sgall,
Pavel Veselý
Abstract:
In Packet Scheduling with Adversarial Jamming packets of arbitrary sizes arrive over time to be transmitted over a channel in which instantaneous jamming errors occur at times chosen by the adversary and not known to the algorithm. The transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. An online algorithm maximizes the total size of packets…
▽ More
In Packet Scheduling with Adversarial Jamming packets of arbitrary sizes arrive over time to be transmitted over a channel in which instantaneous jamming errors occur at times chosen by the adversary and not known to the algorithm. The transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. An online algorithm maximizes the total size of packets it successfully transmits and the goal is to develop an algorithm with the lowest possible asymptotic competitive ratio, where the additive constant may depend on packet sizes.
Our main contribution is a universal algorithm that works for any speedup and packet sizes and, unlike previous algorithms for the problem, it does not need to know these properties in advance. We show that this algorithm guarantees 1-competitiveness with speedup 4, making it the first known algorithm to maintain 1-competitiveness with a moderate speedup in the general setting of arbitrary packet sizes. We also prove a lower bound of $φ+1\approx 2.618$ on the speedup of any 1-competitive deterministic algorithm, showing that our algorithm is close to the optimum.
Additionally, we formulate a general framework for analyzing our algorithm locally and use it to show upper bounds on its competitive ratio for speedups in $[1,4)$ and for several special cases, recovering some previously known results, each of which had a dedicated proof. In particular, our algorithm is 3-competitive without speedup, matching both the (worst-case) performance of the algorithm by Jurdzinski et al. and the lower bound by Anta et al.
△ Less
Submitted 6 August, 2018; v1 submitted 19 May, 2017;
originally announced May 2017.
-
Logarithmic price of buffer downscaling on line metrics
Authors:
Marcin Bienkowski,
Martin Böhm,
Łukasz Jeż,
Paweł Laskoś-Grabowski,
Jan Marcinkowski,
Jiří Sgall,
Aleksandra Spyra,
Pavel Veselý
Abstract:
We consider the reordering buffer problem on a line consisting of n equidistant points. We show that, for any constant delta, an (offline) algorithm that has a buffer (1-delta) k performs worse by a factor of Omega(log n) than an offline algorithm with buffer k. In particular, this demonstrates that the O(log n)-competitive online algorithm MovingPartition by Gamzu and Segev (ACM Trans. on Algorit…
▽ More
We consider the reordering buffer problem on a line consisting of n equidistant points. We show that, for any constant delta, an (offline) algorithm that has a buffer (1-delta) k performs worse by a factor of Omega(log n) than an offline algorithm with buffer k. In particular, this demonstrates that the O(log n)-competitive online algorithm MovingPartition by Gamzu and Segev (ACM Trans. on Algorithms, 6(1), 2009) is essentially optimal against any offline algorithm with a slightly larger buffer.
△ Less
Submitted 22 July, 2017; v1 submitted 16 October, 2016;
originally announced October 2016.
-
The $(h,k)$-Server Problem on Bounded Depth Trees
Authors:
Nikhil Bansal,
Marek Eliáš,
Łukasz Jeż,
Grigorios Koumoutsos
Abstract:
We study the $k$-server problem in the resource augmentation setting i.e., when the performance of the online algorithm with $k$ servers is compared to the offline optimal solution with $h \leq k$ servers. The problem is very poorly understood beyond uniform metrics. For this special case, the classic $k$-server algorithms are roughly $(1+1/ε)$-competitive when $k=(1+ε) h$, for any $ε>0$. Surprisi…
▽ More
We study the $k$-server problem in the resource augmentation setting i.e., when the performance of the online algorithm with $k$ servers is compared to the offline optimal solution with $h \leq k$ servers. The problem is very poorly understood beyond uniform metrics. For this special case, the classic $k$-server algorithms are roughly $(1+1/ε)$-competitive when $k=(1+ε) h$, for any $ε>0$. Surprisingly however, no $o(h)$-competitive algorithm is known even for HSTs of depth 2 and even when $k/h$ is arbitrarily large.
We obtain several new results for the problem. First we show that the known $k$-server algorithms do not work even on very simple metrics. In particular, the Double Coverage algorithm has competitive ratio $Ω(h)$ irrespective of the value of $k$, even for depth-2 HSTs. Similarly the Work Function Algorithm, that is believed to be optimal for all metric spaces when $k=h$, has competitive ratio $Ω(h)$ on depth-3 HSTs even if $k=2h$. Our main result is a new algorithm that is $O(1)$-competitive for constant depth trees, whenever $k =(1+ε)h$ for any $ε> 0$. Finally, we give a general lower bound that any deterministic online algorithm has competitive ratio at least 2.4 even for depth-2 HSTs and when $k/h$ is arbitrarily large. This gives a surprising qualitative separation between uniform metrics and depth-2 HSTs for the $(h,k)$-server problem, and gives the strongest known lower bound for the problem on general metrics.
△ Less
Submitted 11 April, 2017; v1 submitted 30 August, 2016;
originally announced August 2016.
-
Online Packet Scheduling with Bounded Delay and Lookahead
Authors:
Martin Böhm,
Marek Chrobak,
Łukasz Jeż,
Fei Li,
Jiří Sgall,
Pavel Veselý
Abstract:
We study the online bounded-delay packet scheduling problem (BDPS), where packets of unit size arrive at a router over time and need to be transmitted over a network link. Each packet has two attributes: a non-negative weight and a deadline for its transmission. The objective is to maximize the total weight of the transmitted packets. This problem has been well studied in the literature, yet its o…
▽ More
We study the online bounded-delay packet scheduling problem (BDPS), where packets of unit size arrive at a router over time and need to be transmitted over a network link. Each packet has two attributes: a non-negative weight and a deadline for its transmission. The objective is to maximize the total weight of the transmitted packets. This problem has been well studied in the literature, yet its optimal competitive ratio remains unknown: the best upper bound is $1.828$, still quite far from the best lower bound of $φ\approx 1.618$.
In the variant of BDPS with $s$-bounded instances, each packet can be scheduled in at most $s$ consecutive slots, starting at its release time. The lower bound of $φ$ applies even to the special case of $2$-bounded instances, and a $φ$-competitive algorithm for $3$-bounded instances was given in Chin et al. Improving that result, and addressing a question posed by Goldwasser, we present a $φ$-competitive algorithm for $4$-bounded instances.
We also study a variant of BDPS where an online algorithm has the additional power of $1$-lookahead, knowing at time $t$ which packets will arrive at time $t+1$. For BDPS with $1$-lookahead restricted to $2$-bounded instances, we present an online algorithm with competitive ratio $(\sqrt{13} - 1)/2 \approx 1.303$ and we prove a nearly tight lower bound of $(1 + \sqrt{17})/4 \approx 1.281$.
△ Less
Submitted 30 June, 2016;
originally announced June 2016.
-
Online Algorithms for Multi-Level Aggregation
Authors:
Marcin Bienkowski,
Martin Böhm,
Jaroslaw Byrka,
Marek Chrobak,
Christoph Dürr,
Lukáš Folwarczný,
Łukasz Jeż,
Jiří Sgall,
Nguyen Kim Thang,
Pavel Veselý
Abstract:
In the Multi-Level Aggregation Problem (MLAP), requests arrive at the nodes of an edge-weighted tree T, and have to be served eventually. A service is defined as a subtree X of T that contains its root. This subtree X serves all requests that are pending in the nodes of X, and the cost of this service is equal to the total weight of X. Each request also incurs waiting cost between its arrival and…
▽ More
In the Multi-Level Aggregation Problem (MLAP), requests arrive at the nodes of an edge-weighted tree T, and have to be served eventually. A service is defined as a subtree X of T that contains its root. This subtree X serves all requests that are pending in the nodes of X, and the cost of this service is equal to the total weight of X. Each request also incurs waiting cost between its arrival and service times. The objective is to minimize the total waiting cost of all requests plus the total cost of all service subtrees. MLAP is a generalization of some well-studied optimization problems; for example, for trees of depth 1, MLAP is equivalent to the TCP Acknowledgment Problem, while for trees of depth 2, it is equivalent to the Joint Replenishment Problem. Aggregation problem for trees of arbitrary depth arise in multicasting, sensor networks, communication in organization hierarchies, and in supply-chain management. The instances of MLAP associated with these applications are naturally online, in the sense that aggregation decisions need to be made without information about future requests.
Constant-competitive online algorithms are known for MLAP with one or two levels. However, it has been open whether there exist constant competitive online algorithms for trees of depth more than 2. Addressing this open problem, we give the first constant competitive online algorithm for networks of arbitrary (fixed) number of levels. The competitive ratio is O(D^4 2^D), where D is the depth of T. The algorithm works for arbitrary waiting cost functions, including the variant with deadlines.
We also show several additional lower and upper bound results for some special cases of MLAP, including the Single-Phase variant and the case when the tree is a path.
△ Less
Submitted 28 December, 2016; v1 submitted 9 July, 2015;
originally announced July 2015.
-
Mechanism design for aggregating energy consumption and quality of service in speed scaling scheduling
Authors:
Christoph Dürr,
Łukasz Jeż,
Óscar C. Vásquez
Abstract:
We consider a strategic game, where players submit jobs to a machine that executes all jobs in a way that minimizes energy while respecting the given deadlines. The energy consumption is then charged to the players in some way. Each player wants to minimize the sum of that charge and of their job's deadline multiplied by a priority weight. Two charging schemes are studied, the proportional cost sh…
▽ More
We consider a strategic game, where players submit jobs to a machine that executes all jobs in a way that minimizes energy while respecting the given deadlines. The energy consumption is then charged to the players in some way. Each player wants to minimize the sum of that charge and of their job's deadline multiplied by a priority weight. Two charging schemes are studied, the proportional cost share which does not always admit pure Nash equilibria, and the marginal cost share, which does always admit pure Nash equilibria, at the price of overcharging by a constant factor.
△ Less
Submitted 10 July, 2017; v1 submitted 14 April, 2015;
originally announced April 2015.
-
Pricing Online Decisions: Beyond Auctions
Authors:
Ilan Reuven Cohen,
Alon Eden,
Amos Fiat,
Łukasz Jeż
Abstract:
We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the…
▽ More
We consider dynamic pricing schemes in online settings where selfish agents generate online events. Previous work on online mechanisms has dealt almost entirely with the goal of maximizing social welfare or revenue in an auction settings. This paper deals with quite general settings and minimizing social costs. We show that appropriately computed posted prices allow one to achieve essentially the same performance as the best online algorithm. This holds in a wide variety of settings. Unlike online algorithms that learn about the event, and then make enforceable decisions, prices are posted without knowing the future events or even the current event, and are thus inherently dominant strategy incentive compatible.
In particular we show that one can give efficient posted price mechanisms for metrical task systems, some instances of the $k$-server problem, and metrical matching problems. We give both deterministic and randomized algorithms. Such posted price mechanisms decrease the social cost dramatically over selfish behavior where no decision incurs a charge. One alluring application of this is reducing the social cost of free parking exponentially.
△ Less
Submitted 5 April, 2015;
originally announced April 2015.
-
Better Approximation Bounds for the Joint Replenishment Problem
Authors:
Marcin Bienkowski,
Jaroslaw Byrka,
Marek Chrobak,
Łukasz Jeż,
Jiří Sgall
Abstract:
The Joint Replenishment Problem (JRP) deals with optimizing shipments of goods from a supplier to retailers through a shared warehouse. Each shipment involves transporting goods from the supplier to the warehouse, at a fixed cost C, followed by a redistribution of these goods from the warehouse to the retailers that ordered them, where transporting goods to a retailer $ρ$ has a fixed cost $c_ρ$. I…
▽ More
The Joint Replenishment Problem (JRP) deals with optimizing shipments of goods from a supplier to retailers through a shared warehouse. Each shipment involves transporting goods from the supplier to the warehouse, at a fixed cost C, followed by a redistribution of these goods from the warehouse to the retailers that ordered them, where transporting goods to a retailer $ρ$ has a fixed cost $c_ρ$. In addition, retailers incur waiting costs for each order. The objective is to minimize the overall cost of satisfying all orders, namely the sum of all shipping and waiting costs.
JRP has been well studied in Operations Research and, more recently, in the area of approximation algorithms. For arbitrary waiting cost functions, the best known approximation ratio is 1.8. This ratio can be reduced to 1.574 for the JRP-D model, where there is no cost for waiting but orders have deadlines. As for hardness results, it is known that the problem is APX-hard and that the natural linear program for JRP has integrality gap at least 1.245. Both results hold even for JRP-D. In the online scenario, the best lower and upper bounds on the competitive ratio are 2.64 and 3, respectively. The lower bound of 2.64 applies even to the restricted version of JRP, denoted JRP-L, where the waiting cost function is linear.
We provide several new approximation results for JRP. In the offline case, we give an algorithm with ratio 1.791, breaking the barrier of 1.8. In the online case, we show a lower bound of 2.754 on the competitive ratio for JRP-L (and thus JRP as well), improving the previous bound of 2.64. We also study the online version of JRP-D, for which we prove that the optimal competitive ratio is 2.
△ Less
Submitted 9 July, 2013;
originally announced July 2013.
-
Better Bounds for Incremental Frequency Allocation in Bipartite Graphs
Authors:
Marek Chrobak,
Łukasz Jeż,
Jiří Sgall
Abstract:
We study frequency allocation in wireless networks. A wireless network is modeled by an undirected graph, with vertices corresponding to cells. In each vertex we have a certain number of requests, and each of those requests must be assigned a different frequency. Edges represent conflicts between cells, meaning that frequencies in adjacent vertices must be different as well. The objective is to mi…
▽ More
We study frequency allocation in wireless networks. A wireless network is modeled by an undirected graph, with vertices corresponding to cells. In each vertex we have a certain number of requests, and each of those requests must be assigned a different frequency. Edges represent conflicts between cells, meaning that frequencies in adjacent vertices must be different as well. The objective is to minimize the total number of used frequencies.
The offline version of the problem is known to be NP-hard. In the incremental version, requests for frequencies arrive over time and the algorithm is required to assign a frequency to a request as soon as it arrives. Competitive incremental algorithms have been studied for several classes of graphs. For paths, the optimal (asymptotic) ratio is known to be 4/3, while for hexagonal-cell graphs it is between 1.5 and 1.9126. For k-colorable graphs, the ratio of (k+1)/2 can be achieved.
In this paper, we prove nearly tight bounds on the asymptotic competitive ratio for bipartite graphs, showing that it is between 1.428 and 1.433. This improves the previous lower bound of 4/3 and upper bound of 1.5. Our proofs are based on reducing the incremental problem to a purely combinatorial (equivalent) problem of constructing set families with certain intersection properties.
△ Less
Submitted 16 February, 2011;
originally announced February 2011.
-
One to Rule Them All: a General Randomized Algorithm for Buffer Management with Bounded Delay
Authors:
Łukasz Jeż
Abstract:
We give a memoryless scale-invariant randomized algorithm for the Buffer Management with Bounded Delay problem that is e/(e-1)-competitive against an adaptive adversary, together with better performance guarantees for many restricted variants, including the s-bounded instances. In particular, our algorithm attains the optimum competitive ratio of 4/3 on 2-bounded instances.
Both the algorithm an…
▽ More
We give a memoryless scale-invariant randomized algorithm for the Buffer Management with Bounded Delay problem that is e/(e-1)-competitive against an adaptive adversary, together with better performance guarantees for many restricted variants, including the s-bounded instances. In particular, our algorithm attains the optimum competitive ratio of 4/3 on 2-bounded instances.
Both the algorithm and its analysis are applicable to a more general problem, called Collecting Items, in which only the relative order between packets' deadlines is known. Our algorithm is the optimal randomized memoryless algorithm against adaptive adversary for that problem in a strong sense.
While some of provided upper bounds were already known, in general, they were attained by several different algorithms.
△ Less
Submitted 7 February, 2011;
originally announced February 2011.
-
Randomised Buffer Management with Bounded Delay against Adaptive Adversary
Authors:
Łukasz Jeż
Abstract:
We give a new analysis of the RMix algorithm by Chin et al. for the Buffer Management with Bounded Delay problem (or online scheduling of unit jobs to maximise weighted throughput). Unlike the original proof of e/(e-1)-competitiveness, the new one holds even in adaptive-online adversary model. In fact, the proof works also for a slightly more general problem studied by Bie{ń}kowski et al.
We give a new analysis of the RMix algorithm by Chin et al. for the Buffer Management with Bounded Delay problem (or online scheduling of unit jobs to maximise weighted throughput). Unlike the original proof of e/(e-1)-competitiveness, the new one holds even in adaptive-online adversary model. In fact, the proof works also for a slightly more general problem studied by Bie{ń}kowski et al.
△ Less
Submitted 8 February, 2011; v1 submitted 12 July, 2009;
originally announced July 2009.
-
A 4/3-competitive randomized algorithm for online scheduling of packets with agreeable deadlines
Authors:
Łukasz Jeż
Abstract:
In 2005 Li et al. gave a phi-competitive deterministic online algorithm for scheduling of packets with agreeable deadlines with a very interesting analysis. This is known to be optimal due to a lower bound by Hajek. We claim that the algorithm by Li et al. can be slightly simplified, while retaining its competitive ratio. Then we introduce randomness to the modified algorithm and argue that the…
▽ More
In 2005 Li et al. gave a phi-competitive deterministic online algorithm for scheduling of packets with agreeable deadlines with a very interesting analysis. This is known to be optimal due to a lower bound by Hajek. We claim that the algorithm by Li et al. can be slightly simplified, while retaining its competitive ratio. Then we introduce randomness to the modified algorithm and argue that the competitive ratio against oblivious adversary is at most 4/3. Note that this still leaves a gap between the best known lower bound of 5/4 by Chin et al. for randomised algorithms against oblivious adversary.
△ Less
Submitted 3 February, 2010; v1 submitted 25 May, 2009;
originally announced May 2009.
-
Online Scheduling of Bounded Length Jobs to Maximize Throughput
Authors:
Christoph Durr,
Lukasz Jez,
Nguyen Kim Thang
Abstract:
We consider an online scheduling problem, motivated by the issues present at the joints of networks using ATM and TCP/IP. Namely, IP packets have to broken down to small ATM cells and sent out before their deadlines, but cells corresponding to different packets can be interwoven. More formally, we consider the online scheduling problem with preemptions, where each job j is revealed at release ti…
▽ More
We consider an online scheduling problem, motivated by the issues present at the joints of networks using ATM and TCP/IP. Namely, IP packets have to broken down to small ATM cells and sent out before their deadlines, but cells corresponding to different packets can be interwoven. More formally, we consider the online scheduling problem with preemptions, where each job j is revealed at release time r_j, has processing time p_j, deadline d_j and weight w_j. A preempted job can be resumed at any time. The goal is to maximize the total weight of all jobs completed on time. Our main result are as follows: we prove that if all jobs have processing time exactly k, the deterministic competitive ratio is between 2.598 and 5, and when the processing times are at most k, the deterministic competitive ratio is Theta(k/log k).
△ Less
Submitted 14 April, 2009; v1 submitted 12 February, 2009;
originally announced February 2009.
-
Online validation of the pi and pi' failure functions
Authors:
Pawel Gawrychowski,
Artur Jez,
Lukasz Jez
Abstract:
Let pi_w denote the failure function of the Morris-Pratt algorithm for a word w. In this paper we study the following problem: given an integer array A[1..n], is there a word w over arbitrary alphabet such that A[i]=pi_w[i] for all i? Moreover, what is the minimum required cardinality of the alphabet? We give a real time linear algorithm for this problem in the unit-cost RAM model with Θ(log n)…
▽ More
Let pi_w denote the failure function of the Morris-Pratt algorithm for a word w. In this paper we study the following problem: given an integer array A[1..n], is there a word w over arbitrary alphabet such that A[i]=pi_w[i] for all i? Moreover, what is the minimum required cardinality of the alphabet? We give a real time linear algorithm for this problem in the unit-cost RAM model with Θ(log n) bits word size. Our algorithm returns a word w over minimal alphabet such that pi_w = A as well and uses just o(n) words of memory. Then we consider function pi' instead of pi and give an online O(n log n) algorithm for this case. This is the first polynomial algorithm for online version of this problem.
△ Less
Submitted 13 April, 2009; v1 submitted 19 January, 2009;
originally announced January 2009.
-
Generalized Whac-a-Mole
Authors:
Marcin Bienkowski,
Marek Chrobak,
Christoph Durr,
Mathilde Hurand,
Artur Jez,
Lukasz Jez,
Jakub Lopuszanski,
Grzegorz Stachowiak
Abstract:
We consider online competitive algorithms for the problem of collecting weighted items from a dynamic set S, when items are added to or deleted from S over time. The objective is to maximize the total weight of collected items. We study the general version, as well as variants with various restrictions, including the following: the uniform case, when all items have the same weight, the decrement…
▽ More
We consider online competitive algorithms for the problem of collecting weighted items from a dynamic set S, when items are added to or deleted from S over time. The objective is to maximize the total weight of collected items. We study the general version, as well as variants with various restrictions, including the following: the uniform case, when all items have the same weight, the decremental sets, when all items are present at the beginning and only deletion operations are allowed, and dynamic queues, where the dynamic set is ordered and only its prefixes can be deleted (with no restriction on insertions). The dynamic queue case is a generalization of bounded-delay packet scheduling (also referred to as buffer management). We present several upper and lower bounds on the competitive ratio for these variants.
△ Less
Submitted 16 February, 2008; v1 submitted 12 February, 2008;
originally announced February 2008.