-
Algorithmic Delegated Choice: An Annotated Reading List
Authors:
Mohammad T. Hajiaghayi,
Suho Shin
Abstract:
The problem of delegated choice has been of long interest in economics and recently on computer science. We overview a list of papers on delegated choice problem, from classic works to recent papers with algorithmic perspectives.
The problem of delegated choice has been of long interest in economics and recently on computer science. We overview a list of papers on delegated choice problem, from classic works to recent papers with algorithmic perspectives.
△ Less
Submitted 12 August, 2025; v1 submitted 6 August, 2025;
originally announced August 2025.
-
Tokenized Bandit for LLM Decoding and Alignment
Authors:
Suho Shin,
Chenghao Yang,
Haifeng Xu,
Mohammad T. Hajiaghayi
Abstract:
We introduce the tokenized linear bandit (TLB) and multi-armed bandit (TMAB), variants of linear and stochastic multi-armed bandit problems inspired by LLM decoding and alignment. In these problems, at each round $t \in [T]$, a user submits a query (context), and the decision maker (DM) sequentially selects a token irrevocably from a token set. Once the sequence is complete, the DM observes a rand…
▽ More
We introduce the tokenized linear bandit (TLB) and multi-armed bandit (TMAB), variants of linear and stochastic multi-armed bandit problems inspired by LLM decoding and alignment. In these problems, at each round $t \in [T]$, a user submits a query (context), and the decision maker (DM) sequentially selects a token irrevocably from a token set. Once the sequence is complete, the DM observes a random utility from the user, whose expectation is presented by a sequence function mapping the chosen token sequence to a nonnegative real value that depends on the query.
In both problems, we first show that learning is impossible without any structure on the sequence function. We introduce a natural assumption, diminishing distance with more commons (DDMC), and propose algorithms with regret $\tilde{O}(L\sqrt{T})$ and $\tilde{O}(L\sqrt{T^{2/3}})$ for TLB and TMAB, respectively. As a side product, we obtain an (almost) optimality of the greedy decoding for LLM decoding algorithm under DDMC, which justifies the unresaonable effectiveness of greedy decoding in several tasks. This also has an immediate application to decoding-time LLM alignment, when the misaligned utility can be represented as the frozen LLM's utility and a linearly realizable latent function. We finally validate our algorithm's performance empirically as well as verify our assumptions using synthetic and real-world datasets.
△ Less
Submitted 8 June, 2025;
originally announced June 2025.
-
Delegation with Costly Inspection
Authors:
Mohammad T. Hajiaghayi,
Piotr Krysta,
Mohammad Mahdavi,
Suho Shin
Abstract:
We study the problem of delegated choice with inspection cost (DCIC), which is a variant of the delegated choice problem by Kleinberg and Kleinberg (EC'18) as well as an extension of the Pandora's box problem with nonobligatory inspection (PNOI) by Doval (JET'18). In our model, an agent may strategically misreport the proposed element's utility, unlike the standard delegated choice problem which a…
▽ More
We study the problem of delegated choice with inspection cost (DCIC), which is a variant of the delegated choice problem by Kleinberg and Kleinberg (EC'18) as well as an extension of the Pandora's box problem with nonobligatory inspection (PNOI) by Doval (JET'18). In our model, an agent may strategically misreport the proposed element's utility, unlike the standard delegated choice problem which assumes that the agent truthfully reports the utility for the proposed alternative. Thus, the principal needs to inspect the proposed element possibly along with other alternatives to maximize its own utility, given an exogenous cost of inspecting each element. Further, the delegation itself incurs a fixed cost, thus the principal can decide whether to delegate or not and inspect by herself.
We show that DCIC indeed is a generalization of PNOI where the side information from a strategic agent is available at certain cost, implying its NP-hardness by Fu, Li, and Liu (STOC'23). We first consider a costless delegation setting in which the cost of delegation is free. We prove that the maximal mechanism over the pure delegation with a single inspection and an PNOI policy without delegation achieves a $3$-approximation for DCIC with costless delegation, which is further proven to be tight. These results hold even when the cost comes from an arbitrary monotone set function, and can be improved to a $2$-approximation if the cost of inspection is the same for every element. We extend these techniques by presenting a constant factor approximate mechanism for the general setting for rich class of instances.
△ Less
Submitted 12 June, 2025; v1 submitted 8 June, 2025;
originally announced June 2025.
-
Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why is a Lot of Randomness Needed?
Authors:
Mohammad T. Hajiaghayi,
Dariusz R. Kowalski,
Jan Olkowski
Abstract:
We study the problem of reaching agreement in a synchronous distributed system by $n$ autonomous parties, when the communication links from/to faulty parties can omit messages. The faulty parties are selected and controlled by an adaptive, full-information, computationally unbounded adversary. We design a randomized algorithm that works in $O(\sqrt{n}\log^2 n)$ rounds and sends $O(n^2\log^3 n)$ co…
▽ More
We study the problem of reaching agreement in a synchronous distributed system by $n$ autonomous parties, when the communication links from/to faulty parties can omit messages. The faulty parties are selected and controlled by an adaptive, full-information, computationally unbounded adversary. We design a randomized algorithm that works in $O(\sqrt{n}\log^2 n)$ rounds and sends $O(n^2\log^3 n)$ communication bits, where the number of faulty parties is $Θ(n)$. Our result is simultaneously tight for both these measures within polylogarithmic factors: due to the $Ω(n^2)$ lower bound on communication by Abraham et al. (PODC'19) and $Ω(\sqrt{n/\log n})$ lower bound on the number of rounds by Bar-Joseph and Ben-Or (PODC'98). We also quantify how much randomness is necessary and sufficient to reduce time complexity to a certain value, while keeping the communication complexity (nearly) optimal. We prove that no MC algorithm can work in less than $Ω(\frac{n^2}{\max\{R,n\}\log n})$ rounds if it uses less than $O(R)$ calls to a random source, assuming a constant fraction of faulty parties. This can be contrasted with a long line of work on consensus against an {\em adversary limited to polynomial computation time}, thus unable to break cryptographic primitives, culminating in a work by Ghinea et al. (EUROCRYPT'22), where an optimal $O(r)$-round solution with probability $1-(cr)^{-r}$ is given. Our lower bound strictly separates these two regimes, by excluding such results if the adversary is computationally unbounded. On the upper bound side, we show that for $R\in\tilde{O}(n^{3/2})$ there exists an algorithm solving consensus in $\tilde{O}(\frac{n^2}{R})$ rounds with high probability, where tilde notation hides a polylogarithmic factor. The communication complexity of the algorithm does not depend on the amount of randomness $R$ and stays optimal within polylogarithmic factor.
△ Less
Submitted 24 May, 2024; v1 submitted 7 May, 2024;
originally announced May 2024.
-
Optimal Algorithms for Free Order Multiple-Choice Secretary
Authors:
Mohammad Taghi Hajiaghayi,
Dariusz R. Kowalski,
Piotr Krysta,
Jan Olkowski
Abstract:
Suppose we are given integer $k \leq n$ and $n$ boxes labeled $1,\ldots, n$ by an adversary, each containing a number chosen from an unknown distribution. We have to choose an order to sequentially open these boxes, and each time we open the next box in this order, we learn its number. If we reject a number in a box, the box cannot be recalled. Our goal is to accept the $k$ largest of these number…
▽ More
Suppose we are given integer $k \leq n$ and $n$ boxes labeled $1,\ldots, n$ by an adversary, each containing a number chosen from an unknown distribution. We have to choose an order to sequentially open these boxes, and each time we open the next box in this order, we learn its number. If we reject a number in a box, the box cannot be recalled. Our goal is to accept the $k$ largest of these numbers, without necessarily opening all boxes. This is the free order multiple-choice secretary problem. Free order variants were studied extensively for the secretary and prophet problems. Kesselheim, Kleinberg, and Niazadeh KKN (STOC'15) initiated a study of randomness-efficient algorithms (with the cheapest order in terms of used random bits) for the free order secretary problems.
We present an algorithm for free order multiple-choice secretary, which is simultaneously optimal for the competitive ratio and used amount of randomness. I.e., we construct a distribution on orders with optimal entropy $Θ(\log\log n)$ such that a deterministic multiple-threshold algorithm is $1-O(\sqrt{\log k/k})$-competitive. This improves in three ways the previous best construction by KKN, whose competitive ratio is $1 - O(1/k^{1/3}) - o(1)$. Our competitive ratio is (near)optimal for the multiple-choice secretary problem; it works for exponentially larger parameter $k$; and our algorithm is a simple deterministic multiple-threshold algorithm, while that in KKN is randomized. We also prove a corresponding lower bound on the entropy of optimal solutions for the multiple-choice secretary problem, matching entropy of our algorithm, where no such previous lower bound was known.
We obtain our algorithmic results with a host of new techniques, and with these techniques we also improve significantly the previous results of KKN about constructing entropy-optimal distributions for the classic free order secretary.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Online Sampling and Decision Making with Low Entropy
Authors:
Mohammad Taghi Hajiaghayi,
Dariusz R. Kowalski,
Piotr Krysta,
Jan Olkowski
Abstract:
Consider the problem: we are given $n$ boxes, labeled $\{1,2,\ldots, n\}$ by an adversary, each containing a single number chosen from an unknown distribution; these $n$ distributions are not necessarily identical. We are also given an integer $k \leq n$. We have to choose an order in which we will sequentially open these boxes, and each time we open the next box in this order, we learn the number…
▽ More
Consider the problem: we are given $n$ boxes, labeled $\{1,2,\ldots, n\}$ by an adversary, each containing a single number chosen from an unknown distribution; these $n$ distributions are not necessarily identical. We are also given an integer $k \leq n$. We have to choose an order in which we will sequentially open these boxes, and each time we open the next box in this order, we learn the number in the box. Once we reject a number in a box, the box cannot be recalled. Our goal is to accept $k$ of these numbers, without necessarily opening all boxes, such that the accepted numbers are the $k$ largest numbers in the boxes (thus their sum is maximized).
A natural approach to solve such problems is to use randomness to sample randomly ordered elements, however, as indicated in several sources, e.g., Turan et al. NIST'15, Bierhorst et al. Nature'18, pure randomness is hard to get in reality.
We present an algorithm for this problem, which is provably and simultaneously near-optimal with respect to the achieved competitive ratio and the used amount of randomness. In particular, we construct a distribution on the orders with entropy $Θ(\log\log n)$ such that a deterministic multiple-threshold algorithm gives a competitive ratio $1-O(\sqrt{\log k/k})$, for $k < \log n/\log \log n$. Our competitive ratio is simultaneously optimal and uses optimal entropy $Θ(\log\log n)$, improving in three ways the previous best known algorithm, whose competitive ratio is $1 - O(1/k^{1/3}) - o(1)$.
△ Less
Submitted 10 May, 2024; v1 submitted 25 November, 2021;
originally announced November 2021.
-
Fixed Parameter Inapproximability for Clique and SetCover in Time Super-exponential in OPT
Authors:
Mohammad T. Hajiaghayi,
Rohit Khandekar,
Guy Kortsarz
Abstract:
In this paper, we consider proving inapproximability in terms of OPT and thus we base the foundations of fixed parameter inapproximability.
In this paper, we consider proving inapproximability in terms of OPT and thus we base the foundations of fixed parameter inapproximability.
△ Less
Submitted 4 December, 2013; v1 submitted 10 October, 2013;
originally announced October 2013.
-
AdCell: Ad Allocation in Cellular Networks
Authors:
Saeed Alaei,
Mohammad T. Hajiaghayi,
Vahid Liaghat,
Dan Pei,
Barna Saha
Abstract:
With more than four billion usage of cellular phones worldwide, mobile advertising has become an attractive alternative to online advertisements. In this paper, we propose a new targeted advertising policy for Wireless Service Providers (WSPs) via SMS or MMS- namely {\em AdCell}. In our model, a WSP charges the advertisers for showing their ads. Each advertiser has a valuation for specific types o…
▽ More
With more than four billion usage of cellular phones worldwide, mobile advertising has become an attractive alternative to online advertisements. In this paper, we propose a new targeted advertising policy for Wireless Service Providers (WSPs) via SMS or MMS- namely {\em AdCell}. In our model, a WSP charges the advertisers for showing their ads. Each advertiser has a valuation for specific types of customers in various times and locations and has a limit on the maximum available budget. Each query is in the form of time and location and is associated with one individual customer. In order to achieve a non-intrusive delivery, only a limited number of ads can be sent to each customer. Recently, new services have been introduced that offer location-based advertising over cellular network that fit in our model (e.g., ShopAlerts by AT&T) .
We consider both online and offline version of the AdCell problem and develop approximation algorithms with constant competitive ratio. For the online version, we assume that the appearances of the queries follow a stochastic distribution and thus consider a Bayesian setting. Furthermore, queries may come from different distributions on different times. This model generalizes several previous advertising models such as online secretary problem \cite{HKP04}, online bipartite matching \cite{KVV90,FMMM09} and AdWords \cite{saberi05}. ...
△ Less
Submitted 8 January, 2012; v1 submitted 22 December, 2011;
originally announced December 2011.
-
On the Integrality Gap of the Directed-Component Relaxation for Steiner Tree
Authors:
Mohammad Taghi Hajiaghayi,
Shi Li
Abstract:
In this note, we show that the integrality gap of the $k$-Directed-Component- Relaxation($k$-DCR) LP for the Steiner tree problem, introduced by Byrka, Grandoni, Rothvob and Sanita (STOC 2010), is at most $\ln(4)<1.39$. The proof is constructive: we can efficiently find a Steiner tree whose cost is at most $\ln(4)$ times the cost of the optimal fractional $k$-restricted Steiner tree given by the…
▽ More
In this note, we show that the integrality gap of the $k$-Directed-Component- Relaxation($k$-DCR) LP for the Steiner tree problem, introduced by Byrka, Grandoni, Rothvob and Sanita (STOC 2010), is at most $\ln(4)<1.39$. The proof is constructive: we can efficiently find a Steiner tree whose cost is at most $\ln(4)$ times the cost of the optimal fractional $k$-restricted Steiner tree given by the $k$-DCR LP.
△ Less
Submitted 2 December, 2011; v1 submitted 29 November, 2011;
originally announced November 2011.