CSC2556 Lecture 6 Kidney Exchange Cake-Cutting
[Some illustrations due to: Ariel Procaccia]
CSC2556 - Nisarg Shah 1
CSC2556 Lecture 6 Kidney Exchange Cake-Cutting [Some - - PowerPoint PPT Presentation
CSC2556 Lecture 6 Kidney Exchange Cake-Cutting [Some illustrations due to: Ariel Procaccia] CSC2556 - Nisarg Shah 1 Announcements Project proposal Due: Mar 06 by 11:59PM Ill soon put up a few sample project ideas. If you
[Some illustrations due to: Ariel Procaccia]
CSC2556 - Nisarg Shah 1
CSC2556 - Nisarg Shah 2
➢ Due: Mar 06 by 11:59PM ➢ I’ll soon put up a few sample project ideas. ➢ If you have trouble finding a project idea, meet me.
➢ Problem space introduction ➢ High-level research question ➢ Prior work ➢ Detailed goals
CSC2556 - Nisarg Shah 3
4
Donor 2 Patient 2 Donor 1 Patient 1
CSC2556 - Nisarg Shah
by individual hospitals
participating hospitals have little other interaction
match pairs internally, and enroll only hard-to- match pairs into larger exchanges
5 CSC2556 - Nisarg Shah
➢ Vertex = donor-patient pair ➢ Edge = compatibility
➢ Possible strategy: hide some vertices (match internally), and
➢ Utility of agent = # its matched vertices (self-matched +
matched by mechanism)
6 CSC2556 - Nisarg Shah
➢ Input: revealed vertices by agents (edges are public) ➢ Output: matching
vertices irrespective of what other agents do.
7 CSC2556 - Nisarg Shah
8 CSC2556 - Nisarg Shah
9 CSC2556 - Nisarg Shah
mechanism can give a 2 − 𝜗 approximation
➢ No perfect matching exists. ➢ Any algorithm must either leave a blue node or a gray node
unmatched.
10 CSC2556 - Nisarg Shah
mechanism can give a 2 − 𝜗 approximation
➢ Suppose it leaves a blue node unmatched
to return a matching of size 1 when a matching of size 2 exists.
11 CSC2556 - Nisarg Shah
mechanism can give a 2 − 𝜗 approximation
➢ Suppose it leaves a gray node unmatched
to return a matching of size 1 when a matching of size 2 exists.
12 CSC2556 - Nisarg Shah
SP mechanism can give a
6 5 − 𝜗 approximation.
13 CSC2556 - Nisarg Shah
14
➢ Consider matchings that maximize the number of
“internal edges” for each agent.
➢ Among these return, a matching with max overall
cardinality.
CSC2556 - Nisarg Shah
15 CSC2556 - Nisarg Shah
➢ Cannot add more edges to matching ➢ For each edge in optimal matching, one of the two
vertices is in mechanism’s matching
strategyproof for two agents.
16 CSC2556 - Nisarg Shah
17
honest, 𝑁′ = matching when player 1 hides vertices
length cycles, each consisting of alternating 𝑁, 𝑁′ edges
𝑊
1
𝑊
2
𝑁 𝑁 𝑁′ 𝑁′ 𝑁 𝑁′ 𝑁 ∩ 𝑁′ 𝑁 ∩ 𝑁′
CSC2556 - Nisarg Shah
𝑄 and its edges in 𝑁′ by 𝑄′
11, 𝑄22, 𝑄 12 containing edges of 𝑄
among 𝑊
1, among 𝑊 2, and between 𝑊 1- 𝑊 2
➢ Same for 𝑄′11, 𝑄′22, 𝑄′12
11 ≥ 𝑄 11 ′
➢ Property of the algorithm
18 CSC2556 - Nisarg Shah
11 = 𝑄 11 ′
22 = 𝑄 22 ′
12 ≥ 𝑄 12 ′
11 + 𝑄 12
≥ 2 𝑄
11 ′
+ 𝑄
12 ′
= 𝑉1(𝑄′)
19 CSC2556 - Nisarg Shah
11 > 𝑄 11 ′
12 ≥ 𝑄 12 ′
− 2
➢ Every sub-path within 𝑊
2 is of even length
➢ Pair up edges of 𝑄
12 and 𝑄 12 ′ ,
except maybe the first and the last
11 + 𝑄 12
≥ 2 𝑄
11 ′
+ 1 + 𝑄
12 ′
− 2 = 𝑉1 𝑄′ ∎
20
𝑊
1
𝑊
2
CSC2556 - Nisarg Shah
21 CSC2556 - Nisarg Shah
22
➢ Consider matchings that maximize the number of
“internal edges” and do not have any edges between different players on the same side of the partition
➢ Among these return a matching with max cardinality
(need tie breaking)
CSC2556 - Nisarg Shah
23
strategyproof for any number of agents and any partition Π.
CSC2556 - Nisarg Shah
➢ Mix: choose a random partition ➢ Match: Execute MATCH
strategyproof and a 2-approximation.
24 CSC2556 - Nisarg Shah
➢ 𝑁′ is max cardinality on each 𝑊
𝑗, and
➢ σ𝑗 𝑁𝑗𝑗
′ + 1 2 σ𝑗≠𝑘 𝑁𝑗𝑘 ′
≥ σ𝑗 𝑁𝑗𝑗
∗ + 1 2 σ𝑗≠𝑘 |𝑁𝑗𝑘 ∗ |
➢ 𝑁∗∗ = max cardinality on each 𝑊
𝑗
➢ For each path 𝑄 in 𝑁∗Δ𝑁∗∗, add 𝑄 ∩ 𝑁∗∗ to 𝑁′ if 𝑁∗∗ has
more internal edges than 𝑁∗, otherwise add 𝑄 ∩ 𝑁∗ to 𝑁′
➢ For every internal edge 𝑁′ gains relative to 𝑁∗, it loses at
most one edge overall ∎
25 CSC2556 - Nisarg Shah
subject to being max cardinality internally, therefore
𝑗
𝑁𝑗𝑗
Π +
𝑗∈Π1,𝑘∈Π2
𝑁𝑗𝑘
Π ≥ 𝑗
𝑁𝑗𝑗
′ +
𝑗∈Π1,𝑘∈Π2
𝑁𝑗𝑘
′
26 CSC2556 - Nisarg Shah
𝔽 𝑁Π = 1 2𝑜
Π
𝑗
𝑁𝑗𝑗
Π +
𝑗∈Π1,𝑘∈Π2
𝑁𝑗𝑘
Π
≥ 1 2𝑜
Π
𝑗
𝑁𝑗𝑗
′ +
𝑗∈Π1,𝑘∈Π2
𝑁𝑗𝑘
′
=
𝑗
𝑁𝑗𝑗
′ + 1
2𝑜
Π
𝑗∈Π1,𝑘∈Π2
𝑁𝑗𝑘
′
=
𝑗
𝑁𝑗𝑗
′ + 1
2
𝑗≠𝑘
𝑁𝑗𝑘
′
≥
𝑗
𝑁𝑗𝑗
∗ + 1
2
𝑗≠𝑘
𝑁𝑗𝑘
∗
≥ 1 2
𝑗
𝑁𝑗𝑗
∗ + 1
2
𝑗≠𝑘
𝑁𝑗𝑘
∗
= 1 2 𝑁∗ ∎
27 CSC2556 - Nisarg Shah
CSC2556 - Nisarg Shah 28
CSC2556 - Nisarg Shah 29
➢ Heterogeneous: it may be valued
differently by different individuals
➢ Divisible: we can share/divide
it between individuals
➢ Almost without loss of generality
➢ A finite union of disjoint intervals
CSC2556 - Nisarg Shah 30
𝑗 that
is very much like a probability distribution over [0,1]
𝑊
𝑗 𝑌 + 𝑊 𝑗 𝑍 = 𝑊 𝑗 𝑌 ∪ 𝑍
𝑗
0,1 = 1
∃𝑍 ⊆ 𝑌 s.t. 𝑊
𝑗 𝑍 = 𝜇𝑊 𝑗(𝑌)
𝛽 𝜇𝛽 𝛽 β β
𝛽 + 𝛾
CSC2556 - Nisarg Shah 31
∀𝑗 ∈ 𝑂: 𝑊
𝑗 𝐵𝑗 ≥ 1
𝑜
∀𝑗, 𝑘 ∈ 𝑂: 𝑊
𝑗 𝐵𝑗 ≥ 𝑊 𝑗(𝐵𝑘)
CSC2556 - Nisarg Shah 32
𝑗 𝐵𝑗 ≥
Τ 1 𝑜
𝑗 𝐵𝑗 ≥ 𝑊 𝑗 𝐵𝑘
proportionality and EF?
1.
Prop ⇒ EF
2.
EF ⇒ Prop
3.
Equivalent
4.
Incomparable
CSC2556 - Nisarg Shah 33
𝑊
1 𝑌 = 𝑊 1 𝑍 =
Τ 1 2
➢ Why?
CSC2556 - Nisarg Shah 34
cake-cutting algorithm for 𝑜 players?
length of input encoded as binary.
𝑗, which requires
infinite bits to encode.
CSC2556 - Nisarg Shah 35
𝑗’s through two
types of queries:
➢ Eval𝑗(𝑦, 𝑧) returns 𝑊
𝑗
𝑦, 𝑧
➢ Cut𝑗(𝑦, 𝛽) returns 𝑧 such that 𝑊
𝑗
𝑦, 𝑧 = 𝛽
𝑦 𝑧
𝛽
eval output cut output
CSC2556 - Nisarg Shah 36
➢ Eval𝑗 𝑦, 𝑧 = 𝑊
𝑗
𝑦, 𝑧
➢ Cut𝑗 𝑦, 𝛽 = 𝑧 s.t. 𝑊
𝑗
𝑦, 𝑧 = 𝛽
EF allocation when 𝑜 = 2?
➢ Why?
CSC2556 - Nisarg Shah 37
players
to the right.
1/𝑜 to a player, the player shouts “stop”, gets the piece, and exits.
38
1/3 1/3 ≥ 1/3
CSC2556 - Nisarg Shah
CSC2556 - Nisarg Shah 39
cut query to mark his 1/𝑜 point in the remaining cake.
CSC2556 - Nisarg Shah 40
CSC2556 - Nisarg Shah 41
Τ 1 3
CSC2556 - Nisarg Shah 42
Τ 1 3 Τ 1 3
CSC2556 - Nisarg Shah 43
Τ 1 3 Τ 1 3 ≥ Τ 1 3
CSC2556 - Nisarg Shah 44
Spanier protocol in the Robertson-Webb model?
1.
Θ 𝑜
2.
Θ 𝑜 log 𝑜
3.
Θ 𝑜2
4.
Θ 𝑜2 log 𝑜
CSC2556 - Nisarg Shah 45
➢ Assume 𝑜 = 2𝑙 for some 𝑙
𝑊
𝑗
𝑦, 𝑨𝑗 = 1 2 𝑊
𝑗
𝑦, 𝑧
[𝑨∗, 𝑧] with the right 𝑜/2 players.
CSC2556 - Nisarg Shah 46
CSC2556 - Nisarg Shah 47
➢ Inductive proof. We want to prove that if player 𝑗 is
allocated piece 𝐵𝑗 when [𝑦, 𝑧] is divided between 𝑜 players, 𝑊
𝑗 𝐵𝑗 ≥
Τ 1 𝑜 𝑊
𝑗
𝑦, 𝑧
𝑗
𝑦, 𝑧 = 𝑊
𝑗
0,1 = 1
➢ Base case: 𝑜 = 1 is trivial. ➢ Suppose it holds for 𝑜 = 2𝑙−1. We prove for 𝑜 = 2𝑙. ➢ Take the 2𝑙−1 left players.
𝑗
𝑦, 𝑨∗ ≥ Τ 1 2 𝑊
𝑗
𝑦, 𝑧
𝑗 𝐵𝑗 ≥ 1 2𝑙−1 𝑊 𝑗
𝑦, 𝑨∗ ≥
1 2𝑙 𝑊 𝑗
𝑦, 𝑧
CSC2556 - Nisarg Shah 48
protocol in the Robertson-Webb model?
1.
Θ 𝑜
2.
Θ 𝑜 log 𝑜
3.
Θ 𝑜2
4.
Θ 𝑜2 log 𝑜
CSC2556 - Nisarg Shah 49
proportional protocol needs Ω(𝑜 log 𝑜) operations in the Robertson-Webb model.
provably optimal!
CSC2556 - Nisarg Shah 50
algorithms for finding envy-free allocations?”
➢ [Brams and Taylor, 1995] give an unbounded EF protocol. ➢ [Procaccia 2009] shows Ω 𝑜2 lower bound for EF. ➢ Last year, the long-standing major open question of
“bounded EF protocol” was resolved!
➢ [Aziz and Mackenzie, 2016]: 𝑃(𝑜𝑜𝑜𝑜𝑜𝑜
) protocol!