Christoph Dürr - August 2020
Online computation with untrusted advice
Joint work with Spyros Angelopoulos, Jin S., S. Kamali, M. Renault. (ITCS’2020)
Online computation with untrusted advice Joint work with Spyros - - PowerPoint PPT Presentation
Online computation with untrusted advice Joint work with Spyros Angelopoulos, Jin S., S. Kamali, M. Renault. (ITCS2020) Christoph Drr - August 2020 Cost OPT ALG (k=B) Ski rental problem 7 Rent or buy 6 Renting skis cost 1 / day
Christoph Dürr - August 2020
Joint work with Spyros Angelopoulos, Jin S., S. Kamali, M. Renault. (ITCS’2020)
Rent or buy
= 1+(B-1)/B ≃ 2
Worst case
Cost 1 2 3 4 5 6 7 D 1 2 3 4 5 6 OPT ALG (k=B)
B=
Our approach
Different approaches
computed from the instance revealing some of the hidden information and is tailored for the algorithm which exploits it.
learning based prediction and might be wrong.
caching with competitive ratio being function of absolute error of advice
either right (cooperating with algorithm)
May 1st May 1st May 1st May 1st May 1st May 1st May 12nd May 1st
Advice: you will stop skiing before day B Should the algorithm ignore the advice or blindly trust it?
was right
advice was wrong
algorithms
1
1 + B − 1 B 1 + B − 1 B
sup D/B = ∞ Ignore advice Trust blindly Trusted ratio Untrusted ratio
Parameter k
until day B-1 and buys on day B
algorithm buys either on day
⌈B/k⌉
1 + B − 1 k 1 + k − 1 B 1 + k B 1 + B k
Trusted ratio Untrusted ratio
Introduced to illustrate doubling strategies
)
for j such that
has
u ≥ 1 x1, x2, … x1 + x2 + … + xj xj−1 < u ≤ xj x1 + … + xj u xi = 2i
How much fuel is needed to escape gravitation from earth ?
U x1 x2 x3 xj
Parameter w, Advice is u
W 1 4 2
w − w2 − 4w 2
linear program such that:
the LP in case advice was right
can solve linear recurrence to get the
Trusted ratio Untrusted ratio
Only advice bits
k
general )
4-competitive strategies
right
at least in case advice was right
w ≥ 4 2k 21+2−k 2 + 1 3 ⋅ 2k
U Example for k=1
1 1.5 2 2.5 3 Number of advice bits k 1 2 3 4 5
Advice is 0 Advice is 1
What was known before
dedicated bins. Other than that, follow First-Fit.
1.5783 1.54278 1.7 1.4702 Asymptotic competitive ratio First-Fit: consider bins in the order they have been opened. Place new item in first bin where it fits, opening a new bin if necessary Deterministic competitive ratio is between these bounds Angelopoulos, D. Kamali, Renault, Rosén, 2018: needs O(1) advice bits 1.5 Boyar, Kamali, Larsen, López-Ortiz, 2016: Reserve-Critical needs O(log n) advice bits
Reserve-Critical can be fooled
1/6+ε Reserved 1/6+ε Reserved
…
Parameter , Advice
α γ
trusted ratio r and untrusted ratio max{33-18r, 7/4}
between critical and tiny bins
when advice is given with precision
min{α, γ} 1/2k
1.5 3 4.5 6 1.4 1.5 1.6 1.7 1.8
Trusted ratio Untrusted ratio
Boyar, Kamali, Larsen, López-Ortiz, 2016
front of first item requested at most
requests to x is even, then move to front
item to front
5/3 (2 bits advice suffices)
≤
3 7 2 11 4 5 1 8
Request sequence : 2 1 2 7 8 4 11 5 ….
Serving cost (= rank in list) Free exchange (for the currently requested item) Paid exchange (any consecutive items)
Parameter , Advice A {Timestamp, MTF-Even, MTF-Odd}
β ∈ [0,1/2] ∈
front.
exchanges to have the list as if A was run from the beginning. (cost for m=size
exceeds
≤ m2 m3 βm3
A MTF A MTF A …
Trusting phase Ignoring phase
2.2 2.3 2.4 2.5 1.6 1.7 1.8 1.9 2
Trusted ratio Untrusted ratio
randomised algorithms
(Lower bounds for the randomised trusted / untrusted competitive ratios)
studied for the offline setting
2 4 5 9 13 14 17 21
Machine learning predicts insertion point Number of queries is where d is the error of the prediction
O(log d)
d
Kraska, Beutel, Chi, Dean, Polyzotis, 2018