• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Selfish Routing and the Price of Anarchy (2005)

by T Roughgarden
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 255
Next 10 →

Steps Towards a Science of Service Systems

by Jim Spohrer, Paul P. Maglio, John Bailey, Dan Gruhl - IEEE Computer , 2007
"... The service sector – which includes government, education, medical and healthcare, banking and ..."
Abstract - Cited by 128 (5 self) - Add to MetaCart
The service sector – which includes government, education, medical and healthcare, banking and

NIRA: A New Inter-Domain Routing Architecture

by Xiaowei Yang, David Clark, Arthur W. Berger - IEEE/ACM TRANSACTIONS ON NETWORKING , 2007
"... In today’s Internet, users can choose their local Internet service providers (ISPs), but once their packets have entered the network, they have little control over the overall routes their packets take. Giving a user the ability to choose between provider-level routes has the potential of fostering ..."
Abstract - Cited by 77 (2 self) - Add to MetaCart
In today’s Internet, users can choose their local Internet service providers (ISPs), but once their packets have entered the network, they have little control over the overall routes their packets take. Giving a user the ability to choose between provider-level routes has the potential of fostering ISP competition to offer enhanced service and improving end-to-end performance and reliability. This paper presents the design and evaluation of a new Internet routing architecture (NIRA) that gives a user the ability to choose the sequence of providers his packets take. NIRA addresses a broad range of issues, including practical provider compensation, scalable route discovery, efficient route representation, fast route fail-over, and security. NIRA supports user choice without running a global link-state routing protocol. It breaks an end-to-end route into a sender part and a receiver part and uses address assignment to represent each part. A user can specify a route with only a source and a destination address, and switch routes by switching addresses. We evaluate NIRA using a combination of network measurement, simulation, and analysis. Our evaluation shows that NIRA supports user choice with low overhead.
(Show Context)

Citation Context

...gn will be a viable technical solution. We are also aware that letting users choose routes independently may lead to performance problems such as temporary route oscillation [35] or suboptimal routes =-=[49]-=-. Despite these potential problems, recent research suggests that in the Internet environment, user-selected routes are close to optimal [45] and route oscillations happen under rare conditions and ca...

How Much Can Taxes Help Selfish Routing?

by Richard Cole, Yevgeniy Dodis, Tim Roughgarden - EC'03 , 2003
"... ... in networks. We consider a model of selfish routing in which the latency experienced by network tra#c on an edge of the network is a function of the edge congestion, and network users are assumed to selfishly route tra#c on minimum-latency paths. The quality of a routing of tra#c is historically ..."
Abstract - Cited by 76 (6 self) - Add to MetaCart
... in networks. We consider a model of selfish routing in which the latency experienced by network tra#c on an edge of the network is a function of the edge congestion, and network users are assumed to selfishly route tra#c on minimum-latency paths. The quality of a routing of tra#c is historically measured by the sum of all travel times, also called the total latency. It is well known
(Show Context)

Citation Context

...44] and Beckmann, McGuire, and Winsten [5], and has been extensively studied ever since. Further discussion and many more references on both selfish routing and related network models can be found in =-=[38]-=-. We make no attempt to survey the vast literature on the optimal pricing of shared resources, and mention only a few references that can serve as a starting point for further reading. Surveys and rec...

Convergence to Approximate Nash Equilibria in Congestion Games

by Steve Chien, Alistair Sinclair - In SODA ’07 , 2007
"... ..."
Abstract - Cited by 73 (0 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ive, of the classical concept of Nash equilibrium [20]. Much of this activity has focused on understanding the structure of Nash equilibria (as expressed, notably, in the "price of anarchy," see e.g. =-=[22, 25, 24]-=-) and the computational complexity of finding them (see, e.g., [10, 7, 4]). Considerably less is understood about the question of whether selfish players, acting in a decentralized fashion, actually a...

Optimal mechanism design and money burning

by Jason D. Hartline, Tim Roughgarden - STOC ’08 , 2008
"... Mechanism design is now a standard tool in computer science for aligning the incentives of self-interested agents with the objectives of a system designer. There is, however, a fundamental disconnect between the traditional application domains of mechanism design (such as auctions) and those arising ..."
Abstract - Cited by 57 (15 self) - Add to MetaCart
Mechanism design is now a standard tool in computer science for aligning the incentives of self-interested agents with the objectives of a system designer. There is, however, a fundamental disconnect between the traditional application domains of mechanism design (such as auctions) and those arising in computer science (such as networks): while monetary transfers (i.e., payments) are essential for most of the known positive results in mechanism design, they are undesirable or even technologically infeasible in many computer systems. Classical impossibility results imply that the reach of mechanisms without transfers is severely limited. Computer systems typically do have the ability to reduce service quality—routing systems can drop or delay traffic, scheduling protocols can delay the release of jobs, and computational payment schemes can require computational payments from users (e.g., in spam-fighting systems). Service degradation is tantamount to requiring that users burn money, and such “payments ” can be used to influence the preferences of the agents at a cost of degrading the social surplus. We develop a framework for the design and analysis of money-burning mechanisms to maximize the residual surplus— the total value of the chosen outcome minus the payments required. Our primary contributions are the following. • We define a general template for prior-free optimal mechanism design that explicitly connects Bayesian optimal mechanism design, the dominant paradigm in economics, with worst-case analysis. In particular, we establish a general and principled way to identify appropriate performance benchmarks in prior-free mechanism design. • For general single-parameter agent settings, we char-

A New Model for Selfish Routing

by Marios Mavronicolas, Burkhard Monien, Manuel Rode - Proceedings of the 21st International Symposium on Theoretical Aspects of Computer Science (STACS’04), LNCS 2996 , 2004
"... Abstract. In this work, we introduce and study a new model for selfish routing over non-cooperative networks that combines features from the two such best studied models, namely the KP model and the Wardrop model in an interesting way. We consider a set of n users, each using a mixed strategy to shi ..."
Abstract - Cited by 53 (8 self) - Add to MetaCart
Abstract. In this work, we introduce and study a new model for selfish routing over non-cooperative networks that combines features from the two such best studied models, namely the KP model and the Wardrop model in an interesting way. We consider a set of n users, each using a mixed strategy to ship its unsplittable traffic over a network consisting of m parallel links. In a Nash equilibrium, no user can increase its Individual Cost by unilaterally deviating from its strategy. To evaluate the performance of such Nash equilibria, we introduce Quadratic Social Cost as a certain sum of In-dividual Costs – namely, the sum of the expectations of the squares of the incurred link latencies. This definition is unlike the KP model, where Maximum Social Cost has been defined as the maximum of Individual Costs. We analyse the impact of our modeling assumptions on the computation of Quadratic Social Cost, on the structure of worst-case Nash equilibria, and on bounds on the Quadratic Coordination Ratio.
(Show Context)

Citation Context

...e.g., [3, 12, 13, 15, 16, 18, 20, 23, 25, 28, 29] or [17, 24] for surveys. The W model dates back to studies of transportation networks in the 1950s; however, much recent work on selfish routing (see =-=[34]-=- and references therein) has witnessed a revival of interest into the W model. Within the new model, we study some interesting strategic game, originally proposed in [26]; we are especially interested...

Exact Price of Anarchy for Polynomial Congestion Games

by Sebastian Aland, Dominic Dumrauf, Martin Gairing, Burkhard Monien, Florian Schoppmann , 2006
"... We show exact values for the price of anarchy of weighted and unweighted congestion games with polynomial latency functions. The given values also hold for weighted and unweighted network congestion games. ..."
Abstract - Cited by 49 (9 self) - Add to MetaCart
We show exact values for the price of anarchy of weighted and unweighted congestion games with polynomial latency functions. The given values also hold for weighted and unweighted network congestion games.

Congestion Games with Malicious Players

by Moshe Babaioff , Robert Kleinberg , Christos H. Papadimitriou , 2008
"... We study the equilibria of non-atomic congestion games in which there are two types of players: rational players, who seek to minimize their own delay, and malicious players, who seek to maximize the average delay experienced by the rational players. We study the existence of pure and mixed Nash equ ..."
Abstract - Cited by 45 (0 self) - Add to MetaCart
We study the equilibria of non-atomic congestion games in which there are two types of players: rational players, who seek to minimize their own delay, and malicious players, who seek to maximize the average delay experienced by the rational players. We study the existence of pure and mixed Nash equilibria for these games, and we seek to quantify the impact of the malicious players on the equilibrium. One counterintuitive phenomenon which we demonstrate is the “windfall of malice”: paradoxically, when a myopically malicious player gains control of a fraction of the flow, the new equilibrium may be more favorable for the remaining rational players than the previous equilibrium.

Revisiting Log-Linear Learning: Asynchrony, Completeness and Payoff-Based Implementation

by Jason R. Marden, et al. , 2008
"... Log-linear learning is a learning algorithm with equilibrium selection properties. Log-linear learning provides guarantees on the percentage of time that the joint action profile will be at a potential maximizer in potential games. The traditional analysis of log-linear learning has centered around ..."
Abstract - Cited by 42 (11 self) - Add to MetaCart
Log-linear learning is a learning algorithm with equilibrium selection properties. Log-linear learning provides guarantees on the percentage of time that the joint action profile will be at a potential maximizer in potential games. The traditional analysis of log-linear learning has centered around explicitly computing the stationary distribution. This analysis relied on a highly structured setting: i) players ’ utility functions constitute a potential game, ii) players update their strategies one at a time, which we refer to as asynchrony, iii) at any stage, a player can select any action in the action set, which we refer to as completeness, and iv) each player is endowed with the ability to assess the utility he would have received for any alternative action provided that the actions of all other players remain fixed. Since the appeal of log-linear learning is not solely the explicit form of the stationary distribution, we seek to address to what degree one can relax the structural assumptions while maintaining that only potential function maximizers are the stochastically stable action profiles. In this paper, we introduce slight variants of log-linear learning to include both synchronous updates and incomplete action sets. In both settings, we prove that only potential function maximizers are stochastically stable. Furthermore, we introduce a payoff-based version of log-linear learning, in which players are only aware of the utility they received and the action that they played. Note that log-linear learning in its original form is not a payoff-based learning algorithm. In payoff-based log-linear learning, we also prove that only potential maximizers are stochastically stable. The key enabler for these results is to change the focus of the analysis away from deriving the explicit form of the stationary distribution of the learning process towards characterizing the stochastically stable states. The resulting analysis uses the theory of resistance trees for regular perturbed Markov decision processes, thereby allowing a relaxation of the aforementioned structural assumptions.

The Effectiveness of Stackelberg Strategies and Tolls for Network Congestion Games

by Chaitanya Swamy - In Proc. Symposium on Discrete Algorithms (SODA , 2007
"... Abstract It is well known that in a network with arbitrary(convex) latency functions that are a function of edge ..."
Abstract - Cited by 41 (1 self) - Add to MetaCart
Abstract It is well known that in a network with arbitrary(convex) latency functions that are a function of edge
(Show Context)

Citation Context

...in recent years there has been considerable interest and progress in quantifying the performance loss in various settings in terms of the price of anarchy of the corresponding induced game; see e.g., =-=[23, 31, 28]-=-. The price of anarchy (abbreviated PoA) of a game is the ratio between the cost of the Nash equilibrium solution (i.e., the outcome of selfish ∗ A preliminary version [33] appeared in the Proceedings...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University