Results 1  10
of
21
On kColumn Sparse Packing Programs
, 2009
"... We consider the class of packing integer programs (PIPs) that are column sparse, i.e. there is a specified upper bound k on the number of constraints that each variable appears in. We give an ek+o(k)approximation algorithm for kcolumn sparse PIPs, improving on recent results of k2 · 2k [14] and O(k ..."
Abstract

Cited by 17 (3 self)
 Add to MetaCart
(Show Context)
We consider the class of packing integer programs (PIPs) that are column sparse, i.e. there is a specified upper bound k on the number of constraints that each variable appears in. We give an ek+o(k)approximation algorithm for kcolumn sparse PIPs, improving on recent results of k2 · 2k [14] and O(k2) [3, 5]. We also show that the integrality gap of our linear programming relaxation is at least 2k − 1; it is known that kcolumn sparse PIPs are Ω(k log k)hard to approximate [8]. We also extend our result (at the loss of a small constant factor) to the more general case of maximizing a submodular objective over kcolumn sparse packing constraints.
On Expressing Value Externalities in Position Auctions
"... Externalities are recognized to exist in the sponsored search market, where two colocated ads compete for user attention. Existing work focuses on the effect of another ad on the quantity of clicks received. We focus instead on the negative effect of another ad on the value per click, and propose a ..."
Abstract

Cited by 9 (2 self)
 Add to MetaCart
(Show Context)
Externalities are recognized to exist in the sponsored search market, where two colocated ads compete for user attention. Existing work focuses on the effect of another ad on the quantity of clicks received. We focus instead on the negative effect of another ad on the value per click, and propose a general model of externalities, in which a bidder has no value for a slot under a set of certain conditions, each on one other bidder’s allocated slot. We provide a generic greedy algorithm for the winner determination problem (WDP) in this model together with a pricing scheme that closely follow the Generalized Second Price (GSP) auction used in practice. For value externalities that satisfy a property of downwardmonotonicity, these mechanisms provide no new opportunities for manipulation beyond the ones already available via untruthful claims about bid value in GSP under the standard slot auction model. Our main instantiation of downwardmonotonic constraints is an identityspecific language, in which a bidder can require that it precedes some subset of other bidders. For this language’s WDP, we establish worstcase complexity and inapproximability results. This motivates the choice of approximations, e.g. via the greedy algorithm. As another way of circumventing the hardness results, we present fixedparameter algorithms for the WDPs of two sublanguages of the identityspecific model. 1.
On LPbased Approximability for Strict CSPs
"... In a beautiful result, Raghavendra established optimal Unique Games Conjecture (UGC)based inapproximability for a large class of constraint satisfaction problems (CSPs). In the class of CSPs he considers, of which Maximum Cut is a prominent example, the goal is to find an assignment which maximizes ..."
Abstract

Cited by 6 (1 self)
 Add to MetaCart
In a beautiful result, Raghavendra established optimal Unique Games Conjecture (UGC)based inapproximability for a large class of constraint satisfaction problems (CSPs). In the class of CSPs he considers, of which Maximum Cut is a prominent example, the goal is to find an assignment which maximizes a weighted fraction of constraints satisfied. He gave a generic semidefinite program (SDP) for this class of problems and showed how the approximability of each problem is determined by the corresponding SDP (upto an arbitrarily small additive error) assuming the UGC. He noted that his techniques do no apply to CSPs with strict constraints (all of which must be satisfied) such as Vertex Cover. In this paper we address the approximability of these strictCSPs. In the class of CSPs we consider, one is given a set of constraints over a set of variables, and a cost function over the assignments, the goal is to find an assignment to the variables of minimum cost which satisfies all the constraints. We present a generic linear program (LP) for a large class of strictCSPs and give a systematic way to convert integrality gaps for this LP into UGCbased inapproximability results. Some important problems whose approximability our framework captures are Vertex Cover, Hypergraph Vertex Cover, kpartiteHypergraph Vertex Cover, Independent Set and other covering and packing problems over qary alphabets, and a scheduling problem. For the covering and packing problems, which occur quite commonly in practice as well, we provide a matching rounding algorithm, thus settling their approximability upto an arbitrarily small additive error.
Locally stable marriage with strict preferences
 In Proc. 40th Intl. Coll. Automata, Languages and Programming (ICALP
, 2013
"... Abstract. We study twosided matching markets with locality of information and control. Each male (female) agent has an arbitrary strict preference list over all female (male) agents. In addition, each agent is a node in a fixed network. Agents learn about possible partners dynamically based on th ..."
Abstract

Cited by 6 (3 self)
 Add to MetaCart
Abstract. We study twosided matching markets with locality of information and control. Each male (female) agent has an arbitrary strict preference list over all female (male) agents. In addition, each agent is a node in a fixed network. Agents learn about possible partners dynamically based on their current network neighborhood. We consider convergence of dynamics to locally stable matchings that are stable with respect to their imposed information structure in the network. While existence of such states is guaranteed, we show that reachability becomes NPhard to decide. This holds even when the network exists only among one side. In contrast, if only one side has no network and agents remember a previous match every round, reachability is guaranteed and random dynamics converge with probability 1. We characterize this positive result in various ways. For instance, it holds for random memory and for memory with the most recent partner, but not for memory with the best partner. Also, it is crucial which partition of the agents has memory. Finally, we conclude with results on approximating maximum locally stable matchings. 1
Optimizing Password Composition Policies
, 2013
"... A password composition policy restricts the space of allowable passwords to eliminate weak passwords that are vulnerable to statistical guessing attacks. Usability studies have demonstrated that existing password composition policies can sometimes result in weaker password distributions; hence a mor ..."
Abstract

Cited by 4 (4 self)
 Add to MetaCart
A password composition policy restricts the space of allowable passwords to eliminate weak passwords that are vulnerable to statistical guessing attacks. Usability studies have demonstrated that existing password composition policies can sometimes result in weaker password distributions; hence a more principled approach is needed. We introduce the first theoretical model for optimizing password composition policies. We study the computational and sample complexity of this problem under different assumptions on the structure of policies and on users’ preferences over passwords. Our main positive result is an algorithm that – with high probability — constructs almost optimal policies (which are specified as a union of subsets of allowed passwords), and requires only a small number of samples of users’ preferred passwords. We complement our theoretical results with simulations using a realworld dataset of 32 million passwords.
On the Optimality of a Class of LPbased Algorithms ∗
"... In this paper we will be concerned with a class of packing and covering problems which includes Vertex Cover and Independent Set. Typically, one can write an LP relaxation and then round the solution. For instance, for Vertex Cover one can obtain a 2approximation via this approach. On the other han ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
(Show Context)
In this paper we will be concerned with a class of packing and covering problems which includes Vertex Cover and Independent Set. Typically, one can write an LP relaxation and then round the solution. For instance, for Vertex Cover one can obtain a 2approximation via this approach. On the other hand, Khot and Regev [KR08] proved that, assuming the Unique Games Conjecture (UGC), it is NPhard to approximate Vertex Cover to within a factor better than 2 − ε for any constant ε> 0. From their, and subsequent proofs of this result, it was not clear why this LP relaxation should be optimal. The situation was akin to Maximum Cut, where a natural SDP relaxation for it was proved by Khot et al. [KKMO07] to be optimal assuming the UGC. A beautiful result of Raghavendra [Rag08] explains why the SDP is optimal (assuming the UGC). Moreover, his result generalizes to a large class of constraint satisfaction problems (CSPs). Unfortunately, we do not know how to extend his framework so that it applies for problems such as Vertex Cover where the constraints are strict. In this paper, we explain why the simple LPbased rounding algorithm for the Vertex Cover problem is optimal assuming the UGC. Complementing Raghavendra’s result, our result generalizes to a class of strict, covering/packing type CSPs. We first write down a natural LP relaxation for this class of problems and present
Placing regenerators in optical networks to satisfy multiple sets of requests
 IEEE Transactions on Networking
, 2012
"... Abstract. The placement of regenerators in optical networks has become an active area of research during the last years. Given a set of lightpaths in a network G and a positive integer d, regenerators must be placed in such a way that in any lightpath there are no more than d hops without meeting a ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
(Show Context)
Abstract. The placement of regenerators in optical networks has become an active area of research during the last years. Given a set of lightpaths in a network G and a positive integer d, regenerators must be placed in such a way that in any lightpath there are no more than d hops without meeting a regenerator. While most of the research has focused on heuristics and simulations, the first theoretical study of the problem has been recently provided in
Socially stable matchings
 in the Hospitals / Residents problem. CoRR Technical Report 1303.2041. Available from http://arxiv.org/abs/1303.2041
"... In twosided matching markets, the agents are partitioned into two sets. Each agent wishes to be matched to an agent in the other set and has a strict preference over these potential matches. A matching is stable if there are no blocking pairs, i.e., no pair of agents that prefer each other to their ..."
Abstract

Cited by 3 (3 self)
 Add to MetaCart
(Show Context)
In twosided matching markets, the agents are partitioned into two sets. Each agent wishes to be matched to an agent in the other set and has a strict preference over these potential matches. A matching is stable if there are no blocking pairs, i.e., no pair of agents that prefer each other to their assigned matches. In this paper we study a generalization of stable matching motivated by the fact that, in most centralized markets, many agents do not have direct communication with each other. Hence even if some blocking pairs exist, the agents involved in those pairs may not be able to coordinate a deviation. We model communication channels with a bipartite graph between the two sets of agents which we call the social graph, and we study socially stable matchings. A matching is socially stable if there are no blocking pairs that are connected by an edge in the social graph. Socially stable matchings vary in size and so we look for a maximum socially stable matching. We prove that this problem is NPhard and, assuming the unique games conjecture, hard to approximate within a factor of 3 2 − ɛ, for any constant ɛ. Weapproximation algorithm. complement the hardness results with a 3 2 1
Usable Human Authentication: A Quantitative Treatment
, 2014
"... and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity. ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
(Show Context)
and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity.