SlideShare a Scribd company logo
The Price of Anarchy is Independent of the Network Topology Tim Roughgarden (presented by Aleksandr Yampolskiy)
Outline ,[object Object],[object Object],[object Object],[object Object]
Q:  Which route would you take? suburb train station ? wide, circuitous road:  1 hour delay narrow, straight road: 20 minute delay
A:  Most drivers would take the narrow road suburb train station resulting in traffic congestion
What if… ,[object Object],[object Object],suburb train station red sedan must take the longer route
Outline ,[object Object],[object Object],[object Object],[object Object]
The Model ,[object Object],[object Object],[object Object],[object Object],[object Object],} ( G ,  r ,  l ) s 1 t 1 v x x 1 1 0 r 1  = 1 w s 1 ->w->t 1 s 1 -> v -> w ->t 1 s 1 ->v->t 1 Simple Paths
Flows ,[object Object],[object Object],[object Object],s 1 t 1 v x x 1 1 0 r 1  = 1 w f p 2  =  ½ f p 1  =  ½ edge  e =  ( w , t 1 ): f e  = ½ + ½ = 1 l e (f e )  =  1
The Cost of a Flow ,[object Object],[object Object],s 1 t 1 v x x 1 1 0 r 1  = 1 w f p 2  =  ½ f p 1  =  ½ l p 1 ( f )  = ½  + 1 = 1.5 l p 2 ( f )  = ½ +  0 + 1 = 1.5 C ( f ) =  ½ * 1.5 + ½ * 1.5 = 1.5
Some Assumptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Nash Flows ,[object Object],[object Object],[object Object],[object Object],[object Object]
More on Nash Flows  ,[object Object],s 1 t 1 1 x r 1  = 1 flow =  ½ flow =  ½ s 1 t 1 1 x r 1  = 1 flow =  0 flow = 1 C ( f* ) =  ½  *  1  +  ½  *  ½  = ¾ C ( f ) =  0  *  1  +  1  *  1  = 1 optimal flow Nash flow [Pigou 1920]
Optimal Flows ,[object Object],[object Object],s 1 t 1 1 x r 1  = 1 s 1 t 1 1 2x r 1  = 1 latency functions marginal cost functions flow = ½ flow = ½ flow = ½ flow = ½ optimal flow Nash flow
The Price of Anarchy ,[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object]
Linear Latency Functions ,[object Object],s 1 t 1 1 2x r  = 1 flow =  ½ flow =  ½ s 1 t 1 1 x r  = 1 flow =  0 flow = 1 C ( f* ) =  ½  *  1  +  ½  *  ½  = ¾ C ( f ) =  0  *  1  +  1  *  1  = 1  latency functions marginal cost functions Nash flow: Optimal flow:
Linear Latency Functions (cont.)  ,[object Object],[object Object],[object Object]
Proof Idea ,[object Object],[object Object],[object Object],[object Object],s 1 t 1 1 x r  =  1 flow = ½ flow = 0 flow =  ½ flow =0 r  =  ½
Proof Idea ,[object Object],[object Object],[object Object],[object Object],cost of  f*   at rate  r = cost of  f/2   at rate  r/2 + cost of augmenting flow to rate  r ≥  ¼  C ( f ) (easy) ≥  ½ C( f ) (hard) ≥  ¾ C( f )
General Latency Functions  ,[object Object],[object Object],s 1 t 1 1 x p r  = 1 s 1 t 1 1 r  = 1 latency functions marginal cost functions ( p  +1) x p   flow = 1 flow = 0 flow = ( p  + 1) -1/p flow = 1 – ( p  + 1) -1/p Nash flow: Optimal flow: C ( f ) = 1   C ( f* ) = 1 –  p ¢ ( p  +1) -(p+1)/p  =   (  )
Main Theorem  ,[object Object],[object Object]
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) ,[object Object],[object Object]
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) (cont.) ,[object Object],[object Object]
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) (cont.) ,[object Object],[object Object],[object Object],[object Object],s 1 t 1 1 x 2 r  =  1 flow = 1/√3 flow = 1 - 1/√3 l(x) = x 2 , l * (x) = 3x 2 .  Want 3(    x ) 2  =  x 2   )    =  √ 1/3
Upper Bound:  ρ ( G ,  r ,  l )  ≤    ( L ) (cont.) ,[object Object]
Lower Bound:  ρ ( G ,  r ,  l )  ≥    ( L )
Computing the Price of Anarchy ,[object Object],[object Object],s 1 t 1 constant  · l r
Computing the Price of Anarchy (cont.)
Conclusion

More Related Content

What's hot

RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executionsRedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
Redis Labs
 
Queueing theory eq
Queueing theory eqQueueing theory eq
Queueing theory eq
Koko Bakhat
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mappingsatrajit
 
APassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamerAPassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamerPeter Sels
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalencesatrajit
 
TimetablingForPassengers-2
TimetablingForPassengers-2TimetablingForPassengers-2
TimetablingForPassengers-2Peter Sels
 
bask, bfsk, bpsk
bask, bfsk, bpskbask, bfsk, bpsk
bask, bfsk, bpsk
blzz2net
 
matlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequencesmatlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequences
Rakesh kumar jha
 
MATLAB CODE OF Shifting sequence
MATLAB  CODE  OF Shifting sequenceMATLAB  CODE  OF Shifting sequence
MATLAB CODE OF Shifting sequence
Rakesh kumar jha
 
Shortest Path in Graph
Shortest Path in GraphShortest Path in Graph
Shortest Path in Graph
Dr Sandeep Kumar Poonia
 
Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14Naor Ami
 
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUBPresentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
World University of Bangladesh
 
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
Parhamsagharchi
 
Chap5 - ADSP 21K Manual
Chap5 - ADSP 21K ManualChap5 - ADSP 21K Manual
Chap5 - ADSP 21K Manual
SethCopeland
 
SINGLE-SOURCE SHORTEST PATHS
SINGLE-SOURCE SHORTEST PATHS SINGLE-SOURCE SHORTEST PATHS
SINGLE-SOURCE SHORTEST PATHS
Md. Shafiuzzaman Hira
 
B field homogenous sphere
B field homogenous sphereB field homogenous sphere
B field homogenous sphere
FFMdeMul
 
Efficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeEfficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope Volume
Vissarion Fisikopoulos
 
Control system concepts by using matlab
Control system concepts by using matlabControl system concepts by using matlab
Control system concepts by using matlab
CharltonInao1
 

What's hot (20)

RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executionsRedisConf18 - CRDTs and Redis - From sequential to concurrent executions
RedisConf18 - CRDTs and Redis - From sequential to concurrent executions
 
Queueing theory eq
Queueing theory eqQueueing theory eq
Queueing theory eq
 
Bellmanford
BellmanfordBellmanford
Bellmanford
 
Reducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology MappingReducing Structural Bias in Technology Mapping
Reducing Structural Bias in Technology Mapping
 
APassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamerAPassengerKnockOnDelayModelForTimetableOptimisation_beamer
APassengerKnockOnDelayModelForTimetableOptimisation_beamer
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalence
 
TimetablingForPassengers-2
TimetablingForPassengers-2TimetablingForPassengers-2
TimetablingForPassengers-2
 
bask, bfsk, bpsk
bask, bfsk, bpskbask, bfsk, bpsk
bask, bfsk, bpsk
 
matlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequencesmatlab code of shifting and folding of two sequences
matlab code of shifting and folding of two sequences
 
MATLAB CODE OF Shifting sequence
MATLAB  CODE  OF Shifting sequenceMATLAB  CODE  OF Shifting sequence
MATLAB CODE OF Shifting sequence
 
Shortest Path in Graph
Shortest Path in GraphShortest Path in Graph
Shortest Path in Graph
 
Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14Inroduction_To_Algorithms_Lect14
Inroduction_To_Algorithms_Lect14
 
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUBPresentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
Presentation 3 ce801 by Rabindra Ranjan Saha, PEng, Assoc. Prof. WUB
 
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
NUMERICAL METHODS WITH MATLAB : bisection,mueller's,newton-raphson,false poin...
 
Chap5 - ADSP 21K Manual
Chap5 - ADSP 21K ManualChap5 - ADSP 21K Manual
Chap5 - ADSP 21K Manual
 
SINGLE-SOURCE SHORTEST PATHS
SINGLE-SOURCE SHORTEST PATHS SINGLE-SOURCE SHORTEST PATHS
SINGLE-SOURCE SHORTEST PATHS
 
B field homogenous sphere
B field homogenous sphereB field homogenous sphere
B field homogenous sphere
 
Pass&fr trains planning
Pass&fr trains planningPass&fr trains planning
Pass&fr trains planning
 
Efficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope VolumeEfficient Random-Walk Methods forApproximating Polytope Volume
Efficient Random-Walk Methods forApproximating Polytope Volume
 
Control system concepts by using matlab
Control system concepts by using matlabControl system concepts by using matlab
Control system concepts by using matlab
 

Similar to Price of anarchy is independent of network topology

Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
WahyuAde4
 
Minimum cost maximum flow
Minimum cost maximum flowMinimum cost maximum flow
Minimum cost maximum flow
SaruarChowdhury
 
Dsp manual
Dsp manualDsp manual
Dsp manual
pramod naik
 
First Order Active RC Sections
First Order Active RC SectionsFirst Order Active RC Sections
First Order Active RC Sections
Hoopeer Hoopeer
 
Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
Mochamad Guntur Hady Putra
 
Analysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fittingAnalysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fitting
Tarik Kazaz
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
HirazNor
 
Chap04
Chap04Chap04
maxflow.ppt
maxflow.pptmaxflow.ppt
maxflow.ppt
ssuser8244a91
 
Large Scale Fading and Network Deployment.pdf
Large	Scale	Fading	and Network Deployment.pdfLarge	Scale	Fading	and Network Deployment.pdf
Large Scale Fading and Network Deployment.pdf
mshanajoel6
 
Parallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsParallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-Joins
Jonny Daenen
 
Dsp lab manual
Dsp lab manualDsp lab manual
Dsp lab manual
Mukul Mohal
 
Gibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inferenceGibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inference
JeremyHeng10
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
HirazNor
 
Chang etal 2012a
Chang etal 2012aChang etal 2012a
Chang etal 2012a
Arthur Weglein
 
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Arthur Weglein
 
ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012
László Nádai
 
Module1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptxModule1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptx
realme6igamerr
 

Similar to Price of anarchy is independent of network topology (20)

Signal & system
Signal & systemSignal & system
Signal & system
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
Minimum cost maximum flow
Minimum cost maximum flowMinimum cost maximum flow
Minimum cost maximum flow
 
Dsp manual
Dsp manualDsp manual
Dsp manual
 
Ec gate 13
Ec gate 13Ec gate 13
Ec gate 13
 
First Order Active RC Sections
First Order Active RC SectionsFirst Order Active RC Sections
First Order Active RC Sections
 
Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
 
Analysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fittingAnalysis of multipath channel delay estimation using subspace fitting
Analysis of multipath channel delay estimation using subspace fitting
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
 
Chap04
Chap04Chap04
Chap04
 
maxflow.ppt
maxflow.pptmaxflow.ppt
maxflow.ppt
 
Large Scale Fading and Network Deployment.pdf
Large	Scale	Fading	and Network Deployment.pdfLarge	Scale	Fading	and Network Deployment.pdf
Large Scale Fading and Network Deployment.pdf
 
Parallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsParallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-Joins
 
Dsp lab manual
Dsp lab manualDsp lab manual
Dsp lab manual
 
Gibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inferenceGibbs flow transport for Bayesian inference
Gibbs flow transport for Bayesian inference
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
Chang etal 2012a
Chang etal 2012aChang etal 2012a
Chang etal 2012a
 
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
Finite-difference modeling, accuracy, and boundary conditions- Arthur Weglein...
 
ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012ITS World Congress :: Vienna, Oct 2012
ITS World Congress :: Vienna, Oct 2012
 
Module1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptxModule1_dsffffffffffffffffffffgggpa.pptx
Module1_dsffffffffffffffffffffgggpa.pptx
 

More from Aleksandr Yampolskiy

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionAleksandr Yampolskiy
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter BellAleksandr Yampolskiy
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
Aleksandr Yampolskiy
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
Aleksandr Yampolskiy
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsAleksandr Yampolskiy
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
Aleksandr Yampolskiy
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
Aleksandr Yampolskiy
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
Aleksandr Yampolskiy
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of virusesAleksandr Yampolskiy
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
Aleksandr Yampolskiy
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networksAleksandr Yampolskiy
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelementAleksandr Yampolskiy
 

More from Aleksandr Yampolskiy (20)

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of viruses
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
 

Price of anarchy is independent of network topology

  • 1. The Price of Anarchy is Independent of the Network Topology Tim Roughgarden (presented by Aleksandr Yampolskiy)
  • 2.
  • 3. Q: Which route would you take? suburb train station ? wide, circuitous road: 1 hour delay narrow, straight road: 20 minute delay
  • 4. A: Most drivers would take the narrow road suburb train station resulting in traffic congestion
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Lower Bound: ρ ( G , r , l ) ≥  ( L )
  • 27.
  • 28. Computing the Price of Anarchy (cont.)