on the complexity of allocation problems with probabilistic players rishab nithyanand research...

39
On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012

Upload: alicia-pick

Post on 28-Mar-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players

Rishab Nithyanand

Research Proficiency ExaminationSummer 2012

Page 2: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 2

Presentation Outline

• Introduction

• The Password Allocation Problem

• The Weapon-Target Allocation Problem

• Conclusions and Future Work

Page 3: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

3

Traditional Allocation Problems

• Given:– resources (r1, r2, …, rn) and tasks (t1, t2, …, tk)– objective function F

• Goal:– Find allocation for which F is optimal

• Constraint:– at most one task per resource

On the Complexity of Allocation Problems with Probabilistic Players

Page 4: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

4

Allocation Problems with Probabilistic Players

• Given:– resources (r1, r2, …, rn) and tasks (t1, t2, …, tk)

– resource ri completes task tj with probability pij

– objective function F

• Goal:– Find allocation for which E[F] is optimal

• Constraint:– at most one task per resource

On the Complexity of Allocation Problems with Probabilistic Players

Page 5: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

5

• Users have a large set of accounts– some are very valuable

– and some are less valuable

• Passwords are hard to remember– [Vu, 2006]: Average users remember upto 6 unique passwords.

• [Perito, 2011]: Internet accounts are easily linkable by pseudonyms.– Compromise of one account ) compromise of all accounts allocated the same

password.– Some accounts (eg., email) are gateway accounts.

• Problem: – What allocation results in minimum expected loss?

The Password Allocation Problem

On the Complexity of Allocation Problems with Probabilistic Players

Page 6: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 6

• I don’t care. I’m super secure, phish-proof, and use 40 char long passwords!– People do stupid things!

• July 12, 2012: Yahoo lost 45000 unhashed passwords.– All passwords are equal.

• Compromise probability is only server dependent.

• June 5, 2012: 6.5 million hashed passwords stolen.– Some passwords are uncrackable.

• Compromise probability is server and password dependent.

The Password Allocation Problem

Page 7: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

7

PA as a Parallel Job Allocation Problem

• Given a set of programs to be executed and a (smaller) set of machines.

• Each program may cause a system failure with some probability.– This may be machine independent (i.e., all machines are the same).

• Parallel Processing Constraint: Failure of one of the programs ) failure of all programs on the system.

• Problem:– How should programs be allocated to machines to maximize expected

throughput?On the Complexity of Allocation Problems with Probabilistic Players

Page 8: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

8

The Weapon-Target Allocation Problem

• Military offense allocation problem.

• Given a set of weapons and a set of enemy targets.

• Not all weapons destroy their targets– Enemy interception– Mechanical failures

• Probability of failure depends on the weapon-target pair– Placement of defenses against weapons– Distance from allocated weapon

• Problem: – What allocation maximizes expected damage to the enemy targets?

On the Complexity of Allocation Problems with Probabilistic Players

Page 9: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

9

The Weapon-Target Allocation Problem

Research Timeline:

• Formulation: Allan Manne (Stanford) [1958]

• NP-Completeness: Lloyd and Witsenhausen (Bell Labs) [1988]

• Analysis, Variants: Hosein (MIT) [1987-1992], Athans (Bell Labs) [1989-1992]

• Approximation (heuristics): 1977 – today

• Best approximations: Ahuja (UF), Orlin (MIT) [2007]

• (Existence of) Constant-factor approximations: ??On the Complexity of Allocation Problems with Probabilistic Players

Page 10: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 10

Presentation Outline

• Introduction

• The Password Allocation Problem

• The Weapon-Target Allocation Problem

• Conclusions and Future Work

Page 11: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 11

The PA Problem: Definition

• Problem Instance:– n accounts: a1, a2, …, an

– k passwords: PW1, PW2, …, PWk

– ai has value vi and compromise probability qi = (1-pi)• i.e., compromise probability is independent of password strength

• Compromise of one account 2 PWj ) compromise of all accounts 2 PWj

• Constraint: Every account receives exactly one password.

• Goal: Minimize expected loss through password compromise– Equivalent to maximizing expected survival value (or, Expected Gain (EG)).

Page 12: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 12

• Allocation matrix: X = {xij}– xij = 1 ) account aj is allocated password PWi

– xij = 0, otherwise

• Objective Function (Expected Gain): [to be maximized]

• Constraint: – Every account is allocated exactly one password.

The PA Problem: Mathematical Formulation

kX

i=1

0

@nY

j =1

((pj )xi j )nX

j =1

(xi j vj )

1

A

kX

i=1

0

@nY

j =1

((pj )xi j )nX

j =1

(xi j vj )

1

A (1)xi j =

½1 if account j is allocated to password i0 otherwise

maximize: F =kX

i=1

0

@nY

j =1

((pj )xi j )nX

j =1

(xi j vj )

1

A

subj ect to :kX

i=1

xi j =1; 8j 2 f1;:::;ng

F is theexpected gain (EG).

F =P ki=1

³ Q nj =1((pj )

xi j )P nj =1(xi j vj )

´F =

P ki=1

³ Q nj =1((pj )

xi j )P nj =1(xi j vj )

´

Page 13: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 13

Complexity of PA

Theorem: PA with 2 passwords PA2 2 NP Complete.

Proof: Part I: Formulating the Decision Version (PA2)

• Instance: – P = {p1,…,pn} where pi 2 (0,1)

– V = {v1,…,vn}– r

• Is there a partition of N ={1,…,n} into S1 and S2 such that:

• Clearly PA2 2 NP.

Page 14: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 14

Complexity of PA

Theorem: PA with 2 passwords PA2 2 NP Complete.

Proof: Part II: Finding the known hard problem

• The Partition Problem:– Instance: Q = {q1, …, qn}, qi 2 Z+

– Is there a partition of Q into Q1 and Q2 such that:

Page 15: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 15

Complexity of PA

Theorem: PA with 2 passwords PA2 2 NP Complete.

Proof: Part III: Making the Transformation

• Convert Partition instance to PA2 instance in poly-time.

• Given: Q = {q1, …, qn}

• Construct PA2 instance as follows:

• What is x?– For now, just a rational 2 (0,1)

Page 16: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 16

Complexity of PA

Theorem: PA with 2 passwords PA2 2 NP Complete.

Proof: Part IV: Why it works• Solving equations:

• Gives us the following solutions:

Page 17: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 17

Complexity of PA

Theorem: PA with 2 passwords PA2 2 NP Complete.

Proof: Part IV: Why it works

• We will eliminate the solutions where VS1 VS2

.

– As a result our solver will return that the constructed PA2 instance is a yes instance iff the Partition instance is a yes instance.

• Eliminating solution 1: – Recall our transformation:

– When we have:• Since x < 1

– Therefore, solution 1 can never occur.

Page 18: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 18

Complexity of PATheorem: PA with 2 passwords PA2 2 NP Complete.

Proof: Part IV: Why it works• Eliminating solution 2:

– Recall our transformation:

– We need to ensure that when :

– We will find an x such that

– Therefore, when , solution 2 can never occur ) PA2 2 NP Complete.

Page 19: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 19

Efficiently Solvable Cases

The case of n = k• Optimal Strategy: Allocate exactly one account to each

password.

• Proof of optimality: – Since and , we have:

– This means an account contributes the most to the EG when it has its own password.

Page 20: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 20

The case of identical accountsWe have The problem reduces to:

where xi = number of accounts allocated to pi

• Optimal Strategy: Assign accounts (sequentially) to the password for which the EG increases the most.

• Proof of Optimality: Greedy argument – we always stay on par or ahead of any feasible solution.

Efficiently Solvable Cases

Page 21: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 22

A Special Case

The Case of Correlated Values and ProbabilitiesWe have:

and where .

• Property of Optimal Solution:

• Proof (Sketch):

a1 ai aj ak an

PW1 PWl PWm PWk

EG(PWl) = (vi + vk + …) pi pk ….. EG(PWm) = (vj + …) pi …..

If we have: pi > pj > pk , vi > vj > vk, and pi/qi > vj/vi then…

EG’(PWl) = (vi + vj + …) pi pj ….. EG’(PWm) = (vk + …) pk …..

EG(PWl) + EG(PWm) < EG’(PWl) + EG’(PWm)

Page 22: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 23

Presentation Outline

• Introduction

• The Password Allocation Problem

• The Weapon-Target Allocation Problem

• Conclusions and Future Work

Page 23: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 24

The Single Round WTA Problem: Definition

• Problem Instance:– n targets: t1, t2, …, tn

– k weapons: w1, w2, …, wk

– wi destroys tj with probability qij

• i.e., kill probability is weapon and target dependent

• Constraint: Each weapon is allocated to exactly one target.

• Goal: Minimize expected survival of enemy targets– Equivalent to maximizing expected damage to enemy targets.

Page 24: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 25

SWTA Problem Assumptions

• Given kill probabilities are independent of other pairs.– Isolates problem from geometric and geographic factors.

• Either a target is destroyed completely or survives completely.– qij (kill probability) = 1-pij (survival probability)

• Damage is surveyed after weapons are fired.– Models short battles with limited ammunition – does not consider

enemy retreats

• No fractional allocations may be made.– A weapon can only be allocated to a single target

Page 25: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 26

• Allocation matrix: X = {xij}– xij = 1 ) weapon wj is allocated to target ti

– xij = 0, otherwise

• Objective Function (Survival Value): [to be minimized]

• Constraint: – Every weapon is allocated to exactly one target.

The SWTA Problem: Mathematical Formulation

kX

i=1

0

@nY

j =1

((pj )xi j )nX

j =1

(xi j vj )

1

A

kX

i=1

0

@nY

j =1

((pj )xi j )nX

j =1

(xi j vj )

1

A (1)xi j =

½1 if account j is allocated to password i0 otherwise

maximize: F =kX

i=1

0

@nY

j =1

((pj )xi j )nX

j =1

(xi j vj )

1

A

subj ect to :kX

i=1

xi j =1; 8j 2 f1;:::;ng

F is theexpected gain (EG).

F =P ki=1

³ Q nj =1((pj )

xi j )P nj =1(xi j vj )

´F =

P ki=1

³ Q nj =1((pj )

xi j )P nj =1(xi j vj )

´

Page 26: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 27

Complexity of SWTA

Theorem: SWTA with 2 targets (SWTA2) 2 NP Complete.

Proof: Part I: Formulating the Decision Version

• Instance: – P = {pij} where pij 2 (0,1) – r

• Is there a 0-1 matrix X such that:– The sum of the survival probabilities of the 2 targets is less than r

– and every weapon is allocated to at least one target.

• Clearly SWTA2 2 NP.

Page 27: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 28

Complexity of SWTA

Theorem: SWTA with 2 targets (SWTA2) 2 NP Complete.

Proof: Part II: Finding the known hard problem

• The Rational Product Dichotomy (Fractional Subset Product):– Instance: Q = {q1, …, qn}, qi 2 (0,1)

– Is there a partition of N={1, …, n} into S1 and S2 such that:

Page 28: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 29

Complexity of SWTA

Theorem: SWTA with 2 targets (SWTA2) 2 NP Complete.

Proof: Part III: Making the Transformation

• Convert RPD instance to SWTA2 instance in poly-time.

• Given: Q = {q1, …, qn}

• Construct SWTA2 instance as follows:

Where pij is the survival probability of target i after a strike by weapon j.

Page 29: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 30

Complexity of SWTATheorem: SWTA with 2 targets (SWTA2) 2 NP Complete.

Proof: Part IV: Why it works• Our SWTA2 solver will return yes iff

Where qi is the ith rational in the given RPD instance.

• By AGMI: – Therefore, can never occur.– SWTA2 solver returns yes iff

• By AGMI: – SWTA2 solver returns yes iff

which is a yes instance of RPD.

• SWTA2 2 NP Complete

Page 30: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 31

Efficiently Solvable Cases

The Case of Identical Weapons and TargetsWe have all weapon-target pairs with same survival probability p

i.e.,The problem reduces to:

subject towhere xi is the number of weapons allocated to target i.

• Optimal Strategy: Divide weapons as evenly as possible.

Page 31: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 32

If dividing k weapons evenly is not optimal. Then:

Target i Target j

xi weapons xj = d+xi weapons

But, switching one of the weapons target gives us:

1+xi weapons xj = d-1+xi weapons

Since p2(0,1) and xi < d+xi - 1

Therefore, switching targets strictly decreases the net survival value ) solution is not optimal

Page 32: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 33

Efficiently Solvable Cases

The Case of Equal WeaponsWe have one type of weapon – so all weapons destroy target i

with the same probability – pi.

Problem reduces to:

• Optimal Strategy: Assign weapons to the target for which the objective function (i.e., pi xi) decreases the most.

• Proof of Optimality: By induction.– When allocating one weapon to n weapons trivially true.

Page 33: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 34

Assume Xk is the optimal solution for k weapons to n targets

Xk = <x1, x2, …, xn>

Let Xk+1 be the solution returned for k+1 weapons to n targets

Xk+1 = <x1, x2, …, xm+1, …, xn>

Where ±m · ±i 8 i 2 {1, …, n}

± =

pm

x m £

(pm

-1)

Zk+1 = <z1, z2, …, zn>

Let Zk+1 be any other solution

Since Zk+1 Xk+1, there is a j where zk+1(j) > xk+1(j) ¸ xk (j)

Zk = <z1, z2, …, zj-1, …, zn>

Let Zk be the same solution with one less weapon for target j.

± =

pj (z

j -1) £

(pj-1

)

X*k+1 = <x1, x2, …, xj+1, …, xn>

Let X*k+1 be Xk with one more weapon allocated to target j.

± = pj xj £ (p

j -1)

·

· Since xj < zj

··

Page 34: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 35

Efficiently Solvable Cases

The Case of One Weapon per TargetWe have each of the n targets getting at most one weapon – i.e.,

As a result:

(1) is true since xij 2 {0,1}

(2) is true since there is only one x ij = 1 for each target.

Therefore:

Page 35: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 36

Efficiently Solvable Cases

The Case of One Weapon per Target• This can now be written as:

• Which is the transportation problem with:– costij = -qij

– k supply nodes with supply = 1– n demand nodes with demand = 1

Page 36: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 37

SWTA Approximation HeuristicsThree main techniques:• Integer constraint relaxation

– Allow fractional allocations of weapons to targets.– Solve resulting LP .– Use randomized rounding to obtain approximate solution to integer problem.

• Modeling as network flow problems– Create a graph of weapons and targets.– Each edge between a weapon and target has a cost approximately equal to the

change in objective function.• Approximate due to non-linear nature

– Set appropriate constraints (eg., supply/demand, capacity).– Solve network flow problem using MCMF, MF, TP algorithms (as is appropriate).

• Localized search– Start with a feasible solution of reasonable quality.– Perform swaps and multi-swaps yielding better solutions.

Page 37: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 38

Presentation Outline

• Introduction

• The Password Allocation Problem

• The Weapon-Target Allocation Problem

• Conclusions and Future Work

Page 38: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 39

Conclusions and Future Work• The Password Allocation Problem

– Also models parallel processing allocation problems.

– NP Complete even when all passwords are equal

– Has several efficiently solvable cases

• Analysis for cases with varying passwords.

• Approximation Techniques – Heuristics– Boundable algorithms (??)

• Online version of the problem

Varia

bilit

y of

pas

swor

dsVariability of accounts

Equal accounts and PWs

Equal #accounts and PWs

Correlated accounts

2 P

2 NP Complete2 ?

Page 39: On the Complexity of Allocation Problems with Probabilistic Players Rishab Nithyanand Research Proficiency Examination Summer 2012 TexPoint fonts used

On the Complexity of Allocation Problems with Probabilistic Players 40

Conclusions and Future Work• The Weapon-Target Allocation

Problem– NP Complete even for the single-

round version.– There are special poly-time solvable

cases.– General approaches to making

approximate solutions.

• Most current work ignores analysis – too much focus on heuristics (unboundable)!– Existence of constant-factor

bounds?– Almost no analysis for multi-round

variant.

Varia

bilit

y of

wea

pons

Variability of targets

All equal targets

Equal weapons and targets

All equal weapons

One weapon per target

2 P

2 NP Complete