Skip to main content

    P. Spirakis

    Research Interests:
    Stackelberg games [15] may model the interplay among an authority and rational individuals that selfishly demand resources on a large-scale network. In such a game, the authority (Leader) of the network is modeled by a distinguished... more
    Stackelberg games [15] may model the interplay among an authority and rational individuals that selfishly demand resources on a large-scale network. In such a game, the authority (Leader) of the network is modeled by a distinguished player. The selfish users (Followers) are modeled by the remaining players. It is well known that selfish behavior may yield a Nash Equilibrium with cost arbitrarily higher than the optimum one, yielding unbounded Coordination Ratio or Price of Anarchy (PoA) [7, 13]. Leader plays his strategy first assigning a portion of the total demand to some resources of the network. Followers observe and react selfishly assigning their demand to the most appealing resources. Leader aims to drive the system to an a posteriori Nash equilibrium with cost close to the overall optimum one [4, 6, 8, 10]. Leader may also be eager for his own rather than system’s performance [2, 3]. A Stackelberg game can be seen as a special, and easy [6] to implement, case of Mechanism Design. It avoids the complexities of either computing taxes or assigning prices, or even designing the network at hand [9]. However, a central authority capable to control the overall demand on the resources of a network may be unrealistic in networks which evolute and operate under the effect of many and diversing economic entities. A realistic way [4] to act centrally even in large nets could be via Virtual Private Networks (VPNs) [1]. Another flexible way is to combine such strategies with Tolls [5, 14]. A dictator controlling the entire demand optimally on the resources surely yields PoA = 1. On the other hand, rational users do prefer a liberal world to live. Thus, it is important to compute the optimal Leader strategy which controls the minimum of the resources (Price of Optimum) and yields PoA D 1. What is the complexity of computing the Price of Optimum? This is not trivial to answer, since the Price of Optimum depends crucially on computing an optimal Leader strategy. In particular, [6] proved that computing the optimal Leader strategy is hard.
    We present here a high performance parallel free-text retrieval m ethod for multiple text queries using the vector space model. Our method employs the fat-tree area universal routing network for connecting the processors of the parallel m... more
    We present here a high performance parallel free-text retrieval m ethod for multiple text queries using the vector space model. Our method employs the fat-tree area universal routing network for connecting the processors of the parallel m achine. We provide a theoretical analysis of our technique which shows it t o b e superior to parallel t ext retrieval based
    ... 5. H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks”, Proceedings of the IEEE Symposium of Privacy and Security”, 11–14 May, pp. 197–213, 2003. 6. A. CF. Chan and ES Rogers ...
    In a number of situations, it is necessary for two agents who may have never communicated in the past to, jointly, create a shared information item which can serve as a basis for subsequent protocols that the agents may wish to execute... more
    In a number of situations, it is necessary for two agents who may have never communicated in the past to, jointly, create a shared information item which can serve as a basis for subsequent protocols that the agents may wish to execute (e.g., negotiation or encryption protocols). One way to create this shared piece of information is to have the two agents start with one random bit string each and then engage in a protocol that enables them to transform, gradually, bit differences (in their strings) into bit agreements. In a previous work, an efficient protocol was proposed which was based on the use of the Extended Golay error-correcting code in order to locate and “correct” bit differences. In this work we generalize this protocol in order to use any generic error-correcting code and derive theoretical performance bounds on the efficiency, based on the characteristics of the employed code. The proposed generalized protocol is fair, in that the final strings (which have the same bits in the majority of positions) depend on the strings possessed by both agents while each agent contributes to the same degree in the formation of these strings. Finally, the proposed protocol is lightweight (both computationally and with respect to message exchanges) and, thus, can be implemented in embedded systems and resource limited devices.
    ABSTRACT In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from... more
    ABSTRACT In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the common knowledge extracted upon the termination of the protocols depends, in a fair way, on the (possibly independent) information items initially known, separately, by the two agents. It is fair in the sense that there is a negotiation between the two agents instead of one agent forcing the other to conform to its own knowledge. These protocols, may be extended in order to support security applications where the establishment of a common knowledge is required. Moreover, the implementation of the protocols leads to reasonably small code that can also fit within resource limited devices involved in any communication network while, at the same time, it is efficient as simulation results demonstrate.
    ABSTRACT
    A classical problem in scheduling theory is to find an optimal nonpreem-tive sched~e for a collection of unit length tasks subject to precedence con-straints. We are given n tasks to be executed on m processors. Each task requires exactly... more
    A classical problem in scheduling theory is to find an optimal nonpreem-tive sched~e for a collection of unit length tasks subject to precedence con-straints. We are given n tasks to be executed on m processors. Each task requires exactly one unit of execution and can run on any ...
    The wide growth of Internet users has led the developers of popular Web sites to adopt the solution of substituting the Web servers by clusters of Web servers, in order to correspond efficiently to the high rate of requests received. They... more
    The wide growth of Internet users has led the developers of popular Web sites to adopt the solution of substituting the Web servers by clusters of Web servers, in order to correspond efficiently to the high rate of requests received. They also applied load balancing techniques to distribute the workload among them. In this paper we present a general design of load balancing strategies in a cluster of Web servers, which uses a proxy per server to collect the incoming requests. To accomplish the best possible workload distribution, we use an update process, which can either be centralized or distributed. We apply two sender-initiated load balancing algorithms, based on the distinction between the centralized and the distributed update process, and analyze their performance results. We conclude that the distributed case behaves better under high loaded conditions.
    This paper shows that the problem of testing whether a graph $G$ contains an induced subgraph of vertex (edge) connectivity at least $k$ is P-complete for any fixed $k \geqslant 3$. Moreover, if $k_{\max } $ is the largest vertex (edge)... more
    This paper shows that the problem of testing whether a graph $G$ contains an induced subgraph of vertex (edge) connectivity at least $k$ is P-complete for any fixed $k \geqslant 3$. Moreover, if $k_{\max } $ is the largest vertex (edge) connectivity of any subgraph of $G$, ...
    ABSTRACT Open and Distance Learning (ODL) can be regarded as learning by means of Telematics (i.e. the combination of means of telecommunications, information technology and multimedia), by which way, among other things:
    ... overhead. [2] present the AODV (Ad Hoc On De-mand Distance Vector routing) protocol that also uses a demand-driven route establishment procedure. ... inconceiv-Page 3. Analysis and Experimental Evaluation 101 able ...
    In this work, we study the stability of the FIFO (First-In-First-Out) protocol in the context of Adversarial Queueing Theory. As an important intermediate step, we consider dynamic capacities, where each network link capacity may... more
    In this work, we study the stability of the FIFO (First-In-First-Out) protocol in the context of Adversarial Queueing Theory. As an important intermediate step, we consider dynamic capacities, where each network link capacity may arbitrarily take on values in the two-valued set of integers f1; Cg for C > 1 being the high capacity (a parameter). In this context: (1) We construct a FIFO network of only eight nodes which is already unstable at rate r = 0:41. This is the current record for instability of FIFO over networks of flxed-size (independent of r). (2) For every r > 0 we then construct a FIFO network (whose size increases with 1 r ) which is unstable at rate r. Subsequently, we show how to simulate the particular FIFO network in (2) above with dynamic capacities 1, C, in order to produce a FIFO network with all link capacities being equal, while preserving instability thresholds. Hence, we eventually show our main result: FIFO can become unstable in the usual model of unit...
    A brief survey on the most recent results concerning the simulation of PRAMs on DMMs is presented, along with the design of a Shared Memory Simulator (SMS) that is based on a distributed environment provided by many realistic... more
    A brief survey on the most recent results concerning the simulation of PRAMs on DMMs is presented, along with the design of a Shared Memory Simulator (SMS) that is based on a distributed environment provided by many realistic architectures, based on the DMM model. The Shared Memory Simulation Frame (SMS-Frame) will give the opportunity of executing parallel algorithms designed for a variant of PRAM, over a purely distributed working environment, that will be c onsidered to comply with the DMM model. The reason why the models of PRAM and DMM have been chosen, is that t he former has proved to be the most popular cost model i n the parallel algorithms community, while the latter is an abstracted model based on message passing, that is very close to, or is provided through specialized interfaces by the majority of the vendors of parallel machines.

    And 21 more