1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      On packet scheduling with adversarial jamming and speedup

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In Packet Scheduling with Adversarial Jamming, packets of arbitrary sizes arrive over time to be transmitted over a channel in which instantaneous jamming errors occur at times chosen by the adversary and not known to the algorithm. The transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. An online algorithm maximizes the total size of packets it successfully transmits and the goal is to develop an algorithm with the lowest possible asymptotic competitive ratio, where the additive constant may depend on packet sizes. Our main contribution is a universal algorithm that works for any speedup and packet sizes and, unlike previous algorithms for the problem, it does not need to know these parameters in advance. We show that this algorithm guarantees 1-competitiveness with speedup 4, making it the first known algorithm to maintain 1-competitiveness with a moderate speedup in the general setting of arbitrary packet sizes. We also prove a lower bound of \[\phi +1\approx 2.618\] on the speedup of any 1-competitive deterministic algorithm, showing that our algorithm is close to the optimum. Additionally, we formulate a general framework for analyzing our algorithm locally and use it to show upper bounds on its competitive ratio for speedups in [1, 4) and for several special cases, recovering some previously known results, each of which had a dedicated proof. In particular, our algorithm is 3-competitive without speedup, matching both the (worst-case) performance of the algorithm by Jurdzinski et al. (Proceedings of the 12th workshop on approximation and online algorithms (WAOA), LNCS 8952, pp 193–206, 2015. http://doi.org/10.1007/978-3-319-18263-6_17) and the lower bound by Anta et al. (J Sched 19(2):135–152, 2016. http://doi.org/10.1007/s10951-015-0451-z).

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Article: not found

          Amortized efficiency of list update and paging rules

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Bounds for Certain Multiprocessing Anomalies

            R L Graham (1966)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Competitive snoopy caching

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                Journal
                Annals of Operations Research
                Ann Oper Res
                Springer Science and Business Media LLC
                0254-5330
                1572-9338
                March 2021
                February 04 2019
                March 2021
                : 298
                : 1-2
                : 7-42
                Article
                10.1007/s10479-019-03153-x
                875457c1-1365-4dd7-a8dc-8605a5b96e9c
                © 2021

                https://creativecommons.org/licenses/by/4.0

                https://creativecommons.org/licenses/by/4.0

                History

                Comments

                Comment on this article