Abstract 1 Introduction 2 Preliminaries 3 Zero-penalty Set is Nonempty and Non-representable as Multiples 4 Zero-penalty Set is Multiples of an Integer References

Online Matching with Delays and Size-Based Costs

Yasushi Kawase ORCID The University of Tokyo, Japan Tomohiro Nakayoshi ORCID The University of Tokyo, Japan
Abstract

In this paper, we introduce the problem of Online Matching with Delays and Size-based Costs (OMDSC). The OMDSC problem involves m requests arriving online. At any time, a group can be formed by matching any number of requests that have been received but remain unmatched. The cost associated with each group is determined by the waiting time for each request within the group and size-dependent cost. The size-dependent cost is specified by a penalty function. Our goal is to partition all the incoming requests into multiple groups while minimizing the total associated cost. This problem is an extension of the TCP acknowledgment problem proposed by Dooly et al. (J. ACM, 2001). It generalizes the cost model for sending acknowledgments. This study reveals the competitive ratios for a fundamental case, in which the penalty function takes only values of either 0 or 1. We classify such penalty functions into three distinct cases: (i) a fixed penalty of 1 regardless of the group size, (ii) a penalty of 0 if and only if the group size is a multiple of a specific integer k, and (iii) other situations. The problem in case (i) is equivalent to the TCP acknowledgment problem, for which Dooly et al. proposed a 2-competitive algorithm. For case (ii), we first show that natural algorithms that match all remaining requests are Ω(k)-competitive. We then propose an O(logk/loglogk)-competitive deterministic algorithm by carefully managing the match size and timing, and prove its optimality. For any penalty function in case (iii), we demonstrate the non-existence of a competitive online algorithm. Additionally, we discuss competitive ratios for other typical penalty functions that are not restricted to take values of 0 or 1.

Keywords and phrases:
Online matching, competitive analysis, delayed service
Funding:
Yasushi Kawase: JST ERATO Grant Number JPMJER2301, JST PRESTO Grant Number JPMJPR2122, JSPS KAKENHI Grant Number JP20K19739, and Value Exchange Engineering, a joint research project between Mercari, Inc. and the RIISE.
Copyright and License:
[Uncaptioned image] © Yasushi Kawase and Tomohiro Nakayoshi; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Online algorithms
Related Version:
Full Version: https://arxiv.org/abs/2408.08658 [22]
Acknowledgements:
The authors thank anonymous reviewers for useful comments.
Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim Thắng

1 Introduction

In online gaming platforms, the challenge of matching players for an optimal gaming experience lies in balancing minimal waiting times and high match quality. For instance, consider an online gaming platform hosting a k-player game, such as chess (k=2), Mahjong (k=4), or battle royal-style shooting games (e.g., k=60 for Apex Legends). On such platforms, players enter a waiting queue sequentially, and the platform selects k players from the queue to start a match. To address scenarios with an insufficient number of players, the platform may opt to fill in groups with computer (AI) players. Although this approach ensures prompt matchmaking, it potentially compromises the quality of the gaming experience. Conversely, waiting to gather the full quota of the required k players may significantly increase the waiting time, potentially reducing player satisfaction.

Motivated by the above challenge, we introduce the Online Matching with Delays and Size-based Costs (OMDSC) problem. In this problem, requests (corresponding to players) are presented sequentially in real time. At any moment, it is possible to match a group composed of any number of previously received but unmatched requests. The total cost associated with each match is defined by the waiting time for each request within the group and the cost that depends on the group size. The penalty function specifies the cost based on the size of the group.

The OMDSC problem has applications beyond gaming. For instance, in online shopping services, product orders arrive sequentially, and the products can be dispatched together at any time. While it is preferable to dispatch as many orders as possible to minimize costs, customers may become frustrated if their wait times are too long. This situation can also be modeled as an OMDSC problem, where the waiting time and the size of each dispatch jointly determine the total cost.

Notably, our problem is closely related to the TCP acknowledgment problem [14], the online weighted cardinality Joint Replenishment Problem (JRP) with delays [12], and the online Min-cost Perfect Matching with Delays (MPMD) [16]. The TCP acknowledgment problem (without look-ahead) is equivalent to the OMDSC problem with a constant penalty function. Various generalizations of the TCP acknowledgment problem partially capture the OMDSC problem. Specifically, the online weighted cardinality JRP with delays considers the costs dependent on the (weighted) cardinality of each group. In these generalizations, the penalty function is assumed to be monotonically nondecreasing. However, the OMDSC problem treats penalty functions as nonmonotonic. In the MPMD problem, requests arrive on a metric space, and matching is restricted to groups of exactly size 2. The online Min-cost Perfect k-way Matching with Delays (k-MPMD) [27] extends the group size to k. For further details, please refer to Section 1.2.

1.1 Our Results

In this study, we determine the competitive ratios of the OMDSC problem for fundamental and critical scenarios in which the penalty function takes only values of either 0 or 1. In the OMDSC problem, dividing a group into multiple smaller groups can reduce penalties. Therefore, it is sufficient to consider a modified penalty function obtained by optimally dividing a group into subgroups. With this modification, we classify penalty functions into three cases: (i) always 1, (ii) 0 if the size is a multiple of k, and (iii) all other scenarios.

In case (i), the OMDSC problem is equivalent to the TCP acknowledgment problem. Dooly et al. [14] proposed a 2-competitive online algorithm that matches all remaining requests when the total waiting cost increases by 1. For case (ii), we first examine natural algorithms that match all the remaining requests whenever a match incurs a positive cost, which we refer to as match-all-remaining algorithms. We demonstrate that every match-all-remaining algorithm is Ω(k)-competitive (Theorem 6). Consequently, to obtain an o(k)-competitive algorithm, we must consider both the timing and size of the requests to be matched. By carefully managing remaining requests, we propose an O(logk/loglogk)-competitive online algorithm (Theorem 8). We also prove that this competitive ratio is the best possible (Theorem 15). It is worth mentioning that the competitive ratio for case (ii) with k=1 is trivial (Theorem 3) and that with k=2 can be obtained from the results of Emek et al. [17]. For any penalty function in case (iii), we prove that no competitive online algorithm exists (Theorem 2). The results are summarized in Table 1. Furthermore, the competitive ratios for other typical penalty functions that are not restricted to take values of 0 or 1 are discussed in Section 2.3.

Table 1: Competitive ratios for the OMDSC problem.
Penalty function (with modification) Competitive ratio Reference
(i) always 1 2 Dooly et al. [14]
k=1 1 Theorem 3
(ii) 0 if the size is a multiple of k k=2 3 Emek et al. [17]
general k 𝚯(𝐥𝐨𝐠𝒌/𝐥𝐨𝐠𝐥𝐨𝐠𝒌) Theorems 8 and 15
(iii) other scenarios unbounded Theorem 2

1.2 Related Work

An online version of the matching problem was first introduced by Karp et al. [21]. In their study, arriving requests are matched immediately upon arrival, primarily focusing on bipartite matching. Additionally, research has been conducted to minimize matching costs, both in settings where vertices have determined costs and in settings that consider distances in a metric space. Mehta et al. [26] proposed an application to AdWords. Other applications, such as food delivery, have also been considered. For further details, please refer to [25, 15].

In applications such as online game matchmaking and ride-sharing services, service providers can delay user matches. Emek et al. [16] modeled this scenario as an MPMD problem. In this setting, the requests can be retained by incurring waiting costs. Several online algorithms have been proposed for solving the MPMD problem [1, 8, 3]. Subsequently, Melnyk et al. [27] extended the MPMD problem to the k-MPMD problem, which requires exactly matching the size k. To address this problem, deterministic and randomized algorithms have been proposed [27, 19].

Dooly et al. [14] introduced the TCP acknowledgment problem that involves acknowledging TCP packets. In this problem, the aim is to minimize the sum of the acknowledgment costs and the costs of delaying TCP packets. Optimal deterministic and randomized algorithms were proposed by Dooly et al. [14] and Karlin et al. [20], respectively. The TCP acknowledgment problem is equivalent to the OMDSC problem, where the penalty function falls under case (i). Conversely, the OMDSC problem can be viewed as a generalization of the acknowledgment cost of the TCP acknowledgment problem.

Various extensions of the TCP acknowledgment problem have been proposed [10, 7, 6, 9, 5, 11, 2, 29, 12]. In particular, Chen et al. [12] introduced the problem of an online weighted cardinality JRP with delays. Their model can handle penalties based on the size of the match. However, unlike in our study, their penalty function is restricted to monotonically nondecreasing. They proposed a constant-competitive algorithm to solve this problem.

The objectives of the MPMD and k-MPMD problems are to pair requests and form groups of exact size k, respectively. In contrast, the proposed OMDSC problem does not impose constraints on the number of requests in each group. Emek et al. [16] introduced a problem called MPMDfp, which allows the clearance of a request at a cost. The MPMDfp problem on a single source is equivalent to the OMDSC problem where the penalty function corresponds to case (ii) with k=2. Additionally, the MPMDfp problem on a single source can be reduced to an MPMD problem using two sources [16]. For MPMD on two sources, Emek et al. [17] proposed a deterministic algorithm, and He et al. [18] proposed a randomized algorithm (see Section 4 for more details).

Another approach to extend the MPMD problem is to modify waiting costs. Liu et al. [23] generalized the waiting costs from linear to convex. Other variations of waiting costs have also been studied [24, 4, 13]. Pavone et al. [28] investigated Online Hypergraph Matching with Deadlines problem. Although hypergraph matching does not impose constraints on group size, it differs from the OMDSC problem in that it employs deadlines instead of delays, and requests arrive at one at each unit of time.

2 Preliminaries

We denote the set of real numbers, nonnegative real numbers, integers, nonnegative integers, and positive integers by , +, , +, and ++, respectively. In addition, for a positive integer k++, we define k as the set of integers from 0 to k1.

2.1 Problem Settings

In this section, we formally define the OMDSC problem. An instance of the problem is specified by a penalty function f:+++ and m requests V={v1,v2,,vm} that arrive in real time. Each request vi arrives at time ti, where 0t1t2tm is assumed.

An online algorithm initially knows only the function f; it does not have prior knowledge of the arrival times or the total number of requests. Each request vi is revealed at time ti. At each time τ, the algorithm can match any subset Sj of requests that appeared by time τ and have not yet been matched. The cost of matching requests in Sj at time τj is defined as

f(|Sj|)+i:viSj(τjti),

where the first term represents the size cost and the second term represents the waiting cost. In addition, the waiting cost at time τ is defined as i:viV(τti), where V is the set of unmatched but previously presented requests at that time.

The objective is to design an online algorithm that matches all requests while minimizing the total cost. We use the competitive ratio to evaluate the performance of the online algorithm. For a given instance σ, let ALG(σ) represent the cost incurred by the online algorithm and let OPT(σ) denote the optimal cost with prior knowledge of all requests in the instance. The competitive ratio of ALG for an instance σ is defined as ALG(σ)/OPT(σ), interpreting 0/0 as 1. In addition, the competitive ratio of ALG for a problem is defined as the supremum of the competitive ratios over all instances, that is, supσALG(σ)/OPT(σ). We call an online algorithm ρ-competitive if the competitive ratio of that algorithm is ρ.

The competitive ratio defined above is the strict competitive ratio. We can also define the asymptotic competitive ratio as lim supALG(σ)ALG(σ)/OPT(σ). However, in our problem, the strict and asymptotic competitive ratios of the optimal algorithm coincide. Indeed, if an algorithm is strictly ρ-competitive, then it is also asymptotically at most ρ-competitive by definition. Moreover, if no strictly ρ-competitive algorithm exists, we can construct an instance for each algorithm in which the strict competitive ratio is at least ρ. Thus, by repeatedly constructing and providing such instances, we can conclude that no algorithm has an asymptotic competitive ratio better than ρ. Hence, we only consider the strict competitive ratio hereafter.

2.2 Binary Penalty Function

This study focuses primarily on penalty functions that take values only of either 0 or 1. We discuss other penalty functions in Section 2.3. For such a binary penalty function f, we may be able to match n requests with size cost 0, even if f(n)=1, by appropriately partitioning the requests. For instance, if f(2)=f(3)=0 and f(7)=1, we can match 7 requests with a size cost of 0 by partitioning them into groups of sizes 2, 2, and 3. We introduce a notation for the set of numbers of requests that can be matched with a size cost of 0 as follows:

Definition 1.

For the penalty function f:++{0,1}, we define the zero-penalty set Bf as a set of quantities that can be matched with a size cost of 0 by optimally dividing requests into subsets and matching them. Formally,

Bf{n++|s++,n1,,ns++ s.t.i=1sni=n,f(n1)==f(ns)=0}.

For example, if f(1)=0, then Bf=++. Alternatively, if f(1)=1 and f(2)=f(3)=0, then Bf=++{1}. We can interpret the size cost of matching n requests as 0 if nBf and 1 if nBf.

We classify binary penalty functions into the following three types: (i) Bf=, (ii) Bf={knn++} for some k++, and (iii) all other scenarios. Case (i) is the situation in which the penalty for matching requests is always 1 (i.e., f(n)=1 for all n++). Case (ii) is a situation in which a set of requests can be matched without a size cost only if the size is a multiple of k=min{n++f(n)=0} (i.e., f(k)=0 and f(n)=1 for all n++{knn++}). This case is applicable in the context of an online gaming platform that hosts a k-players game, as described in Introduction.

2.3 Other Penalty Functions

If the range of the penalty function is {0,μ} with a positive real μ, it can be treated as a binary penalty function by scaling the increase rates of the waiting costs μ times slower. This is because the cost of matching requests in Sj at time τj can be expressed as μ(f(|Sj|)/μ+i:viSj(τj/μti/μ)). For example, if μ=60 and the unit time is one minute in the original problem, the range of the penalty function can be treated as {0,1} by adjusting the unit time to one hour. Let μ,λ with 0<μλ and consider a penalty function that takes values of 0 or within the range [μ,λ]. By applying our ρ-competitive algorithm to the problem while treating positive penalties as if they were μ, we can obtain a (ρλ/μ)-competitive algorithm. In addition, our impossibility result for case (iii) can be transferred in the same manner.

Another interesting penalty function is f(n)=n/k for a specific integer k. This penalty function appears when a service can process up to k requests simultaneously, and each processing costs a fixed amount. For this penalty function, an algorithm similar to that in (i) is 2-competitive for any k2. We also prove that this competitive ratio is best possible for every k2 (see the full version [22]). For k=1, the algorithm that matches each request upon its arrival is 1-competitive.

3 Zero-penalty Set is Nonempty and Non-representable as Multiples

In this section, we examine case (iii), where the penalty function f satisfies Bf and Bf{knn++} for any k++. We demonstrate that, in this case, no algorithm has a finite competitive ratio.

To illustrate this intuitively, let us consider the case where f(1)=1 and f(2)=f(3)=0, representing a poker table for at least two players. Imagine two players arriving initially, followed potentially by a third. If we match the first two players immediately upon their arrival, matching the subsequent player incurs a cost. Alternatively, if we wait to match the first two, an unnecessary waiting cost is incurred when no additional player appears. We can construct similar instances for every penalty function in case (iii).

Theorem 2.

For the OMDSC problem with a penalty function f that satisfies both Bf and Bf{knn++} for every k++, the competitive ratio of any randomized algorithm is unbounded against an oblivious adversary.

Proof.

Let kminBf, where such a value must exist by the assumption that Bf. Additionally, let min(Bf{knn++}), where such a value must exists because {knn++}Bf and Bf{knn++}. We fix an arbitrary online algorithm ALG and take a sufficiently small ε>0. Consider an instance where k requests are given at time 0, and afterward, there may be arrivals of k additional requests at time ε depending on the behavior of ALG. Suppose that ALG matches all the initial requests before ε with probability p.

If p1/2, consider an instance where k additional requests are given at time ε. Since kBf, ALG incurs an expected size cost of at least p(1/2). In contrast, the minimum total cost is kε by matching all k+(k)= requests at time ε. Thus, the competitive ratio is at least p/(kε)1/(2kε).

Conversely, if p<1/2, consider the instance where no additional requests are presented. Then, the (expected) waiting cost for ALG is at least (1p)kε>kε/2, while the offline optimal cost is 0 by matching all requests at time 0. Hence, the competitive ratio is unbounded.

Therefore, in both scenarios, the competitive ratio is unbounded as ε goes to 0, proving that the competitive ratio for any online algorithm is unbounded.

4 Zero-penalty Set is Multiples of an Integer

In this section, we investigate the case (ii), where the penalty function f satisfies Bf={knn++} for some k++.

When k=1 (i.e., Bf=++), we have f(1)=0. Thus, the algorithm that immediately matches each request individually upon its arrival incurs a cost of 0 and is 1-competitive.

Theorem 3.

For the OMDSC problem with a penalty function f such that f(1)=0, there exists a 1-competitive deterministic online algorithm.

For the case k=2, the OMDSC problem is equivalent to the problem of MPMDfp in a metric space consisting of a single point. It is known that the MPMDfp problem can be reduced to the MPMD problem by doubling the number of points on the metric space [16]. By this reduction, the OMDSC problem with k=2 can be reduced to the problem of MPMD on two sources by setting the distance between two sources to 2 and giving requests for two sources simultaneously when a request is given in the OMDSC problem. A matching across two sources in the MPMD problem corresponds to a matching of a single request in the OMDSC problem. The optimal cost of the reduced MPMD problem is twice that of the original OMDSC problem.

Emek et al. [17] provided a 3-competitive online algorithm for the online MPMD problem on two sources and demonstrated that this is best possible. In their instances constructed for the proof of the lower bound, requests are always given to two sources simultaneously, which can be reduced to the OMDSC problem with k=2. Therefore, we obtain the following theorem.

Theorem 4 (Emek et al. [17]).

For the OMDSC problem with a penalty function f such that Bf={2nn++}, there exists a 3-competitive deterministic algorithm. Moreover, no deterministic online algorithm has a competitive ratio smaller than 3.

He et al. [18] proposed a 2-competitive randomized algorithm against an oblivious adversary for the MPMD problem on two sources. Thus, this leads to a 2-competitive randomized algorithm for the OMDSC problem with Bf={2nn++}.

In the remainder of this section, we conduct an asymptotic analysis with respect to k.

Firstly, we define a type of algorithm as below and demonstrate the difficulty of case (ii) compared to case (i).

Definition 5.

We call an algorithm for the OMDSC problem match-all-remaining if, whenever it makes a match, it matches all remaining requests or the size is in Bf.

For case (i), where a penalty to match requests is always 1, a match-all-remaining algorithm achieves the optimal competitive ratio. However, for case (ii), we show that every match-all-remaining algorithm has a competitive ratio of Ω(k), where the proof can be found in the full version [22].

Theorem 6.

For the OMDSC problem with a penalty function f that satisfies Bf={knn++}, every match-all-remaining algorithm has a competitive ratio of Ω(k).

In Section 4.1, we provide an O(logk/loglogk)-competitive algorithm by utilizing partial matchings of remaining requests. Thus, no match-all-remaining algorithm is optimal. Subsequently, in Section 4.2, we establish the lower bound of Ω(logk/loglogk).

Before proceeding, we introduce some notations. Recall that k={0,1,,k1}.

Definition 7.

We write x¯k to represent the remainder of x when divided by k. Additionally, for ,r+, we define the cyclic interval

,rk{{xk¯xr¯}={¯,¯+1,,r¯}(if ¯r¯),{xkxr¯ or ¯x}={¯,¯+1,,k1,0,1,,r¯}(if ¯>r¯).

With this notation, ab(modk) can be expressed as a¯=b¯. Note that we have |,rk|=r¯¯+1 if ¯r¯ and |,rk|=k+r¯¯+1 if ¯>r¯.

Let α be a real number such that αα=k. Then, we have α=Θ(logk/loglogk) because the ratio αlogk/loglogk=αlogαα/loglogαα=logα+loglogαlogα approaches 1 as k (i.e., α). Thus, our task is to provide upper and lower bounds of O(α) and Ω(α), respectively.

4.1 Upper Bound

The objective of this subsection is to prove the following theorem.

Theorem 8.

For the OMDSC problem with a penalty function f that satisfies Bf={knn++}, there exists an O(logk/loglogk)-competitive deterministic online algorithm.

According to Theorem 6, an O(α) (=O(logk/loglogk))-competitive algorithm must consider both the timing and the size of requests to be matched. To address this requirement, we propose an algorithm that references the costs of other algorithms. The execution of the algorithm is divided into phases. In each phase, the goal is to ensure that any competing algorithm incurs a cost of at least 1, while our algorithm’s cost remains at most O(α). We categorize competing algorithms based on the number of unmatched requests they carry over from the previous phase. As for the current phase, we assume that algorithms only perform matches of sizes that are multiples of k, since otherwise, their cost immediately reaches at least 1. Furthermore, it is sufficient to focus on “greedy” algorithms that immediately match k requests whenever at least k unmatched requests exist.

The first phase starts at the beginning. In each phase, our algorithm runs with the following k+2 variables.

Definition 9.

At each time t within each phase, the variables W0(t),W1(t),,Wk1(t), s(t), and a(t) are defined as follows:

  • Wi(t) (ik): the waiting cost incurred by time t within the phase on the algorithm that greedily performs matches with no size cost, assuming (ki¯) unmatched requests are carried over to the current phase.

  • s(t): the number of requests given by time t in the phase.

  • a(t): the number of requests that our algorithm has matched up to, but not including, time t during the phase.

We will omit the argument t when there is no confusion.

Note that, if (ki) unmatched requests are carried over to the current phase, the optimum cost incurred thus far within the phase is at least min{1,Wi}. At the end of the phase, our algorithm ensures Wi1 for all ik. This means that any algorithm incurs a cost of at least 1 per phase because matching a number of requests that is not a multiple of k results in a cost of 1.

During each phase, our algorithm recursively processes a subroutine recurring(p,qk,l), which takes as parameters a cyclic interval p,qk and an integer l. When the subroutine is called, it ensures that Wi1 for all ip,qk and Wil/α for all ip,qk. In each iteration of the subroutine, the interval size |p,qk| is reduced by a factor of Θ(1/α) or l is increased by one, with incurring cost at most O(1). As a result, all Wi reach at least 1 after O(α) recursions by αα=k.

At the beginning of each phase, the variables W0,W1,,Wk1, s, and a are 0 and recurring(0,k1k, 0) is called. Throughout the phase, the algorithm updates the values of W0,W1,,Wk1, s, and a, appropriately. Moreover, if at least k unmatched requests exist (i.e., sak), it immediately matches k of them.

Algorithm 1 The pseudo-code of recurring(p,qk,l).
(a) Line 1.
(b) Lines 5 and 8.
(c) Line 6.
(d) Line 9.
(e) Line 11.
(f) Line 13.
(g) Line 14.
(h) Line 17.
Figure 1: Lower bounds of Wi at each line of Algorithm 1. Gray areas indicate lower bounds of Wi at the beginning of recurring(p,qk,l). Red areas illustrate increments earlier than the last wait in recurring(p,qk,l). Pink areas represent increments during the last wait.
(a) Situation at line 7.

(b) Situation at line 12.
Figure 2: Relative positions of p, q, p, q, and a¯ in Algorithm 1.

We now describe the subroutine recurring(p,qk,l). See Algorithm 1 for a formal description. Figure 1 illustrates lower bound of each Wi at each line.

When recurring(p,qk,l) is called, it is guaranteed that p,qk, l{0,1,,α}, Wi1 for all ip,qk, Wil/α for all ip,qk, and a¯=p (recall that a¯k is the remainder of a when divided by k, see also Figure 1). The recursion ends (line 3) when |p,qk| equals to 1 or when l is at least α. Then, it matches all remaining requests and proceeds to the next phase.

At the beginning of each recursion, the algorithm waits until Wa¯ increases by 2 (line 2). Afterward, if Wi(l+1)/α for all ip,qk, it calls recurring(p,qk,l+1) (Figure 1). Now, assume that Wi<(l+1)/α for some ip,qk. In this case, there exists a smaller interval p,qk(p,qk) such that Wi(l+1)/α for all ip,qkp,qk (Figure 1). The algorithm picks the smallest such cyclic interval p,qk (line 6).

Next, it attempts to change a¯ from p to p by matching pp¯ requests. To achieve this, it waits to satisfy s¯p,p1k (see Figure 2) until Wa¯(=Wp) increases by 1/α (line 7). If Wa¯ increases by 1/α, then Wi(l+1)/α holds for every ip,qk as we will show later (Figure 1). Consequently, the algorithm calls recurring(p,qk,l+1) (line 8). Now, suppose that s¯ in p,p1k at some point. In that case, it changes a¯ from p to p by matching pp¯ requests (line 9 and see Figure 1).

Then, the algorithm waits until Wa¯(=Wp) increases by 2 (line 10). We consider two cases: () Wi(l+1)/α for all ip,qk (Figure 1) and () Wi<(l+1)/α for some ip,qk (Figure 1). In case (), the algorithm attempts to move a¯ from p to p to call recurring(p,qk,l+1). To do this, the algorithm waits until s¯p,p1k (see Figure 2) or until Wa¯(=Wp) increases by 1 (line 12). If Wp increases by 1, then Wi1 holds for every ip,pk as we will show later (Figure 1). Then, it calls recurring(p,qk,l+1) (line 18). Otherwise, the algorithm changes a¯ from p to p by matching pp¯ requests (line 14 and see Figure 1). Consequently, it calls recurring(p,qk,l+1) (line 15). In case (), Wi becomes at least 1 for i in not a cyclic interval p,rk (Figure 1). Then, the algorithm calls recurring(p,rk,l) (line 18).

After completing the call of recurring, we have Wi1 for all ik. Then, the algorithm moves to the next phase.

To analyze the competitive ratio of this algorithm, we present several lemmas. The value of Wi changes continuously within each phase, and its rate of increase over time is given by dWi(t)dt=s(t)i¯. The increase rate of Wi for each i is illustrated in Figure 3.

(a) s¯p,i1k.

(b) s¯i,p1k.
Figure 3: The increase rates dWpdt=sp¯ and dWidt=si¯.

We demonstrate that if Wp increases significantly while Wi increases only slightly, then Wp increases significantly during periods when si¯ is small.

Lemma 10.

Let p,qk and ip+1,qk. For two times x,y(x<y) in the same phase, suppose that Wp(y)Wp(x)2 and Wi(y)Wi(x)<1/α. Then, the increment of Wp in time t with xty and s(t)¯i,p1ki,i+(ip¯)/(α1)1k is more than 1.

Proof.

Let βk be the index such that i,βk=i,p1ki,i+(ip¯)/(α1)1k. Define T{txtyands(t)¯i,βk} and T^{txtyands(t)¯i,βk}.

Fix tT^. Then, we have either s(t)¯i,p1k or s(t)i¯(ip¯)/(α1). If s(t)¯i,p1k, then dWi(t)dtdWp(t)dt. Otherwise (i.e. s(t)¯i,p1k and s(t)i¯(ip¯)/(α1)), we have

dWi(t)dt =(s(t)i¯)=(s(t)i¯)+(α1)(s(t)i¯)α(s(t)i¯)+(ip¯)α=(s(t)p¯)α=1αdWp(t)dt.

Thus, in either case, dWp(t)dtαdWi(t)dt.

Suppose to the contrary that the increment of Wp within tT is at most 1. Under this condition, Wp must increase by at least 1 within tT^ because Wp(y)Wp(x)2. Therefore, we have

1α11αT^dWp(t)dtdtT^dWi(t)dtdtxydWi(t)dtdt=Wi(y)Wi(x),

where the second inequality holds by dWp(t)dtαdWi(t)dt for tT^. This contradicts the assumption that Wi(y)Wi(x)<1/α. Therefore, the increment of Wp within tT is more than 1.

Next, by using Lemma 10, we show that Wi increases by at least 1/α except for some small interval after Wp increases by 2. This indicates that |p,qk| is small in the situation depicted in Figure 1.

Lemma 11.

Let p,qk. For two times x,y(x<y) in the same phase, suppose that Wp(y)Wp(x)=2. Then, there exist some p,qk such that p,qkp,qk, |p,qk||p,qk|/α, and Wi(y)Wi(x)1/α for all ip,qkp,qk.

Proof.

If Wi(y)Wi(x)1/α for all ip,qk, then the conditions are satisfied by setting p=q=p. Hence, in what follows, we assume that Wi(y)Wi(x)<1/α for some ip,qk. Define p,qk(p,qk) to be the minimum cyclic interval such that Wi(y)Wi(x)1/α for all ip,qkp,qk.

What is left is to show that |p,qk||p,qk|/α. Let βik be the index such that i,βik=i,p1ki,i+(ip¯)/(α1)1k and Ti{txtyands(t)¯i,βik} for i{p,q}. Then, by Lemma 10, the increments of Wp within tTp and tTq are more than 1, respectively. Since the total increment of Wp is 2, the intervals p,βpk and q,βqk must overlap. Thus, we have qp,βpk (see Figure 4).

Figure 4: Relative positions of p, q, p, q, and βp in Lemma 11.

Now, we are ready to prove |p,qk||p,qk|/α. If pp¯(α1)|p,qk|/α, then we have |p,qk||p,βpk|(pp¯)/(α1)|p,qk|/α. Otherwise (i.e., pp¯>(α1)|p,qk|/α), we have

|p,qk| |p,qk|=|p,qk||p,p1k|=|p,qk|(pp¯)
<|p,qk|(α1)|p,qk|/α=|p,qk|/α|p,qk|/α.

Now, we demonstrate that recurring satisfies desired properties.

Lemma 12.

When recurring(p,qk,l) is called, the following three conditions are satisfied: (i) Wi1 for all ip,qk, (ii) Wil/α for all ip,qk, and (iii) a¯=p. Moreover, if recurring(p^,q^k,l^) is called next, it satisfies either (a) |p^,q^k||p,qk| and l^=l+1, or (b) |p^,q^k||p,qk|/(α1) and l^=l.

Proof.

We prove these by induction.

Initially, when recurring(0,k1k,0) is called at the beginning of a phase, the conditions are satisfied as Wi=00/α for all i0,k1k and a¯=p=0.

As an induction hypothesis, suppose the conditions are satisfied when recurring(p,qk,l) is called. Our goal is to show that these conditions continue to be satisfied at the next recursive call. We analyze this based on where the recursive call is made in the conditional branching of Algorithm 1. We denote by L the cardinality of p,qk.

If the condition of line 5 is true and recurring(p,qk,l+1) is called

Conditions (i) and (iii) are satisfied as a¯=p. Condition (ii) is also satisfied since the condition of line 5 is true (see Figure 1). Moreover, the next call satisfies conditions (a).

If the condition of line 5 is false

Since the proposed algorithm waits until Wa¯ increases by 2 at line 2, the interval p,qk chosen at line 6 satisfies |p,qk|L/α by Lemma 11 (see Figure 1).

If the condition of line 8 is true and recurring(p,qk,l+1) is called

Conditions (i) and (iii) are satisfied as a¯=p. As Wp increases by 1/α while s¯p,p1k, Wi also increases by at least 1/α for all ip,p1k by si¯sp¯ (see Figure 1). Thus, for all ip,qk, Wi increases by 1/α, and hence condition (ii) is also satisfied (see Figure 1). Additionally, the next call satisfies condition (a).

If the condition of line 8 is false

Since s¯p,p1k, the proposed algorithm can match (pa¯)=(pp¯) requests at line 9 (see Figure 1). This match results in a¯=p.

If the condition of line 11 is true

In this scenario, recurring(p,qk,l+1) at line 13 or recurring(p,qk,l+1) at line 15 is called. In both cases, condition (a) is satisfied. In the first case, Wa¯(=Wp) increases by 1 at line 12, which indicates s¯p,p1k during the increase. Thus, for any ip,p1k, Wi increases by at least 1, and a¯=p (see Figure 1). Then, it calls recurring(p,qk,l+1) at line 13. In the second case, s¯ is in p,p1k and the proposed algorithm can match (pa¯)=(pp¯) requests, making a¯=p (see Figure 1). Then, it calls recurring(p,qk,l+1) at line 15. These calls satisfy conditions (i) and (iii) in both cases and condition (ii) is satisfied because the condition of line 11 is true.

If the condition of line 11 is false and recurring(p,rk,l) is called

There exists an index ip,qk such that Wi increases by less than 1/α at line 10 (Figure 1). Let βk be the index such that i,βk=i,p1ki,i+(ip¯)/(α1)1k. Lemma 10 ensures that Wp increases by more than 1 during s¯i,βk. Therefore, for all jβ+1,p1k, Wj also increases by at least 1. As (ip¯)(qp¯)=|p,qk|1L/α, we obtain

p,βk p,i+(ip¯)/(α1)1k
p,p+(ip¯)+1α1(ip¯)1k
=p,p+αα1(ip¯)1kp,p+L/(α1)1k.

As p,rkp,βk, we have |p,rk|L/(α1) and condition (b) is satisfied. Since a¯=p, conditions (i) and (iii) are satisfied, and by the induction hypothesis, condition (ii) is also satisfied.

We can bound the number of recursions called by the proposed algorithm from Lemma 12, giving us the upper bound of the cost incurred by the proposed algorithm during each phase.

Lemma 13.

The proposed algorithm incurs a cost of O(α) per phase.

Proof.

It is not difficult to see that the cost incurred by the algorithm in each recursive call is no more than 8. Thus, it is sufficient to prove that the number of recursions is at most O(α) in each phase.

As our goal is asymptotic evaluation, we may assume that α4, which implies α(α1)2. By Lemma 12, each call of recurring(p,qk,l) either increments l by 1 or reduces the number of elements in p,qk to at most |p,qk|/(α1). Recall that the recursion starts with |p,qk|=k(=αα) and l=0 and ends when |p,qk|=1 or lα.

Let Ln be the number of elements in p,qk after the interval reduction has occurred n times. Then, we have LnLn1/(α1)Ln1/(α1)+1, which implies

(Lnα1α2)1α1(Ln1α1α2)1(α1)n(L0α1α2)L0(α1)n.

Thus, the number of elements in the interval after 2α+1 iterations is at most

L2α+1αα(α1)2α+1+α1α21α1+α1α2=1+1α1+1α2<2,

where the second inequality holds by α(α1)2 and the third inequality holds by 1/(α1)<1/(α2)1/2 from the assumption that α4. Consequently, the number of elements in p,qk is reduced to 1 or l increases to α in at most 3α=O(α) iterations. Thus, the number of recursive calls is O(α).

Next, we provide a lower bound on the cost incurred by any algorithm during each phase.

Lemma 14.

At the end of a phase, the cost incurred within the phase by any algorithm is at least 1 (if we treat the waiting costs as imposed sequentially at each moment, rather than at the time of matching).

Proof.

Recall that, if (ki) unmatched requests are carried over to a phase, the optimum cost incurred thus far within the phase is at least min{1,Wi}. Thus, it is sufficient to prove that Wi1 for all ik at the end of the phase.

The phase ends at line 4. At this point, we have |p,qk|=1 or lα, according to the condition at line 3. If |p,qk|=1, then we have p=q, and Wi1 for all ip by Lemma 12. Since Wp1 due to the wait performed at line 2, it follows that Wi1 for all ik. Conversely, if lα, we have Wi1 for all ip,qk and Wil/α1 for all ip,qk by Lemma 12. Thus, in either case, we obtain Wi1 for all ik at the end of the phase. This proves the lemma.

Based on the lemmas above, we now prove Theorem 8.

Proof of Theorem 8.

Suppose that the proposed algorithm completes p(1) phases for the given instance. Then, the cost for the proposed algorithm is at most (p+1)O(α) by Lemma 13, while the cost for any algorithm is at least p by Lemma 14. Therefore, the competitive ratio for this instance is at most (p+1)O(α)/p=O(α).

Conversely, suppose that the instance ends during the first phase. If the optimal offline algorithm incurs a cost of at least 1, then the competitive ratio is at most O(α), as the cost incurred by the proposed algorithm during the first phase is O(α). If the cost incurred by the optimal offline algorithm is less than 1, then only waiting costs are incurred, as no requests are carried over to the first phase. This means that the total cost of the optimal offline algorithm is equal to W0. Since the proposed algorithm continues to wait until W0 reaches 2 at line 2, the total cost of the proposed algorithm is also equal to W0, resulting in a competitive ratio of 1 for such an instance.

Therefore, the proposed algorithm is O(α)(=O(logk/loglogk))-competitive.

4.2 Lower Bound

In this subsection, we prove the following lower bound of the competitive ratio.

Theorem 15.

For the OMDSC problem with a penalty function f that satisfies Bf={knn++}, every deterministic online algorithm has a competitive ratio of Ω(logk/loglogk).

Recall that α is a positive real such that αα=k. We fix an arbitrary online algorithm ALG and construct an adversarial instance according to the behavior of ALG, denoted as σALG. The instance σALG is composed of Θ(α) rounds. To construct σALG, we introduce variables similar to Definition 9.

Definition 16.

For the instance σALG and time t, the variables W0(t),W1(t),,Wk1(t), s(t), and a(t) are defined as follows:

  • Wi(t)(ik): the waiting cost incurred by time t for an algorithm that initially matches (i1¯) requests (i.e, leaving (ki¯) requests) at time 0 and subsequently performs matches of size k immediately for every k unmatched requests accumulated.

  • s(t): the number of requests given by time t.

  • a(t): the number of requests matched by ALG up to, but not including, time t.

We will omit the argument t when there is no confusion.

The instance σALG contains k1 requests with arrival time at 0. For σALG and any ik, there exists an offline algorithm that incurs a cost of at most 2+Wi(xn), where xn is the time when the last requests are given in σALG. This can be achieved by matching (i1¯) requests at time 0, greedily matching a multiple of k requests in the middle, and matching all the remaining requests at time xn. For each round n, the starting time is xn, and there is a (non-empty) cyclic interval pn,qnk such that Wi(xn)2α/n for every ipn,qnk. As rounds progress, the interval is gradually narrowed, and ALG incurs a cost of Ω(1) per round. The instance σALG consists of Θ(α) rounds. This implies that while there exists an offline algorithm with a cost of O(1), ALG incurs a cost of Ω(α), indicating that the competitive ratio of ALG is Ω(α)=Ω(logk/loglogk).

Initially, the instance gives k1 requests at time 0 (i.e. a(0)¯=0 and s(0)¯=k1). Let n be the variable that indicates the round, initialized to 0. Define p0=0, q0=k1, and x0=0.

For the nth round (n0), if |pn,qnk|<α2, set n to be n and finalize the instance. Otherwise, the round continues until time xn+1=xn+1/(s(xn)a(xn)¯). Requests in round n are provided at time xn+1 based on the number of remaining requests immediately before time xn+1 (i.e., s(xn)a(xn+1)¯).

Let hn be |pn,qnk|/α2. If a(xn+1)¯qnhn+1,qnk, then set (pn+1,qn+1) to be (qnhn+1¯,qn) and give no requests. Otherwise, let (pn+1,qn+1)=(qn2hn+1¯,qnhn¯), and give qn+1qn¯ requests so that s(xn+1)¯=qn+1 at time xn+1 (see Figure 5). Then, increase round count n by 1 and proceed to the next round.

This instance ensures that (i) k/α2n|pn,qnk|k/αn, (ii) Wi(xn)2n/α for all ipn,qnk, and (iii) a(xn)¯qn+1,pnk and s(xn)¯=qn.

Figure 5: Relative positions of the cyclic intervals.
Figure 6: Increment rates dWidt=qi¯ and dWjdt=qj¯.

Now, we show a lemma that establishes a lower bound on the number of elements in a cyclic interval where the increment of Wi in the interval is at most 2/α times the increment of Wj for specific j.

Lemma 17.

For a cyclic interval p,qk, let L|p,qk| and hL/α2. Suppose that Lα2 and α4. Then, for any iq+1,pk and jq2h+1,qk, the increment of Wj is at most 2/α times the increment of Wi in the state where s¯=q.

Proof.

Figure 6 depicts the increment rates dWidt=qi¯ and dWjdt=qj¯. By the assumption that Lα2 and α4, we have

2α(L1)(2Lα2+1)=2Lα(11α)2α12α2α(114)241>0. (1)

Therefore, for any iq+1,pk and jq2h+1,qk, we get

dWjdt=qj¯2Lα212Lα2+12α(L1)=2αqp¯=2αdWidt,

where the third inequality follows from (1). Since the rate of increase is constant while s¯=q, the increment of Wj is at most 2/α times the increment of Wi.

By using this lemma, we bound the number of elements in p,qk after n rounds from below and bound the values of Wi for all ip,qk from above.

Lemma 18.

Let n{0,1,2,,n} and suppose that α4. At time xn, the following three conditions are satisfied: (i) k/α2n|pn,qnk|k/αn, (ii) Wi(xn)2n/α for all ipn,qnk, and (iii) a(xn)¯qn+1,pnk and s(xn)¯=qn.

Proof.

We prove this by induction on n.

At time x0=0, we have p0,q0k=0,k1k=k=k/α0, and Wi(x0)=020/α for all i0,k1k=p0,q0k. In addition, we have a(x0)¯=00,0k=k,0k and s(x0)¯=k1. Thus, conditions (i), (ii), and (iii) are satisfied.

Let n{0,1,2,,n1}. Suppose that conditions (i), (ii), and (iii) are satisfied for n=n. We show that these conditions are also satisfied for n=n+1.

Recall that hn=|pn,qnk|/α2. Then, there are two cases where (pn+1,qn+1) is set to be (qnhn+1¯,qn) or (qn2hn+1¯,qnhn¯). In both cases, we prove the inductive step by using Lemma 17. Note that |pn+1,qn+1k|=hn, a(xn+1)¯pn+1,qn+1k and s(xn+1)¯=qn+1 in both cases by the definition of the procedure. Thus, the condition (iii) is met. By the induction hypothesis, we have k/α2n|pn,qnk|k/αn and a(xn)¯qn+1,pnk. Also, as n<n, we have |pn,qnk|α2. Thus, we have

|pn+1,qn+1k|=|pn,qnk|α2k/α2nα2kα2n+2.

Also, we have

|pn+1,qn+1k|=|pn,qnk|α21+|pn,qnk|α22|pn,qnk|α2|pn,qnk|αkαn+1,

where the second inequality holds by |pn,qnk|α2 and the third inequality holds by α4. Thus, the condition (i) is satisfied in both cases. Moreover, we have

Wpn(xn+1)Wpn(xn)=(xn+1xn)(s(xn)pn¯)=(s(xn)pn¯)(s(xn)a(xn)¯)1,

because s(xn)¯=qn and a(xn)¯qn+1,pnk (see Figure 6). Thus, the increment of Wj is less than 2/α for all jpn+1,qn+1kqn2hn+1,qnk by Lemma 17 with setting (p,q)=(pn,qn) and i=pn. Therefore, combining with the induction hypothesis, we obtain Wj(xn+1)2(n+1)/α for all jpn+1,qn+1k. This means that the condition (ii) is satisfied.

Therefore, the conditions (i), (ii), and (iii) are satisfied for n=n+1. This completes the proof by induction.

In what follows, we bound the cost incurred by any online algorithm ALG on σALG is at least Ω(α) and the cost for the optimal offline algorithm on σALG is at most a constant. As our goal is asymptotic evaluation, we assume that α4 in the following.

Lemma 19.

The number of rounds n is Θ(α).

Proof.

For n{0,1,2,,n}, let Ln=|pn,qnk|. From Lemma 18, we have k/α2nLnk/αn. By the termination condition, we have Ln<α2 and Ln1α2. As α2>Lnk/α2n=αα2n, we have n(α2)/2=α/21. In addition, as α2Ln1k/αn1=ααn+1, we have nα1α. Therefore, we obtain α/21nα, and hence n=Θ(α).

From Lemma 19, we can prove the following lemmas.

Lemma 20.

For any deterministic online algorithm ALG, there exists an offline algorithm that incurs a cost of at most a constant for the instance σALG.

Proof.

Let i be an arbitrary element in pn,qnk. Consider the algorithm that initially matches (i1¯) requests at time 0, subsequently performs matches of size k immediately for every k unmatched requests accumulated, and finally matches all the remaining unmatched requests at xn. Then, the total waiting cost of this algorithm is at most Wi(xn)2n/α2 by Lemmas 18 and 19. Moreover, the total size cost is at most 2, as it matches at most twice with sets of requests of size not a multiple of k. Therefore, The total cost incurred by this algorithm is at most 4.

Lemma 21.

ALG(σALG)=Ω(α) for any deterministic online algorithm ALG.

Proof.

For the nth round, we divide into two cases in which ALG matches a non-multiple of k requests during a period [xn,xn+1) or not. If ALG matches a non-multiple of k requests, it incurs a size cost of 1. Otherwise, a(t)¯=a(xn)¯ for all t[xn,xn+1), leading to that the increment of Wa(xn)¯ during [xn,xn+1) is 1 because xn+1xn=1/(s(xn)a(xn)¯) and its increase rate is (s(xn)a(xn)¯). In both cases, the algorithm incurs at least a cost of 1 in each round.

Therefore, the total cost incurred over the instance is at least 1n=Ω(α) by Lemma 19.

Now, we are ready to prove Theorem 15.

Proof of Theorem 15.

By combining Lemmas 20 and 21, the competitive ratio of ALG is at least

supσALG(σ)OPT(σ)ALG(σALG)OPT(σALG)Ω(α)O(1)=Ω(α)=Ω(logkloglogk).

References

  • [1] Yossi Azar, Ashish Chiplunkar, and Haim Kaplan. Polylogarithmic bounds on the competitiveness of min-cost perfect matching with delays. In Proceedings of the 2017 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2017), pages 1051–1061, 2017. doi:10.1137/1.9781611974782.67.
  • [2] Yossi Azar, Ashish Chiplunkar, Shay Kutten, and Noam Touitou. Set cover with delay – Clairvoyance is not required. In Proceedings of the 28th Annual European Symposium on Algorithms (ESA 2020), pages 8:1–8:21, 2020. doi:10.4230/LIPIcs.ESA.2020.8.
  • [3] Yossi Azar and Amit Jacob Fanani. Deterministic min-cost matching with delays. Theory Comput. Syst., 64(4):572–592, 2020. doi:10.1007/s00224-019-09963-7.
  • [4] Yossi Azar, Runtian Ren, and Danny Vainstein. The min-cost matching with concave delays problem. In Proceedings of the 2021 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2021), pages 301–320, 2021. doi:10.1137/1.9781611976465.20.
  • [5] Yossi Azar and Noam Touitou. General framework for metric optimization problems with delay or with deadlines. In Proceedings of the 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS 2019), pages 60–71, 2019. doi:10.1109/FOCS.2019.00013.
  • [6] Marcin Bienkowski, Martin Böhm, Jaroslaw Byrka, Marek Chrobak, Christoph Dürr, Luk’avs Folwarczn’y, Lukasz Jez, Jiri Sgall, Kim Thang Nguyen, and Pavel Veselý. Online algorithms for multi-level aggregation. In Proceedings of the 24th Annual European Symposium on Algorithms (ESA 2016), pages 12:1–12:17, 2016. doi:10.4230/LIPIcs.ESA.2016.12.
  • [7] Marcin Bienkowski, Jaroslaw Byrka, Marek Chrobak, Lukasz Jez, Dorian Nogneng, and Jirí Sgall. Better approximation bounds for the joint replenishment problem. In Proceedings of the 2014 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2014), pages 42–54, 2014. doi:10.1137/1.9781611973402.4.
  • [8] Marcin Bienkowski, Artur Kraska, Hsiang-Hsuan Liu, and Pawel Schmidt. A primal-dual online deterministic algorithm for matching with delays. In Proceedings of the 16th Workshop on Approximation and Online Algorithms (WAOA 2018), pages 51–68, 2018. doi:10.1007/978-3-030-04693-4_4.
  • [9] Niv Buchbinder, Moran Feldman, Joseph S. Naor, and Ohad Talmon. O(depth)-competitive algorithm for online multi-level aggregation. In Proceedings of the 2017 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2017), pages 1235–1244, 2017. doi:10.1137/1.9781611974782.80.
  • [10] Niv Buchbinder, Tracy Kimbrel, Retsef Levi, Konstantin Makarychev, and Maxim Sviridenko. Online make-to-order joint replenishment model: Primal-dual competitive algorithms. Oper. Res., 61(4):1014–1029, 2013. doi:10.1287/opre.2013.1188.
  • [11] Rodrigo A. Carrasco, Kirk Pruhs, Cliff Stein, and José Verschae. The online set aggregation problem. In Proceedings of the 13th Latin American Symposium on Theoretical Informatics (LATIN 2018), pages 245–259, 2018. doi:10.1007/978-3-319-77404-6_19.
  • [12] Ryder Chen, Jahanvi Khatkar, and Seeun William Umboh. Online weighted cardinality joint replenishment problem with delay. In Proceedings of the 49th International Colloquium on Automata, Languages, and Programming (ICALP 2022), pages 40:1–40:18, 2022. doi:10.4230/LIPIcs.ICALP.2022.40.
  • [13] Lindsey Deryckere and Seeun William Umboh. Online matching with set and concave delays. In Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2023), pages 17:1–17:17, 2023. doi:10.4230/LIPIcs.APPROX/RANDOM.2023.17.
  • [14] Daniel R. Dooly, Sally A. Goldman, and Stephen D. Scott. On-line analysis of the TCP acknowledgment delay problem. J. ACM, 48(2):243–273, 2001. doi:10.1145/375827.375843.
  • [15] Federico Echenique, Nicole Immorlica, and Vijay V. Vazirani. Online and Matching-Based Market Design. Cambridge University Press, 2023. doi:10.1017/9781108937535.
  • [16] Yuval Emek, Shay Kutten, and Roger Wattenhofer. Online matching: Haste makes waste! In Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing (STOC 2016), pages 333–344, 2016. doi:10.1145/2897518.2897557.
  • [17] Yuval Emek, Yaacov Shapiro, and Yuyi Wang. Minimum cost perfect matching with delays for two sources. Theor. Comput. Sci., 754:122–129, 2019. doi:10.1016/j.tcs.2018.07.004.
  • [18] Kun He, Sizhe Li, Enze Sun, Yuyi Wang, Roger Wattenhofer, and Weihao Zhu. Randomized algorithm for MPMD on two sources. In Proceedings of the 19th Conference On Web And InterNet Economics (WINE 2023), pages 348–365, 2023. doi:10.1007/978-3-031-48974-7_20.
  • [19] Naonori Kakimura and Tomohiro Nakayoshi. Deterministic primal-dual algorithms for online k-way matching with delays. In Proceedings of the 29th International Computing and Combinatorics Conference (COCOON 2023), pages 238–249, 2023. doi:10.1007/978-3-031-49193-1_18.
  • [20] Anna R. Karlin, Claire Kenyon, and Dana Randall. Dynamic TCP acknowledgement and other stories about e/(e1). In Proceedings of the 33rd Annual ACM Symposium on Theory of Computing (STOC 2001), pages 502–509, 2001. doi:10.1145/380752.380845.
  • [21] Richard M. Karp, Umesh V. Vazirani, and Vijay V. Vazirani. An optimal algorithm for on-line bipartite matching. In Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (STOC 1990), pages 352–358, 1990. doi:10.1145/100216.100262.
  • [22] Yasushi Kawase and Tomohiro Nakayoshi. Online matching with delays and size-based costs. arXiv:2408.08658, 2024. doi:10.48550/arXiv.2408.08658.
  • [23] Xingwu Liu, Zhida Pan, Yuyi Wang, and Roger Wattenhofer. Impatient online matching. In Proceedings of the 29th International Symposium on Algorithms and Computation (ISAAC 2018), pages 62:1–62:12, 2018. doi:10.4230/LIPIcs.ISAAC.2018.62.
  • [24] Xingwu Liu, Zhida Pan, Yuyi Wang, and Roger Wattenhofer. Online matching with convex delay costs. arXiv:2203.03335, 2022. doi:10.48550/arXiv.2203.03335.
  • [25] Aranyak Mehta. Online matching and ad allocation. Found. Trends Theor. Comput. Sci., 8(4):265–368, 2013. doi:10.1561/0400000057.
  • [26] Aranyak Mehta, Amin Saberi, Umesh V. Vazirani, and Vijay V. Vazirani. AdWords and generalized online matching. J. ACM, 54(5):22:1–22:19, 2007. doi:10.1145/1284320.1284321.
  • [27] Darya Melnyk, Yuyi Wang, and Roger Wattenhofer. Online k-way matching with delays and the H-metric. arXiv:2109.06640, 2021. doi:10.48550/arXiv.2109.06640.
  • [28] Marco Pavone, Amin Saberi, Maximilian Schiffer, and Matthew W. Tsao. Technical note—online hypergraph matching with delays. Oper. Res., 70(4):2194–2212, 2022. doi:10.1287/opre.2022.2277.
  • [29] Noam Touitou. Nearly-tight lower bounds for set cover and network design with deadlines/delay. In Proceedings of the 32nd International Symposium on Algorithms and Computation (ISAAC 2021), pages 53:1–53:16, 2021. doi:10.4230/LIPIcs.ISAAC.2021.53.