Abstract 1 Introduction 2 Preliminaries 3 T-strong competitive ratio for Tree Metrics 4 New Algorithm: Subtree-Decomposition 5 Hybrid Algorithm 6 Competitive analysis of Subtree-Decomposition 7 Conclusion References

A Nearly Optimal Deterministic Algorithm for Online Transportation Problem

Tsubasa Harada111Corresponding author ORCID Institute of Science Tokyo, Japan Toshiya Itoh ORCID Institute of Science Tokyo, Japan
Abstract

For the online transportation problem with m server sites, it has long been known that the competitive ratio of any deterministic algorithm is at least 2m1. Kalyanasundaram and Pruhs conjectured in 1998 that a deterministic (2m1)-competitive algorithm exists for this problem, a conjecture that has remained open for over two decades.

In this paper, we propose a new deterministic algorithm for the online transportation problem and show that it achieves a competitive ratio of at most 8m5. This is the first O(m)-competitive deterministic algorithm, coming close to the lower bound of 2m1 within a constant factor.

Keywords and phrases:
Online algorithms, Competitive analysis, Online metric matching, Online weighted matching, Online minimum weight perfect matching, Online transportation problem, Online facility assignment, Greedy algorithm
Category:
Track A: Algorithms, Complexity and Games
Copyright and License:
[Uncaptioned image] © Tsubasa Harada and Toshiya Itoh; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Online algorithms
Related Version:
Full Version: https://arxiv.org/abs/2406.03778v3
Funding:
This work was partially supported by Japan Science and Technology Agency (JST) as part of Adopting Sustainable Partnerships for Innovative Research Ecosystem (ASPIRE), Grant Number JPMJAP2302.
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

1.1 Background

The online transportation problem (OTR), also known as the online facility assignment, was introduced by Kalyanasundaram and Pruhs [12]. In this problem, k servers are placed at m (k) sites on a metric space and an online algorithm receives (at most) k requests one-by-one in an online manner. The number of servers at one site is considered its capacity. The task of an online algorithm is to assign each request irrevocably and immediately to one of the available servers. The cost of assigning a request to a server is determined by the distance between them. The objective of the problem is to minimize the sum of the costs of assigning all requests. We denote the problem as OTR(k,m) when there are k servers and m server sites.

The online transportation problem finds application in various scenarios. Here are two examples: In the first example, we regard a server site as a hospital, a hospital’s capacity as the number of beds it has, and a request as a patient. This problem can then be viewed as a problem of finding a way to assign patients to hospitals so that patients are transported to the hospital as close as possible. In the second example, we regard a server site as a car station, a capacity of the car station as the number of cars it can accommodate, and a request as a user of this car sharing service. The problem can then be viewed as a problem of designing a car sharing service that allows users to use car stations as close as possible.

The online metric matching (OMM), or online weighted matching, is a special case of OTR in which k servers are placed at distinct k sites, i.e., each server has unit capacity. Let OMM(k) denote OMM with k servers. Kalyanasundaram and Pruhs [10] and Khuller et al. [14] independently showed that for OMM(k), the competitive ratio of any deterministic algorithm is at least 2k1. This immediately leads to a lower bound of 2m1 on the competitive ratio of any deterministic algorithm for OTR(k,m). Furthermore, they also proposed a (2k1)-competitive algorithm for OMM(k) called Permutation in [10]. From this result, the Permutation algorithm could be expected to have a matching upper bound of 2m1 on the competitive ratio for OTR(k,m). However, Kalyanasundaram and Pruhs [11] reported without proofs that the competitive ratio of Permutation is Θ(k) and that the competitive ratio of the natural greedy algorithm is 2m1. These results imply the existence of a large gap between the upper bound O(min{k,2m}) and lower bound Ω(m) on the competitive ratio for OTR(k,m). Since mk, when k is sufficiently larger than m, e.g., k=O(2m), this gap becomes even more pronounced. Based on this discussion, they posed the following conjecture.

Conjecture 1 (Kalyanasundaram and Pruhs [11]).

For OTR(k,m), what is the optimal competitive ratio in terms of m? It seems that there should be a (2m1)-competitive algorithm.

Since the publication of this conjecture, there have been many studies of OMM and OTR. Among them, Nayyar and Raghvendra [17] proved that the competitive ratio of the Robust-Matching algorithm [19] is O(mlog2k), thereby reducing the upper bound on the competitive ratio for OTR to O(min{mlog2k,k,2m}). However, neither the upper nor the lower bounds on the competitive ratio have been improved since then.

1.2 Our contributions

In this paper, we propose a new deterministic algorithm called Subtree-Decomposition and show that it is (8m5)-competitive for OTR with m server sites. This is the first deterministic algorithm achieving O(m)-competitiveness within a constant factor of Conjecture 1, significantly reducing the upper bound on the competitive ratio for OTR from O(min{mlog2k,k,2m}) to 8m5. Given that the lower bound for OTR is known to be 2m1, our algorithm achieves the best competitive ratio in terms of its order with respect to m (and k). Furthermore, our algorithm processes each request in O(m) time, whereas the Robust-Matching algorithm, which has a competitive ratio of O(mlog2k), requires O(m2) time per request [19, Theorem 6]. In other words, when k is close to m (e.g. k=O(m)), although the upper bounds 8m5 and O(mlog2m) differ by only a poly-logarithmic factor, our algorithm is computationally more efficient than Robust-Matching.

We also develop a generic method to convert an algorithm designed for tree metrics into one for general metric spaces without significantly degrading the competitive ratio. This method can be applied to designing an online algorithm for optimization problems on a metric space, such as OMM.

1.3 Our techniques

Reduction to a special class of 𝐎𝐓𝐑 instances

First, we will explain how to reduce the task of designing an O(m)-competitive algorithm for general instances of OTR to the task of designing an algorithm for more specific instances. To this end, let us begin by defining two special cases of OMM and introducing the concept of T-strong competitive ratio, which serves as a stricter performance measure for algorithms compared to the standard competitive ratio.

The first special case of OMM is OMM where each request is placed on the same position as a server (denoted by OMMS) and the second one is a further special case of OMMS called online matching on a power-of-two tree metric (denoted by OMTS2). In this problem, a metric space is induced by a weighted tree T=(V(T),E(T)) in which the weight of each edge is a non-negative integer power of two, and the set of server sites coincides with the set V(T) of vertices. Let OMMS(k) denote OMMS with k servers and OMTS2(T) denote OMTS2 with a metric space T. Note that |V(T)|=|E(T)|+1 is the number of servers in OMTS2(T).

The T-strong competitive ratio is defined for OTR on a tree metric (the “T” is derived from “tree”). While the standard competitive ratio measures both the cost of the algorithm and the cost of the optimal offline algorithm in terms of the sum of the edge weights along the path between requests and servers (commonly referred to as the “path distance”), the T-strong competitive ratio measures the algorithm’s cost using the path distance, whereas the cost of the optimal offline algorithm is measured using the weight of the heaviest edge on the path between the requests and servers (referred to as the “max-weight distance”). In other words, we say that an algorithm is T-strongly α-competitive if, for any instance of OTR on a tree metric, the cost incurred by the algorithm, measured by the path distance, is at most α times the optimal offline cost measured by the max-weight distance. Since the max-weight distance is shorter than the path distance, the T-strong competitive ratio is greater than the standard competitive ratio in general.

In this paper, we demonstrate that if a greedy-like algorithm that only uses the positions of a current request and current available server sites (referred to as MPFS [9]222 MPFS is a class of algorithms that generalize the greedy algorithm (see Definition 6 for details). ) is designed to be T-strongly O(k)-competitive for OMTS2 with k servers, it can be transformed into an O(m)-competitive algorithm for OTR(k,m) (Theorem 9). The proof is completed by establishing the following three claims:

  1. (1)

    If there exists a T-strongly O(k)-competitive algorithm for OMTS2 with k servers, then there exists an O(k)-competitive algorithm for OMMS(k).

  2. (2)

    If there exists an O(k)-competitive algorithm for OMMS(k), then there exists an O(k)-competitive algorithm for OMM(k).

  3. (3)

    If a certain MPFS algorithm is O(k)-competitive for OMM(k), then that algorithm is O(m)-competitive for OTR(k,m).

Claim (2) was previously proven by Meyerson et al. [16], and Claim (3) was proven by Harada et al. [9]. In this paper, we prove Claim (1). To this end, we begin by noting that it suffices to demonstrate a method for obtaining an O(k)-competitive algorithm for OMMS(k) with a general k-point metric space by using a T-strongly O(k)-competitive algorithm for OMMS(k) on a tree metric (where the edge weights are not necessarily powers of two).

Next, we explain how to convert algorithm 𝒜, which is T-strongly α-competitive for a tree metric, into algorithm , which is α-competitive for a general k-point metric space . first treats the given metric space as a weighted complete graph, where the weight of each edge corresponds to the distance between its endpoints. then finds a minimum spanning tree (MST) T of this graph and simulates algorithm 𝒜 on T.

The key fact to prove that is α-competitive for a general metric space is that the distance between any two points in the original metric space lies between the max-weight distance and the path distance on the MST T. Using this fact, we can verify that is α-competitive as follows: First, the ’s cost measured by the distance in is at most the 𝒜’s cost measured by the path distance on T. Then, by the T-strong competitiveness of 𝒜, the 𝒜’s cost measured by the path distance is at most α times the optimal offline cost measured by the max-weight distance. Since the optimal offline cost measured by the max-weight distance is not greater than the optimal offline cost measured by the distance in , it follows that the ’s cost is at most α times the optimal offline cost measured by the distance in .

Finally, we briefly explain why the distance in the original metric space lies between the max-weight distance and the path distance on the MST T. By the triangle inequality, the distance in is at most the path distance. To see that the distance in is at least the max-weight distance, consider that if the distance in between two points u and v were smaller than the max-weight distance on T, one could create a spanning tree with a smaller weight by adding edge (u,v) to T and removing the heaviest edge on the u-v path in T. This would contradict T being an MST.

The above discussion reduces the task of designing an O(m)-competitive algorithm for OTR(k,m) to designing a T-strongly O(k)-competitive MPFS algorithm for OMTS2 with k servers.

Overview of our algorithm

In the following, we provide an overview of the T-strongly O(k)-competitive algorithm for OMTS2(T) with k servers, which we refer to as Subtree-Decomposition (SD). Note that in OMTS2, the set of vertices coincides with the set of servers, meaning that k=|V(T)|=|E(T)|+1.

The proposed algorithm is based on a simple depth-first search (DFS) algorithm. The DFS-based algorithm begins by arbitrarily selecting one vertex in T as the root before receiving any requests. When a request arrives at a vertex, the algorithm performs a DFS starting from that vertex, and assigns the request to the first available server it encounters.

Intuitively, one can understand why the T-strong competitive ratio of this DFS-based algorithm is at most O(k) when the given tree T is unweighted (where each edge has unit weight) as follows: The nature of DFS ensures that any edge will be traversed at most twice by the algorithm’s assignments. In instances where there exist edges traversed more than twice, the optimal offline cost also increases in proportion to the number of such edges, resulting in a sufficiently small ratio of the algorithm’s cost to the optimal offline cost333Note that this statement is imprecise, as discussed and justified in this paper through the analysis via “hybrid algorithm” [7].. Thus, the algorithm’s cost measured by the path distance is roughly O(|E(T)|)=O(k). On the other hand, for any request sequence where the algorithm incurs a non-zero cost, the optimal offline cost measured by the max-weight distance is at least 1. Therefore, the ratio of the algorithm’s cost measured by the path distance to the optimal offline cost measured by the max-weight distance is O(k).

However, naive application of this algorithm to a weighted tree results in inefficiencies. For instance, if a request occurs at a vertex where the edges connecting it to its children have very large weights, while the edge connecting it to its parent has a very small weight, the algorithm will prioritize assigning the request to a more costly child. To address this inefficiency, SD performs a stepwise DFS, assigning the request at vertex v to the first available server it encounters by prioritizing the exploration of lighter edges. Specifically, SD proceeds as follows:

  1. (1)

    Perform a DFS from v, restricted to edges with weights no greater than 1.

  2. (2)

    If no available server is found in step 1, return to v and perform another DFS, this time restricted to edges with weights no greater than 2.

  3. (3)

    In subsequent steps, double the threshold for edge weights and perform a DFS from v until an available server is found.

Below, we provide an intuitive explanation for why SD is T-strongly O(k)-competitive for OMTS2(T) with k servers. Let 2n be the weight of the heaviest edge used in the optimal offline assignment. In this case, the optimal offline cost measured by the max-weight distance is at least 2n. SD is designed to minimize the number of times it traverses heavy edges, and it can be shown that no edge with weight greater than 2n is traversed in SD’s assignment. Furthermore, an edge with weight exactly 2n is traversed at most twice by the nature of DFS. Similarly, edges with weight 2n1 are traversed up to two times during the (n1)-th DFS and another two times during the final n-th DFS, for a total of four traversals. Extending this reasoning, for each i=0,,n, the number of traversals for an edge with weight 2i in SD’s assignment is expected to be at most 2(ni+1)2ni+1. Therefore, the algorithm’s cost measured by the path distance is roughly at most O(2i×2ni+1×|E(T)|)=O(2n|E(T)|), and the ratio to the optimal offline cost measured by the max-weight distance is O(|E(T)|)=O(k).

1.4 Related Work

Online Metric Matching on a Line.

A line metric is one of the most interesting and well-studied metric spaces for these problems. In particular, OMM on a line has been actively researched [15, 7, 2, 3, 20]. The best upper bound on the competitive ratio for OMM on a line is O(logk) [20], which is achieved by the Robust-Matching algorithm [19], and the best lower bound on the competitive ratio [18] is Ω(logk), where k denotes the number of servers. Note that the lower bound Ω(logk) can also be applied to any randomized algorithm for OMM on a line. As can be seen from the above, the best possible competitive ratio for OMM on a line has remained open.

There are also some studies on OTR on a line. Ahmed et al. [1] addressed competitive analysis for OTR on a line under the assumption that the server sites are evenly placed and each site has the same capacity. Under this assumption, they showed (with rough proofs) that the natural greedy algorithm is 4m-competitive and the Permutation algorithm (called Optimal-fill in their paper) is m-competitive for any m>2. On the other hand, Harada and Itoh [8] studied OTR on a line with a general layout of servers. They proposed an (2α(S)+1)-competitive algorithm called PTCP (Policy Transition at Critical Point), where α(S) is the ratio of the diameter of a set S of m server sites to the maximum distance between two adjacent server sites. They also constructed a layout of servers where PTCP has a constant competitive ratio while Permutation (or Optimal-Fill) has at least an Ω(m) competitive ratio.

Online Transportation Problem with a Weaker Adversary.

For OTR, models with a weaker adversary have also been well analyzed. Here, we will introduce two previous studies. Kalyanasundaram and Pruhs [12] studied OTR under the weakened adversary model where the adversary has only half as many capacities of each server site as the online algorithm and the length of a request sequence is at most k/2. They showed that the greedy algorithm is Θ(min(m,logk))-competitive and presented an O(1)-competitive algorithm under this model. Chung et al. [5] also studied OTR under another weakened adversary where the adversary has one less capacity of each server site against the online algorithm. Under this model, they presented an O(logm)-competitive deterministic algorithm on an α-HST [5] metric where α=Ω(logm) and an O(log3m)-competitive randomized algorithm on a general metric.

Randomized Algorithms for Online Metric Matching.

There are also many studies on randomized algorithms for OMM. For a general metric space, Meyerson et al. [16] showed the lower bound Ω(logk) and the upper bound O(log3k) on the competitive ratio for OMM with k servers. The upper bound was improved to be O(log2k) by Bansal et al. [4]. As can be seen from the above, there still has been a gap between the upper bound O(log2k) and the lower bound Ω(logk) for OMM. For doubling metrics, Gupta and Lewi [7] showed an O(logk)-competitive randomized algorithm.

Randomized algorithms for OTR(k,m) have not been studied for a long time, but recently Kalyanasundaram et al. [13] proposed an O(log2m)-competitive algorithm.

Stochastic Online Metric Matching.

Raghvendra [19] considered OMM under the random arrival model in which the adversary chooses the set of request locations at the start but the arrival order is a permutation chosen uniformly at random from the set of all possible permutations. He proposed an algorithm called Robust-Matching and showed that it is (2Hk1)-competitive and best possible for OMM(k) under the random arrival model, where Hk denotes the k-th harmonic number. Furthermore, Robust-Matching also has the best possible competitive ratio of 2k1 under the normal adversarial model.

Gupta et al. [6] considered OMM under online i.i.d. arrivals. In this model, requests are drawn independently from a known probability distribution over a metric space. They proposed an algorithm called FAIR-BIAS and showed that it is O((logloglogk)2)-competitive for a general metric space and 9-competitive for a tree metric under this model.

2 Preliminaries

2.1 Definition of Problems

In this section, we define the online metric matching, the online transportation and their variants.

Online Metric Matching

To begin with, we define the online metric matching (denoted by OMM). An instance of OMM is represented by a quadruple I=(X,d,S,σ), where X is a set of points, d:X×X0 is a distance function on X, S is a finite subset of X, and σ=r1r|S|X|S|. An element of S is called a server and the t-th entry rt of σ is called the request at time t or t-th request.

X, d and S are given to an online algorithm in advance, while requests are given one-by-one from r1 to r|S|. At each step, an online algorithm 𝒜 for OMM maintains “assignment” that is initialized to . When a request rt is revealed, 𝒜 must assign rt to one of the available servers irrevocably. If rt is assigned to the server st, then the pair (rt,st) is added to the current assignment and the cost d(rt,st) is incurred for this pair. The cost of the assignment is the sum of the costs of all the pairs contained in it. The goal of an online algorithm is to minimize the cost of the final assignment.

We use the following notation on OMM.

  1. (1)

    OMM(k) denotes OMM with k servers.

  2. (2)

    OMMS denotes OMM where requests arrive at the position of some server, i.e., X=S. We simply write an instance I of OMMS as I=(S,d,σ) instead of (S,d,S,σ).

  3. (3)

    OMMS(k) denotes OMMS with k servers.

Two Metrics on Edge-Weighted Trees

Before presenting online metric matching on a power-of-two tree metric, we first introduce the definitions and notations for the two distance functions used for edge-weighted trees. For an edge-weighted tree T, we use dT to denote the path distance on V(T), i.e., for any u,vV(T), dT(u,v)eE(PT(u,v))wT(e), where PT(u,v) denotes the unique simple path in T from u to v. In this paper, we define another distance dTmax on T as follows:

dTmax(u,v)maxeE(PT(u,v))wT(e).

We call dTmax the max-weight distance on T. It is easy to verify that dTmax defines a metric on V(T) when each edge has a positive weight. By the above definition, we can observe the following relationship between the path distance and the max-weight distance.

 Remark 2.

For any edge-weighted tree T and any u,vV(T), we have

dTmax(u,v)dT(u,v)|E(T)|dTmax(u,v),

where dT denotes the path distance on T and dTmax denotes the max-weight distance on T.

Online Matching on a Power-of-two Tree Metric

Then, we introduce a notion of power-of-two weighted tree and define a special case of OMMS called online matching on a power-of-two tree metric (denoted by OMTS2).

Definition 3 (Power-of-two Weighted Tree).

Let T=(V(T),E(T)) be a tree and wT:E(T)0 be a weight function of T. We say that T is a power-of-two weighted tree if for any eE(T), there exists a non-negative integer i such that wT(e)=2i.

Definition 4 (Power-of-two Tree Metric).

We say that a metric space (X,d) is a power-of-two tree metric if there exists a power-of-two weighted tree T such that V(T)=X and d=dT. In this case, we also say that (X,d) is induced by T.

The online matching on a power-of-two tree metric is a variant of the online metric matching problem where a metric space (X,d) is induced by a power-of-two weighted tree T and a set S of servers is V(T). In other words, an instance of OMTS2 is an instance I=(X,d,S,σ) of OMM such that X=S=V(T) and d=dT.

For a power-of-two weighted tree T, OMTS2(T) denotes OMTS2 where the metric space is induced by T. We simply write an instance I of OMTS2(T) as I=(T,σ) instead of (V(T),dT,V(T),σ) for OMM.

Online Transportation Problem

Finally, we define the online transportation problem (denoted by OTR). In this problem, k servers are clustered in specific m (k) locations called server sites. The number of servers at a server site is called the capacity of that site. Assume that each site has a capacity of at least 1. An instance of OTR is represented by a quintuple (X,d,S,c,σ). Here, (X,d) represents the metric space, S represents the set of server sites, c:S represents the capacity of each site, and σ=r1rkXk represents the request sequence444 For OTR, the number of requests is generally set to be at most k. As can be seen from [9, Lemma 2.1], however, the assumption that the number of requests is exactly k has no effect on the competitive analysis. . OTR is the same as OMM except that an online algorithm can assign up to c(s) requests to one server site s. In other words, OMM can be viewed as a special case of OTR where k=m and each site has unit capacity. We use OTR(k,m) to denote OTR with k servers and m (k) server sites.

2.2 Notation and Terminology

Let I=(X,d,S,c,σ) be any instance of OTR(k,m), rt be the t-th request of I and 𝒜 be any online algorithm for OTR. We use st(I,𝒜) to denote the server to which 𝒜 assigns rt when processing I. Let 𝒜(I) be the total cost incurred when 𝒜 processes I, i.e.,

𝒜(I)=t=1kd(rt,st(I,𝒜)).

Opt denotes the optimal offline algorithm, i.e., Opt knows the entire σ in advance and assigns rt to st(I,Opt) to minimize the total cost Opt(I). At any step of the execution of an online algorithm, a server site is called free if the number of requests assigned to it is less than its capacity, and full otherwise. Let Ft(𝒜,I) be the set of all free server sites just after 𝒜 assigns rt to a server. We say that 𝒜 is α-competitive if 𝒜(I)αOpt(I) for any instance I of OTR. The competitive ratio (𝒜) of 𝒜 is defined to be the infimum of α such that 𝒜 is α-competitive, i.e., (𝒜)=inf{α:𝒜 is α-competitive}. In this paper, we consider only algorithms that, when a request r arrives at the position of a free server site, assign r to that site555 Algorithms that do not satisfy this condition are known to be not α-competitive for any α>0. .

For an instance I=(X,d,S,σ) of OMM(k), we simply say that a server is free when no request is assigned to it, and full otherwise. In other respects, we use the same notation and terminology as in OTR.

2.3 Technical Lemmas from Prior Work

In this section, we present two prior results that play crucial roles in achieving our objective of designing an O(m)-competitive deterministic algorithm for OTR(k,m). The following theorem claims that if there exists an O(k)-competitive algorithm for OMMS(k), then there also exists an O(k)-competitive algorithm for OMM(k).

Theorem 5 (Meyerson et al. [16]).

If there exists an α-competitive algorithm 𝒜 for OMMS, then there exists a (2α+1)-competitive algorithm for OMM.

The algorithm is designed as follows: When a request arrives, it is first moved to the nearest server site (not necessarily available), and then assigned to a server according to 𝒜.

Next, we introduce a class of algorithms for OTR called MPFS (Most Preferred Free Servers) and remark that to design an O(m)-competitive algorithm for OTR(k,m), it suffices to design an O(k)-competitive MPFS algorithm for OMMS(k).

Definition 6 (MPFS Algorithm [9]).

Let 𝒜 be a deterministic online algorithm for OTR. We say that 𝒜 is an MPFS (most preferred free servers) algorithm if it deals with a request sequence σ=r1rk as follows:

  1. (1)

    For each 1tk, the priority (with no ties) of all server sites for rt is determined by only the positions of rt and all server sites S,

  2. (2)

    𝒜 assigns rt to a server with the highest priority among all free server sites Ft1(𝒜,I).

Let 𝒫𝒮 be the class of MPFS algorithms for OTR. By its definition, given a new request r and a set FS of current free server sites, an MPFS algorithm 𝒜 uniquely determines a server s to which r is assigned. We use s𝒜(r,F) to denote such s, i.e., a server to which 𝒜 assigns r when F is a set of free server sites. For any MPFS algorithm, it is immediate that the following remark holds.

 Remark 7.

Let 𝒜𝒫𝒮 and s=s𝒜(r,F). If sFF, then s𝒜(r,F)=s.

Moreover, the following strong theorem [9] is known for MPFS algorithms.

Theorem 8 (Harada et al. [9, Corollary 3.10]).

Let 𝒜𝒫𝒮 and suppose that 𝒜 is α(k)-competitive for OMM(k), where α(k) is a non-decreasing function of k. Then, for any mk, 𝒜 is α(m)-competitive for OTR(k,m).

Proof Sketch.

For simplicity, consider an instance I=(X,d,S,c,σ) where c(s)>1, i.e., the number of requests and servers is k=m. By Hall’s theorem, we can “partition” the request sequence σ=r1rk into request sequences σi=r1irmi for i=1,,, such that both 𝒜 and Opt assign requests in σi to distinct m server sites.

By the definition of the MPFS algorithm, when executing the instance Ii=(X,d,S,σi) for OMM (i.e., when all server sites have unit capacity), each request is assigned to the same server site as in the original execution of I. Thus, we have 𝒜(I)=i𝒜(Ii). Similarly, by optimality, we also have Opt(I)=iOpt(Ii). Therefore, maxi𝒜(Ii)/Opt(Ii) is an upper bound on the competitive ratio of 𝒜. This implies that the competitive ratio of 𝒜 for OMM dominates the competitive ratio for OTR.

By Theorems 5 and 8, if there exists an α(k)-competitive MPFS algorithm for OMMS(k), then we easily obtain a (2α(m)+1)-competitive algorithm for OTR(k,m). Note that if 𝒜 is an MPFS algorithm, then the algorithm shown in Theorem 5 is also an MPFS algorithm.

3 T-strong competitive ratio for Tree Metrics

In this section, we introduce a new concept of T-strong competitive ratio for OMTS2 to represent the performance of an algorithm and show that T-strong competitiveness for OMTS2 is closely related to standard competitiveness for OMMS. The most important result in this section is the following theorem. Thanks to this theorem, our goal of designing an O(m)-competitive algorithm for OTR(k,m) is reduced to designing a T-strongly O(k)-competitive MPFS algorithm for OMTS2 with k servers.

Theorem 9.

If there exists a T-strongly α(k)-competitive MPFS algorithm for OMTS2 with k servers, then there exists a (4α(m)+1)-competitive algorithm for OTR(k,m), where α() is a non-decreasing function.

We begin with defining T-strong competitiveness. Hereafter, we use OptTmax to denote the optimal offline algorithm where the cost of assigning a request to a server is measured by the max-weight distance on T.

Definition 10 (T-strong competitive ratio).

Let I=(T,σ) be any instance of OMTS2 and OptTmax(I) denote the minimum cost of assigning all requests to servers, where the cost is measured by the max-weight distance dTmax on T. We say that an algorithm 𝒜 is T-strongly α-competitive if, for any instance I of OMTS2, it follows that 𝒜(I)αOptTmax(I), where the cost 𝒜(I) is measured by the path distance dT on T. In addition, the T-strong competitive ratio of 𝒜 is defined to be the infimum of α such that 𝒜 is T-strongly α-competitive.

 Remark 11.

In the rest of this paper, the cost of an algorithm is generally measured by the path distance, unless we specifically use the notations OptTmax or dTmax.

 Remark 12.

By Remark 2, we have OptTmax(I)Opt(I). Therefore, if an algorithm 𝒜 is T-strongly α-competitive for OMTS2(T), then 𝒜 is also α-competitive for OMTS2(T).

The following theorem presents a method to convert a T-strongly α-competitive algorithm for OMTS2 into a 2α-competitive algorithm for OMMS with a general metric.

Theorem 13.

If there exists a T-strongly α-competitive algorithm 𝒜 for OMTS2, then there exists a 2α-competitive algorithm for OMMS.

The proof is given in Theorem 13 of the full version. Here, we only describe the definition of . first constructs a power-of-two weighted tree T by using (S,d) and then simulates 𝒜 with input instance I=(T,σ). Now we describe how to construct T by using (S,d). First, we represent the k-point metric space (S,d) as an edge-weighted k-vertex complete graph KS,d in which each edge (u,v) has a weight d(u,v). Let T be a minimum spanning tree of the KS,d. Next, we obtain a power-of-two weighted tree T by adjusting the edge weights of the T as follows: for each edge eE(T), if 2i1<wT(e)2i, then wT(e)2i, i.e., wT(e)=2log2wT(e).

By Theorems 13, 5 and 8, we obtain Theorem 9. Thus, in the rest of this paper, we will focus on designing an MPFS algorithm for OMTS2.

4 New Algorithm: Subtree-Decomposition

In this section, we propose a new MPFS algorithm for OMTS2 called Subtree-Decomposition (SD). In the subsequent sections, we use 𝒜 to denote the SD algorithm unless otherwise specified.

4.1 Notation for Trees

To begin with, we describe the notation for trees used in this paper. Let T=(V(T),E(T)) be a power-of-two weighted tree and dT be the path distance on T. Suppose that T is rooted at ρV(T). For T and any subtree U of T, we use the following notation.

  • For vV(T), par(v) denotes the parent of v.

  • ρ(U) denotes the closest vertex in V(U) to the root ρ. We simply refer to ρ(U) as the root of U.

  • wUmax denotes the maximum weight in U, i.e., wUmaxmax(u,v)E(U)dT(u,v).

  • Emax(U) denotes the set of heaviest edges in U, i.e.,

    Emax(U){(u,v)E(U):dT(u,v)=wUmax}.

The notations vV(T) and eE(T) are sometimes abbreviated to vT and eT respectively when context makes it clear.

4.2 Definition of Subtree-Decomposition

Then, we define the SD algorithm denoted by 𝒜. Before presenting the formal definition, we describe the intuitive behavior of SD.

Intuitive behavior.

Let T=(V(T),E(T)) be a given power-of-two weighted tree rooted at an arbitrary vertex ρV(T). For each vertex v, let Wi(v)V(T) be the set of vertices reachable from vertex v only through edges with weights at most 2i. When a new request arrives at vertex v, for i=1,2,, SD performs a DFS starting from v to search for a free server in Wi(v). SD then assigns the request to the first free server located by a DFS.

Decomposition of a Tree.

Next, to describe the algorithm more precisely and simplify the inductive analysis, we redefine the above algorithm recursively. To this end, we decompose a given power-of-two weighted tree T=(V(T),E(T)) into subtrees (hence the algorithm’s name) as follows:

Let ρ(1)ρ and we define subtrees T(1) and T(2) as follows: We arbitrarily choose ρ(2), one of the children of the root ρ (=ρ(1)), and consider a graph T(ρ(1),ρ(2)) obtained by removing edge (ρ(1),ρ(2)) from T. Note that T(ρ(1),ρ(2)) consists of two subtrees. Let T(1) be the subtree that contains ρ(1) and T(2) be the other subtree that contains ρ(2).

Next, let ρ0ρ and we define subtrees T0,T1, as follows: Let T0 be the maximal subtree of T that contains the root ρ (=ρ0) and does not contain any heaviest edge in Emax(T). We use ρ1,,ρl to denote the vertices v such that vT0 and par(v)T0. Note that (ρi,par(ρi))Emax(T) by the definition of T0. For i=1,,l, let Ti be the subtree of T rooted at ρi. By the definition of {Ti}i=0l, {V(Ti)}i=0l is a partition of V(T). Then, for any vertex v, there uniquely exists a subtree Ti such that vTi.

Recursive Definition.

Now we are ready to describe the formal and recursive definition of SD. For the base case where |V(T)|=1, SD assigns each request to the unique server. For j=1,2, let 𝒜(j) be the SD algorithm for T(j) rooted at ρ(j) and for i=0,,l, let 𝒜i be the SD algorithm for Ti rooted at ρi. 𝒜 has two phases: When all servers in T0 are full, Phase 1 terminates and Phase 2 follows.

Let r be a new request and FV(T) be a set of free servers. 𝒜 assigns r by using 𝒜(j) for j=1,2 and 𝒜i for i=1,,l.

Phase 1: There is at least one free server in 𝑻𝟎.

Assume that rTi for some i=0,,l. If there exists a free server in Ti, then 𝒜 assigns r to a server in Ti according to 𝒜i. Otherwise, 𝒜 assigns r to a server in T0 according to 𝒜0 by regarding par(ρi) as a new request and FV(T0) as a set of free servers.

Phase 2: There is no free server in 𝑻𝟎.

Assume that rT(j) for some j=1,2 and rTi for some i=0,,l. If there exists a free server in Ti, then 𝒜 assigns r to a server in Ti according to 𝒜i. Otherwise, if there exists a free server in T(j), then 𝒜 assigns r to a server in T(j) according to 𝒜(j). Otherwise, 𝒜 assigns r to a server in T(3j) according to 𝒜(3j) by regarding ρ(3j) as a new request and FV(T(3j)) as a set of free servers.

We establish that SD is an MPFS algorithm and that the processing time of SD per request is O(m) through the following propositions. The proof of Proposition 14 is provided in Proposition 15 of the full version.

Proposition 14.

Subtree-Decomposition is an MPFS algorithm.

Proposition 15.

Subtree-Decomposition processes each request in O(m)=O(|V(T)|) time.

Proof.

The proof is by induction on |V(T)|. For the base case |V(T)|=1, each request is obviously processed in O(1) time. For the inductive step, suppose that the processing time of 𝒜i per request is O(|V(Ti)|) for i=0,,l and that of 𝒜(j) is O(|V(T(j))|) for j=1,2. If SD is in Phase 1 and a request r is in T0, then the processing time is O(|V(T0)|) by the induction hypothesis. If SD is in Phase 1 and a request r is in Ti for some i=1,,l, then the processing time is O(|V(T0)|)+O(|V(Ti)|)=O(|V(T)|) by the induction hypothesis. Otherwise, i.e., SD is in Phase 2, the processing time is O(|V(T(1))|)+O(|V(T(2))|)=O(|V(T)|) by the induction hypothesis. Thus, the proposition holds.

5 Hybrid Algorithm

In this section, we introduce the notion of hybrid algorithms and their properties. This idea was initiated by Gupta and Lewi [7] and very useful in analyzing the competitive ratio of an MPFS algorithm. Note that all definitions and results in this section are applicable to any (not necessarily SD) MPFS algorithm. To begin with, we define hybrid algorithms.

Definition 16 (Hybrid Algorithm).

Let 𝒜𝒫𝒮. For a positive integer t𝖽 and a server a𝖽, consider an algorithm =(𝒜,t𝖽,a𝖽) that assigns requests for OMMS as follows:

  1. (1)

    The first t𝖽1 requests are assigned according to 𝒜,

  2. (2)

    if a𝖽 is free just before the t𝖽-th request is revealed, then the t𝖽-th request is assigned to a𝖽 and the subsequent requests are assigned according to 𝒜, and

  3. (3)

    if a𝖽 is full just before the t𝖽-th request is revealed, then the t𝖽-th and subsequent requests are assigned according to 𝒜.

We call =(𝒜,t𝖽,a𝖽) a hybrid algorithm of 𝒜 with decoupling time t𝖽 and decoupling server a𝖽.

One can observe that 𝒜 and output different assignments when decoupling server a𝖽 is free at decoupling time t𝖽 and 𝒜 assigns the t𝖽-th request to a server other than a𝖽, i.e., a𝖽Ft𝖽(𝒜,I). The purpose of considering the hybrid algorithm is to reduce the evaluation of the competitive ratio of a certain MPFS algorithm 𝒜 to evaluating the difference in cost between 𝒜 and its hybrid algorithm . Therefore, we are only interested in cases where the original MPFS algorithm 𝒜 and its hybrid algorithm output different assignments. Motivated by this insight, we give the following definition of hybrid instances.

Definition 17 (Hybrid Instance).

Let I=(S,d,σ) be any instance of OMMS and =(𝒜,t𝖽,a𝖽) be a hybrid algorithm of 𝒜𝒫𝒮. We say that I is valid with respect to if 𝒜 and output different assignments when processing I, i.e., a𝖽Ft𝖽(𝒜,I) and invalid otherwise. We refer to a pair H=(,I) as a hybrid instance of 𝒜 if is a hybrid algorithm of 𝒜 and I is valid with respect to .

The following lemma shows that by evaluating the cost difference between an MPFS algorithm 𝒜 and its hybrid algorithm , we can determine the competitive ratio of 𝒜. The proof of Lemma 18 is given in Lemma 19 of the full version.

Lemma 18.

The following claims hold for any 𝒜𝒫𝒮.

  1. (1)

    Suppose that 𝒜(I)(I)αd(rt𝖽,a𝖽) for any hybrid instance H=(,I)=((𝒜,t𝖽,a𝖽),(S,d,σ)) of OMMS(k). Then, 𝒜 is (α+1)-competitive for OMMS(k).

  2. (2)

    Furthermore, if 𝒜(I)(I)αdTmax(rt𝖽,a𝖽) for any hybrid instance H=(,I)=((𝒜,t𝖽,a𝖽),(T,σ)) of OMTS2(T), then 𝒜 is T-strongly (α+|E(T)|)-competitive for OMTS2(T).

Next, we introduce an important concept called cavities [7], which is defined for a hybrid instance H=(,I)=((𝒜,t𝖽,a𝖽),(S,d,σ)) of OMMS. First, consider the moment when 𝒜 assigns the t𝖽-th request to st𝖽(I,𝒜) and assigns it to a𝖽. We regard 𝒜 as having an “extra” free server at a𝖽 (i.e., a server that is free for 𝒜 but full for ). Similarly, we consider to have an “extra” free server at st𝖽(I,𝒜). The locations of these extra free servers may move as future requests arrive. Eventually, when both 𝒜 and assign a request to their respective extra free servers, the sets of free servers of 𝒜 and align, and from that point onward, 𝒜 and assign a subsequent request to the same server. These extra free servers are referred to as cavities.

The following lemma [8] shows that for any hybrid instance (,I)=((𝒜,t𝖽,a𝖽),(S,d,σ)), the cavity of 𝒜 (i.e., a server that is free for 𝒜 but full for ) and the cavity of (a server that are free for but full for 𝒜) are uniquely determined at each time, if they exist. This holds by the property of MPFS algorithms.

Lemma 19 (Harada and Itoh [8, Lemma 3]).

Let H=(,I) be a hybrid instance of 𝒜𝒫𝒮, where =(𝒜,t𝖽,a𝖽). Then, there uniquely exist a positive integer t𝖼H (t𝖽) and sequences of servers {htH}t=t𝖽t𝖼H and {atH}t=t𝖽t𝖼H such that

  1. (1)

    Ft(,I)Ft(𝒜,I)={htH} for each t𝖽tt𝖼H,

  2. (2)

    Ft(𝒜,I)Ft(,I)={atH} for each t𝖽tt𝖼H and

  3. (3)

    Ft(𝒜,I)=Ft(,I) for each t𝖼H+1t.

We call t𝖼H the coupling time of H and refer to htH (resp. atH) as -cavity (resp. 𝒜-cavity) of H at time t. -cavities and 𝒜-cavities are collectively called cavities. In particular, ht𝖽H (resp. at𝖽H) is called the first -cavity (resp. the first 𝒜-cavity) of H.

For simplicity, t𝖼H, htH and atH are abbreviated as t𝖼, ht and at respectively when H is clear from the context. We use Cav(H) and Cav𝒜(H) to denote the sets of -cavities and 𝒜-cavities of H respectively, i.e., Cav(H){ht}t=t𝖽t𝖼,Cav𝒜(H){at}t=t𝖽t𝖼. In addition, let Cav(H)Cav(H)Cav𝒜(H). By the definition of cavities, it is easy to see that the first 𝒜-cavity is the decoupling server of and the first -cavity is st𝖽(I,𝒜).

We summarize the properties of cavities and assignments in the following proposition. Intuitively, this proposition asserts the following:

  • At each time, either the -cavity or the 𝒜-cavity moves, or neither moves.

  • If at time t, either one of the -cavity or the 𝒜-cavity moves, then we can determine the servers to which and 𝒜 assigned requests at time t.

Proposition 20 (Harada and Itoh [8, Proposition 1]).

Let H=(,I) be a hybrid instance of 𝒜𝒫𝒮, where =(𝒜,t𝖽,a𝖽). Then, the following properties hold:

  1. (1)

    ht1=ht or at1=at for each t𝖽+1tt𝖼,

  2. (2)

    If ht1ht, then rt is assigned to ht by 𝒜 and to ht1 by for each t𝖽+1tt𝖼,

  3. (3)

    If at1at, then rt is assigned to at1 by 𝒜 and to at by for each t𝖽+1tt𝖼,

  4. (4)

    If ht1=ht and at1=at, then 𝒜 and assign rt to the same server and

  5. (5)

    rt𝖼+1 is assigned to at𝖼 by 𝒜 and to ht𝖼 by .

As mentioned before, we aim to upper bound the difference in cost between an MPFS algorithm 𝒜 and its hybrid algorithm . To this end, the hybrid cycle defined in the following definition plays a crucial role since the length of the hybrid cycle provides the upper bound on the difference in cost between 𝒜 and (Lemma 22). For simplicity, we use the following notation for a distance function d:X×X0 and x1,,xnX: d̊(x1,,xn)d(x1,xn)+i=1n1d(xi,xi+1).

Definition 21 (Hybrid Cycle).

Let H=(,I) be a hybrid instance of 𝒜𝒫𝒮 for OMMS, where =(𝒜,t𝖽,a𝖽) and I=(S,d,σ). We refer to the cycle ht𝖽ht𝖼at𝖼at𝖽ht𝖽 as the hybrid cycle of H and define the length of the hybrid cycle to be

d̊(H) d̊(ht𝖽,,ht𝖼,at𝖼,,at𝖽)
=d(ht𝖽,at𝖽)+d(ht𝖼,at𝖼)+t=t𝖽+1t𝖼(d(ht1,ht)+d(at1,at)).

Applying Gupta and Lewi’s method [7] to MPFS algorithms yields the following lemma and its corollary. The corollary implies that we can analyze the competitive ratio of MPFS algorithms by evaluating the length of the hybrid cycle.

Lemma 22.

Let 𝒜𝒫𝒮 and H=(,I)=((𝒜,t𝖽,a𝖽),(S,d,σ)) be any hybrid instance of OMMS(k). Then, the difference in cost between 𝒜 and is at most the length of the hybrid cycle, i.e., 𝒜(I)(I)d̊(H).

The proof of Lemma 22 can be found in Lemma 23 of the full version. By Lemmas 18 and 22, we immediately have the following corollary.

Corollary 23.

The following claims hold for any 𝒜𝒫𝒮.

  1. (1)

    If d̊(H)αd(rt𝖽,a𝖽) for any hybrid instance H=(,I)=((𝒜,t𝖽,a𝖽),(S,d,σ)) of OMMS(k), then 𝒜 is (α+1)-competitive for OMMS(k).

  2. (2)

    If d̊T(H)αdTmax(rt𝖽,a𝖽) for any hybrid instance H=(,I)=((𝒜,t𝖽,a𝖽),(T,σ)) of OMTS2(T), then 𝒜 is T-strongly (α+|E(T)|)-competitive for OMTS2(T).

By this corollary, we aim to obtain an inequality of the form d̊(H)αd(rt𝖽,a𝖽), and focus on hybrid instances that have a certain first -cavity and 𝒜-cavity.

6 Competitive analysis of Subtree-Decomposition

In this section, we derive the upper bound on the competitive ratio of the SD algorithm 𝒜. To this end, the following lemma is important.

Lemma 24.

Let H=(,I)=((𝒜,t𝖽,a𝖽),(T,σ)) be any hybrid instance for OMTS2(T) and let TH be the minimal subtree of T that contains all cavities of H. Then, we have

d̊T(H)2|E(TH)|wTHmax.

Note that Lemma 24 presents a simplified form of Lemma 35 of the full version, and the proof can be found in Appendix J of the full version.

In what follows, we introduce two propositions and show that 𝒜 is T-strongly 3|E(T)|-competitive for OMTS2(T). The proofs can be found in Propositions 36 and 37 of the full version.

Proposition 25.

Consider 𝒜 for OMTS2(T). Let s,s be any vertex of T such that ss. For any rV(T), if 𝒜’s priority of s for r is higher than that of s, then dT(r,s)dTmax(r,s)dTmax(s,s).

Proposition 26.

Let H=((𝒜,t𝖽,a𝖽),(T,σ)) be a hybrid instance for OMTS2(T). Then, dTmax(ht𝖽,a𝖽)=wTHmax.

Theorem 27.

Subtree-Decomposition is T-strongly (3k3)-competitive for OMTS2 with k servers.

Proof.

Let H=((𝒜,t𝖽,a𝖽),(T,σ)) be any hybrid instance for OMTS2(T). By Lemma 24 and Proposition 26, we have d̊T(H)2|E(TH)|wTHmax=2|E(TH)|dTmax(ht𝖽,a𝖽). Since 𝒜 assigns rt𝖽 to not a𝖽 but ht𝖽, the 𝒜’s priority of ht𝖽 for rt𝖽 is higher than that of a𝖽. Therefore, by Proposition 25, we have dTmax(ht𝖽,a𝖽)dTmax(rt𝖽,a𝖽) and then

d̊T(H)2|E(TH)|dTmax(rt𝖽,a𝖽)2|E(T)|dTmax(rt𝖽,a𝖽).

By (2) of Corollary 23, it follows that 𝒜 is T-strongly 3|E(T)|-competitive for OMTS2(T). By substituting |E(T)|=k1, we can see that 𝒜 is T-strongly (3k3)-competitive for OMTS2 with k servers.

By applying Theorem 9, we obtain an O(m)-competitive algorithm for OTR(k,m).

Corollary 28.

For OTR(k,m), there exists a deterministic (12m11)-competitive algorithm.

In fact, with a more careful analysis, we can demonstrate that there exists a (4k3)-competitive algorithm for OMMS(k) and an (8m5)-competitive algorithm for OTR(k,m).

Theorem 29.

There exists a deterministic (4k3)-competitive algorithm for OMMS(k).

Proof.

Fix any instance I=(S,d,σ) of OMMS(k) and Let be the algorithm obtained by transforming SD using the method in Theorem 13. Recall that first constructs a power-of-two weighted tree T by using the given metric space (S,d) and then simulates SD with an instance I=(T,σ). We use the following claim which establishes the relationships between the two types of metrics on T and the original metric. The proof is provided in Claim 14 of the full version.

Claim 30.

Let (S,d,σ) be any instance for OMMS(k) and T be a power-of-two weighted tree constructed by . Then, for any two different points u,vS, dTmax(u,v)<2d(u,v)2dT(u,v).

Let H=((,t𝖽,a𝖽),(S,d,σ)) be a hybrid instance of for OMMS(k) and H=((𝒜,t𝖽,a𝖽),(T,σ)) be a hybrid instance of 𝒜 for OMTS2(T). Then, we have

d̊(H) d̊T(H)2Ew(TH)=2|E(TH)|wTHmax
2|E(T)|dTmax(rt𝖽,a𝖽)4|E(T)|d(rt𝖽,a𝖽)=(4k4)d(rt𝖽,a𝖽),

where the first and fourth inequality is due to Claim 30, the second inequality is due to Lemma 24 and the third inequality is due to Proposition 26 and E(TH)E(T). By (1) of Corollary 23, this implies that is (4k3)-competitive. By applying Theorems 5 and 8, we obtain an (8m5)-competitive algorithm for OTR(k,m).

Theorem 31.

There exists a deterministic (8m5)-competitive algorithm for OTR(k,m).

7 Conclusion

In this paper, we addressed the online transportation problem OTR(k,m) with k servers located at m server sites.

We first defined the T-strong competitive ratio for a tree metric and demonstrate a generic method for converting an algorithm designed for tree metrics into one for general metric spaces. We believe that this technique can be applied to the open problem of designing an O(logk)-competitive randomized algorithm for OMM(k) and so on.

We then introduced a new algorithm called Subtree-Decomposition and proved that it is T-strongly (3k3)-competitive for OMTS2(T) with k servers (in Theorem 27). We also demonstrated the existence of (4k3)-competitive algorithms for OMMS(k) (in Theorem 29) and (8m5)-competitive algorithms for OTR(k,m) (in Theorem 31). For any deterministic algorithm of OTR(k,m), this upper bound on the competitive ratio is tight up to a constant factor with respect to its dependence on the number of server sites. We conjecture that there exists an MPFS algorithm for OTR(k,m) that achieves the matching upper bound of 2m1.

References

  • [1] Abu Reyan Ahmed, Md. Saidur Rahman, and Stephen G. Kobourov. Online facility assignment. Theor. Comput. Sci., 806:455–467, 2020. doi:10.1016/J.TCS.2019.08.011.
  • [2] Antonios Antoniadis, Neal Barcelo, Michael Nugent, Kirk Pruhs, and Michele Scquizzato. A o(n)-competitive deterministic algorithm for online matching on a line. In Approximation and Online Algorithms - 12th International Workshop, WAOA 2014, Wrocław, Poland, September 11-12, 2014, Revised Selected Papers, volume 8952 of Lecture Notes in Computer Science, pages 11–22. Springer, 2014. doi:10.1007/978-3-319-18263-6_2.
  • [3] Antonios Antoniadis, Carsten Fischer, and Andreas Tönnis. A collection of lower bounds for online matching on the line. In LATIN 2018: Theoretical Informatics: 13th Latin American Symposium, Buenos Aires, Argentina, April 16-19, 2018, Proceedings 13, pages 52–65. Springer, 2018. doi:10.1007/978-3-319-77404-6_5.
  • [4] Nikhil Bansal, Niv Buchbinder, Anupam Gupta, and Joseph Naor. An O(log2k)-competitive algorithm for metric bipartite matching. In Algorithms - ESA 2007, 15th Annual European Symposium, Eilat, Israel, October 8-10, 2007, Proceedings, volume 4698 of Lecture Notes in Computer Science, pages 522–533. Springer, 2007. doi:10.1007/978-3-540-75520-3_47.
  • [5] Christine Chung, Kirk Pruhs, and Patchrawat Uthaisombut. The online transportation problem: On the exponential boost of one extra server. In LATIN 2008: Theoretical Informatics, 8th Latin American Symposium, Búzios, Brazil, April 7-11, 2008, Proceedings, volume 4957 of Lecture Notes in Computer Science, pages 228–239. Springer, 2008. doi:10.1007/978-3-540-78773-0_20.
  • [6] Anupam Gupta, Guru Guruganesh, Binghui Peng, and David Wajc. Stochastic online metric matching. In 46th International Colloquium on Automata, Languages, and Programming, ICALP 2019, July 9-12, 2019, Patras, Greece, volume 132 of LIPIcs, pages 67:1–67:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2019. doi:10.4230/LIPICS.ICALP.2019.67.
  • [7] Anupam Gupta and Kevin Lewi. The online metric matching problem for doubling metrics. In Automata, Languages, and Programming - 39th International Colloquium, ICALP 2012, Warwick, UK, July 9-13, 2012, Proceedings, Part I, volume 7391 of Lecture Notes in Computer Science, pages 424–435. Springer, 2012. doi:10.1007/978-3-642-31594-7_36.
  • [8] Tsubasa Harada and Toshiya Itoh. Online facility assignment for general layout of servers on a line. In Combinatorial Optimization and Applications - 16th International Conference, COCOA 2023, Hawaii, HI, USA, December 15-17, 2023, Proceedings, Part II, volume 14462 of Lecture Notes in Computer Science, pages 310–322. Springer, 2023. doi:10.1007/978-3-031-49614-1_23.
  • [9] Tsubasa Harada, Toshiya Itoh, and Shuichi Miyazaki. Capacity-insensitive algorithms for online facility assignment problems on a line. Discret. Math. Algorithms Appl., 16(5):2350057:1–2350057:39, 2024. doi:10.1142/S179383092350057X.
  • [10] Bala Kalyanasundaram and Kirk Pruhs. Online weighted matching. J. Algorithms, 14(3):478–488, 1993. doi:10.1006/JAGM.1993.1026.
  • [11] Bala Kalyanasundaram and Kirk Pruhs. On-line network optimization problems. Developments from a June 1996 seminar on Online algorithms: the state of the art, pages 268–280, 1998.
  • [12] Bala Kalyanasundaram and Kirk Pruhs. The online transportation problem. SIAM J. Discret. Math., 13(3):370–383, 2000. doi:10.1137/S0895480198342310.
  • [13] Bala Kalyanasundaram, Kirk Pruhs, and Clifford Stein. A randomized algorithm for online metric b-matching. Oper. Res. Lett., 51(6):591–594, 2023. doi:10.1016/J.ORL.2023.09.002.
  • [14] Samir Khuller, Stephen G. Mitchell, and Vijay V. Vazirani. On-line algorithms for weighted bipartite matching and stable marriages. Theor. Comput. Sci., 127(2):255–267, 1994. doi:10.1016/0304-3975(94)90042-6.
  • [15] Elias Koutsoupias and Akash Nanavati. The online matching problem on a line. In Approximation and Online Algorithms, First International Workshop, WAOA 2003, Budapest, Hungary, September 16-18, 2003, Revised Papers, volume 2909 of Lecture Notes in Computer Science, pages 179–191. Springer, 2003. doi:10.1007/978-3-540-24592-6_14.
  • [16] Adam Meyerson, Akash Nanavati, and Laura J. Poplawski. Randomized online algorithms for minimum metric bipartite matching. In Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2006, Miami, Florida, USA, January 22-26, 2006, pages 954–959. ACM Press, 2006. URL: http://dl.acm.org/citation.cfm?id=1109557.1109662.
  • [17] Krati Nayyar and Sharath Raghvendra. An input sensitive online algorithm for the metric bipartite matching problem. In 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 505–515. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.53.
  • [18] Enoch Peserico and Michele Scquizzato. Matching on the line admits no o(log n)-competitive algorithm. ACM Trans. Algorithms, 19(3):28:1–28:4, 2023. doi:10.1145/3594873.
  • [19] Sharath Raghvendra. A robust and optimal online algorithm for minimum metric bipartite matching. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2016, September 7-9, 2016, Paris, France, volume 60 of LIPIcs, pages 18:1–18:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016. doi:10.4230/LIPICS.APPROX-RANDOM.2016.18.
  • [20] Sharath Raghvendra. Optimal analysis of an online algorithm for the bipartite matching problem on a line. In 34th International Symposium on Computational Geometry, SoCG 2018, June 11-14, 2018, Budapest, Hungary, volume 99 of LIPIcs, pages 67:1–67:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2018. doi:10.4230/LIPICS.SOCG.2018.67.