Optimal Competitive Ratio for Optimization Problems with Congestion Effects
Abstract
In this work we study online optimization problems with congestion effects. These are problems where tasks arrive online and a decision maker is required to allocate them on the fly to available resources in order to minimize the cost suffered, which grows with the amount of resources used. This class of problems corresponds to the online counterpart of well-known studied problems, including optimization problems with diseconomies of scale [33], minimum cost in congestion games [25], and load balancing problems [4].
Within this setting, our work settles the problem of designing online algorithms with optimal competitive ratio, i.e., algorithms whose incurred cost is as close as possible to that of an oracle with complete knowledge of the future instance ahead of time. We provide three contributions underpinning this result. First, we show that no online algorithm can achieve a competitive ratio below a given factor depending solely on the resource costs. Second, we show that, when guided by carefully modified cost functions, the greedy algorithm achieves a competitive ratio matching this lower bound and thus is optimal. Finally, we show how to compute such modified cost functions in polynomial time.
Keywords and phrases:
Online Algorithms, Competitive Ratio, Algorithmic Game Theory, Greedy Algorithms, Congestion GamesCategory:
APPROXCopyright and License:
2012 ACM Subject Classification:
Theory of computation Online algorithms ; Mathematics of computing Mathematical optimization ; Theory of computation Algorithmic game theoryAcknowledgements:
We thank the reviewers for valuable comments and suggestions.Funding:
This work is partially supported by: a Google DeepMind Scholarship awarded to Miriam Fischer; the PNRR MIUR project FAIR – Future AI Research (PE00000013), Spoke 9 – Green-aware AI; MUR – PNRR IF Agro@intesa; the Project SERICS (PE00000014) under the NRRP MUR program funded by the EU – NGEU; GNCS-INdAM.Editors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
In this work, we study optimization problems with congestion effects. These are cost minimization problems where the goal is to allocate resources to tasks, and the cost suffered by the system grows with the amount of tasks assigned to each resource. This fundamental class of problems is ubiquitous, including celebrated classes of problems such as load balancing [4, 43, 32, 16], social cost minimization in congestion games [40, 35, 25], online virtual circuit routing [3, 31], as well as energy-efficient algorithm design [1, 2], for which we now have a comprehensive picture of the achievable performances and fundamental algorithmic barriers.
However, while much of the existing literature focuses on offline settings, real-world decisions often need to be taken sequentially, with no access to future information, and irrevocably. For these reasons, we are interested in an online setting, where tasks arrive sequentially and resources need to be allocated on the fly. In this context, one measures the quality of a given algorithm over a class of inputs through the notion of competitive ratio [42, 27]. The latter represents the worst-case ratio between the cost achieved by the given algorithm and the optimal cost of an offline algorithm with complete knowledge of the input ahead of time. The goal is then to design an algorithm that minimize such measure of inefficiency.
In this work we settle this problem and develop algorithms that are optimal in the sense that they achieve minimal competitive ratio. We do so by developing a greedy algorithm that is guided in its search by an auxiliary cost function that, crucially, does not align with the cost one wishes to minimize in the first place.
We note that, prior to our work, results on the design of online algorithms for specialized subclasses of problems were given in [4, 16, 15] for the widely-studied class of load balancing problems. Within this setting, these works analyze the performance of standard greedy algorithms whose decisions are guided by the original cost function, rather than by general auxiliary functions, as in our more general algorithmic framework. However, their approach has been shown to be optimal only for specific settings, such as those involving polynomial resource cost functions and weighted tasks. The design of optimal online algorithms for other settings, such as those involving unweighted tasks and/or potentially more general cost functions than polynomials, remains an open problem - see the first paragraph of Section 1.1 for further details. In this respect, our work resolves a number of open questions, e.g., by providing the optimal competitive ratio, and improves upon previous design, e.g., by developing a general algorithmic framework applicable to a variety of settings with strong guarantees of both optimality and computational efficiency. At the same time, we highlight that the results we provide apply well-beyond the class of load balancing problems and extend to general resource cost functions. We are not aware of optimal algorithms at this level of generality. As for offline counterparts of the problem we consider, our work connects with the contributions of [33] and [25], which provide tight polynomial time algorithms for optimization problems with diseconomies of scale, and for minimizing social cost in congestion games. Our work settles a similar question to those of the above-cited papers but, crucially, in the online setting.
Finally, we highlight that our results can also be interpreted under a game-theoretic lens, wherein greedy agents appear online, and one is tasked with introducing interventions, in the form of incentives or taxes, to steer their behavior and reduce the resulting cost. In this context, our work provides a recipe to compute online optimal interventions, i.e., interventions that minimize the inefficiency of the resulting allocation. Indeed, the auxiliary cost functions we design for the greedy algorithm can be leveraged to define incentives or taxes to influence the agents’ behavior. This is discussed in detail in Section 6.
Our contribution and techniques
Our work settles the problem of designing optimal algorithms for online optimization problems with congestion effects. Three technical contributions support this claim.
-
First, we provide a lower bound on the competitive ratio of any online algorithm. This lower bound provides an insurmountable barrier on the achievable performance and, interestingly, depends only on the class of resource costs used, e.g., polynomials. We obtain this result for any class of non-decreasing and non-negative cost functions.
-
Second, we show that, for strictly convex cost functions, the greedy algorithm (guided by carefully modified cost functions) achieves a competitive ratio matching this lower bound and thus is optimal.
-
Third, we give a constructive approach to compute the modified cost functions to be used by the greedy algorithm, through poly-time solvable linear programs. In particular, we give an explicit construction for the case of polynomial resource costs.
Before discussing our techniques, we highlight that, while optimal, the algorithm we propose is easily and efficiently implementable. In fact, the modified cost functions employed by the greedy algorithm do not need to be computed online but can instead be evaluated offline. This aspect is important as it ensures that the online component of the algorithm incurs small computational cost, consisting in the use of a simple greedy algorithm with respect to the previously computed modified costs.
Techniques.
Our work utilizes a mix of combinatorial and duality-based ideas. Regarding the lower bound, perhaps interesting is the fact that the instance we construct features resources with identical cost functions, thus implying that the fundamental barrier we obtain on the achievable competitive ratio is very strong, as it applies already in simple settings such as that of online load balancing problems – see first paragraph of Section 1.1 for further details. The core idea in deriving our lower bound is to make the constructed instance algorithm-dependent in a way so that tasks arrive in groups. Within each group, any possible allocation of tasks to resources is constructed to incur the same cost, so that no online algorithm can distinguish between the quality of one allocation from another.
Designing an optimal algorithm with matching upper bound requires, instead, a different line of work. We follow here a three-pronged approach. First, we leverage linear programming to tightly evaluate the competitive ratio of the greedy algorithm with respect to a-priori given costs, though in a setting where such costs need not coincide with the objective we wish to minimize. Second we utilize linear programming duality to design optimal costs, i.e., costs that, once employed by greedy, minimize the competitive ratio. Third, we show that the optimal value of such linear program matches the lower bound previously found. Finally, as the resulting linear programs contain infinitely many constraints, we show how only finitely many of them can be considered to provide an explicit construction of the modified costs.
1.1 Related work
Our work relates to a number of research streams, which we review in the following paragraphs.
Online load balancing.
In online load balancing problems, tasks arrive sequentially over time, and the decision maker needs to schedule on the fly each individual task to a single machine from a given set of machines, so as to minimize the long-term cost incurred (typically measured by the -norm of the machine loads or, in a closely related formulation, by polynomial resource cost functions). This is a well-studied area, starting with the works of [4, 5, 6] and various follow-up contributions, e.g., [10, 15, 16, 19, 36, 43]. In the weighted version of load balancing, the increase in cost that a task causes to a resource depends on a task-specific weight. For this setting, a specialized greedy algorithm has been shown to guarantee the best competitive ratio when the resource cost functions are restricted to polynomials [15, 36]. However, such an optimality guarantee does not apply to more general cost functions or to the unweighted version of the problem (where all task weights are unitary, and thus potentially allow a lower competitive ratio), which, as will be clear from Section 2, belongs to the class of online optimization problems studied in this manuscript. In such unweighted settings, the works of [10, 16, 19, 22, 43] provide upper and lower bounds for specialized classes of online algorithms. Contrary to that, our work settles the general question of designing optimal online algorithms and deriving fundamental barriers, in the form of tight lower bounds, to which any online algorithm is subject and which depend only on the considered class of resource cost functions.
Perhaps interestingly, the instance we construct to lower bound the competitive ratio for the broader class of optimization problems with congestion effects, is also an instance of online load balancing problems, thus giving a tight answer for this smaller, but important, class too.
Online congestion games.
The setup considered in online congestion games is similar to that of online load balancing problems, with the crucial difference that individual tasks (referred to as agents in that literature) may require more then one resource for their completion. This class of problems is subsumed, too, by the broader class of online optimization problems we study in this work, motivating the ensuing comparison. Most of the literature in online congestion games has focused on providing performance certificates, in the form of competitive ratios, for fixed classes of online algorithms, notably greedy algorithms [4, 8, 9, 10, 15, 16, 19, 22, 29, 43, 44]. Specifically, for linear latency functions (see Section 4 for its definition), [19] and [9] provide a tight competitive ratio of , where is the golden ratio. For quadratic and cubic latency functions, [8] provides upper bounds of approximately 37.589 and 527.323, respectively. A general lower bound of is given by [22] for polynomial latency functions of degree , while upper bounds for the same setting are shown in [29]. The above-mentioned works analyze the performance of greedy algorithms utilizing the original cost function. Instead, in this work we provide tight lower bounds that hold for any online algorithm, and further show that one can achieve such tight lower bound by judiciously modifying the cost function used by the greedy algorithm. To the best of our knowledge, lower bounds that apply to any online algorithm were previously only known for linear latency functions [26]. Our work not only improves upon the lower bound in [26, Proposition 4.4] by a factor of 2, but - more importantly - provides lower bounds for arbitrary classes of non-negative and non-decreasing latency functions. Finally, we highlight that, while [11] seemingly improves on the performance achieved by the above-cited works, their algorithm requires a priori knowledge of an optimal allocation and of the full instance. As such, their results are not applicable in an online setting.
Offline optimization problems with congestion effects.
Offline versions of the problem we consider have been well studied, both under the umbrella of optimization problems (or generalized network design problems) with diseconomies of scale [33, 21] and under that of minimum social cost in congestion games [25]. While there is significant work in both these domains including [35, 2], notable are the works of [33, 21, 25], which provide polynomial time algorithms with optimal approximation and matching lower bounds, and apply these results to a variety of relevant cost functions, including polynomial ones. Our work settles a similar question to that of the above-cited papers, but crucially, in the online setting.
Online optimization.
Finally, we would like to highlight that our work focuses on developing online algorithms in the spirit of competitive analysis [13, 14, 23], i.e., in a setting where one compares the performance of the algorithm at hand with that of an offline optimal algorithm with complete knowledge of the future instance. While connected, this approach differs significantly from other types of analysis performed in online settings, e.g., the extensive line of work on no-regret algorithms [41, 34].
Organization of the manuscript
The remainder of the manuscript is organized as follows. In Section 2, we present the model. In Section 3, we provide a lower bound on the competitive ratio of any online algorithm. In Section 4, we introduce a greedy algorithm that employs modified cost functions, and show that this algorithm achieves best-possible competitive ratio among all online algorithms. In Section 5, we address the efficient computation of such modified cost functions. Finally, in Section 6, we outline connections with Game Theory and, specifically, how our results can be applied to the design of optimal interventions in congestion games. All omitted results and proofs are deferred to the appendix.
2 Problem formulation
We consider an online version of a classical cost minimization problem that involves resource selection and congestion, referred to as online optimization with congestion effects. With regards to notation, denotes the set of natural numbers, denotes the set of natural numbers including zero, and given an integer , denotes the set and the set . In a specific instance of this setting, we are given a fixed set of resources , while individual tasks arrive at discrete time steps , each with a feasible set containing collections of resources needed to complete such task. The length of the time horizon is unknown in advance and, for simplicity, we identify each task with the time step at which it arrives. At each time step , the decision maker needs to irrevocably assign the corresponding task to a non-empty collection of resources from the set , which we denote with . We refer to the collection of resources to which task is assigned as the action for task , and denotes the set of admissible actions for task . An allocation specifies the resources allocated to each task throughout the whole horizon. Each resource is associated with a non-negative and non-decreasing cost function , with and for 111For our purposes, the assumption that for is without loss of generality. Indeed, it can be shown that if this condition does not hold, the competitiveness of online solutions become arbitrarily bad (see Remark 15 in the appendix for further details)., that relates the number of tasks assigned to each resource (in a given allocation) to the cost incurred by due to the assignment. An example of a well-studied cost functions is that of polynomials with non-negative coefficients and maximum degree . The total cost incurred at the end of the time horizon and associated to the allocation is then obtained by summing the costs experienced over all resources, i.e.,
where denotes the congestion of resource in , that is, the number of tasks assigned to resource , under allocation .
In this work, we are interested in developing online algorithms that minimize the total cost. Specifically, an online algorithm Alg acting on instance is a map that irrevocably and deterministically222We focus in this work on deterministic algorithms. associates to each time/task a feasible action solely using information available up to that time, i.e., solely using knowledge of , and of the previous decisions . We denote the allocation generated by algorithm Alg as . Finally, we evaluate the quality of an online algorithm by considering its competitive ratio, that is, the worst-case ratio between the cost achieved by this algorithm and the optimal cost that could have been achieved by an algorithm that minimizes the cost with complete knowledge of the instance ahead of time. Formally, given a class of input instances , the competitive ratio of algorithm Alg is defined as
where denotes an optimal offline solution, i.e., .
In this work we aim at designing algorithms that minimize such competitive ratio, i.e., whose corresponding cost is as close as possible to that of an offline optimal solution. In our analysis, we will often consider classes of instances that are generated using resource costs taken from a given set of resource cost functions , e.g., polynomials. These are instances where each resource cost belongs to the given set . From now on, we implicitly assume that all sets of cost functions under consideration, by default, satisfy the properties stated at the beginning of the section (e.g., non-negativity and non-decreasing monotonicity); additional assumptions (e.g., strict convexity) will be specified explicitly. Interesting sub-classes of the model are given by load balancing instances, where each feasible action in contains a single resource, and instances with identical resources, where all resources have the same cost function, i.e., for all .
3 Lower Bound on Competitive Ratio
In this section, we provide a lower bound on the competitive ratio of any online algorithm, parametrized by the class of resource costs utilized in constructing the instances. Towards this goal, given a cost function , it is instrumental to introduce
| (1) |
As will become apparent later, arises from the lower bound instance used in the proof of Theorem 1. We observe that , since setting and in the right-hand side of (1) yields , regardless of the choice of the cost function . The following theorem constitutes our first main result. It shows that no online algorithm can achieve a competitive ratio below .
Theorem 1.
For an arbitrary class of cost functions, no online algorithm can achieve a competitive ratio over instances generated by below . This result also holds when restricting to load balancing instances with identical resources.
Proof.
We will show that, for any fixed cost function and online algorithm Alg, there exists a load balancing instance where all cost functions are identically equal to and such that . By taking the worst case over , it follows that provides a lower bound on the competitive ratio of any online algorithm over load balancing instances with identical resources and cost functions drawn from . One then concludes by observing that such a lower bound applies directly to optimization problems with congestion effects, as these form a superset of the set of load balancing instances considered.
Fix a cost function , and an online algorithm Alg. To prove the claim, we design an instance constructed adversarially with respect to any choice made by Alg at each task’s arrival, aiming to obtain an allocation with the highest possible cost. Specifically, for a given and a sequence of positive integers, let be a load balancing instance defined as follows:
-
Resources and Cost Functions: Let . is a set of distinct resources. The cost function of each resource is identically equal to .
-
Time Horizon: Given , let ; we observe that, by the choice of , and each are integers. We set . We partition the set of time-steps/tasks into sets of consecutive time steps, where each is defined as (i.e., is made of consecutive time steps).
-
Tasks and Actions: According to the definitions of , the algorithm Alg first processes all the tasks in , then all the tasks in , and so forth. As the instance is of load balancing type, we can characterize the feasible set of actions for each task as , for a given set of singletons to which each task can be assigned, constructed as follows. Given and , is adversarially and iteratively defined, based on the decisions that the algorithm would take up to and including time . Specifically, for , assuming that the algorithm has allocated the first tasks, consists of all resources which have a congestion of at time (that is, just before processing task ). This design procedure is feasible, as the considered online algorithm is deterministic, and its decision at time is uniquely determined by the previous observations and decisions.
The following lemma exhibits some fundamental structural properties of the set of resources to which each task can potentially be assigned; notably, it shows that each is non-empty and well-defined.
Lemma 2.
There exists a sequence of non-empty resource subsets , with and for any , such that Alg assigns distinct tasks to distinct resources in a one-to-one correspondence. Furthermore, for any and task , consists of all the resources in to which no task in has been previously assigned by Alg.
The proof of the above lemma directly follows from the iterative and adversarial definition of each ; in particular, it holds since, for any and time step , there always exists at least a resource in having congestion at time , to which task can be assigned. Figure 1 represents an example of input instance , along with the application of Lemma 2.
The upper figure represents the allocation returned by Alg. Alg assigns all tasks in to the resources in (resources 25 to 48), (resources 29 to 48), (resources 34 to 48), respectively, in a one-to-one-correspondence. At the end of the execution of Alg, the congestion of each resource in the obtained allocation is given by the number of labeled squares (i.e., tasks) in the column corresponding to that resource. Specifically, each resource in (resources 1 to 24), (resources 25 to 28), (resources 29 to 33) and (resources 34 to 48) has congestion 0,1,2 and 3 (under ), respectively.
The lower figure represents the benchmark allocation . Specifically, tasks of are assigned to each resource in . The congestion of each resource in allocation is again represented by the number of labeled squares in the column corresponding to that resource. Specifically, each resource in , , and has congestion 1,5,3 and 0 (under ), respectively.
By exploiting Lemma 2 and the related notation, we can also efficiently characterize the total cost of the allocation returned by algorithm Alg, along with the resulting competitive ratio. Let denote the allocation returned by Alg. We observe that, for any , the congestion of each resource in is equal to , where we set . Indeed, by Lemma 2, each resource in first receives a task, followed by each resource in , and so on. Consequently, since , by the end of the algorithm, every resource in is used by exactly tasks. Then, the total cost achieved by is
where the last equality holds by for , and .
Now, let denote the allocation that, for any , uniformly distributes all tasks of over all resources in ; will be used as benchmark to measure the performance of . As a consequence of Lemma 2, is valid for any and task (i.e., each task in can potentially be assigned to each resource in ), and then effectively represents a feasible allocation. Figure 1 represents the allocations and in an example input instance . Then, the congestion of each resource in under allocation is . Thus, the total cost of allocation is
where, in the second equality, we have shifted the index by one. By exploiting the values of and determined above, we conclude that the competitive ratio of algorithm Alg, when applied to instance , is
| (2) |
where the last equality in (2) is obtained multiplying by both numerator and denominator of the fraction in the previous line. Taking the worst case over and , one immediately obtains the expression of , and thus concludes. Theorem 1 can be applied to quantify lower bounds for specific classes of resource costs, such as polynomials.
Corollary 3.
No online algorithm can achieve a competitive ratio lower than , over instances generated by polynomial resource costs of maximum degree , with . This result also holds when restricting to load balancing instances with identical monomial cost functions .
The proof of the above corollary is deferred to Appendix A.
4 Optimal Competitive Ratio via Modified Greedy Algorithms
In Section 3 we show that the efficiency of online algorithms cannot exceed a certain barrier, established by the lower bound of on their competitive ratio, when cost functions are drawn from . Thus, it is interesting to ask a complementary question: does there exist an online algorithm whose competitive ratio matches this bound? Despite the fact that the class of instances used to obtain the lower bound is rather complex, in this section we show, perhaps surprisingly, that a simple greedy algorithm relying on carefully defined cost functions to evaluate the greedy moves guarantees a competitive ratio matching this lower bound and is therefore optimal.
In the remainder of the paper, instead of working directly with cost functions , it will be often convenient to work with their rescaled version, referred to in the literature as latency functions. Specifically, the latency function associated with is defined by for any , where we set for convenience. Here, can be interpreted as the cost of resource per task, assuming such a cost is equally shared among the tasks assigned to it. Within this setting, the standard greedy algorithms process tasks sequentially and irrevocably, and assign each task to the action minimizing the overall latency of task , e.g., [19], or the total cost , e.g., [4]. The greedy algorithms we consider in this work are instead more general than the previous ones and work as follows. Let be a latency transformation, that is, a map that associates the original latency function of resource with a (possibly) modified one . In this work, we consider a greedy algorithm with respect to modified latency functions derived from . Specifically, we consider a greedy algorithm employing latency functions in place of the original latency functions , and assigning each task to the action minimizing the overall modified latency of task .333We assume that ties are resolved according to an arbitrary deterministic tie-braking rule.
A pseudo-code of the greedy algorithm with modified latency functions is given in Algorithm 1.
As the main result of this section, we show that the greedy algorithm with modified latency obtained from the solution of a specific linear program (LP) provides a competitive ratio that matches the lower bound provided in Theorem 1, when the considered cost functions satisfy a very mild convexity requirement. In the following we discuss our three-step approach to achieve this goal, and then state the main result in Theorem 7.
First, for a given cost function , consider the following infinite LP in the variables ), denoted as :
| LP(c) |
Equipped with this linear program, Lemma 4 establishes that the greedy algorithm employing the latency transformation has a competitive ratio no higher than when the input instance has cost functions in , so long as is simultaneously feasible for all the above LPs, i.e., for LP(c), for all . As becomes evident in the proof of Lemma 4, LP(c) arises from imposing the greedy choice on each task, compared to any other choice.
Second, under mild convexity assumptions on the resource costs, Lemma 6 shows that, by appropriately choosing a specific latency transformation , the value simultaneously satisfies all LPs. Third, and final, by putting Lemma 4 and 6 together, Theorem 7 shows that the competitive ratio of the greedy algorithm associated with is at most . This implies that is a tight bound on the optimal competitive ratio and the algorithm we have designed is optimal.
Lemma 4.
Let and be a latency transformation such that , with and , is feasible for LP(c), for all . Then, the competitive ratio of the greedy algorithm over instances generated by with modified latency functions is at most .
Proof.
Let be a given input instance with cost functions in , such that each pair with is feasible for any . Let and be the allocation of the greedy algorithm with modified latency functions and any other allocation at the end of the time horizon, respectively. Denote with and the congestion of resource in allocations and , respectively.
As for all , it specifically holds for , for any resource . Thus, summing over all resources, we obtain
As and , showing that suffices to conclude, as then and follows.
Let denote the congestion of resource up to and including time step , when employing the greedy algorithm with modified latency functions . Observe that the action according to the greedy algorithm at time step minimizes the sum of the modified latency functions of the corresponding resources up to and including time step . Thus, and, for any other action , it holds that
Aggregating over all time steps, we obtain
and the second inequality follows as for all and for all .
Remark 5.
We observe that the optimal value of each LP(c) is at least 1. Specifically, by leveraging the condition in the constraint corresponding to , we obtain . Furthermore, if is a non-negative linear function of the form , the optimal value of is , which can be trivially achieved by setting for all . Thus, in light of Lemma 4, linear functions with non-negative coefficients can be regarded as dummy functions that do not influence the analysis of (the upper bound on) the competitive ratio. Consequently, they can be excluded from the considered class without loss of generality.
From this point onward, the results we obtain hold under very mild convexity assumptions on the considered cost functions. Specifically, we consider strictly convex latency functions, meaning they satisfy condition for any . We note that this requirement is broad enough to encompass most functions of interest, including polynomials, exponentials, polylogarithms, and many others. In fact, these functions are either strictly convex or linear, and the latter type can be discarded from our analysis without loss of generality (by Remark 5).
Lemma 6.
Let be a class of strictly convex cost functions. Then, if , there exists a latency transformation such that , with , , and , is feasible for LP(c), for all .
Proof.
Given , let . To show the claim, it will be sufficient to show that is feasible for , for any . Indeed, by setting , the claim of the lemma follows. From this point onward, the proof of the lemma can be divided into two main parts, which we outline below:
Part 1: Consider the following linear program with infinite constraints and variables , derived from the linear program by setting for any , removing the monotonicity constraints and imposing for any :
| LP2(c) |
Let be the sequence of values iteratively defined by and
| (3) |
where the above minimum is well-defined as the right-hand part of (3), which can be written as , goes to infinite for , due to the strict convexity of and . By exploiting the iterative definition of for all and the definition of , we show that is a feasible solution for LP2(c).
Proof of Part 1 of Lemma 6.
Given , let denote the constraint associated with in LP2(c). We will first show that the solution , with determined iteratively from (3), is feasible for LP2(c). We observe that each constraint can be written as Thus, the solution provided in (3) satisfies all constraints with and .
It remains to show that holds for any . As outlined in the observation below (3), for any there exists that minimizes the right-hand side of (3), that is,
| (4) |
By using (4), one can show by induction that
| (5) |
(see Lemma 11 in the appendix for a proof).
Thus, for any , we get
where the first equality holds by (5), the second equality is obtained by using and dividing both the numerator and denominator of the fraction by , and the last inequality follows from the definition of (see (1)). The above inequalities imply for any , that is, the constraint of LP2(c) is satisfied for any . This shows the feasibility of for LP2(c), and concludes the proof of Part 1.
Proof of Part 2 of Lemma 6.
Let be the pair obtained by setting for any , that is, . Given , let denote the constraint in LP(c) associated with . By the results obtained in the proof of Part 1, we have that all constraints with are satisfied. Thus, to prove the feasibility of for LP(c), it remains to show that is satisfied for any and that the monotonicity constraints hold.
We observe that holds for any , where the inequality follows from the feasibility of the last constraint of LP2(c) (shown in Part 1). As the obtained inequality is equivalent to for , we have that is satisfied by .
Now, we show that the monotonicity constraints hold. Assume by contradiction that there exists such that . Let denote the sequence of integers defined in the proof of Part 1, that is, the sequence satisfying (4). By the convexity of cost function , the tightness of constraints (by (4)) and the feasibility of for any , one can show that is decreasing in . The proof of this property is deferred to Lemma 12 in Appendix B, and is shown by induction on .
Then, by exploiting the strict convexity of and the decreasing monotonicity of in we have that, under solution , the right-hand side of tends to for tending to (see Lemma 13 in Appendix B). However, this violates the feasibility of for a constraint with a sufficiently large , thus yielding a contradiction.
Thus, is necessarily non-decreasing in , which concludes the proof of Part 2, and therefore the entire proof of Lemma 6.
By Lemma 6, we conclude that there exists a latency transformation such that the resulting modified latency functions , associated with cost functions in , ensure the feasibility of in the linear program LP(c) for all . Then, by Lemma 4, we obtain the following main result of the section:
Theorem 7.
Let be a class of strictly convex cost functions. Then, there exists a latency transformation such that is an upper bound on the competitive ratio of the greedy algorithm with modified latencies derived from , over instances with cost functions drawn from .
5 Computing modified cost functions
While the result in Theorem 7 is existential, its proof suggests that optimal modified cost functions can be computed through the solution of LP(c). However, this is an infinite linear program so that it is unclear how such modified cost functions should be computed, and whether their computation can be carried out efficiently. This will constitute the focus of this section, which we divide in two parts. First, we will consider the case where an upper bound on the total congestion on each resource is known (Section 5.1). We will then move beyond this case in Section 5.2.
5.1 Upper bound on congestion
If an upper bound on the total congestion at any resource is known, for example because we are aware of the maximum number of tasks appearing, it is possible to limit the number of constraints appearing in LP(c) to finitely many, specifically by considering constraints for only. This intuition is made formal in the ensuing corollary.
Corollary 8.
Consider the class of input instances obtained employing cost functions in , and such that the total congestion on any resource is at most . Let, for given and , be the optimal value of the linear program LP(c,), and let . Then we can compute, in polynomial time, a latency transformation such that the greedy algorithm with modified latency functions derived from achieves a competitive ratio no greater than . Furthermore, if is made of strictly convex functions, the resulting competitive ratio is no greater than .
| (LP(c,)) |
Proof.
Observe that, for given and , LP(c,) is feasible, as, for arbitrary satisfying and for all (the latter constraint equals the top constraint in LP(c,) for ), we can find large enough such that the top constraint in LP(c,) is satisfied for all .
Let be an optimal solution to LP(c,).444The dependence of on and is for sake of readability omitted.
Observe that is computable in polynomial time since it is the solution of a finite linear program. Denote . As and is feasible for , so is . Let be the allocation of the greedy algorithm with modified latency functions , and let be any other allocation. By definition of the class of input instances, for any resource , . Thus, by considering the above restriction for each resource congestion in the proof of Lemma 4, we can immediately obtain that, given that is simultaneously feasible for all , is an upper bound on the competitive ratio - in other words, we obtain an equivalent statement of Lemma 4, but adapted to this case of bounded resource congestion. As we have already shown that is feasible for each , it follows that is an upper bound on the competitive ratio.
If contains strictly convex functions only, suppose , otherwise the second statement is trivial. From the proof of Lemma 6, we know that is simultaneously feasible for each LP(c). Since is the optimal value for LP(c,) for at least one and the feasible region of LP(c,) contains that of LP(c), any value that is simultaneously feasible for each must also be feasible for each . Therefore, , and consequently, is, just like , an upper bound on the competitive ratio.
A very well-studied class of problems is that where latency functions are polynomials with non-negative coefficients and degree no higher than , i.e., extracted from the set . Note that, in these settings, it suffices to compute a modified latency for each individual monomial , as explained in general terms in the following remark. This allows to compute and store ahead of time the modified latency functions.
Remark 9.
When the latency functions used to generate the instance are obtained from the set , i.e., they are linear combination of some given basis functions taking the form , then the modified latencies , obtained by linearly combining , as per Theorem 7, also achieve optimal competitive ratio. For details, we refer to Appendix C.
Notice that the transformation defined by LP(c,) achieves a competitive ratio that depends on and may be strictly better than , converging to the latter as grows. Table 2 in Appendix D illustrates how such value increases with for polynomial latency functions with non-negative coefficients of varying maximum degree .
5.2 No upper bound on congestion
Without an explicit upper bound on the total congestion or time horizon, it is unclear whether modified cost functions can be efficiently computed as the linear program LP(c) contains infinitely many constraints. To tackle this issue, we take the following approach. The idea is to fix some finite , compute the modified resource costs up until , by accounting for finitely many constraints only, and then extend the solution from to infinity with a carefully defined function. For this purpose, it is convenient to work with the sum of the modified latency functions, defined as , where we let range in , instead of working directly with . Note that, given , one can reconstruct and similarly, given , one can compute using the above definition. We investigate this approach for polynomial latency functions with non-negative coefficients. For ease of readability, we present the approach for monomial latency functions . Using Remark 9, we easily obtain modified latency functions for general polynomials with identical competitive ratio. Further, by Remark 5, we can disregard the constant monomial (which has cost function ), as (likewise, ) achieves competitive ratio equal to 1. Therefore, w.l.o.g., we consider latency functions , and for each given monomial consider the following (finite) linear program
| (6) |
Here, the first set of constraints represents the constraints already appearing in LP(c), the second set of constraints ensures non-decreasingness of , while the third set imposes that the sum of the modified latencies matches the monomial at the cut-off point . This choice will be crucial as the monomial will be used to patch for and beyond. Armed with this, we can state the main result of this section, which allows us to evaluate the competitive ratio of the resulting patched modified latency functions. Due to space limitations, we refer to the full version of the paper for the proof.
Theorem 10.
Consider the class of instances generated by polynomial latencies of degree no higher than , i.e., where . Consider modified latency functions obtained as , where and
| (7) |
Then, the greedy algorithm employing such modified latencies achieves a competitive ratio no higher than
By Lemma 14, , hence the second term recovers the lower bound on the competitive ratio obtained in Corollary 3 in the limit.
The competitive ratio above is presented with the explicit choice for computing and patching . In principle, (7) can be computed for arbitrary , as long as the same is used in (6) as in the patched . In that case we obtain, for fixed , the bound , and
| (8) |
Although optimizing over may allow for slightly better competitive ratio, it is unclear how to do so efficiently and whether there exists an explicit expression of the optimal . If is small, outweighs , and our choice is motivated by achieving the lowest possible of all , which is especially relevant for small , whilst at the same time yielding good values for compared to other ’s for larger (see Table 1 and Table 3 for and , respectively). We leave the question of optimal choice of for future research.
| 1 | 2.33 | 7.03 | 2.87 | 6.27 | 3 | 6.25 | 3.13 | 6.26 | 3.67 | 6.51 |
|---|---|---|---|---|---|---|---|---|---|---|
| 2 | 2.79 | 6.13 | 3.30 | 5.46 | 3.43 | 5.44 | 3.56 | 5.46 | 4.07 | 5.67 |
| 5 | 3.29 | 5.28 | 3.73 | 4.71 | 3.85 | 4.69 | 3.97 | 4.71 | 4.43 | 4.89 |
| 10 | 3.55 | 4.92 | 3.91 | 4.38 | 4.01 | 4.37 | 4.10 | 4.38 | 4.51 | 4.55 |
| 20 | 3.71 | 4.72 | 3.99 | 4.20 | 4.07 | 4.19 | 4.15 | 4.20 | 4.49 | 4.37 |
| 40 | 3.81 | 4.61 | 4.02 | 4.11 | 4.08 | 4.10 | 4.15 | 4.11 | 4.44 | 4.27 |
| 100 | 3.88 | 4.54 | 4.03 | 4.05 | 4.08 | 4.04 | 4.13 | 4.05 | 4.38 | 4.21 |
| 200 | 3.92 | 4.52 | 4.03 | 4.03 | 4.07 | 4.02 | 4.11 | 4.03 | 4.33 | 4.19 |
| 400 | 3.94 | 4.51 | 4.03 | 4.02 | 4.06 | 4.01 | 4.10 | 4.02 | 4.30 | 4.18 |
6 Beyond Online Optimization - A Game-Theoretic Perspective
Standard Congestion Games [39] constitute the game-theoretic framework most closely related to our model. In these games, tasks act as rational and selfish agents, each autonomously choosing its action to minimize its individual cost , expressed by means of the latency functions . The impact of selfish behavior is often quantified via the Price of Anarchy [30], which, similarly to the competitive ratio, represents the worst-case ratio between the total cost of stable solutions arising from agents’ interactions (i.e., Nash equilibria [37]) and the optimal cost. Significant bulk of work addresses the problem of designing taxes or incentives to reduce as much as possible the price of anarchy [7, 12, 17, 18, 20, 25, 24, 28, 38]. Similarly as in our online optimization model, [11] provide taxation mechanisms for agents that act myopically and greedily select the action that minimize their individual costs. The optimality of the resulting greedy outcomes is measured through the competitive analysis adopted for our model. However, their taxation mechanism uses the full knowledge of the instance and is therefore unusable in online settings. In this context, we observe that the modified latency functions provided by our general greedy algorithm can be exploited to define taxes or incentives that guide agents toward better outcomes. Specifically, if we charge each agent selecting a resource an amount , with being the congestion of resource after the agent’s selection, and representing a tax if positive and an incentive if negative, the greedy choices of the agents “simulate” an execution of the greedy algorithm with modified latencies . Indeed, the individual cost of the agent processed at time step , when choosing action , becomes , that is, the cost used by our algorithm to perform the greedy assignment.
We conclude that the decentralized intervention mechanism, in which each resource autonomously calculates a tax/incentive to charge/credit the agents who select it, guarantees the same competitive ratio analyzed in our work on the online optimization front. Furthermore, the optimality of our greedy framework among all online algorithms translates into the optimality of the resulting intervention mechanisms among all others.
References
- [1] Susanne Albers. Energy-efficient algorithms. Communications of the ACM, 53(5):86–96, 2010. doi:10.1145/1735223.1735245.
- [2] Matthew Andrews, Antonio Fernández Anta, Lisa Zhang, and Wenbo Zhao. Routing for energy minimization in the speed scaling model. In 2010 Proceedings IEEE INFOCOM, pages 1–9. IEEE, 2010. doi:10.1109/INFCOM.2010.5462071.
- [3] James Aspnes, Yossi Azar, Amos Fiat, Serge Plotkin, and Orli Waarts. On-line routing of virtual circuits with applications to load balancing and machine scheduling. Journal of the ACM (JACM), 44(3):486–504, 1997. doi:10.1145/258128.258201.
- [4] Baruch Awerbuch, Yossi Azar, Edward F. Grove, Ming-Yang Kao, P. Krishnan, and Jeffrey Scott Vitter. Load balancing in the norm. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS), pages 383–391, 1995. doi:10.1109/SFCS.1995.492494.
- [5] Yossi Azar, Andrei Z. Broder, and Anna R. Karlin. On-line load balancing. Theor. Comput. Sci., 130(1):73–84, 1994. doi:10.1016/0304-3975(94)90153-8.
- [6] Yossi Azar, Joseph Naor, and Raphael Rom. The competitiveness of on-line assignments. J. Algorithms, 18(2):221–237, 1995. doi:10.1006/JAGM.1995.1008.
- [7] Martin J. Beckmann, C. B. McGuire, and Christopher B. Winsten. Studies in the Economics of Transportation. Yale University Press, 1956.
- [8] Vittorio Bilò. A unifying tool for bounding the quality of non-cooperative solutions in weighted congestion games. Theory Comput. Syst., 62(5):1288–1317, 2018. doi:10.1007/S00224-017-9826-1.
- [9] Vittorio Bilò, Angelo Fanelli, Michele Flammini, and Luca Moscardelli. Performances of one-round walks in linear congestion games. Theory of Computing Systems, 49(1):24–45, 2011. doi:10.1007/S00224-010-9309-0.
- [10] Vittorio Bilò and Cosimo Vinci. On the impact of singleton strategies in congestion games. In Proceedings of the 25th Annual European Symposium on Algorithms, (ESA), pages 17:1–17:14, 2017. doi:10.4230/LIPICS.ESA.2017.17.
- [11] Vittorio Bilò and Cosimo Vinci. Dynamic taxes for polynomial congestion games. ACM Trans. Economics and Comput., 7(3):15:1–15:36, 2019. doi:10.1145/3355946.
- [12] Vittorio Bilò and Cosimo Vinci. Coping with Selfishness in Congestion Games - Analysis and Design via LP Duality. Monographs in Theoretical Computer Science. An EATCS Series. Springer, 2023. doi:10.1007/978-3-031-30261-9.
- [13] Allan Borodin and Ran El-Yaniv. Online Computation and Competitive Analysis. Cambridge University Press, 1998.
- [14] Niv Buchbinder and Joseph Naor. The design of competitive online algorithms via a primal-dual approach. Found. Trends Theor. Comput. Sci., 3(2-3):93–263, 2009. doi:10.1561/0400000024.
- [15] Ioannis Caragiannis. Better bounds for online load balancing on unrelated machines. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 972–981, 2008. URL: http://dl.acm.org/citation.cfm?id=1347082.1347188.
- [16] Ioannis Caragiannis, Michele Flammini, Christos Kaklamanis, Panagiotis Kanellopoulos, and Luca Moscardelli. Tight bounds for selfish and greedy load balancing. Algorithmica, 61(3):606–637, 2011. doi:10.1007/S00453-010-9427-8.
- [17] Ioannis Caragiannis, Christos Kaklamanis, and Panagiotis Kanellopoulos. Improving the efficiency of load balancing games through taxes. In Internet and Network Economics, 4th International Workshop, WINE 2008, Proceedings, volume 5385, pages 374–385, 2008. doi:10.1007/978-3-540-92185-1_43.
- [18] Ioannis Caragiannis, Christos Kaklamanis, and Panagiotis Kanellopoulos. Taxes for linear atomic congestion games. ACM Trans. Algorithms, 7(1):13:1–13:31, 2010. doi:10.1145/1868237.1868251.
- [19] George Christodoulou, Vahab S. Mirrokni, and Anastasios Sidiropoulos. Convergence and approximation in potential games. Theoretical Computer Science, 438:13–27, 2012. doi:10.1016/J.TCS.2012.02.033.
- [20] Richard Cole, Yevgeniy Dodis, and Tim Roughgarden. How much can taxes help selfish routing? Journal of Computer and System Sciences, 72(3):444–467, 2006. doi:10.1016/J.JCSS.2005.09.010.
- [21] Yuval Emek, Shay Kutten, Ron Lavi, and Yangguang Shi. Approximating generalized network design under (dis)economies of scale with applications to energy efficiency. J. ACM, 67(1), 2020. doi:10.1145/3377387.
- [22] Babak Farzad, Neil Olver, and Adrian Vetta. A priority-based model of routing. Chicago Journal of Theoretical Computer Science, 2008(1), 2008. URL: http://cjtcs.cs.uchicago.edu/articles/2008/1/contents.html.
- [23] Amos Fiat and Gerhard J. Woeginger. Online algorithms: The state of the art, volume 1442. Springer, 1998.
- [24] Miriam Fischer, Martin Gairing, and Dario Paccagnan. Fair interventions in weighted congestion games. In International Conference on Web and Internet Economics. Springer, 2024. To appear.
- [25] Martin Gairing and Dario Paccagnan. In congestion games, taxes achieve optimal approximation. Operations Research, 72(3):966–982, 2023. doi:10.1287/OPRE.2021.0526.
- [26] Tobias Harks, Stefan Heinz, and Marc E. Pfetsch. Competitive online multicommodity routing. Theory of Computing Systems, 45(3):533–554, 2009. doi:10.1007/S00224-009-9187-5.
- [27] Anna R. Karlin, Mark S. Manasse, Larry Rudolph, and Daniel D. Sleator. Competitive snoopy caching. Algorithmica, 3:79–119, 1988.
- [28] Jon M. Kleinberg and Sigal Oren. Mechanisms for (mis)allocating scientific credit. Algorithmica, 84(2):344–378, 2022. doi:10.1007/S00453-021-00902-Y.
- [29] Max Klimm, Daniel Schmand, and Andreas Tönnis. The online best reply algorithm for resource allocation problems. In Proceedings of the 12th International Symposium on Algorithmic Game Theory (SAGT), pages 200–215, 2019. doi:10.1007/978-3-030-30473-7_14.
- [30] Elias Koutsoupias and Christos Papadimitriou. Worst-case equilibria. In Proceedings of the 16th Annual Conference on Theoretical Aspects of Computer Science (STACS), pages 404–413, 1999. doi:10.1007/3-540-49116-3_38.
- [31] Stefano Leonardi. On-line network routing. Online Algorithms: The State of the Art, pages 242–267, 2005.
- [32] Thomas Lücking, Marios Mavronicolas, Burkhard Monien, and Manuel Rode. A new model for selfish routing. Theoretical Computer Science, 406(3):187–206, 2008. doi:10.1016/J.TCS.2008.06.045.
- [33] Konstantin Makarychev and Maxim Sviridenko. Solving optimization problems with diseconomies of scale via decoupling. J. ACM, 65(6):42:1–42:27, 2018. doi:10.1145/3266140.
- [34] H. Brendan McMahan. A survey of algorithms and analysis for adaptive online learning. Journal of Machine Learning Research, 18(90):1–50, 2017. URL: https://jmlr.org/papers/v18/14-428.html.
- [35] Carol A. Meyers and Andreas S. Schulz. The complexity of welfare maximization in congestion games. Networks, 59(2):252–260, 2012. doi:10.1002/NET.20439.
- [36] Viswanath Nagarajan and Lily Wang. Online generalized network design under (dis)economies of scale. Mathematics of Operations Research, 49(1):107–124, 2024. doi:10.1287/MOOR.2022.1349.
- [37] John F. Nash. Equilibrium points in -person games. Proceedings of the National Academy of Science, 36(1):48–49, 1950.
- [38] Dario Paccagnan, Rahul Chandan, and Jason R. Marden. Utility and mechanism design in multi-agent systems: An overview. Annu. Rev. Control., 53:315–328, 2022. doi:10.1016/J.ARCONTROL.2022.02.002.
- [39] Robert W. Rosenthal. A class of games possessing pure-strategy Nash equilibria. International Journal of Game Theory, 2:65–67, 1973.
- [40] Tim Roughgarden. Barriers to near-optimal equilibria. In 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, pages 71–80. IEEE, 2014. doi:10.1109/FOCS.2014.16.
- [41] Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations and Trends in Machine Learning, 4(2):107–194, 2012. doi:10.1561/2200000018.
- [42] Daniel D. Sleator and Robert E. Tarjan. Amortized efficiency of list update and paging rules. Communications of the ACM, 28(2):202–208, 1985. doi:10.1145/2786.2793.
- [43] Subhash Suri, Csaba D. Tóth, and Yunhong Zhou. Selfish load balancing and atomic congestion games. Algorithmica, 47(1):79–96, 2007. doi:10.1007/S00453-006-1211-4.
- [44] Cosimo Vinci. Non-atomic one-round walks in congestion games. Theoretical Computer Science, 764:61–79, 2019. doi:10.1016/J.TCS.2018.06.038.
Appendix A Missing Proof of Corollary 3 from Section 3
By Theorem 1, it is sufficient to show that , for being the monomial function with . Let be an infinite sequence of natural numbers defined by for any . By definition of , we have
| (9) | ||||
| (10) | ||||
| (11) | ||||
| (12) | ||||
| (13) | ||||
| (14) | ||||
| (15) |
Appendix B Missing Results and Proofs from Section 4
Lemma 11.
Proof.
We prove the statement with induction over .
Base case (): We have
where we use . Further, we have
where we use .
Inductive step: Assume the statement holds for . Hence,
Then, for ,
where we use .
Lemma 12.
If holds for some , then is decreasing in integers .
Proof.
We show, by induction on , that holds for any integer .
The base case trivially holds by the assumptions. Assume that the claim holds for , and let us show it for . By exploiting the feasibility of for any (shown in Part 1 of Lemma 6) and the tightness of for and any (arising from (4)), we proceed as follows. When considering solution and using , constraint can be written as and can be written as Since the left-hand sides of and are equal, these constraints imply that , that is:
| (16) |
Similarly, by exploiting the equality constraint and the inequality constraint , we obtain
| (17) |
| (18) |
where the last inequality holds since (by the convexity of cost function ) and (by the inductive hypothesis). By (18) and we have , and this shows the inductive step.
Lemma 13.
Let be the function defined as . If is decreasing in , then .
Proof.
Given , we have , where the last inequality holds by the non-decreasing monotonicity of on . By the monotonicity and strict convexity of cost function , we necessarily have that . Thus, by the previous inequalities, must also hold.
Appendix C Missing Proofs from Section 5
Further details on Remark 9.
Remark.
When the latency functions used to generate the instance are obtained from the set , i.e., they are linear combination of some given basis functions taking the form , then the modified latencies , obtained by linearly combining , as per Theorem 7, also achieve optimal competitive ratio.
Proof.
To see this, denote with the largest competitive ratio over all individual basis , and notice that the optimal competitive ratio cannot be lower than . To see that the modified latencies in fact attain a competitive ratio equal to , and therefore are optimal, one can simply observe that must be feasible for the linear program to evaluate the performance of a given generic latency of the form . In more detail, as, for each basis function , is feasible for the linear program LP(c) corresponding to (i.e., LP(c) with ), and for any , is also feasible for LP(c). Thus, as for every basis function , satisfies all constraints of LP(c), taken with any linear, non-negative combination of modified basis functions then also is feasible for the same combination of basis functions .
Lemma 14.
For fixed ,
Proof.
The proof employs the binomial approximation for sufficiently small.
Consider the term . For sufficiently large such that ,
This yields, for sufficiently large ,
As , , which leaves the constant term .
Appendix D Other Results, Tables and Graphs
Remark 15.
Let be a non-null, non-negative function with some such that and . Then, the competitive ratio of any online algorithm over instances employing is unbounded.
Proof.
Let . By the assumption on , , thus . Further, , and as is non-negative. Hence, setting and for any in (1), the numerator is strictly positive, whereas the denominator is zero, thus . Then, by exploiting the lower bound instance provided in Theorem 1 with these values of and , we have that no online algorithm can achieve a competitive ratio over instances generated by below .
| Maximum degree of latency function | |||
| 1 | 1 | 1 | 1 |
| 2 | 2 | 4 | 8 |
| 5 | 2.88 | 10.75 | 46.38 |
| 10 | 3.30 | 15.63 | 91.60 |
| 20 | 3.56 | 19.33 | 137.55 |
| 40 | 3.71 | 21.81 | 174.93 |
| 100 | 3.82 | 23.76 | 205.82 |
| 200 | 3.88 | 24.64 | 219.97 |
| 400 | 3.91 | 25.25 | 238.68 |
| 1 | 7 | 110.26 | 8.07 | 107.27 | 8.33 | 107.17 | 8.60 | 107.26 | 9.67 | 108.92 |
|---|---|---|---|---|---|---|---|---|---|---|
| 2 | 11.07 | 71.48 | 12.61 | 69.54 | 13 | 69.48 | 13.39 | 69.54 | 14.93 | 70.62 |
| 5 | 17.29 | 45.17 | 19.26 | 43.94 | 19.75 | 43.90 | 20.25 | 43.94 | 22.22 | 44.62 |
| 10 | 21.29 | 36.34 | 23.21 | 35.35 | 23.71 | 35.32 | 24.20 | 35.35 | 26.18 | 35.90 |
| 20 | 23.76 | 32.01 | 25.46 | 31.14 | 25.90 | 31.11 | 26.34 | 31.14 | 28.11 | 31.62 |
| 40 | 25.07 | 29.88 | 26.47 | 29.07 | 26.83 | 29.04 | 27.20 | 29.06 | 28.71 | 29.51 |
| 100 | 25.90 | 28.61 | 26.94 | 27.84 | 27.23 | 27.81 | 27.52 | 27.83 | 28.73 | 28.27 |
| 200 | 26.21 | 28.20 | 27.05 | 27.43 | 27.29 | 27.41 | 27.53 | 27.43 | 28.57 | 27.85 |
| 400 | 26.41 | 27.99 | 27.19 | 27.23 | 27.37 | 27.20 | 27.55 | 27.22 | 28.54 | 27.65 |
