Miscellaneous

Mathematical optimization, algorithmic game theory, information security

Table of Contents

Discrete optimization for parallel computing

Performance guarantee $\rho$ in approximation algorithms for a minimization problem.

In this area, my past efforts were devoted to the design and analysis of approximation algorithms. Approximation algorithms are efficient algorithms that find approximate solutions to optimization problems (in particular NP-hard problems) with provable guarantees on the distance of the returned solution to the optimal one.

Scheduling Moldable Tasks

Moldable tasks allow schedulers to determine the number of processors assigned to each task, thus enabling efficient use of large-scale parallel processing systems. We consider the problem of scheduling independent moldable tasks on processors and propose a new perspective of the existing speedup models: as the number $p$ of processors assigned to a task increases, the speedup is linear if $p$ is small and becomes sublinear after $p$ exceeds a threshold. Based on this, we propose an efficient approximation algorithm to minimize the makespan (Wu & Loiseau, 2023). As a by-product, we also propose an approximation algorithm to maximize the sum of values of tasks completed by a deadline; this scheduling objective is considered for moldable tasks for the first time while similar works have been done for other types of parallel tasks.

Open Problem.

Scheduling Malleable Tasks

Due to the ubiquity of batch data processing, the related problems of scheduling malleable batch tasks have received significant attention. We consider a fundamental model where a set of tasks is to be processed on multiple identical machines and each task is specified by a value, a workload, a deadline and a parallelism bound. Within the parallelism bound, the number of machines assigned to a task can vary over time without affecting its workload. In this paper, we identify a boundary condition and prove by construction that a set of malleable tasks with deadlines can be finished by their deadlines if and only if it satisfies the boundary condition. This core result plays a key role in the design and analysis of scheduling algorithms: (a) when several typical objectives are considered, such as social welfare maximization, machine minimization, and minimizing the maximum weighted completion time, and, (b) when the algorithmic design techniques such as greedy and dynamic programming are applied to the social welfare maximization problem. As a result, we give four new or improved algorithms for the above problems (Wu & Loiseau, 2015; Wu & Loiseau, 2024).

Network economics

Previously, I mainly focused on service design, pricing and operations, with the objective of achieving revenue maximization, high service usability, and incentive compatibility. The main theoretical tools or approaches used include algorithmic game theory, queueing theory (Hyytiä et al., 2017), auctions (Cheng et al., 2023), service differentiation, and analyitical modeling. Service design is the activity of planning and arranging infrastructure, communication and material components of a service in order to improve its quality, and the interaction between the service provider and its users. Usability refers to the measurement of how easily a user can accomplish their goals when using a service. In algorithmic game theory, a mechanism is called incentive-compatible (IC) if every participant can achieve their own best outcome by reporting their true preferences. My main applicaiton area is public cloud services, and I aimed to improve the interaction process between a service provider and its users for increased provider’s revenue and resource efficiency and better users’ experience (Wu et al., 2019; Wu et al., 2023).

Homomorphic encryption

Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. The resulting computations are left in an encrypted form which, when decrypted, result in an output that is identical to that of the operations performed on the unencrypted data. My research focused on designing novel homomorphic encryption schemes in the context of linear network coding (Wu et al., 2011; Wu et al., 2013).

References

2024

  1. Springer-Nature
    optimization.jpg
    Algorithms for Scheduling Deadline-Sensitive Malleable Tasks
    Xiaohu Wu and Patrick Loiseau
    SN Operations Research Forum, 2024

2023

  1. EJOR
    optimization.jpg
    Efficient approximation algorithms for scheduling moldable tasks
    Xiaohu Wu and Patrick Loiseau
    European Journal of Operational Research, 2023
  2. IJCAI
    game-theory.png
    Exploring leximin principle for fair core-selecting combinatorial auctions: payment rule design and implementation
    Hao Cheng, Shufeng Kong, Yanchen Deng, Caihua Liu, Xiaohu Wu, Bo An, and Chongjun Wang
    Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
  3. ACM ToMPECS
    network-economics.png
    Delay and price differentiation in cloud computing: A service model, supporting architectures, and performance
    Xiaohu Wu, Francesco De Pellegrini, and Giuliano Casale
    ACM Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS) , 2023

2019

  1. ACM ToMPECS
    network-economics.png
    A framework for allocating server time to spot and on-demand services in cloud computing
    Xiaohu Wu, Francesco De Pellegrini, Guanyu Gao, and Giuliano Casale
    ACM Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS) , 2019

2017

  1. PEVA
    parallel-computing.png
    Dispatching fixed-sized jobs with multiple deadlines to parallel heterogeneous servers
    Esa Hyytiä, Rhonda Righter, Olivier Bilenne, and Xiaohu Wu
    Performance Evaluation (PEVA) , 2017

2015

  1. Allerton
    optimization.jpg
    Algorithms for Scheduling Deadline-Sensitive Malleable Tasks
    Xiaohu Wu and Patrick Loiseau
    The 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton). Conference information , 2015

2013

  1. IEEE TPDS
    HE2.png
    A tag encoding scheme against pollution attack to linear network coding
    Xiaohu Wu, Yinlong Xu, Chau Yuen, and Liping Xiang
    IEEE Transactions on Parallel and Distributed Systems, 2013

2011

  1. IEEE NetCod
    HE2.png
    A hybrid scheme against pollution attack to network coding
    Xiaohu Wu, Yinlong Xu, Liping Xiang, and Wei Xu
    2011 International Symposium on Networking Coding, 2011