# Robust Algorithms for the Secretary Problem

@inproceedings{Bradac2020RobustAF, title={Robust Algorithms for the Secretary Problem}, author={Domagoj Bradac and Anupam Gupta and Sahil Singla and Goran Zuzic}, booktitle={ITCS}, year={2020} }

In classical secretary problems, a sequence of $n$ elements arrive in a uniformly random order, and we want to choose a single item, or a set of size $K$. The random order model allows us to escape from the strong lower bounds for the adversarial order setting, and excellent algorithms are known in this setting. However, one worrying aspect of these results is that the algorithms overfit to the model: they are not very robust. Indeed, if a few "outlier" arrivals are adversarially placed in the… Expand

#### Figures and Topics from this paper

#### 12 Citations

The Secretary Problem with Independent Sampling

- Computer Science
- SODA
- 2021

In this paper it is proved that the best possible algorithm is characterized by a fixed sequence of time thresholds, dictating at which point in time the authors should start accepting a value that is both a maximum of the online sequence and has a given ranking within the sampled elements. Expand

Knapsack Secretary with Bursty Adversary

- Mathematics, Computer Science
- ICALP
- 2020

An algorithm is designed that gives an approximation of $1 - \tilde{O}(\Gamma/k)$ when the adversarial time steps can be covered by $\Gamma \ge \sqrt{k}$ intervals of size $\tilde{\Omega}(\frac{n}{k})$. Expand

Robust Algorithms under Adversarial Injections

- Computer Science
- ICALP
- 2020

This paper proposes a new \emph{adversarial injections} model, in which the input is ordered randomly, but an adversary may inject misleading elements at arbitrary positions, and investigates two classical combinatorial-optimization problems in this model: Maximum matching and cardinality constrained monotone submodular function maximization. Expand

Random-Order Models

- Computer Science
- Beyond the Worst-Case Analysis of Algorithms
- 2020

Improvements in the random-order model are shown for two broad classes of problems: packing problems where the authors must pick a constrained set of items to maximize total value, and covering problems where they must satisfy given requirements at minimum total cost. Expand

Robust Algorithms for Online Convex Problems via Primal-Dual

- Computer Science, Mathematics
- SODA
- 2021

A more unified analysis of primal-dual algorithms to better understand the mechanisms behind this important method and obtains robust online algorithm for fairly general online convex problems on the MIXED model. Expand

Revenue Monotonicity Under Misspecified Bidders

- Mathematics, Computer Science
- WINE
- 2020

This work investigates revenue guarantees for auction mechanisms in a model where a distribution is specified for each bidder, but only some of the distributions are correct, and finds that the answer depends on the feasibility constraint. Expand

Learning Product Rankings Robust to Fake Users

- Computer Science, Mathematics
- ArXiv
- 2020

This work shows that existing learning algorithms---that are optimal in the absence of fake users---may converge to highly sub-optimal rankings under manipulation by fake users, and develops efficient learning algorithms that significantly outperform existing algorithms. Expand

Online Adversarial Attacks

- Computer Science
- ArXiv
- 2021

This paper formalizes the online adversarial attack problem, emphasizing two key elements found in realworld use-cases: attackers must operate under partial knowledge of the target model, and the decisions made by the attacker are irrevocable since they operate on a transient data stream. Expand

Motivation : Picking a Large Element 2 2 The Secretary Problem 4 3 Multiple-Secretary and Other Maximization Problems 5 4 Minimization Problems 14 5 Related Models and Extensions

- 2020

Prophet Inequalities with Linear Correlations and Augmentations

- Computer Science, Mathematics
- EC
- 2020

A natural "linear" correlation structure is considered as a generalization of the common-base value model of Chawla et al. as a way to prove bounds (matching up to constant factors) that decay gracefully with the amount of correlation of the arriving items. Expand

#### References

SHOWING 1-10 OF 56 REFERENCES

Secretary Problems with Non-Uniform Arrival Order

- Computer Science, Mathematics
- STOC
- 2015

This work initiates an investigation into relaxations of the random-ordering hypothesis in online algorithms, by focusing on the secretary problem and asking what performance guarantees one can prove under relaxed assumptions, and proves that Θ(log log n) is the minimum entropy of any permutation distribution that permits constant probability of correct selection in the secretaries problem with $n$ elements. Expand

Online Facility Location against a t-Bounded Adversary

- Computer Science, Mathematics
- SODA
- 2018

This work presents a matching lower bound that any randomized algorithm has an expected competitive ratio of [EQUATION], and uses this result to construct an O(1)-approximate streaming algorithm for k-median clustering that stores O(k log t) points and has O(nk) worst-case update time. Expand

Stochastic bandits robust to adversarial corruptions

- Computer Science, Mathematics
- STOC
- 2018

We introduce a new model of stochastic bandits with adversarial corruptions which aims to capture settings where most of the input follows a stochastic pattern but some fraction of it can be… Expand

Matroids, secretary problems, and online mechanisms

- Mathematics, Computer Science
- SODA '07
- 2007

An O(log k)-competitive algorithm for general matroids (where k is the rank of the matroid), and constant-competitive algorithms for several special cases including graphicMatroids, truncated partition matroIDS, and bounded degree transversal matroid algorithms are presented. Expand

Online Matroid Intersection: Beating Half for Random Arrival

- Mathematics, Computer Science
- IPCO
- 2017

This work presents the first randomized online algorithm that has a $\frac12 + \delta$ competitive ratio in expectation, where $\delta >0$ is a constant. Expand

Heuristics for Semirandom Graph Problems

- Computer Science, Mathematics
- J. Comput. Syst. Sci.
- 2001

It is shown that when p<(1??)lnn /?n, an independent set of size |S| cannot be recovered, unless NP?BPP, and a heuristic is given that recovers this bisection with high probability when p?q?cplogn/n, for c a sufficiently large constant. Expand

Near optimal online algorithms and fast approximation algorithms for resource allocation problems

- Computer Science, Mathematics
- EC '11
- 2011

A new distributional model called the adversarial stochastic input model, which is a generalization of the i.i.d model with unknown distributions, where the distributions can change over time is introduced, and a 1-O(ε) approximation algorithm is given for the resource allocation problem. Expand

Simultaneous approximations for adversarial and stochastic online budgeted allocation

- Computer Science, Mathematics
- SODA
- 2012

This paper designs algorithms that achieve a competitive ratio better than 1 -- 1/e on average, while preserving a nearly optimal worst case competitive ratio, and designs an algorithm with the optimal competitive ratio in both the adversarial and random arrival models. Expand

The adwords problem: online keyword matching with budgeted bidders under random permutations

- Mathematics, Computer Science
- EC '09
- 2009

The problem of a search engine trying to assign a sequence of search keywords to a set of competing bidders, each with a daily spending limit, is considered, and the current literature on this problem is extended by considering the setting where the keywords arrive in a random order. Expand

Stream Order and Order Statistics: Quantile Estimation in Random-Order Streams

- Mathematics, Computer Science
- SIAM J. Comput.
- 2009

The first fully general lower bounds in the random-order model are proved: finding an element with rank n/2 ± n δ in the single-pass random- order model with probability at least 9/10 requires Ω( � n 1−3δ / logn) space. Expand