## Abstract

We consider the minimum makespan problem for *n* tasks and two unrelated parallel selfish machines. Let *R*_{n} be the best approximation ratio of randomized monotone scale-free algorithms. This class contains the most efficient algorithms known for truthful scheduling on two machines. We propose a new *M**i**n* − *M**a**x* formulation for *R*_{n}, as well as upper and lower bounds on *R*_{n} based on this formulation. For the lower bound, we exploit pointwise approximations of cumulative distribution functions (CDFs). For the upper bound, we construct randomized algorithms using distributions with piecewise rational CDFs. Our method improves upon the existing bounds on *R*_{n} for small *n*. In particular, we obtain almost tight bounds for *n* = 2 showing that |*R*_{2} − 1.505996| < 10^{− 6}.

### Similar content being viewed by others

## 1 Introduction and Main Results

Scheduling on unrelated parallel machines is a classical problem in discrete optimization. In this problem one has to allocate *n* independent, indivisible tasks to *m* simultaneously working unrelated machines. The goal is to minimize the time to complete all the tasks. This time is called the makespan, and the scheduling problem is called the minimum makespan problem. Lenstra et al. [16] proved that the problem is NP-complete and that a polynomial-time algorithm cannot achieve an approximation ratio less than \(\frac {3}{2}\) unless *P* = *N**P*.

We restrict ourselves to the case of *m* = 2 machines. For this case there is a linear-time algorithm by Potts [24] and a polynomial-time algorithm by Shchepin and Vakhania [26] which provide \(\frac {3}{2}\)-approximations. Both algorithms use linear programming (LP) relaxations of integer programs and rounding techniques.

We are interested in the minimum makespan problem in the setting of algorithmic mechanism design. In this setting, every machine belongs to a rational agent who requires payments for performing tasks and aims to maximize his or her utility. Nisan and Ronen [23] introduced this approach to model interactions on the Internet, such as routing and information load balancing. The minimum makespan problem is one of many optimization problems considered in algorithmic mechanism design. These include, among others, combinatorial auctions (see, e.g., [2, 6] and references therein) and graph theoretic problems, such as the shortest paths tree [11] and the maximum matching problem [27].

To solve the minimum makespan problem in algorithmic mechanism design, one can use an *allocation mechanism*. An allocation mechanism consists of two algorithms: one allocates tasks to machines, and the other allocates payments to agents (the machines’ owners). The goal of the mechanism is to choose a task allocation algorithm that minimizes the makespan and a payment allocation algorithm that motivates the agents to act according to the wishes of the algorithm designer. For instance, it is desirable that the agents reveal their correct task processing times to the designer. We consider direct revelation mechanisms. These mechanisms collect the information about the processing times from each agent and allocate the tasks and payments based on this information according to a policy known to the agents in advance. To maximize their utilities, the agents can lie about processing times of tasks on their machines. As a result, direct revelation mechanisms may be hard to implement correctly.

To motivate the agents to tell the right processing times, one can use a *truthful* direct revelation mechanism. With such mechanisms, telling the truth becomes a dominant strategy for each agent regardless of what the other agents do. This property guarantees that the processing times used to construct the mechanism are correct. There is a vast literature on truthful mechanisms [4, 21, 23, 25]. Not all task allocation algorithms can be used in truthful mechanisms. For instance, there is no known truthful mechanism for the polynomial-time algorithms by Potts [24] and Shchepin and Vakhania [26]. Finding the best approximation ratio for truthful scheduling on unrelated machines is one of the hardest fundamental questions in mechanism design.

Saks and Yu [25] showed that a task allocation algorithm can be used in a truthful mechanism if and only if the algorithm is *monotone*. Intuitively, a task allocation algorithm is monotone if it assigns a higher load to a machine as long as the processing times on this machine decrease (see Section 2 for the formal definition of monotonicity). In this paper we focus on monotone task allocation algorithms and do not consider the allocation of payments.

Nisan and Ronen [23] show that no deterministic monotone algorithm can achieve an approximation ratio smaller than two, but randomized algorithms can do better in expectation. From here on we say that a randomized allocation algorithm has a given property, e.g., monotonicity, if this property holds with probability one according to the distribution of the random bits of the algorithm. Randomized task allocation algorithms that are monotone in this sense give rise to universally truthful mechanisms considered in this paper.

Next, a deterministic algorithm is *task-independent* when the allocation of any task does not change as long as the processing times of this task stay fixed. Every deterministic monotone allocation algorithm on two machines with a finite approximation ratio is task-independent (Dobzinski and Sundararajan [6]). Therefore, if a given randomized algorithm has a finite expected approximation ratio, this algorithm is task-independent with probability one. Hence we can restrict ourselves without loss of generality to monotone and task-independent randomized algorithms to find the best truthful approximation ratio for two machines.

Finally, we restrict our attention to *scale-free* algorithms. An algorithm is scale-free if scaling all processing times by some positive number does not influence the output. Following Lu [17], we note that for *m* = 2, scale-freeness and allocation independence imply that the allocation of each task depends only on the ratio of this task’s processing times, which simplifies the analysis. Scale-free algorithms are widely used in the literature, and the latest most efficient algorithms for truthful scheduling on two machines by Chen et al. [3], Lu [17] or Lu and Yu [18] are scale-free. In the sequel we work with monotone, task-independent, scale-free (denoted by MIS) task allocation algorithms. These algorithms provide good upper bounds on approximation ratios in scheduling [3, 17,18,19, 23]. Lu and Yu [17,18,19] present a way to construct a payment allocation procedure for MIS algorithms which results in truthful allocation mechanisms.

Denote by *R*_{n} the best worst-case expected approximation ratio of randomized MIS algorithms for the makespan minimization on two machines with *n* tasks. For simplicity, in the rest of the paper we call *R*_{n} the best approximation ratio. Our approach is to formulate a mathematical optimization problem for *R*_{n}. This approach was not common until recently when several successful truthful or truthful in expectation mechanisms have been constructed using linear or nonlinear programs [2, 3, 7, 15]. This paper continues the trend to combine optimization with mechanism design and has the following contributions:

- 1.
A

*M**i**n*−*M**a**x*formulation for*R*_{n}, see (13) in Corollary 3. - 2.
A unified approach to construct upper and lower bounds on

*R*_{n}, see Section 4. In formulation (13), the outer minimization is over multivariate cumulative distribution functions (CDFs) and the inner maximization is over the positive orthant in two dimensions. This problem is in general not tractable, so we build bounds on the optimal value. The lower bounds are the result of restricting the inner maximization to a finite subset of the positive orthant. To obtain the upper bounds, we restrict the outer minimization to the set of piecewise constant CDFs. This is a general approach which could work for any*M**i**n*−*M**a**x*problem that requires optimizing over a set of functions, not necessarily CDFs. - 3.
New upper and lower bounds on

*R*_{n}for*n*∈{2,3,4} and the task allocation algorithms corresponding to the given upper bounds (see Table 1). The resulting upper bounds are currently the best for all monotone algorithms (not only MIS) on two machines. - 4.
Almost tight bounds on

*R*_{2}(see Table 1). For*n*= 2 tasks the initial problem (13) simplifies to problem (30), where the outer minimization is over univariate CDFs. We use piecewise rational CDFs to obtain the upper and lower bounds with a gap not larger than 10^{− 6}.

Notice that another, less restrictive way to define randomized algorithms would be to say that the properties hold in expectation over the random bits of the algorithm. Monotone in expectation task allocation algorithms can be used in truthful in expectation mechanisms. For certain classes of problems (e.g., for combinatorial auctions), one can convert LP relaxations with rounding into truthful in expectation mechanisms, see Azar et al. [2], Elbassioni et al. [7] or Lavi and Swamy [15]. Truthful in expectation mechanisms could perform better in expectation than the universally truthful ones. In this paper we do not analyze the former type of mechanisms. We refer the reader to Auletta et al. [1] and Lu and Yu [19] for more information on truthfulness in expectation.

The outline of the paper is as follows. In Section 2 we provide more details about randomized MIS algorithms for two machines, describe results from earlier research, and formulate a mathematical optimization problem for *R*_{n}. In Section 3 we exploit the symmetry of this problem to analyze the performance of MIS algorithms and to obtain our *M**i**n* − *M**a**x* formulation (13) for *R*_{n}. In Section 4 we construct and compute bounds on the optimal value of the *M**i**n* − *M**a**x* problem for several small *n*. In Section 5 we analyze the case with two tasks in more detail to improve the bounds for this case. Section 6 concludes the paper. In Section 7 we provide the omitted proofs. All computations are done in MATLAB R2017a on a computer with the processor Intel^{®;} Core^{TM} i5-3210M CPU @ 2.5 GHz and 7.7 GiB of RAM. To solve linear programs, we use IBM ILOG CPLEX 12.6.0 solver.

## 2 Preliminaries

Unless otherwise specified, lower-case letters denote numbers, bold lower-case letters denote vectors, and capital letters denote matrices. For a given positive number *n*, let \(\mathbb {R}^{n}\) be the set of real vectors with *n* entries. The notations \(\mathbb {R}^{n}_{+}\) and \(\mathbb {R}^{n}_{++}\) refer to nonnegative and strictly positive real-valued vectors, respectively. For a given positive number *m*, we use [*m*] to denote the set {1,…,*m*}. Unless otherwise stated, we use parentheses to denote vectors and brackets to denote intervals, e.g., (*x*_{1},*x*_{2}) is a vector while [*x*_{1},*x*_{2}] and [*x*_{1},*x*_{2}) are intervals.

The input into the minimum makespan problem with *m* machines and *n* tasks is a matrix of processing times *T* = (*T*_{ij}), *i* ∈ [*m*], *j* ∈ [*n*]. We describe the solution to the problem by a task allocation matrix *X* ∈{0,1}^{m×n}, such that *X*_{ij} = 1 if task *j* is processed on machine *i* and *X*_{ij} = 0 otherwise. Now, for given *X* and *T*, we define the makespan *M*_{i} of machine *i* and the overall makespan *M*.

The optimal makespan for *T* is

For an allocation algorithm \(\mathcal {A}\) and an input matrix *T*, \(X^{\mathcal {A},T}\in \{0,1\}^{m{\times }n}\) denotes the output of \(\mathcal {A}\) on *T*. If \(\mathcal {A}\) is randomized, \(X^{\mathcal {A},T}\) is a random matrix, and we use \(M(X^{\mathcal {A},T},T)\) to denote the expected makespan. The worst-case (expected) approximation ratio of \(\mathcal {A}\) equals the supremum of the ratio \( \frac {M(X^{\mathcal {A},T},T)}{M^{*}(T)}\) over all time matrices *T*. We refer the reader to Motwani and Raghavan [20] for a comprehensive discussion on randomized algorithms.

### 2.1 The Best Approximation Ratio of Randomized MIS Algorithms

According to the definition in Section 1, randomized MIS algorithms are monotone, task-independent and scale-free (MIS) with probability one. Therefore, by fixing the random bits of a randomized MIS algorithm, we obtain a deterministic MIS algorithm with probability one. We provide next a formal description of deterministic MIS algorithms.

A task allocation algorithm is monotone if for every two processing time matrices *T* and *T*^{′} which differ only on machine *i*, \(\ {\sum }_{j=1}^{n} (X^{\mathcal {A},T}_{ij}-X^{\mathcal {A},T^{\prime }}_{ij})(T_{ij}-T^{\prime }_{ij}) \le 0\) (see [4]). That is, the load of a machine increases as long as the processing times on this machine decrease. An algorithm is task-independent if the allocation of a task depends only on its processing times. To be precise, for any two time matrices *T* and *T*^{′} such that \(T_{ij} =T^{\prime }_{ij}\) for task *j* and all *i* ∈ [*m*], the allocation of task *j* is identical, i.e., \(X^{\mathcal {A},T}_{ij} = X^{\mathcal {A},T^{\prime }}_{ij}, \text { for all } i \in [m]\). An algorithm is scale-free if the multiplication of all processing times by the same positive number does not change the allocation. That is, for any \(T \in \mathbb {R}^{m\times n}_{++}\) and *λ* > 0, the output of the algorithm on the inputs *T* and *λ**T* is identical.

Deterministic MIS algorithms for *m* = 2 have been characterized by Lu [17]:

###
**Theorem 1**

*[Lu*[17]*] All deterministic MIS algorithms for scheduling on**two unrelated machines are of the following form. For every task**j* ∈ [*n*]*,**assign a threshold*\(z_{j} \in \mathbb {R}_{++}\)*and**one of the following two conditions:**T*_{1j} < *z*_{j}*T*_{2j}*or**T*_{1j} ≤ *z*_{j}*T*_{2j}*.**The task goes to the first machine if and only if the corresponding condition**is satisfied.*

Let \(\mathcal {C}\) be the class of (randomized) algorithms which randomly assign a threshold *z*_{j} and a condition *T*_{1j} < *z*_{j}*T*_{2j} or *T*_{1j} ≤ *z*_{j}*T*_{2j} to each task *j* and then proceed as given in Theorem 1 for the deterministic case. With probability one a randomized MIS algorithm is a MIS algorithm, and therefore of the form given by Theorem 1. Hence, to find the best approximation ratio, it is enough to consider only algorithms in \(\mathcal {C}\). Next, we show that to find the best approximation ratio, we can restrict ourselves to a subclass of \(\mathcal {C}\).

Let \(\mathcal {P}_{n}\) be the family of Borel probability measures supported on the positive orthant, i.e. \(\text {supp}(\mathbb {P}) \subseteq \mathbb {R}_{++}^{n}\) for all \(\mathbb {P} \in \mathcal {P}_{n}\), where \(\text {supp}(\mathbb {P})\) is the support of \(\mathbb {P}\). We use \(\mathbf {E}_{\mathbb {P}}[\ ]\) and \(\mathbf {P}_{\mathbb {P}}[ \ ]\) to denote the expectation and the probability over the measure \(\mathbb {P}\), respectively. In the sequel we use the notions of a probability measure and the corresponding probability distribution interchangeably. For a \( \mathbb {P} \in \mathcal {P}_{n}\) we define algorithm \(\mathcal {A}^{\mathbb {P}}\) as follows:

Denote the family of all algorithms of the form above by \(\mathcal {A}^{\mathcal {P}_{n}}\):

Consider a measure \(\mathbb {P} \in \mathcal {P}_{n}\) and the corresponding algorithm \(\mathcal {A}^{\mathbb {P}} \in \mathcal {A}^{\mathcal {P}_{n}}\). Let \(X^{\mathbb {P},T}\in \{0,1\}^{2 \times n}\) be the randomized allocation produced by \(\mathcal {A}^{\mathbb {P}}\) on time matrix *T*. The expected makespan of \(\mathcal {A}^{\mathbb {P}}\) on *T* is

Recall that *M*^{∗}(*T*), defined in (2), denotes the optimal makespan for *T*. Let \(R_{n}(\mathbb {P}, T)\) be the expected approximation ratio of \(\mathcal {A}^{\mathbb {P}}\) on *T* and \(R_{n}(\mathbb {P})\) be the worst-case approximation ratio:

It could happen that for some \(\mathbb {P}\) the ratio \( R_{n}(\mathbb {P},T)\) is unbounded in *T*. We do not consider these cases as we know that *R*_{n} ≤ 1.5861 (see Section 2.2). For ease of presentation, we work on \(\overline {\mathbb {R}}_{+}=\mathbb {R}_{+} \cup \{\infty \}\) so that the supremum \(\sup _{T \in \mathbb {R}_{++}^{2\times n}} \ R_{n}(\mathbb {P}, T)\) is always defined.

When a tie \(\frac {T_{1j}}{T_{2j}} = z_{j}\) occurs for some *j* ∈ [*n*], algorithms from the family \(\mathcal {A}^{\mathcal {P}_{n}}\) send task *j* to the second machine. In general, an algorithm in \(\mathcal {C}\) could send the task to the first or the second machine. Next, we show that this behavior at the ties does not affect the worst-case performance:

###
**Theorem 2**

*For a given number of tasks* n*, let*\(\mathbb {P} \in \mathcal {P}_{n}\)*and**define*

Let \(R_{n}(\mathbb {P})\) be defined as in (5), then

Theorem 2 is proven in Section 7.1 and has the following implication:

###
**Corollary 1**

*The best approximation ratio over all randomized MIS*
*algorithms is the best approximation ratio over all algorithms*
*in*
\(\mathcal {A}^{\mathcal {P}_{n}}\)
*.*

By Corollary 1, the best approximation ratio over all randomized MIS algorithms is

Later in the paper we show that \(R_{n}(\mathbb {P})\) is invariant under permutations of the tasks for every \(\mathbb {P}\in \mathcal {P}_{n}\) (see Theorem 3). Therefore, to compute *R*_{n} using (7), we can restrict the optimization to the distributions \(\mathbb {P}\in \mathcal {P}_{n}\) invariant under permutations of the random variables corresponding to the thresholds (*z*_{1},…,*z*_{n}) (see Theorem 4). For such distributions, \(R_{n}(\mathbb {P})\) is determined by the worst-case performance of \(\mathcal {A}^{\mathbb {P}}\) on each pair of the tasks. See Section 3.2, and Proposition 2 in particular, for more detail. This means that for every \(T\in \mathbb {R}^{2\times n}_{++}\), one can find the expected approximation ratio of \(\mathcal {A}^{\mathbb {P}}\) by applying to all pairs of tasks the algorithm \(\mathcal {A}^{\mathbb {P}_{2}}\), where \(\mathbb {P}_{2}\) is the bivariate marginal distribution of \(\mathbb {P}\) (by invariance, this distribution is the same for all pairs of thresholds). We use this property of family \(\mathcal {A}^{\mathcal {P}_{n}}\) to construct problem (13) for *R*_{n}, which is one of the main results of this paper.

### 2.2 Connection to the Current Knowledge on Monotone Algorithms

The best approximation ratio for all monotone task allocation algorithms is unknown. For deterministic algorithms with *n* tasks and *m* machines, when *n* and *m* tend to infinity, the ratio lies in the interval [1 + *ϕ*, *m*], where *ϕ* is the golden ratio. The upper bound is due to Nisan and Ronen [23], and the lower bound is due to Koutsoupias and Vidali [14]. To compute this lower bound, the authors use a matrix of processing times where the numbers of rows and columns tend to infinity. If *n* or *m* is finite, the lower bound may be different. Koutsoupias and Vidali [14] present bounds for several finite time matrices as well. For randomized algorithms, the best approximation ratio lies in the interval \([2- \frac {1}{m}, \ 0.83685m]\). The lower bound is due to Mu’alem and Schapira [21] who use Yao’s minimax principle (for some details on this principle see, e.g., Motwani and Raghavan [20]). The upper bound is due to Lu and Yu [18]. The gap between the bounds grows with *m*, and the case with the smallest number of machines, *m* = 2, has gained much attention in the literature.

For *m* = 2, Nisan and Ronen [23] have shown that the best approximation ratio of deterministic monotone algorithms is equal to 2, for any finite *n*. The ratio for randomized monotone algorithms lies in the interval [1.5,1.5861]. Chen et al. [3] compute the upper bound using an algorithm from the family \(\mathcal {A}^{\mathcal {P}_{n}}\) with independently distributed thresholds. The lower bound is the earlier mentioned bound by Mu’alem and Schapira [21]. There exist tighter lower bounds for certain cases. Lu [17] shows that algorithms from the family \(\mathcal {A}^{\mathcal {P}_{n}}\) (and thus, by Corollary 1, all randomized MIS algorithms) cannot achieve a ratio better than \(\frac {25}{16}\) (= 1.5625) for sufficiently large *n*. Chen et al. [3] prove that an algorithm \(\mathcal {A}^{\mathbb {P}}\) cannot do better than 1.5852 when \(\mathbb {P}\) is a product measure, i.e., when the thresholds are independent random variables.

The cases with *m* = 2 and small *n* > 2 are not well studied. Chen et al. [3] theoretically establish the upper bound 1.5861 for any finite *n*. They also present numerical computations of upper bounds smaller than 1.5861 for some *n*. Finding these smaller bounds requires solving non-convex optimization problems. However, the numerical method used by Chen et al. [3] does not guarantee global optimality.

The case with *m* = 2 and *n* = 2 is the simplest one, but even for this case the best approximation ratio is unknown. The ratio for algorithms from the family \(\mathcal {A}^{\mathcal {P}_{2}}\) lies in the interval [1.505949,1.5068]. The upper bound is due to Chen et al. [3], the lower bound is computed by Lu [17] using Yao’s minimax principle. Notice that Lu [17] states that the lower bound is 1.506, but we repeated the calculations from this paper and obtained the number 1.505949. Thus, when reporting results, we use this number as the currently best lower bound. We improve this bound and show that |*R*_{2} − 1.505996| < 10^{− 6}, in particular, *R*_{2} < 1.506.

From the description above, one can see that the existing bounds for truthful scheduling on unrelated machines are obtained using ad hoc procedures or (for the lower bounds) Yao’s minimax principle. This paper develops a unified approach to construct upper and lower bounds on *R*_{n} for any fixed *n* and provides an alternative to Yao’s minimax principle for the construction of lower bounds. As a result, we improve the bounds for truthful scheduling for *m* = 2 and *n* ∈{2,3,4}.

Next, we compare our approach to the existing methods for upper bounds in [2, 3, 7, 15] that use optimization. Our method for upper bounds generalizes the approach by Chen et al. [3]. The generalization considers a broader class of algorithms and provides stronger upper bounds for *n* ≤ 4. Our approach is fundamentally different from the methods in [2, 7, 15]. To begin with, our method is suitable for the minimum makespan problem on unrelated machines, while the methods in [2, 7, 15] are not guaranteed to work for this problem. Next, [2, 7, 15] use LP relaxations of the corresponding integer programs while we use the tools from continuous optimization to obtain possibly non-linear, but tractable approximations. Moreover, [2, 7, 15] consider truthful in expectation mechanisms only while we work with universally truthful ones.

We obtain new bounds only for small *n* ≤ 4 because of the growing size of the lower bound optimization problems. One can try to solve these problems in a more computationally efficient way using, for instance, the column generation technique (see, e.g., Gilmore and Gomory [10]). As a result, one could expect to obtain new bounds for *n* > 4 with our approach since the solution to the upper bound problem is a relatively simple construction based on the solution to the lower bound problem, as described in Section 4. However, improving the efficiency of the lower bound computation is out of the scope of the current paper.

## 3 Using the Symmetry of the Problem to Obtain a New Formulation for the Best Approximation Ratio

In this section we exploit the fact that problem (7) is invariant under permuting the tasks and the machines to simplify formulation (7) and obtain formulation (13) in Section 3.2.

### 3.1 Using the Symmetry of the Problem

For a given number of tasks *n*, let *S*_{n} be the symmetric, or permutation, group on *n* elements. Given a vector \(\mathbf {z} \in \mathbb {R}^{n}\) and *π* ∈ *S*_{n}, the corresponding permutation of the elements of **z** by *π* is denoted by **z***π*. The group *S*_{n} corresponds to column permutations in a given time matrix *T*. We define another group, *S*_{inv}, which corresponds to row permutations in *T*. *S*_{inv} consists of the identity action ^{id}. and the action ^{inv}. which takes element-wise reciprocals of any vector \(\mathbf {x} =(x_{1},\dots ,x_{n}) \in \mathbb {R}_{++}^{n}\):

Now, we define the action of *S*_{inv}×*S*_{n} on \(\mathcal {P}_{n}\). Given \(\mathbb {P}\in \mathcal {P}_{n}\), *γ* ∈ *S*_{inv}, *π* ∈ *S*_{n} and a random variable \(\mathbf {z} \sim \mathbb {P}\), we consider the transformation **z** → ^{γ}**z***π*. We define \({{~}^{\gamma }\mathbb {P}\pi } \in \mathcal {P}_{n}\) as the distribution of ^{γ}**z***π*. Next, we prove that problem (7) is convex and invariant under the action of *S*_{inv}×*S*_{n} on \(\mathbb {P}\). As a result, to find the infimum in (7), it is enough to optimize over the distributions \(\mathbb {P}\) invariant under the action of *S*_{inv}×*S*_{n}. This approach is regularly used in convex programming, see Dobre and Vera [5], Gatermann and Parrilo [9] or de Klerk et al. [13].

Given distributions \(\mathbb {P}_{1},\dots ,\mathbb {P}_{k} \in \mathcal {P}_{n}\), and weights *α*_{i} ≥ 0 for all *i* ∈ [*k*] such that \({\sum }_{i=1}^{k}\alpha _{i}=1\), we define the convex combination \({\sum }_{i=1}^{k}\alpha _{i} \mathbb {P}_{i} \in \mathcal {P}_{n}\) as the distribution where we draw from *P*_{i}, *i* ∈ [*k*] with probability *α*_{i}. The construction of \({\sum }_{i=1}^{k}\alpha _{i} \mathbb {P}_{i}\) and definitions (3), (4) imply that

Therefore, using (5), we have

that is, \(R_{n}(\mathbb {P})\) is convex in \(\mathbb {P}\). Now, we show the invariance of \(R_{n}(\mathbb {P})\) under the action of *S*_{inv}×*S*_{n}.

###
**Theorem 3**

*For any given number of tasks* n*,*\(\mathbb {P} \in \mathcal {P}_{n}\)*,**γ* ∈ *S*_{inv}*and**π* ∈ *S*_{n}*,*

The proof of Theorem 3 is presented in Section 7.2.

###
**Theorem 4**

*For any given number of tasks* n*,*

### Proof

As problem (9) has a smaller feasibility set than problem (7), the optimal value of problem (9) is not smaller than *R*_{n}. To prove the opposite inequality, we show that for any distribution \(\mathbb {P} \in \mathcal {P}_{n}\) there is a distribution \(\mathbb {Q} \in \mathcal {P}_{n}\) invariant under the action of *S*_{inv}×*S*_{n} such that \( R_{n}(\mathbb {Q}) \le R_{n}(\mathbb {P})\). Given \(\mathbb {P} \in \mathcal {P}_{n}\), take \(\alpha _{i}=\frac {1}{2(n!)}\) for *i* ∈ [2(*n*!)] and consider the convex combination

By construction, \(\mathbb {Q}\) has the required invariance property and

□

### 3.2 New Formulation for the Best Approximation Ratio

From Theorem 4, problem (7) is invariant under permuting the tasks and the machines. In the sequel we exploit the invariance under permuting the tasks only. First, this simplifies the presentation. Second, in our numerical computations using the invariance under the two types of permutations produced the same bounds as using invariance under task permutations only.

Let \(\mathcal {C}_{n} \subset \mathcal {P}_{n}\) be the family of probability measures invariant under the actions of *S*_{n}:

In the rest of the paper we restrict the optimization to the distributions from \(\mathcal {C}_{n}\).

###
**Corollary 2**

*For any given number of tasks* n*,*

### Proof

The Corollary follows from Theorem 4 and

□

Proposition 1 next is straightforward but crucial for our analysis.

###
**Proposition 1**

*Let*\(\mathbb {P} \in \mathcal {C}_{n}\)*.**Then*\(\mathbb {P}\)*has**a cumulative distribution function (CDF) invariant**under permutations of the variables. Moreover, for*0 < *k* < *n**,**all* k*-variate marginal distributions are identical. In**particular,*\(\mathbb {P}\)*is**a joint distribution of* n *identically distributed random variables.*

By Proposition 1, if \(\mathbb {P}\in \mathcal {C}_{n}\), then all univariate marginal distributions of \(\mathbb {P}\) are identical and all bivariate marginal distributions of \(\mathbb {P}\) are identical. Denote the corresponding univariate and bivariate CDFs by \(F_{\mathbb {P}}\) and \(H_{\mathbb {P}}\), respectively, and define

First, we present a result by Chen et al. [3], which follows from Lu and Yu [19]

**Proposition 2** (Chen et al. [3])

*For any given number of tasks* n*,*\(\mathbb {P} \in \mathcal {C}_{n}\)*,**and*\(T\in \mathbb {R}_{++}^{2{\times }n}\)*,*

Notice that this upper bound is defined by only two tasks out of *n*. Using Proposition 2, we obtain the following formulation for \(R_{n}(\mathbb {P})\):

###
**Theorem 5**

*For any given number of tasks* n*, and*\(\mathbb {P} \in \mathcal {C}_{n}\)*,*

The proof of Theorem 5 is provided in Section 7.3.

### Remark 1

Theorem 5 implies that the worst-case approximation ratio for n tasks and \(\mathbb {P} \in \mathcal {P}_{n}\) is the worst-case approximation ratio for two tasks and the bivariate marginal distribution of \(\mathbb {P}\).

The next corollary is the main result of this section, and we use it throughout the rest of the paper.

###
**Corollary 3**

*For any given number of tasks* n*,*

### Proof

The result follows from Corollary 2 and Theorem 5. □

###
**Corollary 4**

*R*_{n+ 1} ≥ *R*_{n}*for all**n* ≥ 2*.*

### Proof

The result follows from Corollary 3. □

## 4 Upper and Lower Bounds on the Best Approximation Ratio

To find *R*_{n} using (13), one needs to optimize over a family of distributions, which is computationally intractable. Therefore we construct upper and lower bounds on the optimal value of the problem. The idea is to restrict the attention to some subset of feasible distributions or some subset of \(\mathbb {R}^{2}_{++}\), over which it is easier to solve problem (13).

- 1.
For the lower bound, we take a finite set \(\mathcal {S} \subset \mathbb {R}_{++}\) and find the supremum in (13) for \(x,y \in \mathcal {S}\) only. A conventional approach to lower bounds is to propose several good-guess time matrices

*T*, use these matrices to build a randomized instance of the minimum makespan problem, and apply Yao’s minimax principle. Our approach is different as we evaluate randomized algorithms on deterministic instances. - 2.
For the upper bound, we find a good-guess distribution \(\mathbb {P}\) and solve the inner maximization problem for this distribution. The distribution is built using the solution to the lower bound problem for

*n*∈{2,3,4}. For*n*= 2 we propose a more efficient approach in Section 5.

### 4.1 Characterizing CDFs

To implement the ideas above, we have to optimize over distributions. For this purpose we represent a distribution via its CDF. To characterize CDFs, we follow Nelsen [22]. For \(\mathbf {x}, \mathbf {y}\in \mathbb {R}^{n}\) such that *x*_{i} ≤ *y*_{i} for all *i* ∈ [*n*], we define the *n*-box \(\mathcal {B}_{xy}: = \left [x_{1}, y_{1} \right ] \times \left [ x_{2}, y_{2}\right ] \times {\dots } \times \left [ x_{n}, y_{n} \right ]. \) The set of vertices of \(\mathcal {B}_{xy}\) is *V*_{xy} = {*x*_{1},*y*_{1}} ×{*x*_{2},*y*_{2}} ×… ×{*x*_{n},*y*_{n}} . The sign of vertex **b** ∈ *V*_{xy} is defined by

Given a set \(D \subseteq \mathbb {R}\), define \(\overline {D}:=\left (D\cup \{0\} \cup \{\infty \}\right )\). A function \(G: \overline {\mathbb {R}}^{n} \rightarrow \mathbb {R}\) is called *n*-increasing on \(\overline {D}^{n}\) when

### Remark 2 (Chapter 2.1 in Nelsen [22])

For *n* > 1, the fact that G is n-increasing does not necessarily imply that G is non-decreasing in each argument, and the other way round.

The following family of functions captures the concept of CDF.

###
**Definition 1**

Let \(\mathcal {S} \subseteq \mathbb {R}_{++}\). \(\mathcal {G}_{n}(\mathcal {S})\) is the family of functions \(G: \overline {\mathcal {S}}^{n} \rightarrow [0,1]\) satisfying the conditions below.

- 1.
G is right continuous on \(\overline {\mathcal {S}}^{n}\)

- 2.
G is n-increasing on \(\overline {\mathcal {S}}^{n}\)

- 3.
*G*(**z**) = 0 for all**z**in \(\overline {\mathcal {S}}^{n}\) such that at least one of*z*_{i}= 0 - 4.
*G*(*∞*,…,*∞*) = 1

**Proposition 3** (Definition 2.10.8. in Nelsen [22])

*A function*
\(G: \overline {\mathbb {R}}_{++}^{n} \rightarrow [0,1]\)
*is*
*a CDF of some*
\(\mathbb {P}\in \mathcal {P}_{n}\)
*if*
*and only if*
\(G \in \mathcal {G}_{n}(\mathbb {R_{++}})\)
*.*

### 4.2 Formulation of Upper and Lower Bounds

To construct the upper bound, we restrict the inner maximization in problem (13) to a subset of \(\mathbb {R}_{++}\). We do this using the next lemma.

###
**Lemma 1**

*Let*\(\mathcal {S} \subseteq \mathbb {R}_{++}\)*be**a***finite***set. Then*\(g \in \mathcal {G}_{n}(\mathcal {S})\)*if**and only if there exists*\(G \in \mathcal {G}_{n}(\mathbb {R}_{++})\)*such**that*\(g=G|_{\overline {\mathcal {S}}^{n}}\)*.**That is,* g *is a restriction of* G *to*\(\overline {\mathcal {S}}^{n}\)*.*

### Proof

If there is \(G \in \mathcal {G}_{n}(\mathbb {R}_{++})\) such that \(g=G|_{\overline {\mathcal {S}}^{n}}\), then \(g \in \mathcal {G}_{n}(\mathcal {S})\) by definition of \(\mathcal {G}_{n}(\mathbb {R_{++}})\). On the other hand, let \(g \in \mathcal {G}_{n}(\mathcal {S})\) and consider a number \(a>\max \{s: s \in \mathcal {S}\}\). Let \(\mathcal {S}_{a}=\mathcal {S} \cup \{a\}\) and define a new function \(\hat {g}:\overline {\mathcal {S}_{a}}^{n} \rightarrow [0,1]\) such that \(\hat {g}(\mathbf {z})=g(\mathbf {z})\) for \(\mathbf {z} \in \overline {\mathcal {S}}^{n}\). For \(\mathbf {z} \notin \overline {\mathcal {S}}^{n}\), construct a new vector **y** by replacing all occurrences of a in **z** with *∞* and define \(\hat {g}(\mathbf {z})=g(\mathbf {y})\). Consider the following piecewise constant function:

It is straightforward to show that \(G \in \mathcal {G}_{n}(\mathbb {R}_{++})\) and \(g=G|_{\overline {\mathcal {S}}^{n}}\). See Fig. 1 for an illustration of the case *n* = 1. □

### Remark 3

The choice of a in the proof of Lemma 1 is free and might influence our upper bound computations in Section 4.3.

For a finite \(\mathcal {S} \subset \mathbb {R}_{++}\) and \(g \in \mathcal {G}_{n}(\mathcal {S})\), we define the restriction of the objective in problem (13) to \(\mathcal {S}\):

By Lemma 1, \(\phi ^{g}=\phi ^{\mathbb {P}}|_{\overline {\mathcal {S}}^{2}}\) for some \(\mathbb {P} \in \mathcal {P}_{n}\).

###
**Theorem 6**

*Given a number of tasks* n*, for any*\(\mathbb {P} \in \mathcal {C}_{n}\)*and**finite*\(\mathcal {S} \subset \mathbb {R}_{++}\)*,**we have*

### Proof

The first inequality follows immediately from Corollary 3. Now, we prove the second inequality. Every \(\mathbb {P} \in \mathcal {C}_{n}\) has a CDF \(G_{\mathbb {P}} \in \mathcal {G}_{n}(\mathbb {R_{++}})\) invariant under permutations of the variables by Proposition 1. At the same time, every such invariant \(G \in \mathcal {G}_{n}(\mathbb {R_{++}})\) corresponds to some \(\mathbb {P}_{G} \in \mathcal {C}_{n}\). Combining this with Corollary 3, we obtain

The last equality holds by Lemma 1. Notice that if \(G \in \mathcal {G}_{n}(\mathbb {R_{++}})\) is invariant under permutations of the variables, then so is the \(g:=G|_{\overline {\mathcal {S}}^{n}}\). On the other hand, if \(g \in \mathcal {G}_{n}(\mathcal {S})\) is invariant under permutations of the variables, then so is the G defined in (15). □

### 4.3 Implementation and Numerical Results

Let \(S\subset \mathbb {R}_{++}\). To compute the lower bound \(R_{n}(\mathcal {S})\) from (17), we use the epigraph form of the optimization problem for \(R_{n}(\mathcal {S})\):

The optimization variable in the problem above is *g*. This variable is a vector in \(\mathbb {R}^{(|\mathcal {S}|+2)^{n}}\) which represents a function \(g \in \mathcal {G}_{n}(\mathcal {S})\). We slightly abuse the notation and do not use a bold symbol for *g* to underline that *g* corresponds to a function with a finite support. Family \(\mathcal {G}_{n}(\mathcal {S})\) is an infinite family of functions *g*, and each of these functions is defined on a finite set \(\overline {\mathcal {S}}^{n}\) with cardinality \((|\mathcal {S}|+2)^{n}\). For the purpose of optimization, this means that we consider all vectors \(g\in \mathbb {R}^{(|\mathcal {S}|+2)^{n}}\) which satisfy the four conditions in Definition 1 and the invariance property. All mentioned conditions are linear, and there are finitely many of them. Therefore the optimization over the infinite family of functions \(\mathcal {G}_{n}(\mathcal {S})\) can be written as a finite LP. We use the invariance of *g* (the second constraint) and Conditions 3-4 in Definition 1 to reduce the number of variables in problem (18) (the size of *g* as a vector). To ensure that *g* corresponds to an *n*-increasing function as specified in (14), it is enough to consider \(\mathbf {x}, \mathbf {y} \in \overline {\mathcal {S}}^{n}\) such that *x*_{i},*y*_{i} are consecutive points in \(\mathcal {S}\) for all *i* ∈ [*n*]. This reduces the number of constraints in problem (18).

To compute the upper bound \(R_{n}(\mathbb {P})\) using formulation (17), we first construct a good-guess distribution \(\mathbb {P}\). Given a set \(\mathcal {S}\) and the solution *g* to the lower bound problem (17) on \(\mathcal {S}\), we use the distribution \(\mathbb {P}_{g}\) which corresponds to the CDF (15) based on *g*. To construct this CDF, we choose a number \(a>\max \{s: s\in \mathcal {S}\}\), as explained in the proof of Lemma 1. In the rest of this section we work with \(\mathcal {S}_{a}=\mathcal {S} \cup \{a\}\). To solve (17) for \(\mathbb {P}_{g}\), we define the following set of intervals:

This set of intervals covers \(\mathbb {R}_{+}\), therefore by (17)

We solve the inner maximization problem in (19) for each pair \(i,j \in [|\mathcal {S}|+2]\). The expression for \(\phi ^{\mathbb {P}_{g}}\) (12) for the case *x**y* ≥ 1 is different from the case *x**y* < 1. To simplify the computations when the line *x**y* = 1 crosses the rectangle *I*_{i}×*I*_{j}, we restrict our attention to \(\mathcal {S}\) of a particular type. Consider a collection of *k* − 1 positive real numbers *r*_{1} < *r*_{2} < ⋯ < *r*_{k− 1} < 1, let

For any \(a>\tfrac {1}{r_{1}}\), \(\mathcal {S}_{k,a}=\mathcal {S}_{k}\cup \{a\}\) subdivides \(\mathbb {R}_{+}\) into 2*k*+ 1 intervals \(\mathcal {I}_{\mathcal {S}_{k}}\). First, consider a pair of intervals \(I_{i},I_{j} \in \mathcal {I}_{\mathcal {S}_{k}}\) such that *i*∉{1,2*k*+ 1} and *j*∉{1,2*k*+ 1} (i.e., neither of them are the first or the last interval). Due to the choice of \(\mathcal {S}_{k}\), the line *x**y* = 1 crosses the rectangle *I*_{i} × *I*_{j} if and only if *i* + *j* = 2*k* + 1. Denote the bivariate marginal CDF and the univariate marginal CDF of \(\mathbb {P}_{g}\) by *H*_{g} and *F*_{g}, respectively. Then

We construct the CDF of \(\mathbb {P}_{g}\) using (15), therefore

That is, the marginal CDFs are constant on *I*_{i} × *I*_{j} and *I*_{i}, respectively. As the range of a CDF is [0,1], we conclude that for *x* ∈ *I*_{i},*y* ∈ *I*_{j}, \(\phi ^{\mathbb {P}_{g}}(x, y)\) is non-increasing in *x* and non-decreasing in *y*. The latter holds since for any \( \mathbb {P} \in \mathcal {P}_{2}\) invariant under *S*_{2} and for any \(x,y \in \mathbb {R}\),

Hence the optimal value of the inner maximization problem in (19) can be obtained by first substituting the CDFs (22) into the function (21) and then substituting *x* = *s*_{i− 1}, *y* = *s*_{j}. Note that this optimum is not attained. For the case *i* + *j* = 2*k* + 1, i.e., when the line *x**y* = 1 crosses the rectangle *I*_{i} × *I*_{j}, the result holds due to the choice of \(\mathcal {S}_{k}\).

When *i* ∈{1,2*k*+ 1} or *j* ∈{1,2*k*+ 1}, the function \(\phi ^{\mathbb {P}_{g}}(x, y)\) simplifies, and we solve such cases separately. The solution approach resembles the one from the previous paragraph.

In numerical experiments we use uniform finite sets

Table 2 shows the best obtained bounds and the *k* we use to compute these bounds.

We round the lower bounds \(R_{n}(\mathcal {S}^{u}_{k})\) down and the upper bounds \(R_{n}(\mathbb {P}_{g})\) up. We verify all upper bounds with exact arithmetics using the MATLAB symbolic package and the following procedure. First, we obtain the optimal solution *g* to problem (18) and round the elements of the set \(\mathcal {S}^{u}_{k}\) and the number *a* to the 8^{th} digit. Next, we transform the rounded values into rational numbers and compute \(R_{n}(\mathbb {P}_{g})\) as a rational number. By Lemma 1 and Theorem 6, the rounded *g* provides the algorithm \(\mathcal {A}^{\mathbb {P}_{g}}\) with the worst-case approximation ratio \(R_{n}(\mathbb {P}_{g})\).

The upper bound for *n* = 2 in Table 2 is worse than the best existing upper bound. We improve our result and obtain a new best exiting upper bound for *n* = 2 in the next section.

## 5 More Precise Bounds for Two Tasks

In this section we analyze the case with *n* = 2 tasks and *m* = 2 machines in more detail. Now, to obtain an upper bound, we do not simply use some good-guess distribution as we did before, but we optimize over a subset of \(\mathcal {C}_{n}\) (10). Moreover, as a side result of this optimization, we obtain a non-uniform set \(\mathcal {S}_{k}\) which produces a better lower bound than the one from Table 2 in the previous section.

Problem (13) simplifies for *n* = 2. Given \(F \in \mathcal {G}_{1}(\mathbb {R}_{++})\), define

*H* is a copula, i.e., there is \(\mathbb {P}_{H,F} \in \mathcal {P}_{2}\) for which *H* is its CDF and *F* is its marginal CDF. See Nelsen [22] for the detailed description of copulas and their properties. Moreover, by construction \(\mathbb {P}_{H,F} \in \mathcal {C}_{2}\). Therefore we can rewrite problem (13) using univariate marginal CDF’s.

###
**Theorem 7**

*Consider family*
\(\mathcal {G}_{1}(\mathbb {R}_{++})\)
*from*
*Definition*
*1.*

### Proof

Given \(F\in \mathcal {G}_{1}(\mathbb {R}_{++})\), let

Consider any \(\mathbb {P}\in \mathcal {C}_{2}\) with the univariate CDF \(F_{\mathbb {P}}\). Define \(\phi ^{\mathbb {P}}(x,y)\) as in (12). From (23) for all \(x,y \in \mathbb {R}_{++}\),

Thus

On the other hand, for all \(F \in \mathcal {G}_{1}(\mathbb {R}_{++})\) there is copula H from (25) with the corresponding distribution \(\mathbb {P}_{H,F} \in \mathcal {C}_{2}\). Hence

□

### Remark 4

Nelsen [22] shows that for *n* > 2 the function

is not a CDF. We do not see other suitable *n*-variate CDFs which would have a bivariate margin *H* from (25). As a result, the proof of Theorem 7 fails for *n* > 2.

### 5.1 New Upper Bound for Two Tasks

To compute a new upper bound on *R*_{2}, we restrict the set of functions in problem (26) to the family of piecewise rational univariate CDFs. We say that a function is piecewise rational if it can be written as a fraction where both the numerator and the denominator are polynomials. The domain of each CDF is subdivided into pieces by \(\mathcal {S}_{k}\) defined in (20). Given \(\mathcal {S}_{k}\), we introduce a collection of intervals:

### Remark 5

We build the intervals using the points from \(\mathcal {S}_{k}\) only. This is different from Section 4.3 where we use an additional number \(a>\max {\mathcal {S}_{k}} \) to construct the intervals.

Given \(\mathcal {I}_{\mathcal {S}_{k}}\) and a family of continuous functions \(\mathcal {F}\), we consider CDFs which “piecewisely” belong to \(\mathcal {F}\).

###
**Definition 2**

\(\mathcal {C_{F}}(\mathcal {S}_{k})\) is a family of functions \(F: \mathbb {R}_{++} \rightarrow [0,1]\) such that

*f*_{1}(*x*) = 0, \(f_{i}(x)\in \mathcal {F}\), *f*_{i}(*x*) is non-decreasing, *f*_{k}(1) ≤ 0.5, 0 ≤ *f*_{i}(*x*_{i}) ≤ *f*_{i+ 1}(*x*_{i}) for all *i* < *k*. By construction, *F* is a CDF and thus \(\mathcal {C_{F}}(\mathcal {S}_{k})\subset \mathcal {G}_{1}(\mathbb {R}_{++})\). Restricting the minimization in problem (26) to \(\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k})\) provides an upper bound on *R*_{2}. We use the symmetry of *F* to simplify the expression for this bound.

###
**Proposition 4**

*Define*\(\mathcal {S}_{k}\)*as**in*(20) *and consider family*\(\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k})\)*from**Definition**2.**R*_{2}*is not larger than*

### Proof

Let \(F \in \mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k})\). Problem (29) is a restriction of problem (26) to a smaller set of functions. Therefore the former problem defines an upper bound on *R*_{2}.

Next, we show the equality between (29) and (30). Denote by *ϕ*^{F} the objective of problem (29). We claim that for every \(x,y\in \mathbb {R}_{++}\),

Let \(\hat {x}>0, \hat {y}>0\). First, consider the case \(\hat {x} \hat y\ge 1\). By construction of (28), \(\hat x \hat y \ge 1\) implies \( F(\hat x)+F(\hat y) \ge F(\hat x)+F\left ({1}/{\hat x}\right ) \ge 1\). Then

Now, let \(\hat {x}\hat {y} < 1\). By construction of \(\mathcal {I}_{\mathcal {S}_{k}}\) in (27), there are \(I_{i}, I_{j} \in \mathcal {I}_{\mathcal {S}_{k}}\) such that \(\hat {x} \in I_{i}, \ \hat {y}\in I_{j}\). The set \( \mathcal {S}_{k}\) is finite, therefore there is a sequence \(\{ (x_{t},y_{t})\}_{t=1}^{\infty }\) such that for all *t* the following holds: *x*_{t} ∈ *I*_{i}, *y*_{t} ∈ *I*_{j}, \(x_{t} \rightarrow \hat {x}^{+}, \ y_{t} \rightarrow \hat {y}^{+}\), *x*_{t}*y*_{t} < 1 and \(x_{t},y_{t} \notin \mathcal {S}_{k}\). For all \(x\in \mathbb {R}_{++}\setminus \mathcal {S}_{k}\) we have *F*(*x*) + *F* (1/*x*) = 1. Hence for all *t*

Finally, *F* is right continuous in \((\hat {x},\hat {y})\), and so is \(\phi ^{F}(\hat {x},\hat {y})\). Since \(x_{t}\rightarrow \hat {x}^{+}, y_{t}\rightarrow \hat {y}^{+}\),

The last inequality follows from (1/*y*_{t}) (1/*x*_{t}) > 1. □

### 5.2 Implementing the New Upper Bound for Two Tasks

In this subsection, for a given \(\mathcal {S}_{k}\), we choose \(\mathcal {F}\) in Definition 2 to be the family of linear univariate functions

Then \(\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k})\) includes, in particular, the CDFs from [3, 17, 18, 23] where the authors use piecewise functions with domains subdivided into two, four, or six intervals. We observe that the upper bounds are better when the domains are subdivided more times or when each piece has a more complex form than a constant function, i.e., when *c*^{1} can be non-zero. We improve upon the existing upper bounds by using a larger number of pieces and letting *c*^{1} be non-zero in each piece. Define

Let \(\mathcal {X}:=\left \{ (x,y) \in \mathbb {R}^{2}_{++}{:} \ xy \ge 1 \right \}\). Consider two formulations for \( R_{2}\left (\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k})\right )\) which are equivalent to problem (30)

The second equality follows from the equivalence of problems (30) and (29) since for \(\mathcal {S}_{k}\) defined in (20) *x**y* ≥ 1 implies *x* ∈ *I*_{i}, *y* ∈ *I*_{j} with *i* + *j* ≥ 2*k* + 1. We use problems (35) and (36) to approximate \(R_{2}\left (\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k})\right )\) with high precision. Namely, we use relaxations of problem (35) to compute lower bounds on \(R_{2}\left (\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k}) \right )\), and we use feasible solutions to problem (36) to compute upper bounds on \(R_{2}\left (\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k}) \right )\).

For \(F \in \mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k})\) satisfying (28) and (33), the variables in problem (35) are \(\left (t,\{{c_{i}^{0}}\}_{i=1}^{k},\{{c^{1}_{i}}\}_{i=1}^{k} \right ) \). This problem is LP with infinitely many constraints: each \((x,y) \in \mathcal {X}\) induces a linear constraint. Such problems can be well approximated using the cutting-plane approach introduced by Kelley [12]. Namely, we start with a finite set \(\mathcal {Y} \subset \mathcal {X}\) and restrict the set of constraints in (35) to its finite subset generated by \((x,y) \in \mathcal {Y}\). As a result, we obtain a finite linear problem. Denote its optimal solution by \((\underline {F}, \ \underline {t})\). Then \(\underline {t}\) is a lower bound on \(R_{2}\left (\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k}) \right )\).

Next, we substitute \(\underline {F}\) in (36) and find a feasible *t*. We compute the supremum for each pair *i*,*j* ∈ [2*k*] with *i* + *j* ≥ 2*k* + 1 using the Karush-Kuhn-Tucker (KKT) conditions. For each pair of intervals the inner maximization problem in (36) either is linearly constrained or satisfies the Mangasarian-Fromovitz constraint qualification. Therefore the optimum is among the KKT points, see, e.g., Section 3 in Eustaquio et al. [8] for more details. All problems are simple and have similar structure. Therefore we do not write the KKT conditions explicitly, but consider all possible critical points from the first order conditions and from the boundary conditions. This set contains all the KKT points, and thus the optimal one. At the end we choose the point (*x*,*y*) with the maximal value of \(\phi ^{\underline {F}}(x,y)\) among the critical points. See Section 7.4 for more details. Let \(\overline {t}\) be the maximum of \(\phi ^{\underline {F}}(x,y)\) over all pairs of intervals. The solution \((\underline {F},\overline {t})\) is feasible for problem (36). Thus \(\overline {t}\) is an upper bound on \(R_{2}\left (\mathcal {C}_{\mathcal {F}}(\mathcal {S}_{k}) \right )\). Let (*x*^{∗},*y*^{∗}) be a point such that \(\phi ^{\underline {F}}(x^{*},y^{*})=\overline {t}\). If \(|\overline {t}-\underline {t}|>10^{-8}\), we proceed from the beginning by restricting problem (35) to the updated set \(\mathcal {Y} \leftarrow \mathcal {Y}\cup \{(x^{*},y^{*})\}\). Otherwise we stop.

To obtain numerical results, we use uniform sets \(\mathcal {S}^{u}_{k}\) of the form (24). We work with family \(\mathcal {C}_{\mathcal {F}}(\mathcal {S}^{u}_{k})\) from Definition 2, where the underlying family of functions \(\mathcal {F}\) is defined in (33). We initialize the cutting-plane procedure with \(\mathcal {Y}=\left \{(x,y): x,y \in \mathcal {S}^{u}_{k}, \ xy\ge 1\right \}\). The best obtained upper bound is indicated in bold in Table 3, it is stronger than the currently best upper bound 1.5068.

We verify the upper bound 1.5059964 using exact arithmetics in a similar way as we do it for the upper bounds in Table 2 of Section 4.3.

### 5.3 New Lower Bound for Two Tasks

The cutting-plane approach from Section 5.1 generates not only the upper bound with the corresponding CDF, but also the set of points \(\mathcal {Y}\). Using \(\mathcal {Y}\), we build a new set \(\mathcal {S}^{*}_{k}\) of the form (20), which is not uniform as in (24). We consider all \((x,y) \in \mathcal {Y}\) involved in the binding constraints of problem (35) at the last cutting-plane iteration. Next, we take the corresponding *x*, *y* and their reciprocals, order ascending, round to the 8^{th} digit and obtain \(\mathcal {S}^{*}_{k}\) with *k* = 82. For this set the lower bound \(R_{n}(\mathcal {S}^{*}_{k})\) from problem (18) is 1.5059953, which is stronger than our lower bound from Table 2. As a result, the lower and upper bounds become very close to each other: |*R*_{2} − 1.505996|≤ 10^{− 6}.

## 6 Conclusion

We consider randomized MIS algorithms to the minimum makespan problem on two unrelated parallel selfish machines. We propose a new *M**i**n* − *M**a**x* formulation (13) to find *R*_{n}, the best approximation ratio over randomized MIS algorithms. The minimization in (13) goes over distributions and the maximization goes over \(\mathbb {R}^{2}_{++}\). The problem is generally intractable, so we build upper and lower bounds on the optimal value. To obtain the lower bound, we solve the initial problem on a finite subset of \(\mathbb {R}^{2}_{++}\). Using the resulting solution, we construct a piecewise constant cumulative distribution function (CDF) for which the worst-case performance is easy to estimate. In this way, we obtain the upper bound on *R*_{n}. We implement this approach and find new bounds for *n* ∈{2,3,4} tasks.

For *n* = 2 the best CDF is a known function of univariate margins (copula). We parametrize these margins as piecewise rational functions of degree at most one. The resulting upper bound problem (30) is a linear semi-infinite problem. We solve it by the cutting-plane approach. This approach provides the upper bound 1.5059964 and the CDF for which the algorithm achieves this bound.

As a side result of the cutting-plane approach, we obtain the lower bound 1.5059953, so |*R*_{2} − 1.505996|≤ 10^{− 6}. This work leaves open several questions for future research. First, our approach could be made more numerically efficient to provide better bounds for *m* = 2 machines. For example, column generation could solve lower bound problem (17) on denser grids and for the larger number of tasks *n*. Parametrizing distributions of more than two variables could improve the results for the upper bound problem (17). Second, we work with *m* = 2, machines but there are algorithms for *m* > 2 machines with similar properties, e.g., by Lu and Yu [19]. It would be interesting to see how our approach works in the case of more than two machines. Finally, the suggested piecewise and pointwise constructions could be suitable for other problems with optimization over low dimensional functions, including problems from algorithmic mechanism design.

## 7 Proofs

In this section we use some additional notation. First, *ρ*(*T*) denotes the vector of the processing time ratios

Second, for \(\mathbf {z} \in \mathbb {R}^{n}_{++}\) we denote by \(\mathcal {A}^{\mathbf {z}}\) the algorithm in \(\mathcal {A}^{\mathcal {P}_{n}}\) with the thresholds fixed at **z**. Finally, for \(T\in \mathbb {R}_{++}^{2\times n}\) we let *X*^{z,T} and *M*(**z**,*T*) be the output and the makespan of \(\mathcal {A}^{\mathbf {z}}\) on *T*, respectively.

### 7.1 Proof of Theorem 2

We begin with a lemma.

###
**Lemma 2**

*For a given number of tasks* n*, let*\(\mathbb {P} \in \mathcal {P}_{n}\)*.**For every time matrix*\(\ T\in \mathbb {R}_{++}^{2\times n}\)*, there exists**a sequence of time matrices*\(\{ T_{k}\}_{k>0} \subset \mathbb {R}_{++}^{2\times n}\)*such**that*\(\mathbf {P}_{z \sim \mathbb {P}}\left [ z_{j}={T_{k,1j}}/{T_{k,2j}}\right ]=0\)*for all**j* ∈ [*n*] *and* k*,**and*

### Proof

Consider a sequence of nonnegative numbers {*𝜖*_{k}} such that

- 1.
\(\mathbf {P}_{z\sim \mathbb {P}}\left [z_{j}={\rho (T)_{j}}+\epsilon _{k} \right ]=0, \ \forall \ k \in \mathbb {N}, \ j \in [n]\)

- 2.
\(\displaystyle \lim _{k \rightarrow \infty } \epsilon _{k}=0\)

A sequence with these properties exists since for every *j* ∈ [*n*] the case \(\mathbf {P}_{z \sim \mathbb {P}}\left [ z_{j}=a\right ]>0\) is possible for countably many \(a\in \mathbb {R}_{++}\) only. Next, we build a sequence of time matrices {*T*_{k}}_{k> 0}, *T*_{k} = (*T*_{k,ij}):

Notice that \(T=\lim _{k \rightarrow \infty } T_{k}\). By adding *𝜖*_{k}*T*_{2j} to every task on the first machine, we ensure that \(\mathbf {P}_{z \sim \mathbb {P}}\left [ z_{j}={T_{k,1j}}/{T_{k,2j}}\right ]=0\) for all *j* ∈ [*n*] and k. For each k and all *j* ∈ [*n*], *i* ∈{1,2}, we have *T*_{ij} ≤ *T*_{k,ij}. So *M*^{∗}(*T*) ≤ *M*^{∗}(*T*_{k}) ≤ *M*(*X*^{∗},*T*_{k}), where *X*^{∗} is the optimal allocation for T. *X*^{∗} is finite (binary, in particular) and \(T=\lim _{k \rightarrow \infty } T_{k}\). Combining this with (1), we see that *M*(*X*^{∗},*T*_{k}) tends to *M*^{∗}(*T*) when k tends to infinity. Therefore

For every time matrix *T*_{k} and task *j*, consider the event *B*_{k,j} : *“**ρ*(*T*)_{j} < *z*_{j} ≤ *ρ*(*T*_{k})_{j}*”*. Let \(B_{k}=\bigcup _{j=1}^{n} B_{k,j} \) and let \({B_{k}^{c}}\) be the complement of *B*_{k}. When *B*_{k} happens, outcomes of \(\mathcal {A}^{\mathbf {z}}\) on *T* and *T*_{k} are different, otherwise they are the same. By construction of \(\mathcal {A}^{\mathbf {z}}\), *M*(**z**,*T*) is finite for any *T*. Hence

For any *j* ∈ [*n*] we have \( \rho (T_{k})_{j} \rightarrow \rho (T)_{j}^{+}\). Since the CDF of \(\mathbb {P}\) is continuous from the right,

which implies

Finally, for any \(k \in \mathbb {N}\)

Thus by (40),

and

□

###
*Proof of Theorem 2*

Recall that \(\mathcal {T}\) is defined in (6). By Lemma 2, for every \(T\in \mathbb {R}_{++}^{2\times n}\) there exists a sequence of time matrices \(\{ T_{k}\}_{k>0} \subset \mathcal {T}\) such that

Hence

The opposite inequality holds since \(\mathcal {T}\subset \mathbb {R}_{++}^{2\times n}\). □

### 7.2 Proof of Theorem 3

Recall the definitions of *S*_{inv} and *S*_{n} from Section 3. Let *σ*_{id} be the identity action of *S*_{2} and *σ*_{swap} be the non-identity action of *S*_{2}. We say that that the group *S*_{2}×*S*_{n} acts on a matrix in \(\mathbb {R}^{2\times n}\) by permuting the two rows and the *n* columns of this matrix. Namely, for \(A\in \mathbb {R}^{2\times n}\) and (*σ*,*π*) ∈ *S*_{2}×*S*_{n}, we define the action of (*σ*,*π*) ∈ *S*_{2}×*S*_{n} on *A* by

We show that for any \(T \in \mathbb {R}^{2\times n}_{++}\) the optimal makespan *M*^{∗}(*T*) is invariant under the actions of *S*_{2}×*S*_{n} on *T*. Moreover, the expected makespan \(M(\mathbb {P},T)\) is invariant under the actions of *S*_{2}×*S*_{n} on *T* and *S*_{inv}×*S*_{n} on \(\mathbb {P}\). These two results together imply Theorem 3.

###
**Lemma 3**

*M*^{∗}(*T*) = *M*^{∗}(*σ**T**π*) *for all*\((\sigma ,\pi ) \in S_{2}{\times }S_{n}, \ T \in \mathbb {R}_{++}^{2\times n}\)

### Proof

Consider a time matrix T and actions *π* ∈ *S*_{n}, *σ* ∈ *S*_{2}. Let \(X^{*}=(X^{*}_{ij})\) be an optimal allocation matrix for T. Then \(\sigma T \pi =(T_{\sigma i, \pi j}), \ \ \sigma X^{*} \pi =(X^{*}_{\sigma i, \pi j})\). This implies

Analogously, for the time matrix *σ**T**π* and actions *π*^{− 1} ∈ *S*_{n}, *σ*^{− 1} ∈ *S*_{2}, we obtain

□

###
*Proof of Theorem 3*

Let \(\mathbb {P}\in \mathcal {P}_{n}\), \(\mathbf {z} \in \mathbb {R}^{n}_{++}\) and \(T\in \mathbb {R}^{2\times n}_{++}\). Since we are interested in \(R_{n}(\mathbb {P})\), by Lemma 2 we can assume without loss of generality that T is such that \(\mathbf {P}_{z \sim \mathbb {P}}\left [ z_{j}={T_{1j}}/{T_{2j}}\right ]=0\) for all *j* ∈ [*n*]. Consider (*γ*,*π*) ∈ *S*_{inv}×*S*_{n} and **y** = ^{γ}**z***π*. Let *σ* = *σ*_{id} if *γ* =^{id}. and *σ* = *σ*_{swap} if *γ* =^{inv}. Then \(\mathcal {A}^{\mathbf {z}}\) sends task j to machine i on T if and only if \(\mathcal {A}^{\mathbf {y}}\) sends task *π**j* to machine *σ**i* on *σ**T**π*. As a result, \(T_{ij}X^{\mathbf {z},T}_{ij} =T_{\sigma i \pi j}X^{\mathbf {y},\sigma T \pi }_{\sigma i \pi j} \) for all *i*,*j* and

Therefore

Combining this with Lemma 3, obtain

By Theorem 2,

where \(\mathcal {T}\) is defined in (6). □

### 7.3 Proof of Theorem 5

By Proposition 2, \(R_{n}(\mathbb {P}) \le \sup _{x,y \in \mathbb {R}_{++}}\phi ^{\mathbb {P}}(x,y)\). Next, we prove the opposite inequality. Consider \(\mathbb {P} \in \mathcal {C}_{n}\). We start with the case *n* = 2 and proceed similarly to Lu and Yu [19]. Denote the bivariate marginal distribution of \(\mathbb {P}\) by \(\mathbb {P}_{2}\). Consider a time matrix \(T \in \mathbb {R}_{++}^{2\times 2}\) and denote \(\frac {T_{11}}{T_{21}}\) by *x*, \(\frac {T_{12}}{T_{22}}\) by *y*. Construct the following matrix *T*_{0}:

The expected makespan of \(\mathcal {A}^{\mathbb {P}_{2}}\) on this instance is \(M(\mathbb {P}_{2},T_{0})\):

Denote the minimum makespan on *T*_{0} by *M*^{∗}. By construction *M*^{∗}≤ 1, hence

This holds for all \(x, y \in \mathbb {R}_{++}\), therefore

Now, fix *n* > 2. Choose a small *𝜖* > 0 and consider the following time matrix *T*_{𝜖}:

The expected makespan of \(\mathcal {A}^{\mathbb {P}}\) on this instance, \(M(\mathbb {P},T_{\epsilon })\), satisfies

and the optimal makespan, *M*^{∗}(*T*_{𝜖}), satisfies

Using the result for *n* = 2,

which holds for all \(x, y \in \mathbb {R}_{++}\).

### 7.4 Possible Critical Points Computation for the Function (34)

In this section we find possible critical points for the function

with *F* defined in (28) using (33) on *I*_{i} × *I*_{j} such that *i*,*j* ∈ [2*k*], *i* + *j* ≥ 2*k* + 1. By construction, in each interval *F* is differentiable, and *ϕ*^{F} is differentiable on *I*_{i} × *I*_{j} (the expression simplifies for *i* = 1 and *j* = 2*k*). The first derivatives of the function *ϕ*^{F}(*x*,*y*) are:

Next, we consider the three possible cases for *i*,*j*. For each of these cases we substitute *F*(*x*), *F*(*y*) from (28) and find the analytical solution to the system \(\frac {\partial \phi ^{F}(x,y)}{\partial x}=0, \ \frac {\partial \phi ^{F}(x,y)}{\partial y}=0\). For this purpose we use Wolfram|Alpha [28]. The obtained solution is denoted by (*x*^{∗}, *y*^{∗}).

*Case 1.**k*<*i*≤ 2*k*, 1 ≤*j*≤*k*.In this case \(F(x)=1-{{c^{0}_{i}}}-{{c^{1}_{i}}}x, \ F(y)= {{c^{0}_{j}}}+{{{c^{1}_{j}}}}/{y}\) and

*y*∈ (0,1). Hence$$ \begin{array}{@{}rcl@{}} \frac{\partial \phi^{F}(x,y)}{\partial x}= &\frac{1}{x^{2}} \left( {{c^{0}_{i}}}-{{c^{0}_{j}}}-\frac{{{c^{1}_{j}}}}{y}\right), \ \ \frac{\partial \phi^{F}(x,y)}{\partial y} \ge 0. \end{array} $$The latter holds since

*F*(*y*) ≤ 1,*F*(*y*) is non-decreasing by construction, and*y*∈ (0,1). The sign of the derivative with respect to*x*does not depend on*x*. The function*ϕ*^{F}(*x*,*y*) is non-decreasing in*y*and is either non-increasing or non-decreasing in*x*. We not know this in advance, so we use the set {(*s*_{i− 1},*s*_{j}),(*s*_{i},*s*_{j})} as possible critical points.*Case 2.**k*<*i*≤ 2*k*,*k*<*j*≤ 2*k*.In this case \(F(x)=1-{{c^{0}_{i}}}-{{c^{1}_{i}}}x, \ F(y)= 1-{{c^{0}_{j}}}-{{c^{1}_{j}}}y\) and

*y*≥ 1. Hence$$ \begin{array}{@{}rcl@{}} \frac{\partial \phi^{F}(x,y)}{\partial x}&=& {1}/{x^{2}} \left( {{c^{0}_{i}}}-1+{c^{0}_{j}}+{{c^{1}_{j}}}y \right),\ \ \frac{\partial \phi^{F}(x,y)}{\partial y}\\ &=& {c^{0}_{j}}-\left( 1+{1}/{x}-2y \right){{c^{1}_{j}}}. \end{array} $$As in

, the sign of the derivative with respect to*Case 1**x*does not depend on*x*, hence*ϕ*^{F}(*x*,*y*) is non-increasing or non-decreasing in*x*. We do not know this in advance, so we start with the set {*s*_{i− 1},*s*_{i}}×{*s*_{j− 1},*s*_{j},*y*^{∗}} as possible critical points. If*i*+*j*= 2*k*+ 1 (that is, the line*x**y*= 1 crosses the rectangle*I*_{i}×*I*_{j}), we additionally consider the point \((\tfrac {1}{y^{*}}, y^{*})\). We check all pairs for feasibility and exclude the infeasible ones.1 ≤*Case 3.**i*≤*k*,*k*<*j*≤ 2*k*.In this case \(F(x)={c^{0}_{i}}+{{{c^{1}_{i}}}}/{x}, \ F(y)=1-{{c^{0}_{j}}}-{{c^{1}_{j}}}y\), and

$$ \begin{array}{@{}rcl@{}} \frac{\partial \phi^{F}(x,y)}{\partial x}&=& \frac{1}{x^{2}} \left( -{c^{0}_{i}}+{{c^{0}_{j}}}+{{c^{1}_{j}}}y - \frac{2{c^{1}_{i}}}{x} \right),\\ \frac{\partial \phi^{F}(x,y)}{\partial y}&=&{c^{0}_{j}}-\left( 1+{1}/{x}-2y\right){c^{1}_{j}}. \end{array} $$

The sign of the derivatives is unknown, so we start with the set {*s*_{i− 1},*s*_{i},*x*^{∗}}×{*s*_{j− 1},*s*_{j},*y*^{∗}} as possible critical points. If *i* + *j* = 2*k* + 1 (that is, the line *x**y* = 1 crosses the rectangle *I*_{i} × *I*_{j}), we additionally consider the set \(\left \{(x^{*},\tfrac {1}{x^{*}}),(\tfrac {1}{y^{*}}, y^{*})\right \}\). We check all resulting pairs for feasibility and exclude the infeasible ones.

When *x* ∈ *I*_{1} or *y* ∈ *I*_{2k}, *ϕ*^{F}(*x*,*y*) simplifies by construction of (28). In our computations we analyze these situations separately.

## References

Auletta, V., Christodoulou, G., Penna, P.: Mechanisms for scheduling with single-bit private values. Theory Comput. Syst.

**57**(3), 523–548 (2015)Azar, Y., Hoefer, M., Maor, I., Reiffenhäuser, R., Vöcking, B.: Truthful mechanism design via correlated tree rounding. Math. Program.

**163**(1), 445–469 (2017)Chen, X., Du, D., Zuluaga, L.: Copula-based randomized mechanisms for truthful scheduling on two unrelated machines. Theory Comput. Syst.

**57**(3), 753–781 (2015)Christodoulou, G., Koutsoupias, E., Vidali, A.: A lower bound for scheduling mechanisms. Algorithmica

**55**(4), 729–740 (2009)Dobre, C., Vera, J.: Exploiting symmetry in copositive programs via semidefinite hierarchies. Math. Program.

**151**(2), 659–680 (2015)Dobzinski, S., Sundararajan, M.: On characterizations of truthful mechanisms for combinatorial auctions and scheduling. In: Proceedings of the 9th ACM Conference on Electronic Commerce EC ’08, pp. 38–47 (2008)

Elbassioni, K., Mehlhorn, K., Ramezani, F.: Towards more practical linear programming-based techniques for algorithmic mechanism design. Theory Comput. Syst.

**59**(4), 641–663 (2016)Eustaquio, R.G., Karas, E.W., Ribeiro, A.A.: Constraint qualifications for nonlinear programming. In: Conference Proceedings. http://paginapessoal.utfpr.edu.br/eustaquio/my-research-interests/kkterabio.pdf (2008)

Gatermann, K., Parrilo, P.A.: Symmetry groups, semidefinite programs, and sums of squares. J. Pure Appl. Algebra

**192**(1), 95–128 (2004)Gilmore, P.C., Gomory, R.E.: A linear programming approach to the cutting-stock problem. Oper. Res.

**9**, 849–859 (1961)Gualà, L., Proietti, G.: Exact and approximate truthful mechanisms for the shortest paths tree problem. Algorithmica

**49**(3), 171–191 (2007)Jr., J.E.K.: The cutting-plane method for solving convex programs. SIAM J. Appl. Math.

**8**, 703–712 (1960)de Klerk, E., Pasechnik, D., Schrijver, A.: Reduction of symmetric semidefinite programs using the regular ∗-representation. Math. Program.

**109**(2), 613–624 (2007)Koutsoupias, E., Vidali, A.: A lower bound of 1 +

*ϕ*for truthful scheduling mechanisms. Algorithmica**66**, 211–223 (2013)Lavi, R., Swamy, C.: Truthful and near-optimal mechanism design via linear programming. J. ACM

**58**(6), 1–25 (2011)Lenstra, J., Shmoys, D., Tardos, É.: Approximation algorithms for scheduling unrelated parallel machines. Math. Program.

**46**, 259–271 (1990)Lu, P.: On 2-player randomized mechanisms for scheduling. In: Internet and Network Economics: 5th International Workshop, WINE 2009, Rome, Italy, December 14-18, 2009. Proceedings, pp. 30–41 (2009)

Lu, P., Yu, C.: An improved randomized truthful mechanism for scheduling unrelated machines. In: Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008 Bordeaux : France (2008)

Lu, P., Yu, C.: Randomized truthful mechanisms for scheduling unrelated machines. In: Internet and Network Economics: 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings pp. 402–413 (2008)

Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)

Mu’alem, A., Schapira, M.: Setting lower bounds on truthfulness: Extended abstract. In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms SODA ’07, pp. 1143–1152 (2007)

Nelsen, R.: An introduction to Copulas. Springer, New York (2006)

Nisan, N., Ronen, A.: Algorithmic mechanism design. Games Econom. Behav.

**35**(1), 166–196 (2001)Potts, C.: Analysis of a linear programming heuristic for scheduling unrelated parallel machines. Discrete Appl. Math

**10**(2), 155–164 (1985)Saks, M.E., Yu, L.: Weak monotonicity suffices for truthfulness on convex domains. In: Proceedings 6th ACM Conference on Electronic Commerce (EC), pp. 286–293 (2005)

Shchepin, E.V., Vakhania, N.: An optimal rounding gives a better approximation for scheduling unrelated machines. Oper. Res. Lett.

**33**(2), 127–133 (2005)Vaze, R., Coupechoux, M.: Online budgeted truthful matching. SIGMETRICS Perform. Eval. Rev.

**44**(3), 3–6 (2017)Wolfram|Alpha: http://www.wolframalpha.com (2009)

## Acknowledgements

We would like to thank the two anonymous reviewers for pointing out an inconsistency in the first proof of Corollary 1 and suggesting numerous improvements in the presentation of the results in this paper.

## Author information

### Authors and Affiliations

### Corresponding author

## Additional information

### Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

## Rights and permissions

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## About this article

### Cite this article

Kuryatnikova, O., Vera, J.C. New Bounds for Truthful Scheduling on Two Unrelated Selfish Machines.
*Theory Comput Syst* **64**, 199–226 (2020). https://doi.org/10.1007/s00224-019-09927-x

Published:

Issue Date:

DOI: https://doi.org/10.1007/s00224-019-09927-x