Radio Network Distributed Algorithms in the Unknown Neighborhood Model
|
|
- Benedict Walters
- 5 years ago
- Views:
Transcription
1 Radio Network Distributed Algorithms in the Unknown Neighborhood Model Bilel Derbel and El-Ghazali Talbi Laboratoire d Informatique Fondamentale de Lille LIFL Université des Sciences et Technologies de Lille France USTL Bilel.Derbel@lifl.fr, El-ghazali.talbi@lifl.fr Abstract. The paper deals with radio network distributed algorithms where initially no information about node degrees is available. We show that the lack of such an information affects the time complexity of existing fundamental algorithms by only a polylogarithmic factor. More precisely, given an n-node graph modeling a multi-hop radio network, we provide a Olog 2 n time distributed algorithm that computes w.h.p., a constant approximation value of the degree of each node. We also provide a O log n+log 2 n time distributed algorithm that computes w.h.p., a constant approximation value of the local maximum degree of each node, where the global maximum degree of the graph is not known. Using our algorithm as a plug-and-play procedure, we show that the local maximum degree can be used instead of to break the symmetry efficiently. We illustrate this claim by revisiting some fundamental algorithms that use as a key parameter. First, we investigate the generic problem of simulating any point-to-point interference-free message passing algorithm in the radio network model. Then, we study the fundamental coloring problem in unit disk graphs. The obtained results show that the local maximum degree allows nodes to self-organize in a local manner and to avoid the radio interferences from being a communication bottleneck. 1 Introduction Motivation and goals We consider a multi-hop network of radio devices modeled by a graph. We assume that the nodes of the graph are not yet organized in any specific manner, that is, we consider a newly deployed network where no specific communication structure is available. In such a network, it is crucial that initially the nodes self-organize in some accurate manner before any tasks could be conducted. For that purpose, nodes have to communicate with their neighbors and coordinate their computations. Compared to a classical pointto-point message passing network where any two neighboring nodes are related by a direct link allowing them to communicate safely, communications between neighbors in a radio network are subject to interferences, i.e., a message sent by a node may get lost due to interferences caused by other message sending. Coping A preliminary version of this paper appeared as an inria internal research report [6] The two authors are supported by the Equipe Projet INRIA DOLPHIN.
2 with these interferences is indeed one of the major obstacles to design efficient distributed algorithms for radio networks. In this paper, we focus on what knowledge about the network is required to avoid interferences while organizing the network nodes efficiently. More specifically, we study the impact of two parameters: the degree of each node and the maximum network degree, on designing time-efficient distributed algorithms for solving basic radio network tasks. These two parameters are in fact used as crucial ingredients to compute fundamental distributed structures in many past works, e.g., node/edge coloring [10, 11, 5], matching [2], single-hop emulation [3], broadcasting and gossiping [7, 1, 4], etc. Unfortunately, nodes in a newly deployed network could even not be aware of their own neighbors. Thus, efficient algorithms working under the assumption that no knowledge about node degrees is available are more likely to be applied in a real setting. The key challenge of this paper is to provide time-efficient algorithms working under an unknown neighborhood model, i.e., a model where no information about node degrees is available. Apart from being of a great importance in realistic settings, the unknown neighborhood model is also of a great theoretical interest. In fact, the time complexity of solving many basic tasks is tightly related to the degrees of nodes lower and upper bounds are often functions of those degrees. To illustrate this claim, let us assume a communication model where a node can hear a message from one neighbor in a given time slot if and only if no other neighbors are being sending in that time slot. It is obvious that if a given node v has to receive one message from each of its neighbors, then the degree of v is a time lower bound. Assuming that v s neighbors know v s degree, if each neighbor of v transmits with a probability inversely proportional to v s degree, then we can show that the latter lower bound is almost tight. Now if we consider the problem of broadcasting a message from every node to its neighbors, then it can be shown that tuning the sending probabilities according to the maximum degree of the network leads to almost time-optimal algorithms. These observations show that a knowledge about node degree can significantly affect the most primitive network tasks. More generally, tuning the sending probability of a node according to that knowledge appears to be very helpful to avoid interferences caused by simultaneous transmissions. It is in fact a key idea to coordinate node transmissions distributively and to break the symmetry efficiently. In this work, we show how to overcome the absence of such a knowledge when thinking and designing efficient distributed algorithms: i by giving a polylogarithmic time algorithm that estimates the degree of each node and ii by showing that the maximum degree of the network is not a bottleneck parameter for computing some fundamental structures such as coloring. The Model We consider a classical graph based radio network model. More precisely, the network is modeled by an n-node graph G = V, E. The nodes represent a set of radio devices. There is an edge between two nodes if the two nodes are in the transmission range of one another. Nodes can communicate by sending and receiving messages. For the sake of analysis, we assume that the nodes have access to a global clock generating discrete pulses slots. We
3 also assume that the nodes wake up synchronously, i.e., at pulse 0 all nodes are awaken. At each pulse, a node can transmit or stay silent. A node receives a message in a given pulse iff it is silent then and precisely one of its neighbors transmits. No collision detection mechanism is available to nodes in any way. We assume that nodes do not have any knowledge about the number of their neighbors. Nevertheless, we assume that an estimate ñ on the number of nodes n in the network is known. In practice, these assumptions can be interpreted as following: nodes know that they may have between 1 and ñ neighbors, but they do not know how many. As we will show, we remark that the running time of all our algorithms depends polylogarithmically on ñ, i.e., a rough estimate value ñ of n e.g., ñ = n O1 affects the time complexity by only a constant factor. Therefore, for a sake of clarity our algorithms are described for ñ = n. For every node v, we denote Nv the set of v s neighbors and d v = Nv the degree of v. We denote N + v = Nv {v}. The maximum degree of the network is denoted by = max {d v v V }. The local maximum degree of a node v is defined by v = max {d u u N + v}. We say that an event occurs with high probability w.h.p., for short if the probability that the event occurs is at least 1 1/n α for a positive constant α which can be made arbitrarily large by setting the corresponding parameters to large enough values. Contributions and Outline Our first contribution Section 2 is a Olog 2 n time distributed algorithm that computes w.h.p., a constant approximation value of the degree of each node. The idea of the algorithm is based on the claim that if the nodes transmit with the same probability p then the probability that a given node v hears a message from its neighbors is maximized for p = 1/d v. Thus, to decide on an estimate value of its degree, a node v changes its sending probability periodically and tries to detect the sending probability for which it hears the most often messages from its neighbors. Our second contribution Section 3 is a O log n+log 2 n time distributed algorithm that computes w.h.p., a constant approximation value v of the local maximum degree v of every node v. The idea of the algorithm is based on the claim that if all the neighbors of a given node v send with the same probability p = 1/d v then w.h.p., node v hears a message from each neighbor during a Od v log n time period. Thus, by combining this claim with our first algorithm, we are able to coordinate the nodes by periodically varying their sending probabilities so that every node can communicate its approximate degree to neighbors having a lower degree. The third result of the paper Section 4 is more general in the sense that it allows us to overcome the lack of information about the global maximum degree. Our analysis reveals that fundamental tasks using the knowledge of as a key assumption can still be scheduled efficiently when such a knowledge is not available. We illustrate this claim for three fundamental problems: i the SRS Single Round Simulation problem [1] which consists in simulating the rounds of a synchronous point-to-point message passing algorithm into the radio network model, ii the classical node coloring problem [10, 11] which consists in coloring the nodes such that every two neighbors have distinct colors iii a
4 variant of the maximum matching problem [5] which consists in computing a set of distance-2 pairwise disjoint edges. We revised these three problems under the assumption that no information about node degrees is available and we show that using an approximate value of the local maximum degree of each node is sufficient to obtain essentially the same time complexity. 2 From scratch approximation of node degrees 2.1 Description of the algorithm Input: An n-node graph G, an integer k = Θlog n, and a small constant β. e Output: A constant approximate value f d v of d v. for i = 1 to log n do c i := 0; p i := 1/2 i ; for j = 1 to k do v sends a ping message with probability p i; if v hears a ping message then c i := c i + 1 ; if c i e β k then f d v := 2 i ; Fig. 1: Algorithm InitNetwork; code for a node v. Algorithm InitNetwork Fig. 1 works in log n phases. At each phase i, every node transmits with a decreasing probability p i = p i 1 /2 for k = Θlog n rounds. At each phase, each node counts the number of times it hears a message variable c i. If that number exceeds a threshold β k then the node decides that its degree is order of 1/p i. Roughly speaking, we will show that if all the neighbors of a node v are sending with the same probability p i, then w.h.p., the number of times node v hears a message is roughly order of k when p i is roughly order of 1/d v. Thus, by varying geometrically the sending probability at each phase from 1/2 to 1/n, each node is likely to experience a phase where it hears order of k messages, and can decide on an approximate value of its degree. In order to obtain the w.h.p. correctness property of our algorithm, the precise value of β and k are to be fixed later in the analysis. 2.2 Analysis Fact 1 e.g., [10,11] x 1 and t x, e t 1 t2 x 1 + t x x e t. Fact 2 Chernoff and Hoeffding s Inequalities, e.g., [9] Let X 1,, X k be k independent Bernoulli trials, PX i = 1 = p = 1 PX i = 0. Let X = k i=1 X i, and EX = µ. For any ǫ and ǫ verifying 0 < ǫ < 1 and ǫ > 0, we have: PX < 1 ǫµ < e µǫ2 /2 and PX µ kε e 2kε 2.
5 Let c i v be the value of counter c i of node v at the end of a given phase i. Lemma 1. Given a node v V, we have Ec i v = k d v p i 1 p i dv. Proof. Due to lack of space, this proof is omitted see [6]. Lemma 2. There exist positive constants ν, β, ǫ > 0 such that: 1 For any node v and phase i such that i 1 log d v i, Ec i v β k, and 2 For any node v and phase i / [logd v 2, logd v + 4], Ec i v 1 ǫβ ν k. Proof. Due to lack of space, this proof is omitted see [6]. In the following, we set β = 1 ǫβ in algorithm InitNetwork where ǫ and β are the constants from the previous lemma. We also set k = α max { β/2ε 2, 1/2ν 2 } log n, where α 1 is any constant. We say that a node decides on the value of d v at phase i if the condition c i βk is true. Lemma 3. Given a node v and a phase i verifying i [logd v, logd v + 1], v decides on the value of d v at phase i with probability at least 1 1/n α. Proof. At phase i [logd v, logd v + 1], we have 1/p i 1 d v 1/p i. Thus, using the Chernoff s inequality, we have: P c i v < 1 εec i v Fact 2 exp ε2 2 Ec iv Lemma 2 exp ε2 2 β k 1 n α Now, using Lemma 2, for i [logd v, logd v + 1], we have Ec i v βk. Thus P c i v < 1 εβk = P c i v < βk 1/n α, and the lemma is proved. In the next lemma, we prove that w.h.p., a node v does not decide on the value of dv at a phase not in the range of log d v, i.e., w.h.p., the condition c i v βk does not hold for i not order of log d v. Lemma 4. Given a node v and a phase i verifying i / [logd v 2, logd v + 4], v does not decide on the value of d v at phase i with probability at least 1 1/n α. Proof. Take a phase i / [logd v 2, logd v + 4]. By Lemma 2, we have Ec i v β νk. Thus, using the Hoeffding s inequality, we have P c i v βk = P c i v Ec i v β Ec iv k k Fact 2 exp 2k β Ec 2 iv k Lemma 2 exp 2kν 2 1 n α
6 Theorem 1. In Olog 2 n time, algorithm InitNetwork outputs w.h.p., a constant approximation value of the degree of any node. Proof. The running time is straightforward. Using the two previous lemmas, a node v decides only at a phase i verifying i [logd v 2, logd v + 4] with probability at least 1 1/n α k. Thus all nodes decide on such a phase with probability at least : 1 1 k n α = 1 1 k n n α Fact n α 2 v V The last inequality holds for a sufficiently large constant α and k = Θlog n. 3 An algorithm for computing the local maximum degree Input: An n-node graph G and a parameter k = Θlog n. Output: A constant approximate value f v of v. Run algorithm InitNetwork and compute f d v; f v := f d v; i := 0; while i Θlog f d v do i := i + 1; p i := 1/2 i ; for j = 1 to k/p i do v sends message f d v with probability p i; if v hears a message d f w from node w and d f w > f v then f v := d f w; Fig. 2: Algorithm LocalMaxDegree; code for a node v. The idea of algorithm LocalMaxDegree Fig. 2 is to coordinate the sending probabilities so that each node can successfully send its approximate degree to neighbors having lower degrees. Given a node v, the crucial observation is that if all its neighbors are sending with probability 1/d v, then within Od v log n time, v will receive a message from each neighbor w.h.p.. The main difficulty is that a neighbor u of v does not know the degree of v. Thus, neighbor u cannot set its sending probability to the required value. Moreover, node u may have other neighbors with different degrees. Thus, node u should change its sending probability according to those neighbors. The key idea of our algorithm is to decrease geometrically the sending probability p i each Θ1/p i log n time period, from p i = 1/2 until reaching p i = Θ1/d v. Thus, at a phase i, nodes having a degree order of 1/p i can hear a message from neighbors having larger degrees. Note that nodes with low degree will finish their while loop early. Theorem 2. In O log n + log 2 n time, algorithm LocalMaxDegree outputs, w.h.p., a constant approximation of the local maximum degree of any node.
7 Proof. Let us consider a phase i and a node v verifying d v = Θ1/p i. Assuming that algorithm InitNetwork outputs the estimate value of the degree of each node, and from the initialization step line 2 of algorithm LocalMaxDegree, the condition of the while loop is still true for all nodes having degree at least order of 1/p i, i.e., neighbors of v with higher degree are still active at phase i. Let u be a neighbor of v with degree at least order of Θ1/p i. We denote u v j,i the event node v hears a message from neighbor u at a given iteration j of the for loop of phase i and u v,i the event node v hears a message from neighbor u at phase i. Thus, we have that: P u v j,i p i 1 p i dv 1 Thus, = P u v j,i Fact 1 p i e pidv 1 d v p 2 i = Θ 1 d v e Θ1 = Θ 1 d v 1 Θ 1 d v P u v,i k Θkdv 1 p 1 Θ i 1 1 Θ e Θk d v d v Thus, the probability that nodes having degree Θ1/p i do not receive a message from their neighbors with larger degree can be upper bounded as following: n Θ 1 e Θk 1 p i n Θ1 v V,d v=θ1/p i u Nv,d u>d v The last inequality holds for well chosen k = Θlog n. Thus, w.h.p., every node with degree order of 1/p i receives a message from each of its neighbors having a larger degree. We remark that we have implicitly assumed that for a node v with a degree order of 1/p i, there exist some neighbors having larger degree up to a constant. If this is not true, then from the initialization step in line 2, node v will decide that its local maximum degree is its own degree. Since the value d u sent by a node u is w.h.p. a constant approximation of u s degree, a simple verification shows that w.h.p., all nodes with a degree order of 1/p i succeeds computing their local maximum degree at phase i. This allows us to easily conclude that at the end of the algorithm, w.h.p., for every node v, v = Θ v. Since d v Θ for every node v, the time complexity is at most: Olog 2 n + Θlog i=1 Θlog k = Olog 2 n + k p i i=1 2 i = Olog 2 n + log n 2 log = Olog 2 n + log n
8 4 Applications 4.1 On simulating the message passing model The first application of the previous algorithms is on simulating the standard synchronous point-to-point message passing model on the graph-based radio model. This problem was first studied in [1]. Paraphrasing the introduction in [1], that study was motivated by the fact that whenever a type of communication mode emerges, new algorithms have to be developed for it for all standard network operations. Thus, simulation procedures could help to convert algorithms designed for networks with the same topology but different means of communication to algorithms for the new communication mode. In particular, since designing algorithms for radio networks from scratch turns to be a hard task, the simulation of algorithms for standard message-passing systems may prove to be a plausible approach. This motivation is still of interest since, compared to the advances gained by the research community in the classical message passing model, solving efficiently distributed tasks in a radio network model is still open for many fundamental problems. The work in [1] concentrated on round-by-round simulations where a separate phase of radio transmission is dedicated to simulate each single round of the original algorithm: in a single round of the original algorithm, it is assumed that each node can send a message to each neighbor. A general primitive called single-round simulation SRS as a building block is provided. The goal of this primitive is to ensure that every message passed by the original algorithm will be effectively transmitted and received during the simulation. We refer to this as the SRS problem. For the general message passing model where a node can send a different message to its neighbors at each pulse, a randomized distributed SRS algorithm with running time O 2 log n was given. For the so-called uniform message passing model where a node sends the same message to its neighbors at each pulse, the authors gave a randomized distributed SRS algorithm with O log n running time. The SRS algorithms in [1] use as a key parameter to schedule the sending probability of each node. Thus, these algorithms are impracticable in the unknown neighborhood model. By using our algorithms to compute an approximation of the local maximum degree of each node, and by locally using the computed value instead of, we can prove the following: Theorem 3. In the unknown neighborhood model, the nodes of any n-node graph can be initialized in O log n + log 2 n time so that the SRS problem can be solved w.h.p., for the uniform resp. general message passing model in O log n resp. O 2 log n time. Proof. First we consider a uniform point-to-point message passing algorithm A. For now let us assume that d v and v are known for each node v. Consider a round of A. To solve the SRS problem: each node v must send a message M v to all its neighbors during that round the message must be received by each neighbor. Consider the following SRS algorithm: each node v transmits message M v with probability 1/ v for r v rounds r v is to be fixed later.
9 Given a node v, let u v denote the event v hears the message M u in a single transmission round. Let u v denote the event v hears the message M u during the r v transmission rounds. Thus, we have: P u v = 1 u w N + v\{u} Using the fact that w N + v, w d v, we obtain 1 1 w P u v dv 1 Θ u d v u = P u v ru 1 ru 1 exp Θ Θ u u Hence, the probability that node u fails sending M u to at least one neighbor v satisfies P u v, v Nu P u v ru d u exp Θ u v Nu Thus by choosing r u = Θ u logd u n, node u succeeds sending M u to all its neighbors with probability at least 1 1/n Θ1. Thus, the SRS algorithm succeeds for all nodes with probability at least 1 1/n Θ1 n 1 1/n Θ1. Note that the constant hidden in the Θ notation when fixing r u is to be tuned carefully to obtain the w.h.p., property. In particular, a constant approximation value of u and d u affects r u by only a constant. Since algorithm LocalMaxDegree succeeds for all nodes w.h.p., it is not difficult to conclude that w.h.p., the SRS algorithm is successful for all nodes. Here, let us remark that the SRS algorithm has the nice property that sparse nodes are not penalized by dense regions, i.e., a node u terminates a SRS within r u = O u log n time. Now, let us consider the general point-to-point message passing model, i.e., at each round of the original algorithm, a node v can send a different message to each neighbor at most d v messages each round. It is easy to see that the previous SRS algorithm can be easily extended to this general case: each node v applies the previous SRS procedure each O v log n time period for each of the d v messages to be delivered. It is not difficult to prove that w.h.p., the messages are received within Od v v log n. However, this is not sufficient to guarantee the correctness of the SRS algorithm since a message sent from node u to node v can be received by another neighbor w of u. By concatenating nodes identifiers to messages, a node receiving a message can easily know if the message was for him. If unique identifiers are not available, then each node selects randomly an identifier from the { 1,, n O1}. Hence, it is easy to show that each node picks a unique identifier w.h.p. Then, each node sends its identifier to its neighbors using the uniform SRS procedure. Thus, w.h.p., in O log n time, each node can learn the identifiers of its neighbors.
10 Remark 1. In the correctness proof of algorithm LocalMaxDegree Theorem 2, we used the fact that nodes having a degree smaller than order of p i at a phase i have already finished computing their local maximum degree and so they are silent, i.e., only nodes having a degree larger than order of p i remain active and can transmit. This assumption is no longer true if the nodes begin running the simulation process described in Theorem 3 after terminating algorithm LocalMaxDegree. However, in our SRS procedure, each node v transmits with probability order of v. Thus, Equation 1 in the proof of Theorem 2 still holds when replacing p i by Θp i. The other inequalities given in Theorem 2 are then affected by only a constant and Theorem 2 still holds w.h.p. Corollary 1. Given a uniform resp. general point-to-point message passing algorithm A running on an n-node graph G in τ time τ = n O1, there exists a distributed algorithm that simulates w.h.p., A in the unknown neighborhood radio model in O log n τ + log 2 n time resp. O 2 log n τ + log 2 n time. Corollary 2. Consider a point-to-point message passing algorithm A running on an n-node graph G in τ time τ = n O1. Assume that at each round of algorithm A, each node sends the same message to a bounded number of neighbors and another message to the remaining neighbors. Then, there exists a distributed algorithm that simulates w.h.p., algorithm A in the unknown neighborhood radio model in O log n τ + log 2 n time. Consider for instance the local broadcasting problem where each node has to broadcast a message to its neighbors. Using the previous results it is straightforward that this problem can be solved w.h.p., in O log n + log 2 n time. This could be for instance compared with a randomized O log 3 n time protocol for the same problem in the SINR Signal-to-Interference-plus-Noise-Ratio radio model not the graph based model given recently in [8]. 4.2 On computing a coloring in unit disk graphs Node and edge coloring are one of the most important and fundamental tasks in distributed radio networks. In fact, coloring can be considered as a basic tool to initially organize unstructured wireless ad hoc and sensor networks. This is wellmotivated for instance by associating different colors with different time-slots in a time-division multiple access TDMA scheme. In the following paragraphs, we revised some coloring related problems in the unknown neighborhood model. Node coloring A correct node coloring is an assignment of a color to each node in the graph, such that any two adjacent nodes have different colors. In [10, 11], the authors provide an algorithm that produces w.h.p., a correct coloring with O colors in O log n time for unit disk graphs. That algorithm requires that is known to all nodes. In the conclusion of [10, 11], it was asked whether we can get rid of. Using our algorithms, we answer that question in the positive:
11 Proposition 1. In the unknown neighborhood model, there exists a distributed algorithm that produces w.h.p., a O node coloring within O log n + log 2 n time on any n-node unit disk graph. Proof Sketch. Due to lack of space, we only give the very general guidelines to prove the proposition. More specifically, we run the coloring algorithm of [10, 11] by using the approximated local maximum degree for each node instead of parameter. By carefully redefining the constants used in [10,11] according to our approximation factor, the reasoning used in [10, 11] can still be proved to hold w.h.p. In particular, we use some arguments from Remark 1 to ensure that the coloring process from [10, 11] does not interfere with the initialization step. One should however note that, at the same time and independently of our result [6], Schneider and Wattenhofer [12] came up with a new O + log 2 n time algorithm for -coloring without knowledge of. Partial strong edge coloring A correct edge coloring is an assignment of a color to each edge in the graph, such that any two adjacent edges have a different color. One can find many variants of the edge coloring problem. In particular, in [5], the authors considered the problem of computing a strong or a distance-2 edge coloring, that is the problem of assigning distinct colors to any pair of edges between which there is a path of length at most two. The algorithms described there are based on computing an approximate maximum strong matching by an algorithm originally described in [2]. Computing a strong maximum matching consists in computing a set, with maximum cardinality, of edges mutually at distance at least 2. In [5], it is proved that a O1-approximate solution to the strong maximum matching can be computed in Oρ log n time for unit disk graphs 1, where ρ denotes the time it takes to compute the active degree of each node. Following the same terminology than in [5], a node is said to be active in a given round if it decides to transmit. Then, the active degree of a node is the number of its neighbors that are active in the current round. Using our algorithms, we can show that ρ = Olog 2 n. Thus, we obtain the following: Proposition 2. In the unknown neighborhood model, there exists a distributed algorithm that produces w.h.p., a O1-approximate strong matching in Olog 3 n time on any n-node unit disk graph. 5 Conclusion In this paper, we have shown that computing in the unknown neighborhood model is up to a polylogarithmic factor similar to computing in the known neighborhood model. We have also shown that, for some distributed tasks, computing the local maximum degree of each node is sufficient to overcome the need to 1 In [5], it is also assumed that a node can hear collisions which is actually stronger than the assumptions of our model.
12 know the global parameter. Many open issues can however be investigated. For instance, although the correctness of our algorithms was proved analytically, it would be nice to give an experimental analysis and/or to study the impact of changing the values the constants used in our algorithms through simulation. Another interesting field of research is to derive new algorithms which are both time and energy efficient and to extend our algorithms to non graph based models and/or to multi-channel radio networks. References 1. Noga Alon, Amotz Bar-Noy, Nathan Linial, and David Peleg. On the complexity of radio communication. In 21 st annual ACM Symposium on Theory of computing STOC 89, pages , New York, NY, USA, ACM. 2. Hari Balakrishnan, Christopher L. Barrett, V. S. Anil Kumar, Madhav V. Marathe, and Shripad Thite. The distance-2 matching problem and its relationship to the mac-layer capacity of ad hoc wireless networks. IEEE Journal on Selected Areas in Communications, 226: , Reuven Bar-Yehuda, Oded Goldreich, and Alon Itai. Efficient emulation of singlehop radio network with collision detection on multi-hop radio network with no collision detection. In 3 rd International Workshop on Distributed Algorithms WDAG 89, DISC nowadays, pages 24 32, London, UK, Springer-Verlag. 4. Reuven Bar-Yehuda, Amos Israeli, and Alon Itai. Multiple communication in multihop radio networks. In 8 th ACM Symposium on Principles of distributed computing PODC 89, pages , Christopher L. Barrett, V. S. Anil Kumar, Madhav V. Marathe, Shripad Thite, and Gabriel Istrate. Strong edge coloring for channel assignment in wireless radio networks. In 4 th annual IEEE international conference on Pervasive Computing and Communications Workshops PERCOMW 06, page 106, Washington, DC, USA, IEEE Computer Society. 6. Bilel Derbel and El-Ghazali Talbi. Radio network distributed algorithms in the unknown neighborhood model. In Technical Report HAL, inria , RR- 6581, June Leszek Gasieniec, David Peleg, and Qin Xin. Faster communication in known topology radio networks. In 24 th symposium on principles of distributed computing PODC 05, pages ACM, Olga Goussevskaia, Thomas Moscibroda, and Roger Wattenhofer. Local Broadcasting in the Physical Interference Model. In International Workshop on Foundations of Mobile Computing DialM-POMC, Toronto, Canada, pages 35 44, August Michael Mitzenmacher and Eli Upfal. Probability and Computing, Randomized Algorithms and probabilistic analysis. Cambridge University Press, Thomas Moscibroda and Roger Wattenhofer. Coloring Unstructured Radio Networks. In 17 th ACM Symposium on Parallelism in Algorithms and Architectures SPAA 05, pages 39 48, July Thomas Moscibroda and Roger Wattenhofer. Coloring unstructured radio networks. Distributed Computing, 214: , Johannes Schneider and Roger Wattenhofer. Coloring unstructured wireless multi-hop networks. In 28 th Symposium on Principles of Distributed Computing PODC 09, pages , 2009.
Radio Network Clustering from Scratch
Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.
More informationOn Asynchronous Node Coloring in the SINR Model
On Asynchronous Node Coloring in the SINR Model Fabian Fuchs Institute of Theoretical Informatics Karlsruhe Institute of Technology Karlsruhe, Germany fabian.fuchs@kit.edu Abstract In this work we extend
More informationLocality Lower Bounds
Chapter 8 Locality Lower Bounds In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in log n + O(1) rounds. 8.1
More informationA Note on Node Coloring in the SINR Model
A Note on Node Coloring in the SINR Model Bilel Derbel, El-Ghazali Talbi To cite this version: Bilel Derbel, El-Ghazali Talbi. A Note on Node Coloring in the SINR Model. [Research Report] RR-7058, INRIA.
More informationA Faster Distributed Radio Broadcast Primitive (Extended Abstract)
A Faster Distributed Radio Broadcast Primitive (Extended Abstract Bernhard Haeupler Carnegie Mellon University haeupler@cs.cmu.edu David Wajc Carnegie Mellon University wajc@cs.cmu.edu ABSTRACT We present
More informationOn the Locality of Distributed Sparse Spanner Constructions
On the Locality of Distributed Sparse Spanner Constructions B. Derbel, C. Gavoille, D. Peleg, L. Viennot University of Lille University of Bordeaux Weizmann Institute INRIA, Paris PODC 2008 Toronto What
More informationEnergy-Efficient Size Approximation of Radio Networks with no Collision Detection
Energy-Efficient Size Approximation of Radio Networs with no Collision Detection Tomasz Jurdzińsi 12, Mirosław Kutyłowsi 3, and Jan Zatopiańsi 2 1 Institute of Computer Science, Technical University Chemnitz
More informationStructuring Unreliable Radio Networks
Structuring Unreliable Radio Networks Keren Censor-Hillel Seth Gilbert Fabian Kuhn Nancy Lynch Calvin Newport August 25, 2013 Abstract In this paper we study the problem of building a constant-degree connected
More informationComputing and Communicating Functions over Sensor Networks
Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]
More informationInitializing Newly Deployed Ad Hoc and Sensor Networks
Initializing Newly Deployed Ad Hoc and Sensor Networks Fabian Kuhn Computer Engineering and Networks Laboratory ETH Zurich, Switzerland kuhn@tikeeethzch Thomas Moscibroda Computer Engineering and Networks
More informationA Local Broadcast Layer for the SINR Network Model
A Local Broadcast Layer for the SINR Network Model Magnús M. Halldórsson mmh@ru.is Reykjavik University Stephan Holzer holzer@csail.mit.edu MIT Nancy Lynch lynch@csail.mit.edu MIT arxiv:505.0454v [cs.dc]
More informationShortest Link Scheduling with Power Control under Physical Interference Model
2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks Shortest Link Scheduling with Power Control under Physical Interference Model Peng-Jun Wan Xiaohua Xu Department of Computer Science
More informationThe mv-decomposition: definition and application to the distance-2 broadcast problem in multi-hops radio networks
The mv-decomposition: definition and application to the distance-2 broadcast problem in multi-hops radio networks Olivier Cogis, Benoît Darties, Sylvain Durand, Jean-Claude König, and Geneviève Simonet
More informationDeploying Wireless Networks with Beeps
Deploying Wireless Networks with Beeps Alejandro Cornejo 1 and Fabian Kuhn 2 1 Massachusetts Institute of Technology 2 University of Lugano Abstract. We present the discrete beeping communication model,
More informationGradient Clock Synchronization
Noname manuscript No. (will be inserted by the editor) Rui Fan Nancy Lynch Gradient Clock Synchronization the date of receipt and acceptance should be inserted later Abstract We introduce the distributed
More informationTrading Bit, Message, and Time Complexity of Distributed Algorithms
Trading Bit, Message, and Time Complexity of Distributed Algorithms Johannes Schneider, Roger Wattenhofer Computer Engineering and Networks Laboratory, ETH Zurich, 8092 Zurich, Switzerland Abstract We
More informationarxiv: v1 [cs.dc] 4 Oct 2018
Distributed Reconfiguration of Maximal Independent Sets Keren Censor-Hillel 1 and Mikael Rabie 2 1 Department of Computer Science, Technion, Israel, ckeren@cs.technion.ac.il 2 Aalto University, Helsinki,
More informationMaximal Independent Set
Lecture 5 Maximal Independent Set 5.1 The Problem Definition 5.1 (Independent Set). Given an undirected Graph G = (V, E), an independent set is a subset of nodes U V, such that no two nodes in U are adjacent.
More informationA Constant-Factor Approximation for Wireless Capacity Maximization with Power Control in the SINR Model
A Constant-Factor Approximation for Wireless Capacity Maximization with Power Control in the SINR Model Thomas Kesselheim October 17, 2010 Abstract In modern wireless networks devices are able to set the
More informationTopology Control with Limited Geometric Information
Topology Control with Limited Geometric Information Kevin Lillis and Sriram V. Pemmaraju Department of Computer Science The University of Iowa, Iowa City, IA 52242-1419, USA, [lillis, sriram]@cs.uiowa.edu
More informationClock Synchronization with Bounded Global and Local Skew
Clock Synchronization with ounded Global and Local Skew Distributed Computing Christoph Lenzen, ETH Zurich Thomas Locher, ETH Zurich Roger Wattenhofer, ETH Zurich October 2008 Motivation: No Global Clock
More informationOn Alarm Protocol in Wireless Sensor Networks
On Alarm Protocol in Wireless Sensor Networks Jacek Cichoń, Rafal Kapelko, Jakub Lemiesz, and Marcin Zawada Institute of Mathematics and Computer Science, Wrocław University of Technology, Poland Abstract.
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia
More informationDistributed Distance-Bounded Network Design Through Distributed Convex Programming
Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design
More informationOn the Complexity of Radio Communication
On the Complexity of Radio Communication Extended Abstract) Noga Alon Amotz Bar-Noy Nathan Linial David Peleg Abstract A radio network is a synchronous network of processors that communicate by transmitting
More informationarxiv: v1 [cs.dc] 22 May 2017
Symmetry Breaking in the Congest Model: Timeand Message-Efficient Algorithms for Ruling Sets Shreyas Pai, Gopal Pandurangan 2, Sriram V. Pemmaraju, Talal Riaz, and Peter Robinson 3 arxiv:705.0786v [cs.dc]
More informationOn improving matchings in trees, via bounded-length augmentations 1
On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical
More informationMaximizing Capacity with Power Control under Physical Interference Model in Simplex Mode
Maximizing Capacity with Power Control under Physical Interference Model in Simplex Mode Peng-Jun Wan, Chao Ma, Shaojie Tang, and Boliu Xu Illinois Institute of Technology, Chicago, IL 60616 Abstract.
More informationTime Synchronization
Massachusetts Institute of Technology Lecture 7 6.895: Advanced Distributed Algorithms March 6, 2006 Professor Nancy Lynch Time Synchronization Readings: Fan, Lynch. Gradient clock synchronization Attiya,
More informationMaximal Independent Set
Lecture 5 Maximal Independent Set The problem Definition 5.1 (Independent Set). Given an undirected Graph G = (V, E) an independent set is a subset of nodes U V, such that no two nodes in U are adjacent.
More informationDominating Set. Chapter 7
Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationCollision-free scheduling: Complexity of Interference Models
Collision-free scheduling: Complexity of Interference Models Anil Vullikanti Department of Computer Science, and Virginia Bioinformatics Institute, Virginia Tech Anil Vullikanti (Virginia Tech) 1/12 Link
More informationWeak Graph Colorings: Distributed Algorithms and Applications
Weak Graph Colorings: Distributed Algorithms and Applications Fabian Kuhn Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology Cambridge, MA 0139, USA fkuhn@csail.mit.edu
More informationHardness of MST Construction
Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what
More informationStone Age Distributed Computing
Stone Age Distributed Computing Yuval Emek Roger Wattenhofer Abstract A new model that depicts a network of randomized finite state machines operating in an asynchronous environment is introduced. This
More informationRadio communication in random graphs
Journal of Computer and System Sciences 72 (2006) 490 506 www.elsevier.com/locate/jcss Radio communication in random graphs R. Elsässer a,,1,l.garsieniec b a Department of Mathematics, University of California,
More informationA Local Broadcast Layer for the SINR Network Model
A Local Broadcast Layer for the SINR Network Model The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher
More informationdistributed approaches For Proportional and max-min fairness in random access ad-hoc networks
distributed approaches For Proportional and max-min fairness in random access ad-hoc networks Xin Wang, Koushik Kar Rensselaer Polytechnic Institute OUTline Introduction Motivation and System model Proportional
More informationChromatic number, clique subdivisions, and the conjectures of Hajós and Erdős-Fajtlowicz
Chromatic number, clique subdivisions, and the conjectures of Hajós and Erdős-Fajtlowicz Jacob Fox Choongbum Lee Benny Sudakov Abstract For a graph G, let χ(g) denote its chromatic number and σ(g) denote
More informationOn the Resilience and Uniqueness of CPA for Secure Broadcast
On the Resilience and Uniqueness of CPA for Secure Broadcast Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos and Dimitris Sakavalas School of Electrical and Computer Engineering National Technical
More informationThe Turán number of sparse spanning graphs
The Turán number of sparse spanning graphs Noga Alon Raphael Yuster Abstract For a graph H, the extremal number ex(n, H) is the maximum number of edges in a graph of order n not containing a subgraph isomorphic
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,
More informationA Note on Interference in Random Networks
CCCG 2012, Charlottetown, P.E.I., August 8 10, 2012 A Note on Interference in Random Networks Luc Devroye Pat Morin Abstract The (maximum receiver-centric) interference of a geometric graph (von Rickenbach
More informationarxiv: v2 [cs.ds] 5 Apr 2014
Simple, Fast and Deterministic Gossip and Rumor Spreading Bernhard Haeupler Microsoft Research haeupler@cs.cmu.edu arxiv:20.93v2 [cs.ds] 5 Apr 204 Abstract We study gossip algorithms for the rumor spreading
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationOptimal whitespace synchronization strategies
Optimal whitespace synchronization strategies Yossi Azar Ori Gurel-Gurevich Eyal Lubetzky Thomas Moscibroda Abstract The whitespace-discovery problem describes two parties, Alice and Bob, trying to establish
More informationEfficient routing in Poisson small-world networks
Efficient routing in Poisson small-world networks M. Draief and A. Ganesh Abstract In recent work, Jon Kleinberg considered a small-world network model consisting of a d-dimensional lattice augmented with
More informationWhat Can Be Approximated Locally? Case Study: Dominating Sets in Planar Graphs
What Can Be Approximated Locally? Case Study: Dominating Sets in Planar Graphs TIK Report Number 331 Christoph Lenzen, Yvonne Anne Oswald, Roger Wattenhofer Computer Engineering and Networks Laboratory
More informationWhat You Must Remember When Processing Data Words
What You Must Remember When Processing Data Words Michael Benedikt, Clemens Ley, and Gabriele Puppis Oxford University Computing Laboratory, Park Rd, Oxford OX13QD UK Abstract. We provide a Myhill-Nerode-like
More informationOn the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation
On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract
More informationDominating Set. Chapter 26
Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationDominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET
294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It
More informationInterference in Cellular Networks: The Minimum Membership Set Cover Problem
Interference in Cellular Networks: The Minimum Membership Set Cover Problem Fabian Kuhn 1, Pascal von Rickenbach 1, Roger Wattenhofer 1, Emo Welzl 2, and Aaron Zollinger 1 kuhn@tikeeethzch, pascalv@tikeeethzch,
More informationStructuring Unreliable Radio Networks
Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set
More informationThe concentration of the chromatic number of random graphs
The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2
More informationDistributed Deterministic Graph Coloring
Distributed Deterministic Graph Coloring Michael Elkin Ben-Gurion University + 1 The Model Unweighted undirected graph G = (V, E). Vertices host processors. Processors communicate over edges of G. Communication
More informationNotes 6 : First and second moment methods
Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative
More informationQueue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling
1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless
More informationBalanced Allocation Through Random Walk
Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.
More informationPacket Scheduling with Interference
Computer Science Computer Science Department Thomas Keßelheim Packet Scheduling with Interference Diploma Thesis January 3, 2009 Thesis advisor: Second advisor: Prof. Dr. Berthold Vöcking Prof. Dr. Petri
More informationRequest Satisfaction Problem in Synchronous Radio Networks
Request Satisfaction Problem in Synchronous Radio Networks Benoit Darties, Sylvain Durand, Jérôme Palaysi To cite this version: Benoit Darties, Sylvain Durand, Jérôme Palaysi. Request Satisfaction Problem
More informationAn Improved Approximation Algorithm for Virtual Private Network Design
An Improved Approximation Algorithm for Virtual Private Network Design Friedrich Eisenbrand Fabrizio Grandoni Abstract Virtual private network design deals with the reservation of capacities in a network,
More informationContention Resolution on a Fading Channel
Contention Resolution on a Fading Channel ABSTRACT Jeremy T. Fineman Georgetown University jfineman@cs.georgetown.edu Fabian Kuhn U. of Freiburg, Germany kuhn@cs.uni-freiburg.de In this paper, we study
More informationDominating Connectivity and Reliability of Heterogeneous Sensor Networks
Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Kenneth A. Berman Email: ken.berman@uc.edu Fred S. Annexstein Email: fred.annexstein@uc.edu Aravind Ranganathan Email: rangana@email.uc.edu
More informationDecomposing Broadcast Algorithms Using Abstract MAC Layers Majid Khabbazian, Dariusz Kowalski, Fabian Kuhn, and Nancy Lynch
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2011-010 February 23, 2011 Decomposing Broadcast Algorithms Using Abstract MAC Layers Majid Khabbazian, Dariusz Kowalski,
More informationPacking and decomposition of graphs with trees
Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.
More informationApproximation Algorithms for Computing Capacity of Wireless Networks with SINR constraints
Approximation Algorithms for Computing Capacity of Wireless Networks with SINR constraints Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marathe,, Srinivasan Parthasarathy and Aravind Srinivasan Department
More informationDistributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars
Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars Fu Hsing Wang 1 Jou Ming Chang 2 Yue Li Wang 1, 1 Department of Information Management, National Taiwan
More informationRumor Spreading and Vertex Expansion
Rumor Spreading and Vertex Expansion George Giakkoupis Thomas Sauerwald Abstract We study the relation between the rate at which rumors spread throughout a graph and the vertex expansion of the graph.
More informationII. THE TWO-WAY TWO-RELAY CHANNEL
An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable
More informationThe k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks
The k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks Douglas M. Blough Mauro Leoncini Giovanni Resta Paolo Santi Abstract Topology control, wherein nodes adjust
More informationRandomized Algorithms
Randomized Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours
More informationCapacity of a Two-way Function Multicast Channel
Capacity of a Two-way Function Multicast Channel 1 Seiyun Shin, Student Member, IEEE and Changho Suh, Member, IEEE Abstract We explore the role of interaction for the problem of reliable computation over
More informationLocal Approximation Algorithms for a Class of 0/1 Max-Min Linear Programs
Local Approximation Algorithms for a Class of 0/ Max-Min Linear Programs Patrik Floréen, Marja Hassinen, Petteri Kaski, and Jukka Suomela Helsinki Institute for Information Technology HIIT, Department
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationarxiv: v2 [cs.dc] 5 Apr 2012
Stone Age Distributed Computing Yuval Emek Jasmin Smula Roger Wattenhofer arxiv:1202.1186v2 [cs.dc] 5 Apr 2012 Computer Engineering and Networks Laboratory (TIK) ETH Zurich, Switzerland Abstract The traditional
More informationDetecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information
Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services wassim.znaidi@insa-lyon.fr
More informationHAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS
HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS Colin Cooper School of Mathematical Sciences, Polytechnic of North London, London, U.K. and Alan Frieze and Michael Molloy Department of Mathematics, Carnegie-Mellon
More informationNondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic
More informationCombining Shared Coin Algorithms
Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence
More informationarxiv: v1 [cs.dc] 27 Sep 2016
How to Elect a Low-energy Leader Yi-Jun Chang University of Michigan cyijun@umich.edu Tsvi Kopelowitz University of Michigan kopelot@gmail.com Seth Pettie University of Michigan pettie@umich.edu arxiv:1609.08486v1
More informationONE of the main applications of wireless sensor networks
2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main
More informationAsymptotics, asynchrony, and asymmetry in distributed consensus
DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex
More informationNew Lower Bounds for the CONGEST Model. Seri Khoury
New Lower Bounds for the CONGEST Model Seri Khoury New Lower Bounds for the CONGEST Model Research Thesis Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More informationA FRAMEWORK FOR UNCONDITIONALLY SECURE PUBLIC-KEY ENCRYPTION (WITH POSSIBLE DECRYPTION ERRORS)
A FRAMEWORK FOR UNCONDITIONALLY SECURE PUBLIC-KEY ENCRYPTION (WITH POSSIBLE DECRYPTION ERRORS) MARIYA BESSONOV, DIMA GRIGORIEV, AND VLADIMIR SHPILRAIN ABSTRACT. We offer a public-key encryption protocol
More informationDistributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks
Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,
More informationTesting that distributions are close
Tugkan Batu, Lance Fortnow, Ronitt Rubinfeld, Warren D. Smith, Patrick White May 26, 2010 Anat Ganor Introduction Goal Given two distributions over an n element set, we wish to check whether these distributions
More informationGossip algorithms for solving Laplacian systems
Gossip algorithms for solving Laplacian systems Anastasios Zouzias University of Toronto joint work with Nikolaos Freris (EPFL) Based on : 1.Fast Distributed Smoothing for Clock Synchronization (CDC 1).Randomized
More informationHow to beat a random walk with a clock?
Introduction Moody walk analysis R/A Conclusion How to beat a random walk with a clock? Locating a Target With an Agent Guided by Unreliable Local Advice Nicolas Hanusse 1 David Ilcinkas 1 Adrian Kosowski
More informationQuantum query complexity of entropy estimation
Quantum query complexity of entropy estimation Xiaodi Wu QuICS, University of Maryland MSR Redmond, July 19th, 2017 J o i n t C e n t e r f o r Quantum Information and Computer Science Outline Motivation
More informationLower Bounds for Testing Bipartiteness in Dense Graphs
Lower Bounds for Testing Bipartiteness in Dense Graphs Andrej Bogdanov Luca Trevisan Abstract We consider the problem of testing bipartiteness in the adjacency matrix model. The best known algorithm, due
More informationAn asymptotically tight bound on the adaptable chromatic number
An asymptotically tight bound on the adaptable chromatic number Michael Molloy and Giovanna Thron University of Toronto Department of Computer Science 0 King s College Road Toronto, ON, Canada, M5S 3G
More informationMulti-Dimensional Online Tracking
Multi-Dimensional Online Tracking Ke Yi and Qin Zhang Hong Kong University of Science & Technology SODA 2009 January 4-6, 2009 1-1 A natural problem Bob: tracker f(t) g(t) Alice: observer (t, g(t)) t 2-1
More informationFaster Johnson-Lindenstrauss style reductions
Faster Johnson-Lindenstrauss style reductions Aditya Menon August 23, 2007 Outline 1 Introduction Dimensionality reduction The Johnson-Lindenstrauss Lemma Speeding up computation 2 The Fast Johnson-Lindenstrauss
More informationUnderstanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks
1 Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Member, IEEE, Xiaojun Lin, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract
More informationPoly-logarithmic independence fools AC 0 circuits
Poly-logarithmic independence fools AC 0 circuits Mark Braverman Microsoft Research New England January 30, 2009 Abstract We prove that poly-sized AC 0 circuits cannot distinguish a poly-logarithmically
More informationLecture 4 Noisy Channel Coding
Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem
More informationMaximum-Weighted Subset of Communication Requests Schedulable without Spectral Splitting
Maximum-Weighted Subset of Communication Requests Schedulable without Spectral Splitting Peng-Jun Wan, Huaqiang Yuan, Xiaohua Jia, Jiliang Wang, and Zhu Wang School of Computer Science, Dongguan University
More information