The Expressiveness of Silence: Tight Bounds for Synchronous Communication of. Information Using Bits and Silence. Una-May O'Reilly and Nicola Santoro

Size: px
Start display at page:

Download "The Expressiveness of Silence: Tight Bounds for Synchronous Communication of. Information Using Bits and Silence. Una-May O'Reilly and Nicola Santoro"

Transcription

1 The Expressiveness of Silence: Tight Bounds for Synchronous Communication of Information Using Bits and Silence Una-May O'Reilly and Nicola Santoro School of Comper Science, Carleton University Ottawa, K1S 5B6, Canada Abstract. We establish worst-case and average-case lower bounds on the trade-o between the time and bit complexity for two-party communication in synchronous networs. We prove that the bounds are tight by presenting a protocol which has bit-time complexity matching the ones expressed by the lower bounds. We actually show that the algorithm is everywhere optimal: at any point of the trade-o and for any universe of data to be communicated, no other solion has better complexity to communicate any element of that universe (within a xed relabelling). Similar results are derived when transmissions are subject to corruptions. 1 Introduction A distribed system is a collection of processing entities (each with a local cloc and local memory) which communicate by transmitting bounded sequences of bits called messages. A fully synchronous system is a distribed system where the following two conditions hold: 1. all local clocs 'tic' simultaneously (although they might not sign the same time) and that the interval s between two consecive cloc tics is constant; 2. there exists a nown upper bound! on the transmission and queueing delays. Since! is nown a priori to all entities and all local clocs tic simultaneously, the unit of time can be redened so that transmission delays are unitary; that is, a message sent at cloc tic t to a neighbor will arrive and be processed there at cloc tic t + 1. Therefore, we can just consider unitary transmission delays witho any loss of generality. To avoid paradoxical situations, it is assumed that at any cloc tic only one message can be send to the same neighbor. A great deal of theoretical research is based on this synchronous distribed compation model. For example, on the election problem in a synchronous ring, alone, there are numerous results [4, 5, 6, 7, 8, 9, 11, 12, 13, 14]. In a fully synchronous system, the process of eciently and accurately communicating information along a lin obeys a set of rules, called the two-party communication (TPC) protocol; its choice can greatly aect the overall performance of the higher-level protocols employed in the system. Associated with any TPC protocol are two related cost measures: the total number of bits transmitted and the total number of cloc tics elapsed during the communication; the study of the two-party communication problem in synchronous networs is really the study of the trade-o between time and bits. Most of the research activities on this subject have been carried o within coding theory and have focused on determining, for the information

2 to be communicated, encoding-decoding schemes which satisfy some specic constraints (e.g., error- detection, error correction, etc.) or optimize some performance parameters (e.g., average number of bits, etc.). Related investigations include the study of transmitting sequences of bits over unreliable channels in synchronous systems (e.g., [1, 2]). It is worthwhile noting that, unlie their asynchronous counterpart, in fully distribed systems transmission of bits is not the only way of communicating information; for example, in a fault-free system, if no bit is received at local cloc time t + 1, then none was transmitted at cloc time t. Hence, absence of transmission, or silence, is detectable and can be used to convey information. In other words, while the transmission alphabet is binary (i.e., T = f0; 1g), in a fully synchronous networ the communication alphabet is ternary (i.e., C = f0; 1; silenceg). Moreover, it is possible to communicate any positive integer x transmitting less than dlog 3 xe bits by using more time; for example, it is well nown that any positive integer x can be communicated transmitting only two bits in time linear in x. The tradeo between time and bits is, unfortunately, not linear. For example, using only a constant > 2 number of bits, the time complexity can be reduced to sublinear; e.g., [10, 12]. Several solions have been presented each oering dierent trade-os. Unfortunately, previous to this wor, no lower-bounds were nown on the time-bit complexity maing it dicult to evaluate the eciency of the proposed solions. In this paper, we investigate the two-party communication problem when a bit can be transmitted in a time unit. The problem is studied both in fault-free networs and in networs where transmissions are subject to corruption; in both cases, we establish tight bounds on the trade-o between time and bit complexity. Following is a summary of the results; unless otherwise specied, they are established for both types of networs. 1. We establish lower-bounds on the trade-o between time and bit complexity both for the average and the worst case. The lower-bounds hold even when the universe of discourse (from which the information to be communicated is drawn) is nite; thus, they are also a lower-bound for the case of a (countable) innite universe. 2. We present a solion protocol and show that its complexity matches both the worst-case and the average-case lower-bounds. The protocol wors even when the information to be communicated is drawn from an innite (b countable) universe. 3. We prove the stronger result that our protocol is everywhere optimal: at any point of the trade-o and for any universe, no other solion has better complexity to communicate any element of that universe (within a xed relabelling) 4. The protocol for networs where transmissions are subject to corruptions can tolerate any number of faults. Note that results 1 and 2 above imply that the existence and nowledge of a bound on the size of the universe does not aect the bit-time trade-o. The paper is organized as follows. In the next section, basic denitions are presented and some existing protocols are described to provide the reader with an insight into the nature of the problem. In Section 3, two distinct lower bounds are established on the trade-o between time and bits, depending on whether or not the

3 transmission is reliable. In Section 4, for both cases, we present protocols for the two-party communication problem and prove that they are everywhere optimal. 2 Denitions And Previous Results The purpose of this section is to provide the basic denitions and introduce the terminology used in the paper. In addition, we also describe some of the existing protocols to provide the reader with an insight into the nature of the problem. 2.1 Basic Denitions Consider a synchronous system composed of two entities, called the sender and the receiver, connected by a direct lin; at each time unit, the sender can either transmit a bit or remain silent; a bit transmitted by the sender at time t will be received and processed by the receiver at time t + 1 (sender's time). A quantum of silence (or, simply, quantum) is the number of cloc tics between the transmission of two successive bit transmissions; the quantum is zero if the bits are sent at two consecive cloc tics. Given a countable (and possibly innite) universe U, the two-party communication problem for U (denoted by TPC(U)), is the problem of the sender communicating witho ambiguity to the receiver arbitrary elements of U using any combination of bit transmissions and silence. Since U is countable, we will assume witho loss of generality that U is a set of consecive integers starting from 0. Given a solion protocol A for TPC(U), let t(x) and b(x) denote the time and the number of bits requires by A to communicate x 2 U; the couple ht(x); b(x)i will be called the time-bits complexity of A for x. Let A(x; b) denote the time required by A to communicate x 2 U using at most b bits; that is, A(x; b) = t(x) if b b(x), A(x; b) = 1 otherwise. We can now dene time-bits worst-case optimality: Denition 1 Time-Bits Worst-Case Optimality. A solion protocol A is timebits worst-case optimal for U if for every solion protocol B and 8b 2 maxfa(x; b) : x 2 Ug maxfb(x; b) : x 2 Ug That is, a worst-case optimal algorithm is worst-case optimal at any point of the time-bit trade-o. Similarly, we can dene time-bits average-case optimality: Denition 2 Time-Bits Average-Case Optimality. A solion algorithm A is average-case optimal for U if for every solion protocol B and 8b 2 AvefA(x; b) : x 2 Ug AvefB(x; b) : x 2 Ug A much stronger notion of optimality is everywhere-optimality. Denition 3 Everywhere Optimality. A solion protocol A is everywhere optimal for U ior every solion protocol B and 8b 2, there exists a permation of the elements of U such that 8x 2 U : A(x; b) B((x); b)

4 In other words, for every choice of the number of transmitted bits, A requires no more time to communicate any element of U (within a relabelling) than any other solion algorithm. Obviously, everywhere optimality implies both worst-case and average-case time-bits optimality. Among all solion protocols, of particular interest are the ones which solve the two-party communication problem for every universe U (and are, thus, independent of U). Denition4 Universal Communicator. A protocol A is a universal communicator if it solves TPC(U) for every U. We consider two dierent versions of TPC(U) depending on whether transmissions are reliable or subject to corruption, and we denote them by R(U) and C(U), respectively. In R(U), transmissions are reliable and, thus, the value of the bits can be used to convey information. In C(U), transmissions are subject to corruption and, thus, the value of the received bits can not be relied upon by the protocol. A solion protocol for C(U) is therefore resilient to corruptions during transmission. Given a positive integer b 2 Z +, let R b (U) and C b (U) denote the restriction of R(U) and C(U), respectively, when exactly b bits are transmitted. In the following, b i will denote a bit and q i will denote a quantum; the subscript will specify the order in the communication. 2.2 Existing Protocols There exists a well nown solion protocol for C 2 (U): to communicate any x 2 U, the sender waits x time units between the transmission of the rst bit b 0 and second bit b 1 ; the receiver decodes the quantum of silence as x. The time-bits complexity is exactly hx; 2i. If the bits can be used to carry information (problem R 2 (U)) the quantum of silence can be reduced by a factor of four: the rst bit, b 0, is used to indicate whether x is odd; the second bit, b 1, is used to indicate whether w = b xc 2 is odd; the quantum waited is z = b w c. To obtain x the receiver simply compes 2 4z + 2b 1 + b 0 (here both bits are treated as integer values). This protocol has timebit complexity h x ; 2i and has been successfully employed to obtain a bit-optimal 4 election algorithm for ring networs of unnown size [3]. For the case b = 3, consider the following protocol for C 3 (U): to communicate x 2 U, the sender transmits b 0, waits q 1 = b p xc transmits b 1, waits q 2 = x? q1, 2 transmits b 2, where the value of the b i 's is arbitrary. To obtain x the receiver simply compes q1+q 2 2. Since x?b p xc 2 2b p xc, this protocol has time-bits complexity at most h3b p xc+3; 3i. In the case of R 3 (U), the rst bit, b 0, is used to indicate whether y = b p xc is odd; the second bit, b 2, is used to indicate whether z = x? b p xc 2 is odd; the third bit, b 3, is used to indicate whether w = b z c is odd. The two quanta 2 waited are q 0 = b y c and q 2 1 = b w c. To obtain x the receiver simply compes 2 (2q 0 + b 0 ) 2 + (4q 1 + 2b 1 + b 2 ) where the bits are treated as integer values. For example, if x = 7387, we have y = 85, z = 162 and w = 81; thus, the two quanta are q 0 = 42 and q 1 = 40 while the bits are b 0 = 1, b 1 = 0 and b 2 = 1. The reader can easily verify that the quantity (2q 0 + b 0 ) 2 + (4q 1 + 2b 1 + b 2 ) comped by the receiver is indeed x. Notice that q 0 = b y c = b bp xc c and, since z 2bp xc, then 2 2

5 = b w c = b b 2 z c c b p xc ; thus, this protocol has time-bits complexity at most hb p xc + 3; 3i (e.g., see [10]). A solion protocol for R b (U) can be obtained by extending the protocol for R 3 (U). For simplicity, let = b?1 be a power of two. Given x 2 U, the encoding E(x) E(x) = b 0 E(X 1 )b q 1 of x is dened recursively as follows: E(X i ) = E(X2i )b i E(X 2i+1 ) if 1 < i < quantum of length X i if i 2 where X i b b x 2 c c, X 2 2i = b p X i c, X 2i+1 = b X i?x 2 2i c, b 2 i = X 2i+1 mod 2 b = b xc mod 2 2. The encoded information to be communicated is then the sequence of bits and quanta dened by the recurrence relation dened above. For example, let x = 927 and = 4; the encoding is h1; 3; 0; 3; 0; 1; 0; 1; 1i where the quanta are denoted with a bar. To obtain x, the receiver will recursively compe X i = X2i 2 + (2X 2i+1 + b i ) until X 1 is determined; then, x = 4X 1 +2b +b 1. The protocol is provably correct. Exactly quanta will be used, and b = +1 bits will be transmitted. It is easy to verify that X 2i+1 b p X i c ; since X 2i = b p X i c by denition, it follows that each quantum is at most ( x) 1. Hence, the time complexity is at most ( x) 1 + b. 4 4 For the general case of b = + 1 bits ( quanta), a solion protocol for C b (U) has been recently proposed by Schmeltz, and it requires time x 1?2 + l.o.t. in the worst case [12]. 3 Lower Bounds In this section we establish lower-bounds on the time-bits trade-o for the two-party communication problem both in the worst and in the average case. The bounds are established when the universe U is nite; as will be shown in section 4, these bounds are tight even when U is countable b innite. We consider both versions of the problem, C and R; that is, when bit transmissions are subject to corruption and when transmission are fault-free, respectively. The bounds apply to any solion protocol, regardless of the schemes employed for encoding, transmitting and decoding. 3.1 Communication in Presence of Corruption If transmissions are subject to corruptions, the value of the received bits cannot be relied upon. Hence, the only meaningful information is whether or not a transmission occurs at a given time; obviously, the time before the rst transmission and after the last transmission cannot be used to convey information. Consider C b (U); i.e., the two-party communication problem for U using exactly b bit transmissions which are subject to corruption. Observe that b time units will be required by any solion algorithm for C b (U) to transmit the b bits; hence, the concern is on the amount of additional time required by the protocol. In the following, unless otherwise specied, \time" refers to \additional" time. Given a nite universe U, let c(u; b) denote the number of time units needed in the worst case to solve C b (U). To derive a bound on c(u; b), we will consider the dual problem of determining the size!(t; b) of the largest set U for which c( U ; b) t; that is, U is the largest set for which the two-party communication problem can

6 always be solved using b transmissions and at most t additional time units. Notice that, with b bit transmissions, it is only possible to distinguish = b? 1 quanta; hence, the dual problem can be rephrased as follows: Determine the largest positive integer n =!(t; b) such that every x 2 Z n = f0; 1; : : :; ng can be communicated using = b? 1 distinguished quanta whose total sum is at most t. This problem has an exact solion which will enable us to establish the desired bounds. Theorem 5.!(t; b) = t + Proof. Let n =!(t; b); by denition, it must be possible to communicate any element in Z n = f0; 1; : : :; ng using = b? 1 distinguished quanta requiring at most time t. In other words,!(t; + 1) is equal to the number of distinct -tuples ht 1 ; t 2 ; : : : ; t i of positive integers such that P 1i t i t. Given a positive integer x, let T [x] denote the number of compositions of x of size ; i.e.,. Since T [x] = x + X T [x] = jfhx 1 ; x 2 ; : : : ; xi : x j = x; x j 2 Z + gj, it follows that!(t; + 1) = X i T [i] = X i i + = t + which proves the theorem. Given two positive integers x and, let f(x; ) be the smallest integer t such that x!(t; + 1). Theorem 6 Worst Case Lower Bound. c(u; b) = f(juj; ); that is, any solion protocol for C +1 (U) requires f(juj; ) time units in the worst case. Proof. from Theorem 5. Theorem 7. Let f(juj; ) = t. For any solion protocol P for C +1 (U), there exists a partition of U into t + 1 disjoint subsets U 0 ; U 1 ; : : : ; U t such that 1. ju i j = i + ; 0 i < t; ju tj t + 2. the time P (x) required by P to communicate x 2 U i is P (x) i. Proof. Since f(juj; ) = t; by Theorem 5, U is the largest set for which the twoparty communication problem can always be solved using b = + 1 transmissions and at most t additional time units. Given a protocol P for C +1 (U), order the elements x 2 U according to the time P (x) required by P to communicate them; let U be the corresponding ordered set. Dene U i to be the subset composed of the elements of U whose raning, with respect to the ordering dened above, is in the range P 0j<i j + ; P 0ji j +. Since f(juj; ) = t, it follows

7 that j Ui j = i + for 0 i < t and j Ut t + j which proves part 1 of the Theorem. We will now show that, for every x 2 Ui ; P (x) i. By contradiction, let this not be the case. Let j t be the smallest index for which there exists an x 2 Ui such that P (x) < j. This implies that there exists a j0 < t such that jfx 2 U : P (x) = j0gj > j0 +. In other words, in protocol P, the number of elements which are uniquely identied using quanta for a total of j0 time is greater than the j0 + number T [j0] = compositions of j0 of size ; a clear contradiction. Hence, for every x 2 Ui ; P (x) i, proving part 2 of the theorem. Theorem8 Average Case Lower Bound. Any solion protocol for C +1 (U) requires tm + P 0i<t i i + time on the average where t = f(juj; ) and m = t(juj? P 0i<t i i + juj ). Proof. From Theorem Reliable Transmission If bit transmissions are error-free, the value of a received bit can be trusted. Consider R b (U); i.e., the two-party communication problem for U using only b bit transmissions in a fault-free system. As in C b (U), the time before the rst transmission and after the last transmission cannot be used to convey information, and the concern is on the amount of time in addition to the one needed for bit transmissions. Given a nite universe U, let r(u; b) denote the number of time units needed in the worst case to solve R b (U). To derive a bound on r(u; b), we will consider the dual problem of determining the size (t; b) of the largest set U for which r(u ; b) t; that is, U is the largest set for which the two-party communication problem can always be solved transmitting b bits and at most t additional time units. Since with b bit transmissions it is only possible to distinguish = b? 1 quanta, the dual problem can be rephrased as follows: Determine the largest positive integer n = (t; b) such that every x 2 Z n = f0; 1; : : :; ng can be communicated using b bits and = b? 1 distinguished quanta whose total sum is at most t. This problem has an exact solion which will enable us to establish the desired bounds. Theorem9. (t; b) = 2 +1 t +

8 Proof. The number of distinct assignment of values to +1 distinguished bits P is The number of distinct -tuples ht 1 ; t 2 ; ; t i of positive integers such that j t j t t + is!(t; b) (from 5). Therefore (t; b) = 2 +1!(t; b) = Given two positive integers x and, let (x; ) denote the smallest t such that x (t; + 1). Theorem 10 Worst Case Lower Bound. Any protocol for R +1 (U) requires (juj; ) time units in the worst case; that is, r(u; b) = (juj; ). Proof. By Theorem 9. Theorem 11. Let (juj; ) = t. For any solion protocol P for R +1 (U), there exists a partition of U into t + 1 disjoint subsets U 0 ; U 1 ; : : : ; U t, such that i + t + 1. ju i j = 2 +1 ; 0 i < t, and ju t j = the time P (x) required by P to communicate x 2 U i is P (x) i. Proof. Similar to Theorem 7. P Theorem 12 Average Case lower Bound. Any protocol for R +1 (U) requires on i i + the average time where t = (juj; ) t + Proof. By Theorem Upper Bounds In this section we present solion algorithms for the two versions of the two-party communication problem, C and R. These algorithms solve the problem even when the the universe U of information is innite. As will be shown later, their complexity matches the global lower-bounds for the problems. 4.1 P 1: An Everywhere Optimal Solion for C Given two -tuples q = hq 1 ; q 2 ; : : : ; q i and q0 = hq0 1 ; q0 2 ; : : : ; q0 i of positive integers, we say that q < q0 if q j = q0 j for 1 j < l, and q l < q0 l for some index l, 1 l +1. For a given, let V t be the ordered set of -tuples q = hq 1 ; q 2 ; : : :; q i where q P i 2 Z + and i q i t; that is V t [i] < V t [i + 1]. Obviously, the size of V t is t + t +. Any two integers t and P i, 1 i, uniquely identies a - tuple V t [i] = hq 1 ; q 2 ; : : : ; q i where i q P i t; conversely, any -tuple hq 1 ; q 2 ; : : : ; q i t + uniquely identies the integers t = i q i and i; 1 i, such that

9 V t [i] = hq 1 ; q 2 ; : : : ; q i. The solion algorithm, P 1, is described below; it comprises of an encoding scheme, a decoding scheme, and a communication protocol. The value X to be communicated will be encoded as a (2 + 1)-tuple hp 0 ; p 1 ; : : :; p 2 i, where the even elements p 0 ; p 2 ; : : : ; p 2 are arbitrary bits and the odd elements p 1 ; p 3 ; : : : ; p 2?1 form the -tuple corresponding to the X-th element of the set V f(x;) ; i.e., hp 1 ; p 3 ; : : :; p 2?1 i = V f(x;) [X]. Encoding Scheme: Given X and, 1. Let t be the smallest integer such that X t + ; i.e., t = f(x; ). 2. Determine V t [X] = hq 1 ; q 2 ; : : : ; q i 3. Set encoding(x) = hp 0 ; p 1 ; : : : ; p 2 i, where p 2i = b 2 f0; 1g and p 2i+1 = q i ; (0 i < ). Once the (2 + 1)-tuple hp 0 ; p 1 ; : : : ; p 2 i corresponding to the encoding of X has been determined, the actual communication can start. The encoded information is communicated as follows: the element p 2i = b 2 f0; 1g is transmitted and the element p 2i+1 = q i is communicated by waiting a quantum of silence of length q i. Once the last bit p 2 has been received, the receiving entity will reconstruct the (2 +1)-tuple hp 0 ; p 1 ; : : : ; p 2 i and apply to it the decoding scheme. Communication Protocol SEND(X): Compe encoding(x) = hp 0 ; p 1 ; : : : ; p 2 i for 0 i 2 if even(i) then transmit p i else wait p i time units endif endfor RECEIVE(Z): i := 0 receive(b) p 0 = b Repeat wait q until receive(b) p 2i+1 = q i := i + 1 p 2i = b Until i = Z = hp 0 ; p 1 ; : : : ; p 2 i Compe decoding(z) To decode hp 0 ; p 1 ; : : :; p 2 i, the receiver will extract the (+1)-tuple hq 1 ; q 2 ; : : : ; q i formed by the odd elements q i = p 2i+1 ; (0 i < ) and compe t = P i q i ; at this

10 point X, the communicated value, is the unique integer such that 1 X t + and V t [X] = hq 1 ; q 2 ; : : : ; q i. Decoding Scheme: Given Z = hp 0 ; p 1 ; : : : ; p 2 i and, 1. Let Y = hq 1 ; q 2 ; : : : ; q i where q i = p 2i+1 ; (0 i < ); let t = P i q i. 2. Find X such that V t [X] = Y. 3. Set decoding(z) = X. For a xed, let P 1(X) denote the amount of time required by algorithm P 1 to communicate integer X using bit transmissions. Recall (from Section 3) that f(x; ) is the smallest integer t such that x!(t; + 1). Lemma 13. For a xed, P 1(X) = f(x; ) for every integer X. Proof. By construction. Theorem 14. P 1 is worst-case optimal for every Z n = f0; 1; : : :; ng. Proof. By Lemma 13 and Theorem 6. Theorem 15. For a xed, P 1 is everywhere optimal for every Z n = f0; 1; : : :; ng. Proof. Given Z n, let t = h(n; ) be the smallest integer such that n!(t; + 1). Assume for simplicity that n = t +. Let S i = fx 2 Z n : P 1(x) = ig. By Lemma i + 13, for every x 2 Z n ; P 1(x) = h(x; ) t; hence, js i j = ; 0 i t. Recall that, by Theorem 6, for any solion algorithm A, there exists a partition i + of Z n into t + 1 disjoint subsets A 0 ; A 1 ; : : : ; A t such that ja i j = and A(x) i for every x 2 A i. Therefore, there exists a permation of Z n such that P 1(x) A((x)) for all x 2 Z n, proving the theorem. 4.2 P 2: An Everywhere Optimal Protocol for R t + Given, let W t be an ordered set of size 2 +1 where each element W t [i] is a distinct (2 + 1)-tuple p = hp 0 ; p 1 ; : : : ; p 2 i where p 2i 2 f0; 1g; p 2i+1 2 Z +, and Pi p 2i+1 t. The set is lexicographically ordered; that is, W t [i] < W t [i + 1] where hp 0 ; p 1 ; : : : ; p 2 i < hp0 0 ; p0 1 ; : : : ; p0 2 i if p j = p0 j for 1 j l and p l+1 < p0 l+1. A solion algorithm, P 2, is described below; it comprises of an encoding scheme, a decoding scheme, and uses the same communication protocol as P 1. Encoding Scheme: Given X and, 1. Let t be the smallest integer such that X 2 +1 t + ; i.e.,t = (X; ).

11 2. Find W t [X] = hp 0 ; p 1 ; : : : ; p 2 i 3. Set encoding(x) = W t [X]. Decoding Scheme: Given Z = hp 0 ; p 1 ; : : : ; p 2 i and, 1. Let Y = hq 1 ; q 2 ; : : : ; q i where q i = p 2i+1 (0 i < ); let t = P i q i. 2. Find X such that W t [X] = Y. 3. Set decoding(z) = X. Communication Protocol: same as in P 1 For a xed, let P 2(X) denote the amount of time required by algorithm P 1 to communicate integer X using bit transmissions. Recall (from Section 3) that (X; ) is the smallest integer t such that x (t; + 1). Lemma 16. For a xed, P 2(X) = (X; ) for every integer X. Corollary17. For a xed, P 2 is worst-case optimal for every Z n = f0; 1; : : :; ng Theorem18. For a xed, P 2 is everywhere optimal for every Z n = f0; 1; : : :; ng. The proofs of the above lemma and theorem are analogous to those presented in Section 4.1 and therefore are omitted here for brevity. 5 Conclusion We have presented an algorithm for two-party communication in synchronous networs which has bit-time complexity matching the ones expressed by the lower bounds. This algorithm (and the similar one derived when tranmissions are subject to corruption) has been shown to be everywhere optimal: at any point of the trade-o and for any universe of data to be communicated, no other solion has better complexity to communicate any element of that universe (within a xed relabelling). An extension of this algorithm, to extend its adequacy to a larger class of fault tolerant networs (e.g., noise and bit ommision), is desirable. Furthermore, an implication of this result is that ecient asynchronous to synchronous transforms may now be designed. This will lead to improvements on the complexity of existing synchronous solions and the establishment of bounds for problems for which no previous synchronous solion has existed. 6 Acnowledgements This wor has been supported in part by the Natural Sciences and Engineering Research Council of Canada. Ms. O'Reilly also acnowledges the support of Bell Northern Research Ltd.

12 References 1. Aho, A.V., Ullman, J.D., Yannaais, M., Modeling communication protocols by aomata, Proceedings of the 20th Symposium on Foundations of Comper Science (FOCS), Aho, A.V., Ullman, J.D., Wyner, A.D., Yannaais, M., Bounds on the size and transmission rate of communication protocols, Comper and Mathematics with Applications 8, (3), 1982, 205{ Bodlaender, H.L., Tel, G., Bit-Optimal election in synchronous rings, Tech. Rep. RUU- CS-89-2, Utrecht University, Fredericson, G., Lynch, N.A., The impact of synchronous communication on the problem of electing a leader on a ring, Proceedings of 16th Symposium on Theory of Comping (STOC), Fredericson G., Santoro, N., Symmetry breaing in synchronous networs, Proceedings AWOC '86, Springer Verlag Lecture Notes in Comper Science 227, 1986, Gafni, E., Improvements in the time complexity of two message-optimal election algorithms, Proceedings of 4th Conference on Principles of Distribed Comping (PODC), Itai, A., Rodeh, M., Symmetry breaing in synchronous networs, Proceedings of 22nd Symposium on Theory of Comping (STOC), 1981, van Leeuwen, J., Santoro, N., Urria, J., Zas, S., Guessing games and distribed compations in synchronous networs, Proceedings of 14th International Conference on Aomata, Languages and Programming (ICALP), Overmars, M., Santoro, N., Time vs bits: an improved algorithm for leader election in synchronous rings, Proceedings of 6th Symposium on Theoretical Aspects of Comper Science (STACS), Santoro, N., Comping with time: temporal dimensions in distribed comping, Proceedings of 28th Allerton Conference., Santoro, N., Rotem, D., On the complexity of distribed elections in synchronous graphs, Proceedings of11th Worshop on Graphs (WG), Schmeltz, B., Optimal Tradeos Between Time and Bit Complexity in Distribed Synchronous Rings, Proceedings of10th Symposium on Theoretical Aspects of Comper Science STACS, Spirais, P., Tampaas, B., Ecient distribed algorithms by using the Archimedean time assumption, Proceedings of 5th Symposium on Theoretical Aspects of Comper Science (STACS), Vitanyi, P., Distribed elections in an Archimedean ring of processors, Proceedings of 16th Symposium on Theory of Comping (STOC), This article was processed using the LaT E X macro pacage with LLNCS style

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report # Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine

More information

2. THE MAIN RESULTS In the following, we denote by the underlying order of the lattice and by the associated Mobius function. Further let z := fx 2 :

2. THE MAIN RESULTS In the following, we denote by the underlying order of the lattice and by the associated Mobius function. Further let z := fx 2 : COMMUNICATION COMLEITY IN LATTICES Rudolf Ahlswede, Ning Cai, and Ulrich Tamm Department of Mathematics University of Bielefeld.O. Box 100131 W-4800 Bielefeld Germany 1. INTRODUCTION Let denote a nite

More information

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139 Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Rachid Guerraoui Petr Kouznetsov Distributed Programming Laboratory EPFL Abstract Recent papers [7, 9] define the weakest failure detector

More information

Time-Space Trade-Os. For Undirected ST -Connectivity. on a JAG

Time-Space Trade-Os. For Undirected ST -Connectivity. on a JAG Time-Space Trade-Os For Undirected ST -Connectivity on a JAG Abstract Undirected st-connectivity is an important problem in computing. There are algorithms for this problem that use O (n) time and ones

More information

Flags of almost ane codes

Flags of almost ane codes Flags of almost ane codes Trygve Johnsen Hugues Verdure April 0, 207 Abstract We describe a two-party wire-tap channel of type II in the framework of almost ane codes. Its cryptological performance is

More information

Laboratoire Bordelais de Recherche en Informatique. Universite Bordeaux I, 351, cours de la Liberation,

Laboratoire Bordelais de Recherche en Informatique. Universite Bordeaux I, 351, cours de la Liberation, Laboratoire Bordelais de Recherche en Informatique Universite Bordeaux I, 351, cours de la Liberation, 33405 Talence Cedex, France Research Report RR-1145-96 On Dilation of Interval Routing by Cyril Gavoille

More information

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins. On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try

More information

GUESSING GAMES AND DISTRIBUTED COMPUTATIONS IN SYNCHRONOUS NETWORKS

GUESSING GAMES AND DISTRIBUTED COMPUTATIONS IN SYNCHRONOUS NETWORKS GUESSING GAMES AND DISTRIBUTED COMPUTATIONS IN SYNCHRONOUS NETWORKS (draft) J.E. van Leeuwen 1, N. Santoro 2, J. Urrutia 3, S. Zaks 4 1 Department of Computer Science, University of Utrecht, Utrecht, 3508

More information

Noisy channel communication

Noisy channel communication Information Theory http://www.inf.ed.ac.uk/teaching/courses/it/ Week 6 Communication channels and Information Some notes on the noisy channel setup: Iain Murray, 2012 School of Informatics, University

More information

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,

More information

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists

More information

for average case complexity 1 randomized reductions, an attempt to derive these notions from (more or less) rst

for average case complexity 1 randomized reductions, an attempt to derive these notions from (more or less) rst On the reduction theory for average case complexity 1 Andreas Blass 2 and Yuri Gurevich 3 Abstract. This is an attempt to simplify and justify the notions of deterministic and randomized reductions, an

More information

Fast Signature Generation with a. Fiat Shamir { Like Scheme. Fachbereich Mathematik / Informatik. Abstract

Fast Signature Generation with a. Fiat Shamir { Like Scheme. Fachbereich Mathematik / Informatik. Abstract Fast Signature Generation with a Fiat Shamir { Like Scheme H. Ong Deutsche Bank AG Stuttgarter Str. 16{24 D { 6236 Eschborn C.P. Schnorr Fachbereich Mathematik / Informatik Universitat Frankfurt Postfach

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

Alon Orlitsky. AT&T Bell Laboratories. March 22, Abstract

Alon Orlitsky. AT&T Bell Laboratories. March 22, Abstract Average-case interactive communication Alon Orlitsky AT&T Bell Laboratories March 22, 1996 Abstract and Y are random variables. Person P knows, Person P Y knows Y, and both know the joint probability distribution

More information

Circuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department

Circuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department Circuit depth relative to a random oracle Peter Bro Miltersen Aarhus University, Computer Science Department Ny Munkegade, DK 8000 Aarhus C, Denmark. pbmiltersen@daimi.aau.dk Keywords: Computational complexity,

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Analog Neural Nets with Gaussian or other Common. Noise Distributions cannot Recognize Arbitrary. Regular Languages.

Analog Neural Nets with Gaussian or other Common. Noise Distributions cannot Recognize Arbitrary. Regular Languages. Analog Neural Nets with Gaussian or other Common Noise Distributions cannot Recognize Arbitrary Regular Languages Wolfgang Maass Inst. for Theoretical Computer Science, Technische Universitat Graz Klosterwiesgasse

More information

A version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd

A version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd CDMTCS Research Report Series A Version of for which ZFC can not Predict a Single Bit Robert M. Solovay University of California at Berkeley CDMTCS-104 May 1999 Centre for Discrete Mathematics and Theoretical

More information

and combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc

and combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc On the representation of parallel search in theorem proving Maria Paola Bonacina Department of Computer Science { The University of Iowa Abstract This extended abstract summarizes two contributions from

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de

More information

Lecture 9 : PPAD and the Complexity of Equilibrium Computation. 1 Complexity Class PPAD. 1.1 What does PPAD mean?

Lecture 9 : PPAD and the Complexity of Equilibrium Computation. 1 Complexity Class PPAD. 1.1 What does PPAD mean? CS 599: Algorithmic Game Theory October 20, 2010 Lecture 9 : PPAD and the Complexity of Equilibrium Computation Prof. Xi Chen Scribes: Cheng Lu and Sasank Vijayan 1 Complexity Class PPAD 1.1 What does

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

Genuine atomic multicast in asynchronous distributed systems

Genuine atomic multicast in asynchronous distributed systems Theoretical Computer Science 254 (2001) 297 316 www.elsevier.com/locate/tcs Genuine atomic multicast in asynchronous distributed systems Rachid Guerraoui, Andre Schiper Departement d Informatique, Ecole

More information

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

Ma/CS 6b Class 24: Error Correcting Codes

Ma/CS 6b Class 24: Error Correcting Codes Ma/CS 6b Class 24: Error Correcting Codes By Adam Sheffer Communicating Over a Noisy Channel Problem. We wish to transmit a message which is composed of 0 s and 1 s, but noise might accidentally flip some

More information

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

protocols such as protocols in quantum cryptography and secret-key agreement by public discussion [8]. Before we formalize the main problem considered

protocols such as protocols in quantum cryptography and secret-key agreement by public discussion [8]. Before we formalize the main problem considered Privacy Amplication Secure Against Active Adversaries? Ueli Maurer Stefan Wolf Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich) CH-8092 Zurich, Switzerland E-mail addresses:

More information

Lecture 9: Cardinality. a n. 2 n 1 2 n. n=1. 0 x< 2 n : x = :a 1 a 2 a 3 a 4 :::: s n = s n n+1 x. 0; if 0 x<

Lecture 9: Cardinality. a n. 2 n 1 2 n. n=1. 0 x< 2 n : x = :a 1 a 2 a 3 a 4 :::: s n = s n n+1 x. 0; if 0 x< Lecture 9: Cardinality 9. Binary representations Suppose fa n g n= is a sequence such that, for each n =; 2; 3;:::, either a n =0ora n = and, for any integer N, there exists an integer n>n such that a

More information

LECTURE NOTES IN CRYPTOGRAPHY

LECTURE NOTES IN CRYPTOGRAPHY 1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic

More information

Hamming Codes 11/17/04

Hamming Codes 11/17/04 Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but

More information

Abstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced

Abstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced Primary Partition \Virtually-Synchronous Communication" harder than Consensus? Andre Schiper and Alain Sandoz Departement d'informatique Ecole Polytechnique Federale de Lausanne CH-1015 Lausanne (Switzerland)

More information

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Agreement Protocols CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Classification of Faults Based on components that failed Program

More information

Maximal Noise in Interactive Communication over Erasure Channels and Channels with Feedback

Maximal Noise in Interactive Communication over Erasure Channels and Channels with Feedback Maximal Noise in Interactive Communication over Erasure Channels and Channels with Feedback Klim Efremenko UC Berkeley klimefrem@gmail.com Ran Gelles Princeton University rgelles@cs.princeton.edu Bernhard

More information

Portland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which

Portland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which Beyond P NP = NEXP Stephen A. Fenner 1? and Lance J. Fortnow 2?? 1 University of Southern Maine, Department of Computer Science 96 Falmouth St., Portland, ME 04103, USA E-mail: fenner@usm.maine.edu, Fax:

More information

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol. Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Garrett: `Bernstein's analytic continuation of complex powers' 2 Let f be a polynomial in x 1 ; : : : ; x n with real coecients. For complex s, let f

Garrett: `Bernstein's analytic continuation of complex powers' 2 Let f be a polynomial in x 1 ; : : : ; x n with real coecients. For complex s, let f 1 Bernstein's analytic continuation of complex powers c1995, Paul Garrett, garrettmath.umn.edu version January 27, 1998 Analytic continuation of distributions Statement of the theorems on analytic continuation

More information

Chapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University

Chapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University Chapter 4 Data Transmission and Channel Capacity Po-Ning Chen, Professor Department of Communications Engineering National Chiao Tung University Hsin Chu, Taiwan 30050, R.O.C. Principle of Data Transmission

More information

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Viveck R. Cadambe EE Department, Pennsylvania State University, University Park, PA, USA viveck@engr.psu.edu Nancy Lynch

More information

Exact Quantum Amplitude Amplification for the Leader Election Problem

Exact Quantum Amplitude Amplification for the Leader Election Problem Exact Quantum Amplitude Amplification for the Leader Election Problem Seiichiro Tani tani@theory.brl.ntt.co.jp Hirotada Kobayashi hirotada@nii.ac.jp Keiji Matsumoto keiji@nii.ac.jp NTT Communication Science

More information

DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS

DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS JOEL BAKER Abstract. The goal of this expository paper is to introduce De Bruijn graphs and discuss their applications to fault tolerant

More information

CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES

CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES A.N. Trahtman? Bar-Ilan University, Dep. of Math. and St., 52900, Ramat Gan, Israel ICALP, Workshop synchr. autom., Turku, Finland, 2004 Abstract.

More information

to fast sorting algorithms of which the provable average run-time is of equal order of magnitude as the worst-case run-time, even though this average

to fast sorting algorithms of which the provable average run-time is of equal order of magnitude as the worst-case run-time, even though this average Average Case Complexity under the Universal Distribution Equals Worst Case Complexity Ming Li University of Waterloo, Department of Computer Science Waterloo, Ontario N2L 3G1, Canada aul M.B. Vitanyi Centrum

More information

Report on PIR with Low Storage Overhead

Report on PIR with Low Storage Overhead Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz

More information

9 Forward-backward algorithm, sum-product on factor graphs

9 Forward-backward algorithm, sum-product on factor graphs Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 9 Forward-backward algorithm, sum-product on factor graphs The previous

More information

Math 42, Discrete Mathematics

Math 42, Discrete Mathematics c Fall 2018 last updated 12/05/2018 at 15:47:21 For use by students in this class only; all rights reserved. Note: some prose & some tables are taken directly from Kenneth R. Rosen, and Its Applications,

More information

PERFECTLY secure key agreement has been studied recently

PERFECTLY secure key agreement has been studied recently IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract

More information

A Parallel Approximation Algorithm. for. Positive Linear Programming. mal values for the primal and dual problems are

A Parallel Approximation Algorithm. for. Positive Linear Programming. mal values for the primal and dual problems are A Parallel Approximation Algorithm for Positive Linear Programming Michael Luby Noam Nisan y Abstract We introduce a fast parallel approximation algorithm for the positive linear programming optimization

More information

DD2446 Complexity Theory: Problem Set 4

DD2446 Complexity Theory: Problem Set 4 DD2446 Complexity Theory: Problem Set 4 Due: Friday November 8, 2013, at 23:59. Submit your solutions as a PDF le by e-mail to jakobn at kth dot se with the subject line Problem set 4: your full name.

More information

LCNS, Vol 762, pp , Springer 1993

LCNS, Vol 762, pp , Springer 1993 On the Power of Reading and Writing Simultaneously in Parallel Compations? Rolf Niedermeier and Peter Rossmanith?? Fakultat fur Informatik, Technische Universitat Munchen Arcisstr. 21, 80290 Munchen, Fed.

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits

More information

Coset Decomposition Method for Decoding Linear Codes

Coset Decomposition Method for Decoding Linear Codes International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya

More information

Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model?

Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model? Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model? Jaap-Henk Hoepman Department of Computer Science, University of Twente, the Netherlands hoepman@cs.utwente.nl

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland. A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,

More information

8 (0,1,3,0,1) (3,0,1,3,0) 5 9 (1,3,0,1,3) (3,0,1,3,0) 6 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) leader

8 (0,1,3,0,1) (3,0,1,3,0) 5 9 (1,3,0,1,3) (3,0,1,3,0) 6 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) leader Deterministic, silence and self-stabilizing leader election algorithm on id-based ring Colette Johnen L.R.I./C.N.R.S., Universite de Paris-Sud Bat. 490, Campus d'orsay F-91405 Orsay Cedex, France. phone

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing-

7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing- 7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing- Constrained Systems, Proc. 4th Workshop Computer-Aided Verication, Lecture Notes in Computer Science 663, Springer-Verlag,

More information

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing

More information

A Graph Based Parsing Algorithm for Context-free Languages

A Graph Based Parsing Algorithm for Context-free Languages A Graph Based Parsing Algorithm for Context-free Languages Giinter Hot> Technical Report A 01/99 June 1999 e-mail: hotzocs.uni-sb.de VVVVVV: http://vwv-hotz.cs.uni-sb. de Abstract We present a simple algorithm

More information

On Equilibria of Distributed Message-Passing Games

On Equilibria of Distributed Message-Passing Games On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu

More information

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department of omputer and Information Science The Ohio State University olumbus, OH 43210 (email: fmanivann,singhalg@cis.ohio-state.edu)

More information

CS505: Distributed Systems

CS505: Distributed Systems Cristina Nita-Rotaru CS505: Distributed Systems. Required reading for this topic } Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson for "Impossibility of Distributed with One Faulty Process,

More information

Notes on Iterated Expectations Stephen Morris February 2002

Notes on Iterated Expectations Stephen Morris February 2002 Notes on Iterated Expectations Stephen Morris February 2002 1. Introduction Consider the following sequence of numbers. Individual 1's expectation of random variable X; individual 2's expectation of individual

More information

The Weighted Byzantine Agreement Problem

The Weighted Byzantine Agreement Problem The Weighted Byzantine Agreement Problem Vijay K. Garg and John Bridgman Department of Electrical and Computer Engineering The University of Texas at Austin Austin, TX 78712-1084, USA garg@ece.utexas.edu,

More information

Chapter 2 Source Models and Entropy. Any information-generating process can be viewed as. computer program in executed form: binary 0

Chapter 2 Source Models and Entropy. Any information-generating process can be viewed as. computer program in executed form: binary 0 Part II Information Theory Concepts Chapter 2 Source Models and Entropy Any information-generating process can be viewed as a source: { emitting a sequence of symbols { symbols from a nite alphabet text:

More information

Decidability of Existence and Construction of a Complement of a given function

Decidability of Existence and Construction of a Complement of a given function Decidability of Existence and Construction of a Complement of a given function Ka.Shrinivaasan, Chennai Mathematical Institute (CMI) (shrinivas@cmi.ac.in) April 28, 2011 Abstract This article denes a complement

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

5. Density evolution. Density evolution 5-1

5. Density evolution. Density evolution 5-1 5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;

More information

Combining Shared Coin Algorithms

Combining Shared Coin Algorithms Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence

More information

Dynamics and Quantum Channels

Dynamics and Quantum Channels Dynamics and Quantum Channels Konstantin Riedl Simon Mack 1 Dynamics and evolutions Discussing dynamics, one has to talk about time. In contrast to most other quantities, time is being treated classically.

More information

Consider the following general situation: let G and H be two sets (not. G H = f(g; h)j g 2 G; h 2 Hg:

Consider the following general situation: let G and H be two sets (not. G H = f(g; h)j g 2 G; h 2 Hg: Math 375 Week 8 1.1 (External) Direct Products Consider the following general situation: let G and H be two sets (not necessarily distinct). Consider the set of pairs G H = f(g; h)j g 2 G; h 2 Hg: This

More information

Variable Length Codes for Degraded Broadcast Channels

Variable Length Codes for Degraded Broadcast Channels Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates

More information

Time values are often denoted as positive real numbers including zero. We dene symbols to present the events of processes. Denition 2.2 l Let A be an

Time values are often denoted as positive real numbers including zero. We dene symbols to present the events of processes. Denition 2.2 l Let A be an A rocess Algebra for Optimization for arallel rograms Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610 Japan Tel: +81-3-5978-5388 Fax: +81-3-5978-5390

More information

Division of Trinomials by Pentanomials and Orthogonal Arrays

Division of Trinomials by Pentanomials and Orthogonal Arrays Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang

More information

2 Information transmission is typically corrupted by noise during transmission. Various strategies have been adopted for reducing or eliminating the n

2 Information transmission is typically corrupted by noise during transmission. Various strategies have been adopted for reducing or eliminating the n Finite size eects and error-free communication in Gaussian channels Ido Kanter and David Saad # Minerva Center and Department of Physics, Bar-Ilan University, Ramat-Gan 52900, Israel. # The Neural Computing

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

Great Theoretical Ideas in Computer Science

Great Theoretical Ideas in Computer Science 15-251 Great Theoretical Ideas in Computer Science Polynomials, Lagrange, and Error-correction Lecture 23 (November 10, 2009) P(X) = X 3 X 2 + + X 1 + Definition: Recall: Fields A field F is a set together

More information

On Reducing Linearizability to State Reachability 1

On Reducing Linearizability to State Reachability 1 On Reducing Linearizability to State Reachability 1 Ahmed Bouajjani a, Michael Emmi b, Constantin Enea a, Jad Hamza a a LIAFA, Université Paris Diderot b IMDEA Software Institute, Spain Abstract Ecient

More information

Asynchronous Models For Consensus

Asynchronous Models For Consensus Distributed Systems 600.437 Asynchronous Models for Consensus Department of Computer Science The Johns Hopkins University 1 Asynchronous Models For Consensus Lecture 5 Further reading: Distributed Algorithms

More information

Time Free Self-Stabilizing Local Failure Detection

Time Free Self-Stabilizing Local Failure Detection Research Report 33/2004, TU Wien, Institut für Technische Informatik July 6, 2004 Time Free Self-Stabilizing Local Failure Detection Martin Hutle and Josef Widder Embedded Computing Systems Group 182/2

More information

Computability and Complexity

Computability and Complexity Computability and Complexity Decidability, Undecidability and Reducibility; Codes, Algorithms and Languages CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario,

More information

Distributed Consensus

Distributed Consensus Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement

More information

1 Introduction It will be convenient to use the inx operators a b and a b to stand for maximum (least upper bound) and minimum (greatest lower bound)

1 Introduction It will be convenient to use the inx operators a b and a b to stand for maximum (least upper bound) and minimum (greatest lower bound) Cycle times and xed points of min-max functions Jeremy Gunawardena, Department of Computer Science, Stanford University, Stanford, CA 94305, USA. jeremy@cs.stanford.edu October 11, 1993 to appear in the

More information

Quantum Circuit Complexity 1. Andrew Chi-Chih Yao. Department of Computer Science. Abstract

Quantum Circuit Complexity 1. Andrew Chi-Chih Yao. Department of Computer Science. Abstract Quantum Circuit Complexity 1 Andrew Chi-Chih Yao Department of Computer Science Princeton University Princeton, New Jersey 08544 Abstract We study a complexity model of quantum circuits analogous to the

More information

THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS

THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS GÁBOR HORVÁTH, CHRYSTOPHER L. NEHANIV, AND KÁROLY PODOSKI Dedicated to John Rhodes on the occasion of his 80th birthday.

More information

In this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset

In this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset A Generalization of Shostak's Method for Combining Decision Procedures Clark W. Barrett, David L. Dill, and Aaron Stump Stanford University, Stanford, CA 94305, USA, http://verify.stanford.edu c Springer-Verlag

More information

Lecture 11: Polar codes construction

Lecture 11: Polar codes construction 15-859: Information Theory and Applications in TCS CMU: Spring 2013 Lecturer: Venkatesan Guruswami Lecture 11: Polar codes construction February 26, 2013 Scribe: Dan Stahlke 1 Polar codes: recap of last

More information

Analysis of a Randomized Local Search Algorithm for LDPCC Decoding Problem

Analysis of a Randomized Local Search Algorithm for LDPCC Decoding Problem Analysis of a Randomized Local Search Algorithm for LDPCC Decoding Problem Osamu Watanabe, Takeshi Sawai, and Hayato Takahashi Dept. of Mathematical and Computing Sciences, Tokyo Institute of Technology

More information

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8

17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8 Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................

More information

communicate directly), and the label associated by a node to an incident edges represent the the corresponding port number. If the entities of a syste

communicate directly), and the label associated by a node to an incident edges represent the the corresponding port number. If the entities of a syste Computing on Anonymous Networks with Sense of Direction Paola Flocchini y Alessandro Roncato z Nicola Santoro Abstract Sense of direction refers to a set of global consistency constraints of the local

More information