The Expressiveness of Silence: Tight Bounds for Synchronous Communication of. Information Using Bits and Silence. Una-May O'Reilly and Nicola Santoro
|
|
- Melvin Pitts
- 6 years ago
- Views:
Transcription
1 The Expressiveness of Silence: Tight Bounds for Synchronous Communication of Information Using Bits and Silence Una-May O'Reilly and Nicola Santoro School of Comper Science, Carleton University Ottawa, K1S 5B6, Canada Abstract. We establish worst-case and average-case lower bounds on the trade-o between the time and bit complexity for two-party communication in synchronous networs. We prove that the bounds are tight by presenting a protocol which has bit-time complexity matching the ones expressed by the lower bounds. We actually show that the algorithm is everywhere optimal: at any point of the trade-o and for any universe of data to be communicated, no other solion has better complexity to communicate any element of that universe (within a xed relabelling). Similar results are derived when transmissions are subject to corruptions. 1 Introduction A distribed system is a collection of processing entities (each with a local cloc and local memory) which communicate by transmitting bounded sequences of bits called messages. A fully synchronous system is a distribed system where the following two conditions hold: 1. all local clocs 'tic' simultaneously (although they might not sign the same time) and that the interval s between two consecive cloc tics is constant; 2. there exists a nown upper bound! on the transmission and queueing delays. Since! is nown a priori to all entities and all local clocs tic simultaneously, the unit of time can be redened so that transmission delays are unitary; that is, a message sent at cloc tic t to a neighbor will arrive and be processed there at cloc tic t + 1. Therefore, we can just consider unitary transmission delays witho any loss of generality. To avoid paradoxical situations, it is assumed that at any cloc tic only one message can be send to the same neighbor. A great deal of theoretical research is based on this synchronous distribed compation model. For example, on the election problem in a synchronous ring, alone, there are numerous results [4, 5, 6, 7, 8, 9, 11, 12, 13, 14]. In a fully synchronous system, the process of eciently and accurately communicating information along a lin obeys a set of rules, called the two-party communication (TPC) protocol; its choice can greatly aect the overall performance of the higher-level protocols employed in the system. Associated with any TPC protocol are two related cost measures: the total number of bits transmitted and the total number of cloc tics elapsed during the communication; the study of the two-party communication problem in synchronous networs is really the study of the trade-o between time and bits. Most of the research activities on this subject have been carried o within coding theory and have focused on determining, for the information
2 to be communicated, encoding-decoding schemes which satisfy some specic constraints (e.g., error- detection, error correction, etc.) or optimize some performance parameters (e.g., average number of bits, etc.). Related investigations include the study of transmitting sequences of bits over unreliable channels in synchronous systems (e.g., [1, 2]). It is worthwhile noting that, unlie their asynchronous counterpart, in fully distribed systems transmission of bits is not the only way of communicating information; for example, in a fault-free system, if no bit is received at local cloc time t + 1, then none was transmitted at cloc time t. Hence, absence of transmission, or silence, is detectable and can be used to convey information. In other words, while the transmission alphabet is binary (i.e., T = f0; 1g), in a fully synchronous networ the communication alphabet is ternary (i.e., C = f0; 1; silenceg). Moreover, it is possible to communicate any positive integer x transmitting less than dlog 3 xe bits by using more time; for example, it is well nown that any positive integer x can be communicated transmitting only two bits in time linear in x. The tradeo between time and bits is, unfortunately, not linear. For example, using only a constant > 2 number of bits, the time complexity can be reduced to sublinear; e.g., [10, 12]. Several solions have been presented each oering dierent trade-os. Unfortunately, previous to this wor, no lower-bounds were nown on the time-bit complexity maing it dicult to evaluate the eciency of the proposed solions. In this paper, we investigate the two-party communication problem when a bit can be transmitted in a time unit. The problem is studied both in fault-free networs and in networs where transmissions are subject to corruption; in both cases, we establish tight bounds on the trade-o between time and bit complexity. Following is a summary of the results; unless otherwise specied, they are established for both types of networs. 1. We establish lower-bounds on the trade-o between time and bit complexity both for the average and the worst case. The lower-bounds hold even when the universe of discourse (from which the information to be communicated is drawn) is nite; thus, they are also a lower-bound for the case of a (countable) innite universe. 2. We present a solion protocol and show that its complexity matches both the worst-case and the average-case lower-bounds. The protocol wors even when the information to be communicated is drawn from an innite (b countable) universe. 3. We prove the stronger result that our protocol is everywhere optimal: at any point of the trade-o and for any universe, no other solion has better complexity to communicate any element of that universe (within a xed relabelling) 4. The protocol for networs where transmissions are subject to corruptions can tolerate any number of faults. Note that results 1 and 2 above imply that the existence and nowledge of a bound on the size of the universe does not aect the bit-time trade-o. The paper is organized as follows. In the next section, basic denitions are presented and some existing protocols are described to provide the reader with an insight into the nature of the problem. In Section 3, two distinct lower bounds are established on the trade-o between time and bits, depending on whether or not the
3 transmission is reliable. In Section 4, for both cases, we present protocols for the two-party communication problem and prove that they are everywhere optimal. 2 Denitions And Previous Results The purpose of this section is to provide the basic denitions and introduce the terminology used in the paper. In addition, we also describe some of the existing protocols to provide the reader with an insight into the nature of the problem. 2.1 Basic Denitions Consider a synchronous system composed of two entities, called the sender and the receiver, connected by a direct lin; at each time unit, the sender can either transmit a bit or remain silent; a bit transmitted by the sender at time t will be received and processed by the receiver at time t + 1 (sender's time). A quantum of silence (or, simply, quantum) is the number of cloc tics between the transmission of two successive bit transmissions; the quantum is zero if the bits are sent at two consecive cloc tics. Given a countable (and possibly innite) universe U, the two-party communication problem for U (denoted by TPC(U)), is the problem of the sender communicating witho ambiguity to the receiver arbitrary elements of U using any combination of bit transmissions and silence. Since U is countable, we will assume witho loss of generality that U is a set of consecive integers starting from 0. Given a solion protocol A for TPC(U), let t(x) and b(x) denote the time and the number of bits requires by A to communicate x 2 U; the couple ht(x); b(x)i will be called the time-bits complexity of A for x. Let A(x; b) denote the time required by A to communicate x 2 U using at most b bits; that is, A(x; b) = t(x) if b b(x), A(x; b) = 1 otherwise. We can now dene time-bits worst-case optimality: Denition 1 Time-Bits Worst-Case Optimality. A solion protocol A is timebits worst-case optimal for U if for every solion protocol B and 8b 2 maxfa(x; b) : x 2 Ug maxfb(x; b) : x 2 Ug That is, a worst-case optimal algorithm is worst-case optimal at any point of the time-bit trade-o. Similarly, we can dene time-bits average-case optimality: Denition 2 Time-Bits Average-Case Optimality. A solion algorithm A is average-case optimal for U if for every solion protocol B and 8b 2 AvefA(x; b) : x 2 Ug AvefB(x; b) : x 2 Ug A much stronger notion of optimality is everywhere-optimality. Denition 3 Everywhere Optimality. A solion protocol A is everywhere optimal for U ior every solion protocol B and 8b 2, there exists a permation of the elements of U such that 8x 2 U : A(x; b) B((x); b)
4 In other words, for every choice of the number of transmitted bits, A requires no more time to communicate any element of U (within a relabelling) than any other solion algorithm. Obviously, everywhere optimality implies both worst-case and average-case time-bits optimality. Among all solion protocols, of particular interest are the ones which solve the two-party communication problem for every universe U (and are, thus, independent of U). Denition4 Universal Communicator. A protocol A is a universal communicator if it solves TPC(U) for every U. We consider two dierent versions of TPC(U) depending on whether transmissions are reliable or subject to corruption, and we denote them by R(U) and C(U), respectively. In R(U), transmissions are reliable and, thus, the value of the bits can be used to convey information. In C(U), transmissions are subject to corruption and, thus, the value of the received bits can not be relied upon by the protocol. A solion protocol for C(U) is therefore resilient to corruptions during transmission. Given a positive integer b 2 Z +, let R b (U) and C b (U) denote the restriction of R(U) and C(U), respectively, when exactly b bits are transmitted. In the following, b i will denote a bit and q i will denote a quantum; the subscript will specify the order in the communication. 2.2 Existing Protocols There exists a well nown solion protocol for C 2 (U): to communicate any x 2 U, the sender waits x time units between the transmission of the rst bit b 0 and second bit b 1 ; the receiver decodes the quantum of silence as x. The time-bits complexity is exactly hx; 2i. If the bits can be used to carry information (problem R 2 (U)) the quantum of silence can be reduced by a factor of four: the rst bit, b 0, is used to indicate whether x is odd; the second bit, b 1, is used to indicate whether w = b xc 2 is odd; the quantum waited is z = b w c. To obtain x the receiver simply compes 2 4z + 2b 1 + b 0 (here both bits are treated as integer values). This protocol has timebit complexity h x ; 2i and has been successfully employed to obtain a bit-optimal 4 election algorithm for ring networs of unnown size [3]. For the case b = 3, consider the following protocol for C 3 (U): to communicate x 2 U, the sender transmits b 0, waits q 1 = b p xc transmits b 1, waits q 2 = x? q1, 2 transmits b 2, where the value of the b i 's is arbitrary. To obtain x the receiver simply compes q1+q 2 2. Since x?b p xc 2 2b p xc, this protocol has time-bits complexity at most h3b p xc+3; 3i. In the case of R 3 (U), the rst bit, b 0, is used to indicate whether y = b p xc is odd; the second bit, b 2, is used to indicate whether z = x? b p xc 2 is odd; the third bit, b 3, is used to indicate whether w = b z c is odd. The two quanta 2 waited are q 0 = b y c and q 2 1 = b w c. To obtain x the receiver simply compes 2 (2q 0 + b 0 ) 2 + (4q 1 + 2b 1 + b 2 ) where the bits are treated as integer values. For example, if x = 7387, we have y = 85, z = 162 and w = 81; thus, the two quanta are q 0 = 42 and q 1 = 40 while the bits are b 0 = 1, b 1 = 0 and b 2 = 1. The reader can easily verify that the quantity (2q 0 + b 0 ) 2 + (4q 1 + 2b 1 + b 2 ) comped by the receiver is indeed x. Notice that q 0 = b y c = b bp xc c and, since z 2bp xc, then 2 2
5 = b w c = b b 2 z c c b p xc ; thus, this protocol has time-bits complexity at most hb p xc + 3; 3i (e.g., see [10]). A solion protocol for R b (U) can be obtained by extending the protocol for R 3 (U). For simplicity, let = b?1 be a power of two. Given x 2 U, the encoding E(x) E(x) = b 0 E(X 1 )b q 1 of x is dened recursively as follows: E(X i ) = E(X2i )b i E(X 2i+1 ) if 1 < i < quantum of length X i if i 2 where X i b b x 2 c c, X 2 2i = b p X i c, X 2i+1 = b X i?x 2 2i c, b 2 i = X 2i+1 mod 2 b = b xc mod 2 2. The encoded information to be communicated is then the sequence of bits and quanta dened by the recurrence relation dened above. For example, let x = 927 and = 4; the encoding is h1; 3; 0; 3; 0; 1; 0; 1; 1i where the quanta are denoted with a bar. To obtain x, the receiver will recursively compe X i = X2i 2 + (2X 2i+1 + b i ) until X 1 is determined; then, x = 4X 1 +2b +b 1. The protocol is provably correct. Exactly quanta will be used, and b = +1 bits will be transmitted. It is easy to verify that X 2i+1 b p X i c ; since X 2i = b p X i c by denition, it follows that each quantum is at most ( x) 1. Hence, the time complexity is at most ( x) 1 + b. 4 4 For the general case of b = + 1 bits ( quanta), a solion protocol for C b (U) has been recently proposed by Schmeltz, and it requires time x 1?2 + l.o.t. in the worst case [12]. 3 Lower Bounds In this section we establish lower-bounds on the time-bits trade-o for the two-party communication problem both in the worst and in the average case. The bounds are established when the universe U is nite; as will be shown in section 4, these bounds are tight even when U is countable b innite. We consider both versions of the problem, C and R; that is, when bit transmissions are subject to corruption and when transmission are fault-free, respectively. The bounds apply to any solion protocol, regardless of the schemes employed for encoding, transmitting and decoding. 3.1 Communication in Presence of Corruption If transmissions are subject to corruptions, the value of the received bits cannot be relied upon. Hence, the only meaningful information is whether or not a transmission occurs at a given time; obviously, the time before the rst transmission and after the last transmission cannot be used to convey information. Consider C b (U); i.e., the two-party communication problem for U using exactly b bit transmissions which are subject to corruption. Observe that b time units will be required by any solion algorithm for C b (U) to transmit the b bits; hence, the concern is on the amount of additional time required by the protocol. In the following, unless otherwise specied, \time" refers to \additional" time. Given a nite universe U, let c(u; b) denote the number of time units needed in the worst case to solve C b (U). To derive a bound on c(u; b), we will consider the dual problem of determining the size!(t; b) of the largest set U for which c( U ; b) t; that is, U is the largest set for which the two-party communication problem can
6 always be solved using b transmissions and at most t additional time units. Notice that, with b bit transmissions, it is only possible to distinguish = b? 1 quanta; hence, the dual problem can be rephrased as follows: Determine the largest positive integer n =!(t; b) such that every x 2 Z n = f0; 1; : : :; ng can be communicated using = b? 1 distinguished quanta whose total sum is at most t. This problem has an exact solion which will enable us to establish the desired bounds. Theorem 5.!(t; b) = t + Proof. Let n =!(t; b); by denition, it must be possible to communicate any element in Z n = f0; 1; : : :; ng using = b? 1 distinguished quanta requiring at most time t. In other words,!(t; + 1) is equal to the number of distinct -tuples ht 1 ; t 2 ; : : : ; t i of positive integers such that P 1i t i t. Given a positive integer x, let T [x] denote the number of compositions of x of size ; i.e.,. Since T [x] = x + X T [x] = jfhx 1 ; x 2 ; : : : ; xi : x j = x; x j 2 Z + gj, it follows that!(t; + 1) = X i T [i] = X i i + = t + which proves the theorem. Given two positive integers x and, let f(x; ) be the smallest integer t such that x!(t; + 1). Theorem 6 Worst Case Lower Bound. c(u; b) = f(juj; ); that is, any solion protocol for C +1 (U) requires f(juj; ) time units in the worst case. Proof. from Theorem 5. Theorem 7. Let f(juj; ) = t. For any solion protocol P for C +1 (U), there exists a partition of U into t + 1 disjoint subsets U 0 ; U 1 ; : : : ; U t such that 1. ju i j = i + ; 0 i < t; ju tj t + 2. the time P (x) required by P to communicate x 2 U i is P (x) i. Proof. Since f(juj; ) = t; by Theorem 5, U is the largest set for which the twoparty communication problem can always be solved using b = + 1 transmissions and at most t additional time units. Given a protocol P for C +1 (U), order the elements x 2 U according to the time P (x) required by P to communicate them; let U be the corresponding ordered set. Dene U i to be the subset composed of the elements of U whose raning, with respect to the ordering dened above, is in the range P 0j<i j + ; P 0ji j +. Since f(juj; ) = t, it follows
7 that j Ui j = i + for 0 i < t and j Ut t + j which proves part 1 of the Theorem. We will now show that, for every x 2 Ui ; P (x) i. By contradiction, let this not be the case. Let j t be the smallest index for which there exists an x 2 Ui such that P (x) < j. This implies that there exists a j0 < t such that jfx 2 U : P (x) = j0gj > j0 +. In other words, in protocol P, the number of elements which are uniquely identied using quanta for a total of j0 time is greater than the j0 + number T [j0] = compositions of j0 of size ; a clear contradiction. Hence, for every x 2 Ui ; P (x) i, proving part 2 of the theorem. Theorem8 Average Case Lower Bound. Any solion protocol for C +1 (U) requires tm + P 0i<t i i + time on the average where t = f(juj; ) and m = t(juj? P 0i<t i i + juj ). Proof. From Theorem Reliable Transmission If bit transmissions are error-free, the value of a received bit can be trusted. Consider R b (U); i.e., the two-party communication problem for U using only b bit transmissions in a fault-free system. As in C b (U), the time before the rst transmission and after the last transmission cannot be used to convey information, and the concern is on the amount of time in addition to the one needed for bit transmissions. Given a nite universe U, let r(u; b) denote the number of time units needed in the worst case to solve R b (U). To derive a bound on r(u; b), we will consider the dual problem of determining the size (t; b) of the largest set U for which r(u ; b) t; that is, U is the largest set for which the two-party communication problem can always be solved transmitting b bits and at most t additional time units. Since with b bit transmissions it is only possible to distinguish = b? 1 quanta, the dual problem can be rephrased as follows: Determine the largest positive integer n = (t; b) such that every x 2 Z n = f0; 1; : : :; ng can be communicated using b bits and = b? 1 distinguished quanta whose total sum is at most t. This problem has an exact solion which will enable us to establish the desired bounds. Theorem9. (t; b) = 2 +1 t +
8 Proof. The number of distinct assignment of values to +1 distinguished bits P is The number of distinct -tuples ht 1 ; t 2 ; ; t i of positive integers such that j t j t t + is!(t; b) (from 5). Therefore (t; b) = 2 +1!(t; b) = Given two positive integers x and, let (x; ) denote the smallest t such that x (t; + 1). Theorem 10 Worst Case Lower Bound. Any protocol for R +1 (U) requires (juj; ) time units in the worst case; that is, r(u; b) = (juj; ). Proof. By Theorem 9. Theorem 11. Let (juj; ) = t. For any solion protocol P for R +1 (U), there exists a partition of U into t + 1 disjoint subsets U 0 ; U 1 ; : : : ; U t, such that i + t + 1. ju i j = 2 +1 ; 0 i < t, and ju t j = the time P (x) required by P to communicate x 2 U i is P (x) i. Proof. Similar to Theorem 7. P Theorem 12 Average Case lower Bound. Any protocol for R +1 (U) requires on i i + the average time where t = (juj; ) t + Proof. By Theorem Upper Bounds In this section we present solion algorithms for the two versions of the two-party communication problem, C and R. These algorithms solve the problem even when the the universe U of information is innite. As will be shown later, their complexity matches the global lower-bounds for the problems. 4.1 P 1: An Everywhere Optimal Solion for C Given two -tuples q = hq 1 ; q 2 ; : : : ; q i and q0 = hq0 1 ; q0 2 ; : : : ; q0 i of positive integers, we say that q < q0 if q j = q0 j for 1 j < l, and q l < q0 l for some index l, 1 l +1. For a given, let V t be the ordered set of -tuples q = hq 1 ; q 2 ; : : :; q i where q P i 2 Z + and i q i t; that is V t [i] < V t [i + 1]. Obviously, the size of V t is t + t +. Any two integers t and P i, 1 i, uniquely identies a - tuple V t [i] = hq 1 ; q 2 ; : : : ; q i where i q P i t; conversely, any -tuple hq 1 ; q 2 ; : : : ; q i t + uniquely identies the integers t = i q i and i; 1 i, such that
9 V t [i] = hq 1 ; q 2 ; : : : ; q i. The solion algorithm, P 1, is described below; it comprises of an encoding scheme, a decoding scheme, and a communication protocol. The value X to be communicated will be encoded as a (2 + 1)-tuple hp 0 ; p 1 ; : : :; p 2 i, where the even elements p 0 ; p 2 ; : : : ; p 2 are arbitrary bits and the odd elements p 1 ; p 3 ; : : : ; p 2?1 form the -tuple corresponding to the X-th element of the set V f(x;) ; i.e., hp 1 ; p 3 ; : : :; p 2?1 i = V f(x;) [X]. Encoding Scheme: Given X and, 1. Let t be the smallest integer such that X t + ; i.e., t = f(x; ). 2. Determine V t [X] = hq 1 ; q 2 ; : : : ; q i 3. Set encoding(x) = hp 0 ; p 1 ; : : : ; p 2 i, where p 2i = b 2 f0; 1g and p 2i+1 = q i ; (0 i < ). Once the (2 + 1)-tuple hp 0 ; p 1 ; : : : ; p 2 i corresponding to the encoding of X has been determined, the actual communication can start. The encoded information is communicated as follows: the element p 2i = b 2 f0; 1g is transmitted and the element p 2i+1 = q i is communicated by waiting a quantum of silence of length q i. Once the last bit p 2 has been received, the receiving entity will reconstruct the (2 +1)-tuple hp 0 ; p 1 ; : : : ; p 2 i and apply to it the decoding scheme. Communication Protocol SEND(X): Compe encoding(x) = hp 0 ; p 1 ; : : : ; p 2 i for 0 i 2 if even(i) then transmit p i else wait p i time units endif endfor RECEIVE(Z): i := 0 receive(b) p 0 = b Repeat wait q until receive(b) p 2i+1 = q i := i + 1 p 2i = b Until i = Z = hp 0 ; p 1 ; : : : ; p 2 i Compe decoding(z) To decode hp 0 ; p 1 ; : : :; p 2 i, the receiver will extract the (+1)-tuple hq 1 ; q 2 ; : : : ; q i formed by the odd elements q i = p 2i+1 ; (0 i < ) and compe t = P i q i ; at this
10 point X, the communicated value, is the unique integer such that 1 X t + and V t [X] = hq 1 ; q 2 ; : : : ; q i. Decoding Scheme: Given Z = hp 0 ; p 1 ; : : : ; p 2 i and, 1. Let Y = hq 1 ; q 2 ; : : : ; q i where q i = p 2i+1 ; (0 i < ); let t = P i q i. 2. Find X such that V t [X] = Y. 3. Set decoding(z) = X. For a xed, let P 1(X) denote the amount of time required by algorithm P 1 to communicate integer X using bit transmissions. Recall (from Section 3) that f(x; ) is the smallest integer t such that x!(t; + 1). Lemma 13. For a xed, P 1(X) = f(x; ) for every integer X. Proof. By construction. Theorem 14. P 1 is worst-case optimal for every Z n = f0; 1; : : :; ng. Proof. By Lemma 13 and Theorem 6. Theorem 15. For a xed, P 1 is everywhere optimal for every Z n = f0; 1; : : :; ng. Proof. Given Z n, let t = h(n; ) be the smallest integer such that n!(t; + 1). Assume for simplicity that n = t +. Let S i = fx 2 Z n : P 1(x) = ig. By Lemma i + 13, for every x 2 Z n ; P 1(x) = h(x; ) t; hence, js i j = ; 0 i t. Recall that, by Theorem 6, for any solion algorithm A, there exists a partition i + of Z n into t + 1 disjoint subsets A 0 ; A 1 ; : : : ; A t such that ja i j = and A(x) i for every x 2 A i. Therefore, there exists a permation of Z n such that P 1(x) A((x)) for all x 2 Z n, proving the theorem. 4.2 P 2: An Everywhere Optimal Protocol for R t + Given, let W t be an ordered set of size 2 +1 where each element W t [i] is a distinct (2 + 1)-tuple p = hp 0 ; p 1 ; : : : ; p 2 i where p 2i 2 f0; 1g; p 2i+1 2 Z +, and Pi p 2i+1 t. The set is lexicographically ordered; that is, W t [i] < W t [i + 1] where hp 0 ; p 1 ; : : : ; p 2 i < hp0 0 ; p0 1 ; : : : ; p0 2 i if p j = p0 j for 1 j l and p l+1 < p0 l+1. A solion algorithm, P 2, is described below; it comprises of an encoding scheme, a decoding scheme, and uses the same communication protocol as P 1. Encoding Scheme: Given X and, 1. Let t be the smallest integer such that X 2 +1 t + ; i.e.,t = (X; ).
11 2. Find W t [X] = hp 0 ; p 1 ; : : : ; p 2 i 3. Set encoding(x) = W t [X]. Decoding Scheme: Given Z = hp 0 ; p 1 ; : : : ; p 2 i and, 1. Let Y = hq 1 ; q 2 ; : : : ; q i where q i = p 2i+1 (0 i < ); let t = P i q i. 2. Find X such that W t [X] = Y. 3. Set decoding(z) = X. Communication Protocol: same as in P 1 For a xed, let P 2(X) denote the amount of time required by algorithm P 1 to communicate integer X using bit transmissions. Recall (from Section 3) that (X; ) is the smallest integer t such that x (t; + 1). Lemma 16. For a xed, P 2(X) = (X; ) for every integer X. Corollary17. For a xed, P 2 is worst-case optimal for every Z n = f0; 1; : : :; ng Theorem18. For a xed, P 2 is everywhere optimal for every Z n = f0; 1; : : :; ng. The proofs of the above lemma and theorem are analogous to those presented in Section 4.1 and therefore are omitted here for brevity. 5 Conclusion We have presented an algorithm for two-party communication in synchronous networs which has bit-time complexity matching the ones expressed by the lower bounds. This algorithm (and the similar one derived when tranmissions are subject to corruption) has been shown to be everywhere optimal: at any point of the trade-o and for any universe of data to be communicated, no other solion has better complexity to communicate any element of that universe (within a xed relabelling). An extension of this algorithm, to extend its adequacy to a larger class of fault tolerant networs (e.g., noise and bit ommision), is desirable. Furthermore, an implication of this result is that ecient asynchronous to synchronous transforms may now be designed. This will lead to improvements on the complexity of existing synchronous solions and the establishment of bounds for problems for which no previous synchronous solion has existed. 6 Acnowledgements This wor has been supported in part by the Natural Sciences and Engineering Research Council of Canada. Ms. O'Reilly also acnowledges the support of Bell Northern Research Ltd.
12 References 1. Aho, A.V., Ullman, J.D., Yannaais, M., Modeling communication protocols by aomata, Proceedings of the 20th Symposium on Foundations of Comper Science (FOCS), Aho, A.V., Ullman, J.D., Wyner, A.D., Yannaais, M., Bounds on the size and transmission rate of communication protocols, Comper and Mathematics with Applications 8, (3), 1982, 205{ Bodlaender, H.L., Tel, G., Bit-Optimal election in synchronous rings, Tech. Rep. RUU- CS-89-2, Utrecht University, Fredericson, G., Lynch, N.A., The impact of synchronous communication on the problem of electing a leader on a ring, Proceedings of 16th Symposium on Theory of Comping (STOC), Fredericson G., Santoro, N., Symmetry breaing in synchronous networs, Proceedings AWOC '86, Springer Verlag Lecture Notes in Comper Science 227, 1986, Gafni, E., Improvements in the time complexity of two message-optimal election algorithms, Proceedings of 4th Conference on Principles of Distribed Comping (PODC), Itai, A., Rodeh, M., Symmetry breaing in synchronous networs, Proceedings of 22nd Symposium on Theory of Comping (STOC), 1981, van Leeuwen, J., Santoro, N., Urria, J., Zas, S., Guessing games and distribed compations in synchronous networs, Proceedings of 14th International Conference on Aomata, Languages and Programming (ICALP), Overmars, M., Santoro, N., Time vs bits: an improved algorithm for leader election in synchronous rings, Proceedings of 6th Symposium on Theoretical Aspects of Comper Science (STACS), Santoro, N., Comping with time: temporal dimensions in distribed comping, Proceedings of 28th Allerton Conference., Santoro, N., Rotem, D., On the complexity of distribed elections in synchronous graphs, Proceedings of11th Worshop on Graphs (WG), Schmeltz, B., Optimal Tradeos Between Time and Bit Complexity in Distribed Synchronous Rings, Proceedings of10th Symposium on Theoretical Aspects of Comper Science STACS, Spirais, P., Tampaas, B., Ecient distribed algorithms by using the Archimedean time assumption, Proceedings of 5th Symposium on Theoretical Aspects of Comper Science (STACS), Vitanyi, P., Distribed elections in an Archimedean ring of processors, Proceedings of 16th Symposium on Theory of Comping (STOC), This article was processed using the LaT E X macro pacage with LLNCS style
Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #
Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine
More information2. THE MAIN RESULTS In the following, we denote by the underlying order of the lattice and by the associated Mobius function. Further let z := fx 2 :
COMMUNICATION COMLEITY IN LATTICES Rudolf Ahlswede, Ning Cai, and Ulrich Tamm Department of Mathematics University of Bielefeld.O. Box 100131 W-4800 Bielefeld Germany 1. INTRODUCTION Let denote a nite
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationFinally the Weakest Failure Detector for Non-Blocking Atomic Commit
Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Rachid Guerraoui Petr Kouznetsov Distributed Programming Laboratory EPFL Abstract Recent papers [7, 9] define the weakest failure detector
More informationTime-Space Trade-Os. For Undirected ST -Connectivity. on a JAG
Time-Space Trade-Os For Undirected ST -Connectivity on a JAG Abstract Undirected st-connectivity is an important problem in computing. There are algorithms for this problem that use O (n) time and ones
More informationFlags of almost ane codes
Flags of almost ane codes Trygve Johnsen Hugues Verdure April 0, 207 Abstract We describe a two-party wire-tap channel of type II in the framework of almost ane codes. Its cryptological performance is
More informationLaboratoire Bordelais de Recherche en Informatique. Universite Bordeaux I, 351, cours de la Liberation,
Laboratoire Bordelais de Recherche en Informatique Universite Bordeaux I, 351, cours de la Liberation, 33405 Talence Cedex, France Research Report RR-1145-96 On Dilation of Interval Routing by Cyril Gavoille
More informationOn-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.
On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try
More informationGUESSING GAMES AND DISTRIBUTED COMPUTATIONS IN SYNCHRONOUS NETWORKS
GUESSING GAMES AND DISTRIBUTED COMPUTATIONS IN SYNCHRONOUS NETWORKS (draft) J.E. van Leeuwen 1, N. Santoro 2, J. Urrutia 3, S. Zaks 4 1 Department of Computer Science, University of Utrecht, Utrecht, 3508
More informationNoisy channel communication
Information Theory http://www.inf.ed.ac.uk/teaching/courses/it/ Week 6 Communication channels and Information Some notes on the noisy channel setup: Iain Murray, 2012 School of Informatics, University
More informationNetwork Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,
More informationWell known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne
Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,
More informationPreface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques
Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists
More informationfor average case complexity 1 randomized reductions, an attempt to derive these notions from (more or less) rst
On the reduction theory for average case complexity 1 Andreas Blass 2 and Yuri Gurevich 3 Abstract. This is an attempt to simplify and justify the notions of deterministic and randomized reductions, an
More informationFast Signature Generation with a. Fiat Shamir { Like Scheme. Fachbereich Mathematik / Informatik. Abstract
Fast Signature Generation with a Fiat Shamir { Like Scheme H. Ong Deutsche Bank AG Stuttgarter Str. 16{24 D { 6236 Eschborn C.P. Schnorr Fachbereich Mathematik / Informatik Universitat Frankfurt Postfach
More informationMATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9
Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received
More informationAlon Orlitsky. AT&T Bell Laboratories. March 22, Abstract
Average-case interactive communication Alon Orlitsky AT&T Bell Laboratories March 22, 1996 Abstract and Y are random variables. Person P knows, Person P Y knows Y, and both know the joint probability distribution
More informationCircuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department
Circuit depth relative to a random oracle Peter Bro Miltersen Aarhus University, Computer Science Department Ny Munkegade, DK 8000 Aarhus C, Denmark. pbmiltersen@daimi.aau.dk Keywords: Computational complexity,
More information3. Coding theory 3.1. Basic concepts
3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,
More informationAnalog Neural Nets with Gaussian or other Common. Noise Distributions cannot Recognize Arbitrary. Regular Languages.
Analog Neural Nets with Gaussian or other Common Noise Distributions cannot Recognize Arbitrary Regular Languages Wolfgang Maass Inst. for Theoretical Computer Science, Technische Universitat Graz Klosterwiesgasse
More informationA version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd
CDMTCS Research Report Series A Version of for which ZFC can not Predict a Single Bit Robert M. Solovay University of California at Berkeley CDMTCS-104 May 1999 Centre for Discrete Mathematics and Theoretical
More informationand combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc
On the representation of parallel search in theorem proving Maria Paola Bonacina Department of Computer Science { The University of Iowa Abstract This extended abstract summarizes two contributions from
More informationRepresentation of Correlated Sources into Graphs for Transmission over Broadcast Channels
Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu
More information1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori
Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de
More informationLecture 9 : PPAD and the Complexity of Equilibrium Computation. 1 Complexity Class PPAD. 1.1 What does PPAD mean?
CS 599: Algorithmic Game Theory October 20, 2010 Lecture 9 : PPAD and the Complexity of Equilibrium Computation Prof. Xi Chen Scribes: Cheng Lu and Sasank Vijayan 1 Complexity Class PPAD 1.1 What does
More informationEE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes
EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check
More informationGenuine atomic multicast in asynchronous distributed systems
Theoretical Computer Science 254 (2001) 297 316 www.elsevier.com/locate/tcs Genuine atomic multicast in asynchronous distributed systems Rachid Guerraoui, Andre Schiper Departement d Informatique, Ecole
More informationPartitions and Covers
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw
More informationMa/CS 6b Class 24: Error Correcting Codes
Ma/CS 6b Class 24: Error Correcting Codes By Adam Sheffer Communicating Over a Noisy Channel Problem. We wish to transmit a message which is composed of 0 s and 1 s, but noise might accidentally flip some
More informationOn Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus
On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationprotocols such as protocols in quantum cryptography and secret-key agreement by public discussion [8]. Before we formalize the main problem considered
Privacy Amplication Secure Against Active Adversaries? Ueli Maurer Stefan Wolf Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich) CH-8092 Zurich, Switzerland E-mail addresses:
More informationLecture 9: Cardinality. a n. 2 n 1 2 n. n=1. 0 x< 2 n : x = :a 1 a 2 a 3 a 4 :::: s n = s n n+1 x. 0; if 0 x<
Lecture 9: Cardinality 9. Binary representations Suppose fa n g n= is a sequence such that, for each n =; 2; 3;:::, either a n =0ora n = and, for any integer N, there exists an integer n>n such that a
More informationLECTURE NOTES IN CRYPTOGRAPHY
1 LECTURE NOTES IN CRYPTOGRAPHY Thomas Johansson 2005/2006 c Thomas Johansson 2006 2 Chapter 1 Abstract algebra and Number theory Before we start the treatment of cryptography we need to review some basic
More informationHamming Codes 11/17/04
Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but
More informationAbstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced
Primary Partition \Virtually-Synchronous Communication" harder than Consensus? Andre Schiper and Alain Sandoz Departement d'informatique Ecole Polytechnique Federale de Lausanne CH-1015 Lausanne (Switzerland)
More informationAgreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur
Agreement Protocols CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Classification of Faults Based on components that failed Program
More informationMaximal Noise in Interactive Communication over Erasure Channels and Channels with Feedback
Maximal Noise in Interactive Communication over Erasure Channels and Channels with Feedback Klim Efremenko UC Berkeley klimefrem@gmail.com Ran Gelles Princeton University rgelles@cs.princeton.edu Bernhard
More informationPortland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which
Beyond P NP = NEXP Stephen A. Fenner 1? and Lance J. Fortnow 2?? 1 University of Southern Maine, Department of Computer Science 96 Falmouth St., Portland, ME 04103, USA E-mail: fenner@usm.maine.edu, Fax:
More informationBounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.
Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist
More informationCS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding
CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationGarrett: `Bernstein's analytic continuation of complex powers' 2 Let f be a polynomial in x 1 ; : : : ; x n with real coecients. For complex s, let f
1 Bernstein's analytic continuation of complex powers c1995, Paul Garrett, garrettmath.umn.edu version January 27, 1998 Analytic continuation of distributions Statement of the theorems on analytic continuation
More informationChapter 4. Data Transmission and Channel Capacity. Po-Ning Chen, Professor. Department of Communications Engineering. National Chiao Tung University
Chapter 4 Data Transmission and Channel Capacity Po-Ning Chen, Professor Department of Communications Engineering National Chiao Tung University Hsin Chu, Taiwan 30050, R.O.C. Principle of Data Transmission
More informationInformation-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation
Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Viveck R. Cadambe EE Department, Pennsylvania State University, University Park, PA, USA viveck@engr.psu.edu Nancy Lynch
More informationExact Quantum Amplitude Amplification for the Leader Election Problem
Exact Quantum Amplitude Amplification for the Leader Election Problem Seiichiro Tani tani@theory.brl.ntt.co.jp Hirotada Kobayashi hirotada@nii.ac.jp Keiji Matsumoto keiji@nii.ac.jp NTT Communication Science
More informationDE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS
DE BRUIJN GRAPHS AND THEIR APPLICATIONS TO FAULT TOLERANT NETWORKS JOEL BAKER Abstract. The goal of this expository paper is to introduce De Bruijn graphs and discuss their applications to fault tolerant
More informationCERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES
CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES A.N. Trahtman? Bar-Ilan University, Dep. of Math. and St., 52900, Ramat Gan, Israel ICALP, Workshop synchr. autom., Turku, Finland, 2004 Abstract.
More informationto fast sorting algorithms of which the provable average run-time is of equal order of magnitude as the worst-case run-time, even though this average
Average Case Complexity under the Universal Distribution Equals Worst Case Complexity Ming Li University of Waterloo, Department of Computer Science Waterloo, Ontario N2L 3G1, Canada aul M.B. Vitanyi Centrum
More informationReport on PIR with Low Storage Overhead
Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz
More information9 Forward-backward algorithm, sum-product on factor graphs
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 9 Forward-backward algorithm, sum-product on factor graphs The previous
More informationMath 42, Discrete Mathematics
c Fall 2018 last updated 12/05/2018 at 15:47:21 For use by students in this class only; all rights reserved. Note: some prose & some tables are taken directly from Kenneth R. Rosen, and Its Applications,
More informationPERFECTLY secure key agreement has been studied recently
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract
More informationA Parallel Approximation Algorithm. for. Positive Linear Programming. mal values for the primal and dual problems are
A Parallel Approximation Algorithm for Positive Linear Programming Michael Luby Noam Nisan y Abstract We introduce a fast parallel approximation algorithm for the positive linear programming optimization
More informationDD2446 Complexity Theory: Problem Set 4
DD2446 Complexity Theory: Problem Set 4 Due: Friday November 8, 2013, at 23:59. Submit your solutions as a PDF le by e-mail to jakobn at kth dot se with the subject line Problem set 4: your full name.
More informationLCNS, Vol 762, pp , Springer 1993
On the Power of Reading and Writing Simultaneously in Parallel Compations? Rolf Niedermeier and Peter Rossmanith?? Fakultat fur Informatik, Technische Universitat Munchen Arcisstr. 21, 80290 Munchen, Fed.
More informationUpper Bounds on the Capacity of Binary Intermittent Communication
Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,
More informationAN INTRODUCTION TO SECRECY CAPACITY. 1. Overview
AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits
More informationCoset Decomposition Method for Decoding Linear Codes
International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya
More informationCan an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model?
Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model? Jaap-Henk Hoepman Department of Computer Science, University of Twente, the Netherlands hoepman@cs.utwente.nl
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationWojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.
A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,
More information8 (0,1,3,0,1) (3,0,1,3,0) 5 9 (1,3,0,1,3) (3,0,1,3,0) 6 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) leader
Deterministic, silence and self-stabilizing leader election algorithm on id-based ring Colette Johnen L.R.I./C.N.R.S., Universite de Paris-Sud Bat. 490, Campus d'orsay F-91405 Orsay Cedex, France. phone
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia
More information7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing-
7. F.Balarin and A.Sangiovanni-Vincentelli, A Verication Strategy for Timing- Constrained Systems, Proc. 4th Workshop Computer-Aided Verication, Lecture Notes in Computer Science 663, Springer-Verlag,
More informationLecture 7. Union bound for reducing M-ary to binary hypothesis testing
Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing
More informationA Graph Based Parsing Algorithm for Context-free Languages
A Graph Based Parsing Algorithm for Context-free Languages Giinter Hot> Technical Report A 01/99 June 1999 e-mail: hotzocs.uni-sb.de VVVVVV: http://vwv-hotz.cs.uni-sb. de Abstract We present a simple algorithm
More informationOn Equilibria of Distributed Message-Passing Games
On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu
More information1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal
Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department of omputer and Information Science The Ohio State University olumbus, OH 43210 (email: fmanivann,singhalg@cis.ohio-state.edu)
More informationCS505: Distributed Systems
Cristina Nita-Rotaru CS505: Distributed Systems. Required reading for this topic } Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson for "Impossibility of Distributed with One Faulty Process,
More informationNotes on Iterated Expectations Stephen Morris February 2002
Notes on Iterated Expectations Stephen Morris February 2002 1. Introduction Consider the following sequence of numbers. Individual 1's expectation of random variable X; individual 2's expectation of individual
More informationThe Weighted Byzantine Agreement Problem
The Weighted Byzantine Agreement Problem Vijay K. Garg and John Bridgman Department of Electrical and Computer Engineering The University of Texas at Austin Austin, TX 78712-1084, USA garg@ece.utexas.edu,
More informationChapter 2 Source Models and Entropy. Any information-generating process can be viewed as. computer program in executed form: binary 0
Part II Information Theory Concepts Chapter 2 Source Models and Entropy Any information-generating process can be viewed as a source: { emitting a sequence of symbols { symbols from a nite alphabet text:
More informationDecidability of Existence and Construction of a Complement of a given function
Decidability of Existence and Construction of a Complement of a given function Ka.Shrinivaasan, Chennai Mathematical Institute (CMI) (shrinivas@cmi.ac.in) April 28, 2011 Abstract This article denes a complement
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More information5. Density evolution. Density evolution 5-1
5. Density evolution Density evolution 5-1 Probabilistic analysis of message passing algorithms variable nodes factor nodes x1 a x i x2 a(x i ; x j ; x k ) x3 b x4 consider factor graph model G = (V ;
More informationCombining Shared Coin Algorithms
Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence
More informationDynamics and Quantum Channels
Dynamics and Quantum Channels Konstantin Riedl Simon Mack 1 Dynamics and evolutions Discussing dynamics, one has to talk about time. In contrast to most other quantities, time is being treated classically.
More informationConsider the following general situation: let G and H be two sets (not. G H = f(g; h)j g 2 G; h 2 Hg:
Math 375 Week 8 1.1 (External) Direct Products Consider the following general situation: let G and H be two sets (not necessarily distinct). Consider the set of pairs G H = f(g; h)j g 2 G; h 2 Hg: This
More informationVariable Length Codes for Degraded Broadcast Channels
Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates
More informationTime values are often denoted as positive real numbers including zero. We dene symbols to present the events of processes. Denition 2.2 l Let A be an
A rocess Algebra for Optimization for arallel rograms Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610 Japan Tel: +81-3-5978-5388 Fax: +81-3-5978-5390
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More information2 Information transmission is typically corrupted by noise during transmission. Various strategies have been adopted for reducing or eliminating the n
Finite size eects and error-free communication in Gaussian channels Ido Kanter and David Saad # Minerva Center and Department of Physics, Bar-Ilan University, Ramat-Gan 52900, Israel. # The Neural Computing
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationThese outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n
Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:
More informationGreat Theoretical Ideas in Computer Science
15-251 Great Theoretical Ideas in Computer Science Polynomials, Lagrange, and Error-correction Lecture 23 (November 10, 2009) P(X) = X 3 X 2 + + X 1 + Definition: Recall: Fields A field F is a set together
More informationOn Reducing Linearizability to State Reachability 1
On Reducing Linearizability to State Reachability 1 Ahmed Bouajjani a, Michael Emmi b, Constantin Enea a, Jad Hamza a a LIAFA, Université Paris Diderot b IMDEA Software Institute, Spain Abstract Ecient
More informationAsynchronous Models For Consensus
Distributed Systems 600.437 Asynchronous Models for Consensus Department of Computer Science The Johns Hopkins University 1 Asynchronous Models For Consensus Lecture 5 Further reading: Distributed Algorithms
More informationTime Free Self-Stabilizing Local Failure Detection
Research Report 33/2004, TU Wien, Institut für Technische Informatik July 6, 2004 Time Free Self-Stabilizing Local Failure Detection Martin Hutle and Josef Widder Embedded Computing Systems Group 182/2
More informationComputability and Complexity
Computability and Complexity Decidability, Undecidability and Reducibility; Codes, Algorithms and Languages CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario,
More informationDistributed Consensus
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement
More information1 Introduction It will be convenient to use the inx operators a b and a b to stand for maximum (least upper bound) and minimum (greatest lower bound)
Cycle times and xed points of min-max functions Jeremy Gunawardena, Department of Computer Science, Stanford University, Stanford, CA 94305, USA. jeremy@cs.stanford.edu October 11, 1993 to appear in the
More informationQuantum Circuit Complexity 1. Andrew Chi-Chih Yao. Department of Computer Science. Abstract
Quantum Circuit Complexity 1 Andrew Chi-Chih Yao Department of Computer Science Princeton University Princeton, New Jersey 08544 Abstract We study a complexity model of quantum circuits analogous to the
More informationTHE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS
THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS GÁBOR HORVÁTH, CHRYSTOPHER L. NEHANIV, AND KÁROLY PODOSKI Dedicated to John Rhodes on the occasion of his 80th birthday.
More informationIn this paper, we take a new approach to explaining Shostak's algorithm. We rst present a subset of the original algorithm, in particular, the subset
A Generalization of Shostak's Method for Combining Decision Procedures Clark W. Barrett, David L. Dill, and Aaron Stump Stanford University, Stanford, CA 94305, USA, http://verify.stanford.edu c Springer-Verlag
More informationLecture 11: Polar codes construction
15-859: Information Theory and Applications in TCS CMU: Spring 2013 Lecturer: Venkatesan Guruswami Lecture 11: Polar codes construction February 26, 2013 Scribe: Dan Stahlke 1 Polar codes: recap of last
More informationAnalysis of a Randomized Local Search Algorithm for LDPCC Decoding Problem
Analysis of a Randomized Local Search Algorithm for LDPCC Decoding Problem Osamu Watanabe, Takeshi Sawai, and Hayato Takahashi Dept. of Mathematical and Computing Sciences, Tokyo Institute of Technology
More information17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8
Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................
More informationcommunicate directly), and the label associated by a node to an incident edges represent the the corresponding port number. If the entities of a syste
Computing on Anonymous Networks with Sense of Direction Paola Flocchini y Alessandro Roncato z Nicola Santoro Abstract Sense of direction refers to a set of global consistency constraints of the local
More information