196 research outputs found

### Simple and Efficient Local Codes for Distributed Stable Network Construction

In this work, we study protocols so that populations of distributed processes
can construct networks. In order to highlight the basic principles of
distributed network construction we keep the model minimal in all respects. In
particular, we assume finite-state processes that all begin from the same
initial state and all execute the same protocol (i.e. the system is
homogeneous). Moreover, we assume pairwise interactions between the processes
that are scheduled by an adversary. The only constraint on the adversary
scheduler is that it must be fair. In order to allow processes to construct
networks, we let them activate and deactivate their pairwise connections. When
two processes interact, the protocol takes as input the states of the processes
and the state of the their connection and updates all of them. Initially all
connections are inactive and the goal is for the processes, after interacting
and activating/deactivating connections for a while, to end up with a desired
stable network. We give protocols (optimal in some cases) and lower bounds for
several basic network construction problems such as spanning line, spanning
ring, spanning star, and regular network. We provide proofs of correctness for
all of our protocols and analyze the expected time to convergence of most of
them under a uniform random scheduler that selects the next pair of interacting
processes uniformly at random from all such pairs. Finally, we prove several
universality results by presenting generic protocols that are capable of
simulating a Turing Machine (TM) and exploiting it in order to construct a
large class of networks.Comment: 43 pages, 7 figure

### Moving in temporal graphs with very sparse random availability of edges

In this work we consider temporal graphs, i.e. graphs, each edge of which is
assigned a set of discrete time-labels drawn from a set of integers. The labels
of an edge indicate the discrete moments in time at which the edge is
available. We also consider temporal paths in a temporal graph, i.e. paths
whose edges are assigned a strictly increasing sequence of labels. Furthermore,
we assume the uniform case (UNI-CASE), in which every edge of a graph is
assigned exactly one time label from a set of integers and the time labels
assigned to the edges of the graph are chosen randomly and independently, with
the selection following the uniform distribution. We call uniform random
temporal graphs the graphs that satisfy the UNI-CASE. We begin by deriving the
expected number of temporal paths of a given length in the uniform random
temporal clique. We define the term temporal distance of two vertices, which is
the arrival time, i.e. the time-label of the last edge, of the temporal path
that connects those vertices, which has the smallest arrival time amongst all
temporal paths that connect those vertices. We then propose and study two
statistical properties of temporal graphs. One is the maximum expected temporal
distance which is, as the term indicates, the maximum of all expected temporal
distances in the graph. The other one is the temporal diameter which, loosely
speaking, is the expectation of the maximum temporal distance in the graph. We
derive the maximum expected temporal distance of a uniform random temporal star
graph as well as an upper bound on both the maximum expected temporal distance
and the temporal diameter of the normalized version of the uniform random
temporal clique, in which the largest time-label available equals the number of
vertices. Finally, we provide an algorithm that solves an optimization problem
on a specific type of temporal (multi)graphs of two vertices.Comment: 30 page

### Simple and efficient local codes for distributed stable network construction

In this work, we study protocols so that populations of distributed processes can construct networks. In order to highlight the basic principles of distributed network construction, we keep the model minimal in all respects. In particular, we assume finite-state processes that all begin from the same initial state and all execute the same protocol. Moreover, we assume pairwise interactions between the processes that are scheduled by a fair adversary. In order to allow processes to construct networks, we let them activate and deactivate their pairwise connections. When two processes interact, the protocol takes as input the states of the processes and the state of their connection and updates all of them. Initially all connections are inactive and the goal is for the processes, after interacting and activating/deactivating connections for a while, to end up with a desired stable network. We give protocols (optimal in some cases) and lower bounds for several basic network construction problems such as spanning line, spanning ring, spanning star, and regular network. The expected time to convergence of our protocols is analyzed under a uniform random scheduler. Finally, we prove several universality results by presenting generic protocols that are capable of simulating a Turing Machine (TM) and exploiting it in order to construct a large class of networks. We additionally show how to partition the population into k supernodes, each being a line of logk nodes, for the largest such k. This amount of local memory is sufficient for the supernodes to obtain unique names and exploit their names and their memory to realize nontrivial constructions

### Terminating population protocols via some minimal global knowledge assumptions

We extend the population protocol model with a cover-time service that informs a walking state every time it covers the whole network. This represents a known upper bound on the cover time of a random walk. The cover-time service allows us to introduce termination into population protocols, a capability that is crucial for any distributed system. By reduction to an oracle-model we arrive at a very satisfactory lower bound on the computational power of the model: we prove that it is at least as strong as a Turing Machine of space log n with input commutativity, where n is the number of nodes in the network. We also give a log n-space, but nondeterministic this time, upper bound. Finally, we prove interesting similarities of this model to linear bounded automata. Keywords: population protocol, cover-time service, rendezvous-based communication, interaction, counter machine, absence detector, linear-bounded automaton 1

- â€¦