41,851 research outputs found
Time vs. Information Tradeoffs for Leader Election in Anonymous Trees
The leader election task calls for all nodes of a network to agree on a
single node. If the nodes of the network are anonymous, the task of leader
election is formulated as follows: every node of the network must output a
simple path, coded as a sequence of port numbers, such that all these paths end
at a common node, the leader. In this paper, we study deterministic leader
election in anonymous trees.
Our aim is to establish tradeoffs between the allocated time and the
amount of information that has to be given to the nodes to
enable leader election in time in all trees for which leader election in
this time is at all possible. Following the framework of , this information (a single binary string) is provided to all
nodes at the start by an oracle knowing the entire tree. The length of this
string is called the . For an allocated time ,
we give upper and lower bounds on the minimum size of advice sufficient to
perform leader election in time .
We consider -node trees of diameter . While leader election
in time can be performed without any advice, for time we give
tight upper and lower bounds of . For time we give
tight upper and lower bounds of for even values of ,
and tight upper and lower bounds of for odd values of .
For the time interval for constant ,
we prove an upper bound of and a lower bound of
, the latter being valid whenever is odd or when
the time is at most . Finally, for time for any
constant (except for the case of very small diameters), we give
tight upper and lower bounds of
Efficient Construction of Probabilistic Tree Embeddings
In this paper we describe an algorithm that embeds a graph metric
on an undirected weighted graph into a distribution of tree metrics
such that for every pair , and
. Such embeddings have
proved highly useful in designing fast approximation algorithms, as many hard
problems on graphs are easy to solve on tree instances. For a graph with
vertices and edges, our algorithm runs in time with high
probability, which improves the previous upper bound of shown by
Mendel et al.\,in 2009.
The key component of our algorithm is a new approximate single-source
shortest-path algorithm, which implements the priority queue with a new data
structure, the "bucket-tree structure". The algorithm has three properties: it
only requires linear time in the number of edges in the input graph; the
computed distances have a distance preserving property; and when computing the
shortest-paths to the -nearest vertices from the source, it only requires to
visit these vertices and their edge lists. These properties are essential to
guarantee the correctness and the stated time bound.
Using this shortest-path algorithm, we show how to generate an intermediate
structure, the approximate dominance sequences of the input graph, in time, and further propose a simple yet efficient algorithm to converted
this sequence to a tree embedding in time, both with high
probability. Combining the three subroutines gives the stated time bound of the
algorithm.
Then we show that this efficient construction can facilitate some
applications. We proved that FRT trees (the generated tree embedding) are
Ramsey partitions with asymptotically tight bound, so the construction of a
series of distance oracles can be accelerated
Distributed Approximation of Minimum Routing Cost Trees
We study the NP-hard problem of approximating a Minimum Routing Cost Spanning
Tree in the message passing model with limited bandwidth (CONGEST model). In
this problem one tries to find a spanning tree of a graph over nodes
that minimizes the sum of distances between all pairs of nodes. In the
considered model every node can transmit a different (but short) message to
each of its neighbors in each synchronous round. We provide a randomized
-approximation with runtime for
unweighted graphs. Here, is the diameter of . This improves over both,
the (expected) approximation factor and the runtime
of the best previously known algorithm.
Due to stating our results in a very general way, we also derive an (optimal)
runtime of when considering -approximations as done by the
best previously known algorithm. In addition we derive a deterministic
-approximation
Sparse Fault-Tolerant BFS Trees
This paper addresses the problem of designing a sparse {\em fault-tolerant}
BFS tree, or {\em FT-BFS tree} for short, namely, a sparse subgraph of the
given network such that subsequent to the failure of a single edge or
vertex, the surviving part of still contains a BFS spanning tree for
(the surviving part of) . Our main results are as follows. We present an
algorithm that for every -vertex graph and source node constructs a
(single edge failure) FT-BFS tree rooted at with O(n \cdot
\min\{\Depth(s), \sqrt{n}\}) edges, where \Depth(s) is the depth of the BFS
tree rooted at . This result is complemented by a matching lower bound,
showing that there exist -vertex graphs with a source node for which any
edge (or vertex) FT-BFS tree rooted at has edges. We then
consider {\em fault-tolerant multi-source BFS trees}, or {\em FT-MBFS trees}
for short, aiming to provide (following a failure) a BFS tree rooted at each
source for some subset of sources . Again, tight bounds
are provided, showing that there exists a poly-time algorithm that for every
-vertex graph and source set of size constructs a
(single failure) FT-MBFS tree from each source , with
edges, and on the other hand there exist
-vertex graphs with source sets of cardinality , on
which any FT-MBFS tree from has edges.
Finally, we propose an approximation algorithm for constructing
FT-BFS and FT-MBFS structures. The latter is complemented by a hardness result
stating that there exists no approximation algorithm for these
problems under standard complexity assumptions
Multi-Embedding of Metric Spaces
Metric embedding has become a common technique in the design of algorithms.
Its applicability is often dependent on how high the embedding's distortion is.
For example, embedding finite metric space into trees may require linear
distortion as a function of its size. Using probabilistic metric embeddings,
the bound on the distortion reduces to logarithmic in the size.
We make a step in the direction of bypassing the lower bound on the
distortion in terms of the size of the metric. We define "multi-embeddings" of
metric spaces in which a point is mapped onto a set of points, while keeping
the target metric of polynomial size and preserving the distortion of paths.
The distortion obtained with such multi-embeddings into ultrametrics is at most
O(log Delta loglog Delta) where Delta is the aspect ratio of the metric. In
particular, for expander graphs, we are able to obtain constant distortion
embeddings into trees in contrast with the Omega(log n) lower bound for all
previous notions of embeddings.
We demonstrate the algorithmic application of the new embeddings for two
optimization problems: group Steiner tree and metrical task systems
- …