7,436 research outputs found
Small Cuts and Connectivity Certificates: A Fault Tolerant Approach
We revisit classical connectivity problems in the {CONGEST} model of distributed computing. By using techniques from fault tolerant network design, we show improved constructions, some of which are even "local" (i.e., with O~(1) rounds) for problems that are closely related to hard global problems (i.e., with a lower bound of Omega(Diam+sqrt{n}) rounds).
Distributed Minimum Cut: Nanongkai and Su presented a randomized algorithm for computing a (1+epsilon)-approximation of the minimum cut using O~(D +sqrt{n}) rounds where D is the diameter of the graph. For a sufficiently large minimum cut lambda=Omega(sqrt{n}), this is tight due to Das Sarma et al. [FOCS \u2711], Ghaffari and Kuhn [DISC \u2713].
- Small Cuts: A special setting that remains open is where the graph connectivity lambda is small (i.e., constant). The only lower bound for this case is Omega(D), with a matching bound known only for lambda <= 2 due to Pritchard and Thurimella [TALG \u2711]. Recently, Daga, Henzinger, Nanongkai and Saranurak [STOC \u2719] raised the open problem of computing the minimum cut in poly(D) rounds for any lambda=O(1). In this paper, we resolve this problem by presenting a surprisingly simple algorithm, that takes a completely different approach than the existing algorithms. Our algorithm has also the benefit that it computes all minimum cuts in the graph, and naturally extends to vertex cuts as well. At the heart of the algorithm is a graph sampling approach usually used in the context of fault tolerant (FT) design.
- Deterministic Algorithms: While the existing distributed minimum cut algorithms are randomized, our algorithm can be made deterministic within the same round complexity. To obtain this, we introduce a novel definition of universal sets along with their efficient computation. This allows us to derandomize the FT graph sampling technique, which might be of independent interest.
- Computation of all Edge Connectivities: We also consider the more general task of computing the edge connectivity of all the edges in the graph. In the output format, it is required that the endpoints u,v of every edge (u,v) learn the cardinality of the u-v cut in the graph. We provide the first sublinear algorithm for this problem for the case of constant connectivity values. Specifically, by using the recent notion of low-congestion cycle cover, combined with the sampling technique, we compute all edge connectivities in poly(D) * 2^{O(sqrt{log n log log n})} rounds.
Sparse Certificates: For an n-vertex graph G and an integer lambda, a lambda-sparse certificate H is a subgraph H subseteq G with O(lambda n) edges which is lambda-connected iff G is lambda-connected. For D-diameter graphs, constructions of sparse certificates for lambda in {2,3} have been provided by Thurimella [J. Alg. \u2797] and Dori [PODC \u2718] respectively using O~(D) number of rounds. The problem of devising such certificates with o(D+sqrt{n}) rounds was left open by Dori [PODC \u2718] for any lambda >= 4. Using connections to fault tolerant spanners, we considerably improve the round complexity for any lambda in [1,n] and epsilon in (0,1), by showing a construction of (1-epsilon)lambda-sparse certificates with O(lambda n) edges using only O(1/epsilon^2 * log^{2+o(1)} n) rounds
Fault-Tolerant Spanners: Better and Simpler
A natural requirement of many distributed structures is fault-tolerance:
after some failures, whatever remains from the structure should still be
effective for whatever remains from the network. In this paper we examine
spanners of general graphs that are tolerant to vertex failures, and
significantly improve their dependence on the number of faults , for all
stretch bounds.
For stretch we design a simple transformation that converts every
-spanner construction with at most edges into an -fault-tolerant
-spanner construction with at most edges.
Applying this to standard greedy spanner constructions gives -fault tolerant
-spanners with edges. The previous
construction by Chechik, Langberg, Peleg, and Roddity [STOC 2009] depends
similarly on but exponentially on (approximately like ).
For the case and unit-length edges, an -approximation
algorithm is known from recent work of Dinitz and Krauthgamer [arXiv 2010],
where several spanner results are obtained using a common approach of rounding
a natural flow-based linear programming relaxation. Here we use a different
(stronger) LP relaxation and improve the approximation ratio to ,
which is, notably, independent of the number of faults . We further
strengthen this bound in terms of the maximum degree by using the \Lovasz Local
Lemma.
Finally, we show that most of our constructions are inherently local by
designing equivalent distributed algorithms in the LOCAL model of distributed
computation.Comment: 17 page
Byzantine Approximate Agreement on Graphs
Consider a distributed system with n processors out of which f can be Byzantine faulty. In the approximate agreement task, each processor i receives an input value x_i and has to decide on an output value y_i such that
1) the output values are in the convex hull of the non-faulty processors\u27 input values,
2) the output values are within distance d of each other.
Classically, the values are assumed to be from an m-dimensional Euclidean space, where m >= 1.
In this work, we study the task in a discrete setting, where input values with some structure expressible as a graph. Namely, the input values are vertices of a finite graph G and the goal is to output vertices that are within distance d of each other in G, but still remain in the graph-induced convex hull of the input values. For d=0, the task reduces to consensus and cannot be solved with a deterministic algorithm in an asynchronous system even with a single crash fault. For any d >= 1, we show that the task is solvable in asynchronous systems when G is chordal and n > (omega+1)f, where omega is the clique number of G. In addition, we give the first Byzantine-tolerant algorithm for a variant of lattice agreement. For synchronous systems, we show tight resilience bounds for the exact variants of these and related tasks over a large class of combinatorial structures
A multipath analysis of biswapped networks.
Biswapped networks of the form have recently been proposed as interconnection networks to be implemented as optical transpose interconnection systems. We provide a systematic construction of vertex-disjoint paths joining any two distinct vertices in , where is the connectivity of . In doing so, we obtain an upper bound of on the -diameter of , where is the diameter of and the -diameter. Suppose that we have a deterministic multipath source routing algorithm in an interconnection network that finds mutually vertex-disjoint paths in joining any distinct vertices and does this in time polynomial in , and (and independently of the number of vertices of ). Our constructions yield an analogous deterministic multipath source routing algorithm in the interconnection network that finds mutually vertex-disjoint paths joining any distinct vertices in so that these paths all have length bounded as above. Moreover, our algorithm has time complexity polynomial in , and . We also show that if is Hamiltonian then is Hamiltonian, and that if is a Cayley graph then is a Cayley graph
Diameter of Cayley graphs of permutation groups generated by transposition trees
Let be a Cayley graph of the permutation group generated by a
transposition tree on vertices. In an oft-cited paper
\cite{Akers:Krishnamurthy:1989} (see also \cite{Hahn:Sabidussi:1997}), it is
shown that the diameter of the Cayley graph is bounded as
\diam(\Gamma) \le \max_{\pi \in S_n}{c(\pi)-n+\sum_{i=1}^n
\dist_T(i,\pi(i))}, where the maximization is over all permutations ,
denotes the number of cycles in , and \dist_T is the distance
function in . In this work, we first assess the performance (the sharpness
and strictness) of this upper bound. We show that the upper bound is sharp for
all trees of maximum diameter and also for all trees of minimum diameter, and
we exhibit some families of trees for which the bound is strict. We then show
that for every , there exists a tree on vertices, such that the
difference between the upper bound and the true diameter value is at least
.
Observe that evaluating this upper bound requires on the order of (times
a polynomial) computations. We provide an algorithm that obtains an estimate of
the diameter, but which requires only on the order of (polynomial in)
computations; furthermore, the value obtained by our algorithm is less than or
equal to the previously known diameter upper bound. This result is possible
because our algorithm works directly with the transposition tree on
vertices and does not require examining any of the permutations (only the proof
requires examining the permutations). For all families of trees examined so
far, the value computed by our algorithm happens to also be an upper
bound on the diameter, i.e.
\diam(\Gamma) \le \beta \le \max_{\pi \in S_n}{c(\pi)-n+\sum_{i=1}^n
\dist_T(i,\pi(i))}.Comment: This is an extension of arXiv:1106.535
- …