5,232 research outputs found
Memory lower bounds for deterministic self-stabilization
In the context of self-stabilization, a \emph{silent} algorithm guarantees
that the register of every node does not change once the algorithm has
stabilized. At the end of the 90's, Dolev et al. [Acta Inf. '99] showed that,
for finding the centers of a graph, for electing a leader, or for constructing
a spanning tree, every silent algorithm must use a memory of
bits per register in -node networks. Similarly, Korman et al. [Dist. Comp.
'07] proved, using the notion of proof-labeling-scheme, that, for constructing
a minimum-weight spanning trees (MST), every silent algorithm must use a memory
of bits per register. It follows that requiring the algorithm
to be silent has a cost in terms of memory space, while, in the context of
self-stabilization, where every node constantly checks the states of its
neighbors, the silence property can be of limited practical interest. In fact,
it is known that relaxing this requirement results in algorithms with smaller
space-complexity.
In this paper, we are aiming at measuring how much gain in terms of memory
can be expected by using arbitrary self-stabilizing algorithms, not necessarily
silent. To our knowledge, the only known lower bound on the memory requirement
for general algorithms, also established at the end of the 90's, is due to
Beauquier et al.~[PODC '99] who proved that registers of constant size are not
sufficient for leader election algorithms. We improve this result by
establishing a tight lower bound of bits per
register for self-stabilizing algorithms solving -coloring or
constructing a spanning tree in networks of maximum degree~. The lower
bound bits per register also holds for leader election
Leader Election in Anonymous Rings: Franklin Goes Probabilistic
We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state, so that various model checking techniques can be employed to verify its correctness, that is, eventually a unique leader is elected with probability one. We also sketch a formal correctness proof of the algorithm for rings with arbitrary size
Parallel Tempering Simulation of the three-dimensional Edwards-Anderson Model with Compact Asynchronous Multispin Coding on GPU
Monte Carlo simulations of the Ising model play an important role in the
field of computational statistical physics, and they have revealed many
properties of the model over the past few decades. However, the effect of
frustration due to random disorder, in particular the possible spin glass
phase, remains a crucial but poorly understood problem. One of the obstacles in
the Monte Carlo simulation of random frustrated systems is their long
relaxation time making an efficient parallel implementation on state-of-the-art
computation platforms highly desirable. The Graphics Processing Unit (GPU) is
such a platform that provides an opportunity to significantly enhance the
computational performance and thus gain new insight into this problem. In this
paper, we present optimization and tuning approaches for the CUDA
implementation of the spin glass simulation on GPUs. We discuss the integration
of various design alternatives, such as GPU kernel construction with minimal
communication, memory tiling, and look-up tables. We present a binary data
format, Compact Asynchronous Multispin Coding (CAMSC), which provides an
additional speedup compared with the traditionally used Asynchronous
Multispin Coding (AMSC). Our overall design sustains a performance of 33.5
picoseconds per spin flip attempt for simulating the three-dimensional
Edwards-Anderson model with parallel tempering, which significantly improves
the performance over existing GPU implementations.Comment: 15 pages, 18 figure
Comparing the expressive power of the Synchronous and the Asynchronous pi-calculus
The Asynchronous pi-calculus, as recently proposed by Boudol and,
independently, by Honda and Tokoro, is a subset of the pi-calculus which
contains no explicit operators for choice and output-prefixing. The
communication mechanism of this calculus, however, is powerful enough to
simulate output-prefixing, as shown by Boudol, and input-guarded choice, as
shown recently by Nestmann and Pierce. A natural question arises, then, whether
or not it is possible to embed in it the full pi-calculus. We show that this is
not possible, i.e. there does not exist any uniform, parallel-preserving,
translation from the pi-calculus into the asynchronous pi-calculus, up to any
``reasonable'' notion of equivalence. This result is based on the incapablity
of the asynchronous pi-calculus of breaking certain symmetries possibly present
in the initial communication graph. By similar arguments, we prove a separation
result between the pi-calculus and CCS.Comment: 10 pages. Proc. of the POPL'97 symposiu
Exploration of Finite 2D Square Grid by a Metamorphic Robotic System
We consider exploration of finite 2D square grid by a metamorphic robotic
system consisting of anonymous oblivious modules. The number of possible shapes
of a metamorphic robotic system grows as the number of modules increases. The
shape of the system serves as its memory and shows its functionality. We
consider the effect of global compass on the minimum number of modules
necessary to explore a finite 2D square grid. We show that if the modules agree
on the directions (north, south, east, and west), three modules are necessary
and sufficient for exploration from an arbitrary initial configuration,
otherwise five modules are necessary and sufficient for restricted initial
configurations
Time vs. Information Tradeoffs for Leader Election in Anonymous Trees
The leader election task calls for all nodes of a network to agree on a
single node. If the nodes of the network are anonymous, the task of leader
election is formulated as follows: every node of the network must output a
simple path, coded as a sequence of port numbers, such that all these paths end
at a common node, the leader. In this paper, we study deterministic leader
election in anonymous trees.
Our aim is to establish tradeoffs between the allocated time and the
amount of information that has to be given to the nodes to
enable leader election in time in all trees for which leader election in
this time is at all possible. Following the framework of , this information (a single binary string) is provided to all
nodes at the start by an oracle knowing the entire tree. The length of this
string is called the . For an allocated time ,
we give upper and lower bounds on the minimum size of advice sufficient to
perform leader election in time .
We consider -node trees of diameter . While leader election
in time can be performed without any advice, for time we give
tight upper and lower bounds of . For time we give
tight upper and lower bounds of for even values of ,
and tight upper and lower bounds of for odd values of .
For the time interval for constant ,
we prove an upper bound of and a lower bound of
, the latter being valid whenever is odd or when
the time is at most . Finally, for time for any
constant (except for the case of very small diameters), we give
tight upper and lower bounds of
Deterministic Symmetry Breaking in Ring Networks
We study a distributed coordination mechanism for uniform agents located on a
circle. The agents perform their actions in synchronised rounds. At the
beginning of each round an agent chooses the direction of its movement from
clockwise, anticlockwise, or idle, and moves at unit speed during this round.
Agents are not allowed to overpass, i.e., when an agent collides with another
it instantly starts moving with the same speed in the opposite direction
(without exchanging any information with the other agent). However, at the end
of each round each agent has access to limited information regarding its
trajectory of movement during this round.
We assume that mobile agents are initially located on a circle unit
circumference at arbitrary but distinct positions unknown to other agents. The
agents are equipped with unique identifiers from a fixed range. The {\em
location discovery} task to be performed by each agent is to determine the
initial position of every other agent.
Our main result states that, if the only available information about movement
in a round is limited to %information about distance between the initial and
the final position, then there is a superlinear lower bound on time needed to
solve the location discovery problem. Interestingly, this result corresponds to
a combinatorial symmetry breaking problem, which might be of independent
interest. If, on the other hand, an agent has access to the distance to its
first collision with another agent in a round, we design an asymptotically
efficient and close to optimal solution for the location discovery problem.Comment: Conference version accepted to ICDCS 201
- …