263 research outputs found
Silent MST approximation for tiny memory
In network distributed computing, minimum spanning tree (MST) is one of the
key problems, and silent self-stabilization one of the most demanding
fault-tolerance properties. For this problem and this model, a polynomial-time
algorithm with memory is known for the state model. This is
memory optimal for weights in the classic range (where
is the size of the network). In this paper, we go below this
memory, using approximation and parametrized complexity.
More specifically, our contributions are two-fold. We introduce a second
parameter~, which is the space needed to encode a weight, and we design a
silent polynomial-time self-stabilizing algorithm, with space . In turn, this allows us to get an approximation algorithm for the problem,
with a trade-off between the approximation ratio of the solution and the space
used. For polynomial weights, this trade-off goes smoothly from memory for an -approximation, to memory for exact solutions,
with for example memory for a 2-approximation
Introduction to local certification
A distributed graph algorithm is basically an algorithm where every node of a
graph can look at its neighborhood at some distance in the graph and chose its
output. As distributed environment are subject to faults, an important issue is
to be able to check that the output is correct, or in general that the network
is in proper configuration with respect to some predicate. One would like this
checking to be very local, to avoid using too much resources. Unfortunately
most predicates cannot be checked this way, and that is where certification
comes into play. Local certification (also known as proof-labeling schemes,
locally checkable proofs or distributed verification) consists in assigning
labels to the nodes, that certify that the configuration is correct. There are
several point of view on this topic: it can be seen as a part of
self-stabilizing algorithms, as labeling problem, or as a non-deterministic
distributed decision.
This paper is an introduction to the domain of local certification, giving an
overview of the history, the techniques and the current research directions.Comment: Last update: minor editin
Routing and scheduling approaches for energy-efficient data gathering in wireless sensor networks
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science of Bilkent University, 2011.Thesis (Ph. D.) -- Bilkent University, 2011.Includes bibliographical references leaves 99-108.A wireless sensor network consists of nodes which are capable of sensing an environment
and wirelessly communicating with each other to gather the sensed data
to a central location. Besides the advantages for many applications, having very
limited irreplaceable energy resources is an important shortcoming of the wireless
sensor networks. In this thesis, we present effective routing and node scheduling
solutions to improve network lifetime in wireless sensor networks for data gathering
applications. Towards this goal, we first investigate the network lifetime
problem by developing a theoretical model which assumes perfect data aggregation
and power-control capability for the nodes; and we derive an upper-bound on
the functional lifetime of a sensor network. Then we propose a routing protocol
to improve network lifetime close to this upper-bound on some certain conditions.
Our proposed routing protocol, called L-PEDAP, is based on constructing localized,
self-organizing, robust and power-aware data aggregation trees. We also
propose a node scheduling protocol that can work with our routing protocol together
to improve network lifetime further. Our node scheduling protocol, called
PENS, keeps an optimal number of nodes active to achieve minimum energy consumption
in a round, and puts the remaining nodes into sleep mode for a while.
Under some conditions, the optimum number can be greater than the minimum
number of nodes required to cover an area. We also derive the conditions under
which keeping more nodes alive can be more energy efficient. The extensive simulation
experiments we performed to evaluate our PEDAP and PENS protocols
show that they can be effective methods to improve wireless sensor network lifetime
for data gathering applications where nodes have power-control capability
and where perfect data aggregation can be used.Tan, Hüseyin ÖzgürPh.D
Struggling to Learn, Learning to Struggle: Strategy and Structure in the 2010-11 University of Puerto Rico Student Strike
From April 2010 to March 2011, the University of Puerto Rico (UPR) underwent a two-phase strike sequence against neoliberal austerity measures. Altogether, that process resulted in the eventual concession of all of the students’ main demands, an unprecedented feat at the UPR, and a rare one in Puerto Rican history in general. In this dissertation I seek to cast light on this improbable event by examining, first, how neoliberalization patterned and contoured the choices facing the century-old UPR student movement. Second, I explore how interactions within the movement, including the framing contest among leadership teams and their interaction with the movement grassroots, affected the way in which those decisions were made. Focusing on a political cadre organization, the Union of Socialist Youths (UJS), which has been involved in the UPR since the mid-1970s, I conducted targeted, semi-structured interviews with members of the UJS, several of whom were first-generation working-class students first drawn to the movement by the on campus “movement building” activities of political cadre. Complementing my own critical participant observation with these interviews, as well as archival and documentary research, I built a reflexive, extended case study based on a reiterated problem-solving or learning process model. In summary, without arguing causation, I show that: 1) reforms implemented by administrators named by both governing parties since 1981 constitute a more or less coherent repertoire consistent with neoliberalization; 2) debates within the UPR student movement around critical switchpoints before and during the 2010-11 strike revolved around an apparent tradeoff between militant “pressure” and mass appeal, aspects of which are made salient by neoliberalizing repertoires (a recurring combination of strategic dilemmas that I call the “neoliberal dilemma”); 3) the UJS and other cadre organizations intervened in these debates in ways that strengthened the strategic capacity of the movement as a whole; and 4) the 2010-11 UPR strike is in turn part of a longer problem-solving sequence extending back to at least 1981, which in turn is part of the longer trajectory of the nested UPR student movement field, and the broader trajectory of resistance to colonial capitalism in Puerto Rico
Speech Recognition
Chapters in the first part of the book cover all the essential speech processing techniques for building robust, automatic speech recognition systems: the representation for speech signals and the methods for speech-features extraction, acoustic and language modeling, efficient algorithms for searching the hypothesis space, and multimodal approaches to speech recognition. The last part of the book is devoted to other speech processing applications that can use the information from automatic speech recognition for speaker identification and tracking, for prosody modeling in emotion-detection systems and in other speech processing applications that are able to operate in real-world environments, like mobile communication services and smart homes
A COMMUNICATION FRAMEWORK FOR MULTIHOP WIRELESS ACCESS AND SENSOR NETWORKS: ANYCAST ROUTING & SIMULATION TOOLS
The reliance on wireless networks has grown tremendously within a number of varied application domains, prompting an evolution towards the use of heterogeneous multihop network architectures. We propose and analyze two communication frameworks for such networks. A first framework is designed for communications within multihop wireless access networks. The framework supports dynamic algorithms for locating access points using anycast routing with multiple metrics and balancing network load. The evaluation shows significant performance improvement over traditional solutions. A second framework is designed for communication within sensor networks and includes lightweight versions of our algorithms to fit the limitations of sensor networks. Analysis shows that this stripped down version can work almost equally well if tailored to the needs of a sensor network. We have also developed an extensive simulation environment using NS-2 to test realistic situations for the evaluations of our work. Our tools support analysis of realistic scenarios including the spreading of a forest fire within an area, and can easily be ported to other simulation software. Lastly, we us our algorithms and simulation environment to investigate sink movements optimization within sensor networks. Based on these results, we propose strategies, to be addressed in follow-on work, for building topology maps and finding optimal data collection points. Altogether, the communication framework and realistic simulation tools provide a complete communication and evaluation solution for access and sensor networks
LIPIcs, Volume 261, ICALP 2023, Complete Volume
LIPIcs, Volume 261, ICALP 2023, Complete Volum
- …