404 research outputs found
Rendezvous on a Line by Location-Aware Robots Despite the Presence of Byzantine Faults
A set of mobile robots is placed at points of an infinite line. The robots
are equipped with GPS devices and they may communicate their positions on the
line to a central authority. The collection contains an unknown subset of
"spies", i.e., byzantine robots, which are indistinguishable from the
non-faulty ones. The set of the non-faulty robots need to rendezvous in the
shortest possible time in order to perform some task, while the byzantine
robots may try to delay their rendezvous for as long as possible. The problem
facing a central authority is to determine trajectories for all robots so as to
minimize the time until the non-faulty robots have rendezvoused. The
trajectories must be determined without knowledge of which robots are faulty.
Our goal is to minimize the competitive ratio between the time required to
achieve the first rendezvous of the non-faulty robots and the time required for
such a rendezvous to occur under the assumption that the faulty robots are
known at the start. We provide a bounded competitive ratio algorithm, where the
central authority is informed only of the set of initial robot positions,
without knowing which ones or how many of them are faulty. When an upper bound
on the number of byzantine robots is known to the central authority, we provide
algorithms with better competitive ratios. In some instances we are able to
show these algorithms are optimal
Mobile agent rendezvous: A survey
Abstract. Recent results on the problem of mobile agent rendezvous on distributed networks are surveyed with an emphasis on outlining the various approaches taken by researchers in the theoretical computer science community.
NF-ÎşB: A lesson in family values
A set of mobile robots (represented as points) is distributed in the Cartesian plane. The collection contains an unknown subset of byzantine robots which are indistinguishable from the reliable ones. The reliable robots need to gather, i.e., arrive to a configuration in which at the same time, all of them occupy the same point on the plane. The robots are equipped with GPS devices and at the beginning of the gathering process they communicate the Cartesian coordinates of their respective positions to the central authority. On the basis of this information, without the knowledge of which robots are faulty, the central authority designs a trajectory for every robot. The central authority aims to provide the trajectories which result in the shortest possible gathering time of the healthy robots. The efficiency of a gathering strategy is measured by its competitive ratio, i.e., the maximal ratio between the time required for gathering achieved by the given trajectories and the optimal time required for gathering in the offline case, i.e., when the faulty robots are known to the central authority in advance. The role of the byzantine robots, controlled by the adversary, is to act so that the gathering is delayed and the resulting competitive ratio is maximized. The objective of our paper is to propose efficient algorithms when the central authority is aware of an upper bound on the number of byzantine robots. We give optimal algorithms for collections of robots known to contain at most one faulty robot. When the proportion of byzantine robots is known to be less than one half or one third, we provide algorithms with small constant competitive ratios. We also propose algorithms with bounded competitive ratio in the case where the proportion of faulty robots is arbitrary
Byzantine Gathering in Networks
This paper investigates an open problem introduced in [14]. Two or more
mobile agents start from different nodes of a network and have to accomplish
the task of gathering which consists in getting all together at the same node
at the same time. An adversary chooses the initial nodes of the agents and
assigns a different positive integer (called label) to each of them. Initially,
each agent knows its label but does not know the labels of the other agents or
their positions relative to its own. Agents move in synchronous rounds and can
communicate with each other only when located at the same node. Up to f of the
agents are Byzantine. A Byzantine agent can choose an arbitrary port when it
moves, can convey arbitrary information to other agents and can change its
label in every round, in particular by forging the label of another agent or by
creating a completely new one.
What is the minimum number M of good agents that guarantees deterministic
gathering of all of them, with termination?
We provide exact answers to this open problem by considering the case when
the agents initially know the size of the network and the case when they do
not. In the former case, we prove M=f+1 while in the latter, we prove M=f+2.
More precisely, for networks of known size, we design a deterministic algorithm
gathering all good agents in any network provided that the number of good
agents is at least f+1. For networks of unknown size, we also design a
deterministic algorithm ensuring the gathering of all good agents in any
network but provided that the number of good agents is at least f+2. Both of
our algorithms are optimal in terms of required number of good agents, as each
of them perfectly matches the respective lower bound on M shown in [14], which
is of f+1 when the size of the network is known and of f+2 when it is unknown
Imaging the Ettingshausen effect and cryogenic thermoelectric cooling in a van der Waals semimetal
Attaining viable thermoelectric cooling at cryogenic temperatures is of major
fundamental and technological interest for novel electronics and quantum
materials applications. In-device temperature control can provide a more
efficient and precise thermal environment management as compared to the
conventional global cooling. Here we develop nanoscale cryogenic imaging of a
magneto-thermoelectric effect and demonstrate absolute cooling and an ultrahigh
Ettingshausen effect in exfoliated WTe2 Weyl semimetal flakes at liquid He
temperatures. Application of a current and perpendicular magnetic field gives
rise to cooling via generation of electron-hole pairs on one side of the sample
and heating by their recombination at the opposite side. In contrast to bulk
materials, the cooling process is found to be nonmonotonic in magnetic field
and device size. The derived model of magneto-thermoelectricity in mesoscopic
semimetal devices shows that the cooling efficiency and the induced temperature
profiles are governed by the interplay between sample geometry, electron-hole
recombination length, magnetic field, and flake and substrate heat
conductivities. The findings open the way for direct integration of microscopic
thermoelectric cooling and for temperature landscape engineering in novel van
der Waals devices
Variation in Ancillary Testing among Pediatric Asthma Patients Seen in Emergency Departments
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/72605/1/j.aem.2007.01.016.pd
Extensional and Intensional Strategies
This paper is a contribution to the theoretical foundations of strategies. We
first present a general definition of abstract strategies which is extensional
in the sense that a strategy is defined explicitly as a set of derivations of
an abstract reduction system. We then move to a more intensional definition
supporting the abstract view but more operational in the sense that it
describes a means for determining such a set. We characterize the class of
extensional strategies that can be defined intensionally. We also give some
hints towards a logical characterization of intensional strategies and propose
a few challenging perspectives
"Self-screening" of rhodopsin in rod outer segments
Microspectrophotometry (MSP) shows rhodopsin highly concentrated (about 3.0mmol/l) in rod outer segments (ROS). Calculation of the in vivo absorption spectrum of human rhodopsin from such data reveals a striking failure to agree with the action spectrum of human rod vision. Agreement is good between the spectral distribution of absorption coefficients and the action spectrum, but the "concentration-broadening" (or "self-screening") introduced by the high end on absorbance at this concentration results in a misfit among the largest in the 93 years comparisons of this kind have been made! To deal with this anomaly, it has been suggested that "concentration-broadening" is inappropriate for rhodopsin in rod vision. This proposal was tested by comparing rod action spectra of 15-day-old and adult rats, since the lengths of ROS increase by a factor of about two in maturation. Three lines of evidence are inconsistent with it. Although the conundrum remains unexplained, it cannot be dismissed by supposing "self-screening" inappropriate for night vision.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/27007/1/0000574.pd
When Patrolmen Become Corrupted: Monitoring a Graph using Faulty Mobile Robots
International audienceA team of k mobile robots is deployed on a weighted graph whose edge weights represent distances. The robots perpetually move along the domain, represented by all points belonging to the graph edges, not exceeding their maximal speed. The robots need to patrol the graph by regularly visiting all points of the domain. In this paper, we consider a team of robots (patrolmen), at most f of which may be unreliable, i.e. they fail to comply with their patrolling duties. What algorithm should be followed so as to minimize the maximum time between successive visits of every edge point by a reliable patrolmen? The corresponding measure of efficiency of patrolling called idleness has been widely accepted in the robotics literature. We extend it to the case of untrusted patrolmen; we denote by Ifk (G) the maximum time that a point of the domain may remain unvisited by reliable patrolmen. The objective is to find patrolling strategies minimizing Ifk (G). We investigate this problem for various classes of graphs. We design optimal algorithms for line segments, which turn out to be surprisingly different from strategies for related patrolling problems proposed in the literature. We then use these results to study the case of general graphs. For Eulerian graphs G, we give an optimal patrolling strategy with idleness Ifk (G) = (f + 1)|E|/k, where |E| is the sum of the lengths of the edges of G. Further, we show the hardness of the problem of computing the idle time for three robots, at most one of which is faulty, by reduction from 3-edge-coloring of cubic graphs — a known NP-hard problem. A byproduct of our proof is the investigation of classes of graphs minimizing idle time (with respect to the total length of edges); an example of such a class is known in the literature under the name of Kotzig graphs
- …