324 research outputs found
Fast and Compact Distributed Verification and Self-Stabilization of a DFS Tree
We present algorithms for distributed verification and silent-stabilization
of a DFS(Depth First Search) spanning tree of a connected network. Computing
and maintaining such a DFS tree is an important task, e.g., for constructing
efficient routing schemes. Our algorithm improves upon previous work in various
ways. Comparable previous work has space and time complexities of bits per node and respectively, where is the highest
degree of a node, is the number of nodes and is the diameter of the
network. In contrast, our algorithm has a space complexity of bits
per node, which is optimal for silent-stabilizing spanning trees and runs in
time. In addition, our solution is modular since it utilizes the
distributed verification algorithm as an independent subtask of the overall
solution. It is possible to use the verification algorithm as a stand alone
task or as a subtask in another algorithm. To demonstrate the simplicity of
constructing efficient DFS algorithms using the modular approach, We also
present a (non-sielnt) self-stabilizing DFS token circulation algorithm for
general networks based on our silent-stabilizing DFS tree. The complexities of
this token circulation algorithm are comparable to the known ones
Self-Stabilizing Byzantine Asynchronous Unison
We explore asynchronous unison in the presence of systemic transient and
permanent Byzantine faults in shared memory. We observe that the problem is not
solvable under less than strongly fair scheduler or for system topologies with
maximum node degree greater than two. We present a self-stabilizing
Byzantine-tolerant solution to asynchronous unison for chain and ring
topologies. Our algorithm has minimum possible containment radius and optimal
stabilization time
On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games
In \emph{bandwidth allocation games} (BAGs), the strategy of a player
consists of various demands on different resources. The player's utility is at
most the sum of these demands, provided they are fully satisfied. Every
resource has a limited capacity and if it is exceeded by the total demand, it
has to be split between the players. Since these games generally do not have
pure Nash equilibria, we consider approximate pure Nash equilibria, in which no
player can improve her utility by more than some fixed factor through
unilateral strategy changes. There is a threshold (where
is a parameter that limits the demand of each player on a specific
resource) such that -approximate pure Nash equilibria always exist for
, but not for . We give both
upper and lower bounds on this threshold and show that the
corresponding decision problem is -hard. We also show that the
-approximate price of anarchy for BAGs is . For a restricted
version of the game, where demands of players only differ slightly from each
other (e.g. symmetric games), we show that approximate Nash equilibria can be
reached (and thus also be computed) in polynomial time using the best-response
dynamic. Finally, we show that a broader class of utility-maximization games
(which includes BAGs) converges quickly towards states whose social welfare is
close to the optimum
Local algorithms : Self-stabilization on speed
Non peer reviewe
Collaborative Delivery with Energy-Constrained Mobile Robots
We consider the problem of collectively delivering some message from a
specified source to a designated target location in a graph, using multiple
mobile agents. Each agent has a limited energy which constrains the distance it
can move. Hence multiple agents need to collaborate to move the message, each
agent handing over the message to the next agent to carry it forward. Given the
positions of the agents in the graph and their respective budgets, the problem
of finding a feasible movement schedule for the agents can be challenging. We
consider two variants of the problem: in non-returning delivery, the agents can
stop anywhere; whereas in returning delivery, each agent needs to return to its
starting location, a variant which has not been studied before.
We first provide a polynomial-time algorithm for returning delivery on trees,
which is in contrast to the known (weak) NP-hardness of the non-returning
version. In addition, we give resource-augmented algorithms for returning
delivery in general graphs. Finally, we give tight lower bounds on the required
resource augmentation for both variants of the problem. In this sense, our
results close the gap left by previous research.Comment: 19 pages. An extended abstract of this paper was published at the
23rd International Colloquium on Structural Information and Communication
Complexity 2016, SIROCCO'1
A general lower bound for collaborative tree exploration
We consider collaborative graph exploration with a set of agents. All
agents start at a common vertex of an initially unknown graph and need to
collectively visit all other vertices. We assume agents are deterministic,
vertices are distinguishable, moves are simultaneous, and we allow agents to
communicate globally. For this setting, we give the first non-trivial lower
bounds that bridge the gap between small () and large () teams of agents. Remarkably, our bounds tightly connect to existing results
in both domains.
First, we significantly extend a lower bound of
by Dynia et al. on the competitive ratio of a collaborative tree exploration
strategy to the range for any . Second,
we provide a tight lower bound on the number of agents needed for any
competitive exploration algorithm. In particular, we show that any
collaborative tree exploration algorithm with agents has a
competitive ratio of , while Dereniowski et al. gave an algorithm
with agents and competitive ratio , for any
and with denoting the diameter of the graph. Lastly, we
show that, for any exploration algorithm using agents, there exist
trees of arbitrarily large height that require rounds, and we
provide a simple algorithm that matches this bound for all trees
Valuing Fuel Diversification in Optimal Investment Policies for Electricity Generation Portfolios
Optimal capacity allocation for investments in electricity generation assets can be deterministically derived by comparing technology specific long-term and short-term marginal costs. In an uncertain market environment, Mean-Variance Portfolio (MVP) theory provides a consistent framework to valuate financial risks in power generation portfolios that allows to derive the efficient fuel mix of a system portfolio with different generation technologies from a welfare maximization perspective. Because existing literature on MVP applications in electricity generation markets uses predominantly numerical methods to characterize portfolio risks, this article presents a novel analytical approach combining conceptual elements of peak-load pricing and MVP theory to derive optimal portfolios consisting of an arbitrary number of plant technologies given uncertain fuel prices. For this purpose, we provide a static optimization model which allows to fully capture fuel price risks in a mean variance portfolio framework. The analytically derived optimality conditions contribute to a much better understanding of the optimal investment policy and its risk characteristics compared to existing numerical methods. Furthermore, we demonstrate an application of the proposed framework and results to the German electricity market which has not yet been treated in MVP literature on electricity markets
More efficient periodic traversal in anonymous undirected graphs
We consider the problem of periodic graph exploration in which a mobile
entity with constant memory, an agent, has to visit all n nodes of an arbitrary
undirected graph G in a periodic manner. Graphs are supposed to be anonymous,
that is, nodes are unlabeled. However, while visiting a node, the robot has to
distinguish between edges incident to it. For each node v the endpoints of the
edges incident to v are uniquely identified by different integer labels called
port numbers. We are interested in minimisation of the length of the
exploration period.
This problem is unsolvable if the local port numbers are set arbitrarily.
However, surprisingly small periods can be achieved when assigning carefully
the local port numbers. Dobrev et al. described an algorithm for assigning port
numbers, and an oblivious agent (i.e. agent with no memory) using it, such that
the agent explores all graphs of size n within period 10n. Providing the agent
with a constant number of memory bits, the optimal length of the period was
previously proved to be no more than 3.75n (using a different assignment of the
port numbers). In this paper, we improve both these bounds. More precisely, we
show a period of length at most 4 1/3 n for oblivious agents, and a period of
length at most 3.5n for agents with constant memory. Moreover, we give the
first non-trivial lower bound, 2.8n, on the period length for the oblivious
case
Recommended from our members
Exploring the meteorological potential for planning a high performance European Electricity Super-grid: optimal power capacity distribution among countries
The concept of a European Super-grid for electricity presents clear advantages for a reliable and affordable renewable power production (photovoltaics and wind). Based on the mean-variance portfolio optimization analysis, we explore optimal scenarios for the allocation of new renewable capacity at national level in order to provide to energy decision-makers guidance about which regions should be mostly targeted to either maximize total production or reduce its day-to-day variability.
The results show that the existing distribution of renewable generation capacity across Europe is far from optimal: i.e., a 'better' spatial distribution of resources could have been achieved with either a ~31% increase in mean power supply (for the same level of day-to-day variability) or a ~37.5% reduction in day-to-day variability (for the same level of mean productivity). Careful planning of additional increments in renewable capacity at the European level could, however, act to significantly ameliorate this deficiency. The choice of where to deploy resources depends, however, on the objective being pursued – on the one hand, if the goal is to maximize average output, then new capacity is best allocated in the countries with highest resources, whereas investment in additional capacity in a north/south dipole pattern across Europe would act to most reduce daily variations and thus decrease the day-to-day volatility of renewable power supply
El papel social del militar en el postconflicto colombiano
En el presente ensayo se pretende argumentar diferentes dinámicas del conflicto interno en Colombia que llevó a que de manera temprana las Fuerzas Militares del país asumieran funciones de seguridad civil, desarrollando su estructura y doctrina en torno a las necesidades de la lucha contra los grupos armados al margen de la ley y en defensa de la sociedad y las instituciones, de esta manera relegó a un segundo plano su rol clásico de defensa de las fronteras nacionales frente a potenciales amenazas externas. Así pues es necesario mirar en primera instancia como El ordenamiento constitucional, legal y jurídico del Estado moderno prevé y justifica la creación y existencia de las fuerzas militares FFMM- cuya misión fundamental es la defensa de la soberanía con respecto y frente a otras naciones del mundo (defensa nacional externa). Así mismo, la defensa nacional interna está asignada al cuerpo de policía, al margen y de manera totalmente separada de las FFMMPregrad
- …