324 research outputs found

    Fast and Compact Distributed Verification and Self-Stabilization of a DFS Tree

    Full text link
    We present algorithms for distributed verification and silent-stabilization of a DFS(Depth First Search) spanning tree of a connected network. Computing and maintaining such a DFS tree is an important task, e.g., for constructing efficient routing schemes. Our algorithm improves upon previous work in various ways. Comparable previous work has space and time complexities of O(nlogΔ)O(n\log \Delta) bits per node and O(nD)O(nD) respectively, where Δ\Delta is the highest degree of a node, nn is the number of nodes and DD is the diameter of the network. In contrast, our algorithm has a space complexity of O(logn)O(\log n) bits per node, which is optimal for silent-stabilizing spanning trees and runs in O(n)O(n) time. In addition, our solution is modular since it utilizes the distributed verification algorithm as an independent subtask of the overall solution. It is possible to use the verification algorithm as a stand alone task or as a subtask in another algorithm. To demonstrate the simplicity of constructing efficient DFS algorithms using the modular approach, We also present a (non-sielnt) self-stabilizing DFS token circulation algorithm for general networks based on our silent-stabilizing DFS tree. The complexities of this token circulation algorithm are comparable to the known ones

    Self-Stabilizing Byzantine Asynchronous Unison

    Get PDF
    We explore asynchronous unison in the presence of systemic transient and permanent Byzantine faults in shared memory. We observe that the problem is not solvable under less than strongly fair scheduler or for system topologies with maximum node degree greater than two. We present a self-stabilizing Byzantine-tolerant solution to asynchronous unison for chain and ring topologies. Our algorithm has minimum possible containment radius and optimal stabilization time

    On Existence and Properties of Approximate Pure Nash Equilibria in Bandwidth Allocation Games

    Full text link
    In \emph{bandwidth allocation games} (BAGs), the strategy of a player consists of various demands on different resources. The player's utility is at most the sum of these demands, provided they are fully satisfied. Every resource has a limited capacity and if it is exceeded by the total demand, it has to be split between the players. Since these games generally do not have pure Nash equilibria, we consider approximate pure Nash equilibria, in which no player can improve her utility by more than some fixed factor α\alpha through unilateral strategy changes. There is a threshold αδ\alpha_\delta (where δ\delta is a parameter that limits the demand of each player on a specific resource) such that α\alpha-approximate pure Nash equilibria always exist for ααδ\alpha \geq \alpha_\delta, but not for α<αδ\alpha < \alpha_\delta. We give both upper and lower bounds on this threshold αδ\alpha_\delta and show that the corresponding decision problem is NP{\sf NP}-hard. We also show that the α\alpha-approximate price of anarchy for BAGs is α+1\alpha+1. For a restricted version of the game, where demands of players only differ slightly from each other (e.g. symmetric games), we show that approximate Nash equilibria can be reached (and thus also be computed) in polynomial time using the best-response dynamic. Finally, we show that a broader class of utility-maximization games (which includes BAGs) converges quickly towards states whose social welfare is close to the optimum

    Collaborative Delivery with Energy-Constrained Mobile Robots

    Full text link
    We consider the problem of collectively delivering some message from a specified source to a designated target location in a graph, using multiple mobile agents. Each agent has a limited energy which constrains the distance it can move. Hence multiple agents need to collaborate to move the message, each agent handing over the message to the next agent to carry it forward. Given the positions of the agents in the graph and their respective budgets, the problem of finding a feasible movement schedule for the agents can be challenging. We consider two variants of the problem: in non-returning delivery, the agents can stop anywhere; whereas in returning delivery, each agent needs to return to its starting location, a variant which has not been studied before. We first provide a polynomial-time algorithm for returning delivery on trees, which is in contrast to the known (weak) NP-hardness of the non-returning version. In addition, we give resource-augmented algorithms for returning delivery in general graphs. Finally, we give tight lower bounds on the required resource augmentation for both variants of the problem. In this sense, our results close the gap left by previous research.Comment: 19 pages. An extended abstract of this paper was published at the 23rd International Colloquium on Structural Information and Communication Complexity 2016, SIROCCO'1

    A general lower bound for collaborative tree exploration

    Full text link
    We consider collaborative graph exploration with a set of kk agents. All agents start at a common vertex of an initially unknown graph and need to collectively visit all other vertices. We assume agents are deterministic, vertices are distinguishable, moves are simultaneous, and we allow agents to communicate globally. For this setting, we give the first non-trivial lower bounds that bridge the gap between small (knk \leq \sqrt n) and large (knk \geq n) teams of agents. Remarkably, our bounds tightly connect to existing results in both domains. First, we significantly extend a lower bound of Ω(logk/loglogk)\Omega(\log k / \log\log k) by Dynia et al. on the competitive ratio of a collaborative tree exploration strategy to the range knlogcnk \leq n \log^c n for any cNc \in \mathbb{N}. Second, we provide a tight lower bound on the number of agents needed for any competitive exploration algorithm. In particular, we show that any collaborative tree exploration algorithm with k=Dn1+o(1)k = Dn^{1+o(1)} agents has a competitive ratio of ω(1)\omega(1), while Dereniowski et al. gave an algorithm with k=Dn1+εk = Dn^{1+\varepsilon} agents and competitive ratio O(1)O(1), for any ε>0\varepsilon > 0 and with DD denoting the diameter of the graph. Lastly, we show that, for any exploration algorithm using k=nk = n agents, there exist trees of arbitrarily large height DD that require Ω(D2)\Omega(D^2) rounds, and we provide a simple algorithm that matches this bound for all trees

    Valuing Fuel Diversification in Optimal Investment Policies for Electricity Generation Portfolios

    Full text link
    Optimal capacity allocation for investments in electricity generation assets can be deterministically derived by comparing technology specific long-term and short-term marginal costs. In an uncertain market environment, Mean-Variance Portfolio (MVP) theory provides a consistent framework to valuate financial risks in power generation portfolios that allows to derive the efficient fuel mix of a system portfolio with different generation technologies from a welfare maximization perspective. Because existing literature on MVP applications in electricity generation markets uses predominantly numerical methods to characterize portfolio risks, this article presents a novel analytical approach combining conceptual elements of peak-load pricing and MVP theory to derive optimal portfolios consisting of an arbitrary number of plant technologies given uncertain fuel prices. For this purpose, we provide a static optimization model which allows to fully capture fuel price risks in a mean variance portfolio framework. The analytically derived optimality conditions contribute to a much better understanding of the optimal investment policy and its risk characteristics compared to existing numerical methods. Furthermore, we demonstrate an application of the proposed framework and results to the German electricity market which has not yet been treated in MVP literature on electricity markets

    More efficient periodic traversal in anonymous undirected graphs

    Get PDF
    We consider the problem of periodic graph exploration in which a mobile entity with constant memory, an agent, has to visit all n nodes of an arbitrary undirected graph G in a periodic manner. Graphs are supposed to be anonymous, that is, nodes are unlabeled. However, while visiting a node, the robot has to distinguish between edges incident to it. For each node v the endpoints of the edges incident to v are uniquely identified by different integer labels called port numbers. We are interested in minimisation of the length of the exploration period. This problem is unsolvable if the local port numbers are set arbitrarily. However, surprisingly small periods can be achieved when assigning carefully the local port numbers. Dobrev et al. described an algorithm for assigning port numbers, and an oblivious agent (i.e. agent with no memory) using it, such that the agent explores all graphs of size n within period 10n. Providing the agent with a constant number of memory bits, the optimal length of the period was previously proved to be no more than 3.75n (using a different assignment of the port numbers). In this paper, we improve both these bounds. More precisely, we show a period of length at most 4 1/3 n for oblivious agents, and a period of length at most 3.5n for agents with constant memory. Moreover, we give the first non-trivial lower bound, 2.8n, on the period length for the oblivious case

    El papel social del militar en el postconflicto colombiano

    Get PDF
    En el presente ensayo se pretende argumentar diferentes dinámicas del conflicto interno en Colombia que llevó a que de manera temprana las Fuerzas Militares del país asumieran funciones de seguridad civil, desarrollando su estructura y doctrina en torno a las necesidades de la lucha contra los grupos armados al margen de la ley y en defensa de la sociedad y las instituciones, de esta manera relegó a un segundo plano su rol clásico de defensa de las fronteras nacionales frente a potenciales amenazas externas. Así pues es necesario mirar en primera instancia como El ordenamiento constitucional, legal y jurídico del Estado moderno prevé y justifica la creación y existencia de las fuerzas militares FFMM- cuya misión fundamental es la defensa de la soberanía con respecto y frente a otras naciones del mundo (defensa nacional externa). Así mismo, la defensa nacional interna está asignada al cuerpo de policía, al margen y de manera totalmente separada de las FFMMPregrad
    corecore