29 research outputs found

    Near-Optimal Distributed Maximum Flow

    Get PDF
    We present a near-optimal distributed algorithm for (1+o(1))(1+o(1))-approximation of single-commodity maximum flow in undirected weighted networks that runs in (D+n)no(1)(D+ \sqrt{n})\cdot n^{o(1)} communication rounds in the \Congest model. Here, nn and DD denote the number of nodes and the network diameter, respectively. This is the first improvement over the trivial bound of O(n2)O(n^2), and it nearly matches the Ω~(D+n)\tilde{\Omega}(D+ \sqrt{n}) round complexity lower bound. The development of the algorithm contains two results of independent interest: (i) A (D+n)no(1)(D+\sqrt{n})\cdot n^{o(1)}-round distributed construction of a spanning tree of average stretch no(1)n^{o(1)}. (ii) A (D+n)no(1)(D+\sqrt{n})\cdot n^{o(1)}-round distributed construction of an no(1)n^{o(1)}-congestion approximator consisting of the cuts induced by O(logn)O(\log n) virtual trees. The distributed representation of the cut approximator allows for evaluation in (D+n)no(1)(D+\sqrt{n})\cdot n^{o(1)} rounds. All our algorithms make use of randomization and succeed with high probability

    Lessons from the Congested Clique Applied to MapReduce

    Full text link
    The main results of this paper are (I) a simulation algorithm which, under quite general constraints, transforms algorithms running on the Congested Clique into algorithms running in the MapReduce model, and (II) a distributed O(Δ)O(\Delta)-coloring algorithm running on the Congested Clique which has an expected running time of (i) O(1)O(1) rounds, if ΔΘ(log4n)\Delta \geq \Theta(\log^4 n); and (ii) O(loglogn)O(\log \log n) rounds otherwise. Applying the simulation theorem to the Congested-Clique O(Δ)O(\Delta)-coloring algorithm yields an O(1)O(1)-round O(Δ)O(\Delta)-coloring algorithm in the MapReduce model. Our simulation algorithm illustrates a natural correspondence between per-node bandwidth in the Congested Clique model and memory per machine in the MapReduce model. In the Congested Clique (and more generally, any network in the CONGEST\mathcal{CONGEST} model), the major impediment to constructing fast algorithms is the O(logn)O(\log n) restriction on message sizes. Similarly, in the MapReduce model, the combined restrictions on memory per machine and total system memory have a dominant effect on algorithm design. In showing a fairly general simulation algorithm, we highlight the similarities and differences between these models.Comment: 15 page

    High Entropy Random Selection Protocols

    Get PDF
    In this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome

    High Entropy Random Selection Protocols

    Get PDF
    We study the two party problem of randomly selecting a common string among all the strings of length n. We want the protocol to have the property that the output distribution has high Shannon entropy or high min entropy, even when one of the two parties is dishonest and deviates from the protocol. We develop protocols that achieve high, close to n, Shannon entropy and simultaneously min entropy close to n/2. In the literature the randomness guarantee is usually expressed in terms of “resilience”. The notion of Shannon entropy is not directly comparable to that of resilience, but we establish a connection between the two that allows us to compare our protocols with the existing ones. We construct an explicit protocol that yields Shannon entropy n- O(1) and has O(log ∗n) rounds, improving over the protocol of Goldreich et al. (SIAM J Comput 27: 506–544, 1998) that also achieves this entropy but needs O(n) rounds. Both these protocols need O(n2) bits of communication. Next we reduce the number of rounds and the length of communication in our protocols. We show the existence, non-explicitly, of a protocol that has 6 rounds, O(n) bits of communication and yields Shannon entropy n- O(log n) and min entropy n/ 2 - O(log n). Our protocol achieves the same Shannon entropy bound as, also non-explicit, protocol of Gradwohl et al. (in: Dwork (ed) Advances in Cryptology—CRYPTO ‘06, 409–426, Technical Report , 2006), however achieves much higher min entropy: n/ 2 - O(log n) versus O(log n). Finally we exhibit a very simple 3-round explicit “geometric” protocol with communication length O(n). We connect the security parameter of this protocol with the well studied Kakey

    Space-Optimal Packet Routing on Trees

    No full text

    With Great Speed Come Small Buffers: {S}pace-Bandwidth Tradeoffs for Routing

    No full text

    Distributed Distance Computation and Routing with Small Messages

    No full text

    Better Deterministic Online Packet Routing on Grids

    No full text

    With Great Speed Come Small Buffers: Space-Bandwidth Tradeoffs for Routing

    No full text
    We consider the Adversarial Queuing Theory (AQT) model, where packet arrivals are subject to a maximum average rate 0ρ10\le\rho\le1 and burstiness σ0\sigma\ge0. In this model, we analyze the size of buffers required to avoid overflows in the basic case of a path. Our main results characterize the space required by the average rate and the number of distinct destinations: we show that O(kd1/k)O(k d^{1/k}) space suffice, where dd is the number of distinct destinations and k=1/ρk=\lfloor 1/\rho \rfloor; and we show that Ω(1kd1/k)\Omega(\frac 1 k d^{1/k}) space is necessary. For directed trees, we describe an algorithm whose buffer space requirement is at most 1+d+σ1 + d' + \sigma where dd' is the maximum number of destinations on any root-leaf path
    corecore