559 research outputs found
Distributed Deterministic Broadcasting in Uniform-Power Ad Hoc Wireless Networks
Development of many futuristic technologies, such as MANET, VANET, iThings,
nano-devices, depend on efficient distributed communication protocols in
multi-hop ad hoc networks. A vast majority of research in this area focus on
design heuristic protocols, and analyze their performance by simulations on
networks generated randomly or obtained in practical measurements of some
(usually small-size) wireless networks. %some library. Moreover, they often
assume access to truly random sources, which is often not reasonable in case of
wireless devices. In this work we use a formal framework to study the problem
of broadcasting and its time complexity in any two dimensional Euclidean
wireless network with uniform transmission powers. For the analysis, we
consider two popular models of ad hoc networks based on the
Signal-to-Interference-and-Noise Ratio (SINR): one with opportunistic links,
and the other with randomly disturbed SINR. In the former model, we show that
one of our algorithms accomplishes broadcasting in rounds, where
is the number of nodes and is the diameter of the network. If nodes
know a priori the granularity of the network, i.e., the inverse of the
maximum transmission range over the minimum distance between any two stations,
a modification of this algorithm accomplishes broadcasting in
rounds.
Finally, we modify both algorithms to make them efficient in the latter model
with randomly disturbed SINR, with only logarithmic growth of performance.
Ours are the first provably efficient and well-scalable, under the two
models, distributed deterministic solutions for the broadcast task.Comment: arXiv admin note: substantial text overlap with arXiv:1207.673
Rendezvous of Distance-aware Mobile Agents in Unknown Graphs
We study the problem of rendezvous of two mobile agents starting at distinct
locations in an unknown graph. The agents have distinct labels and walk in
synchronous steps. However the graph is unlabelled and the agents have no means
of marking the nodes of the graph and cannot communicate with or see each other
until they meet at a node. When the graph is very large we want the time to
rendezvous to be independent of the graph size and to depend only on the
initial distance between the agents and some local parameters such as the
degree of the vertices, and the size of the agent's label. It is well known
that even for simple graphs of degree , the rendezvous time can be
exponential in in the worst case. In this paper, we introduce a new
version of the rendezvous problem where the agents are equipped with a device
that measures its distance to the other agent after every step. We show that
these \emph{distance-aware} agents are able to rendezvous in any unknown graph,
in time polynomial in all the local parameters such the degree of the nodes,
the initial distance and the size of the smaller of the two agent labels . Our algorithm has a time complexity of
and we show an almost matching lower bound of
on the time complexity of any
rendezvous algorithm in our scenario. Further, this lower bound extends
existing lower bounds for the general rendezvous problem without distance
awareness
Fault-Tolerant Aggregation: Flow-Updating Meets Mass-Distribution
Flow-Updating (FU) is a fault-tolerant technique that has proved to be
efficient in practice for the distributed computation of aggregate functions in
communication networks where individual processors do not have access to global
information. Previous distributed aggregation protocols, based on repeated
sharing of input values (or mass) among processors, sometimes called
Mass-Distribution (MD) protocols, are not resilient to communication failures
(or message loss) because such failures yield a loss of mass. In this paper, we
present a protocol which we call Mass-Distribution with Flow-Updating (MDFU).
We obtain MDFU by applying FU techniques to classic MD. We analyze the
convergence time of MDFU showing that stochastic message loss produces low
overhead. This is the first convergence proof of an FU-based algorithm. We
evaluate MDFU experimentally, comparing it with previous MD and FU protocols,
and verifying the behavior predicted by the analysis. Finally, given that MDFU
incurs a fixed deviation proportional to the message-loss rate, we adjust the
accuracy of MDFU heuristically in a new protocol called MDFU with Linear
Prediction (MDFU-LP). The evaluation shows that both MDFU and MDFU-LP behave
very well in practice, even under high rates of message loss and even changing
the input values dynamically.Comment: 18 pages, 5 figures, To appear in OPODIS 201
Mobile agent rendezvous: A survey
Abstract. Recent results on the problem of mobile agent rendezvous on distributed networks are surveyed with an emphasis on outlining the various approaches taken by researchers in the theoretical computer science community.
Rendezvous of Heterogeneous Mobile Agents in Edge-weighted Networks
We introduce a variant of the deterministic rendezvous problem for a pair of
heterogeneous agents operating in an undirected graph, which differ in the time
they require to traverse particular edges of the graph. Each agent knows the
complete topology of the graph and the initial positions of both agents. The
agent also knows its own traversal times for all of the edges of the graph, but
is unaware of the corresponding traversal times for the other agent. The goal
of the agents is to meet on an edge or a node of the graph. In this scenario,
we study the time required by the agents to meet, compared to the meeting time
in the offline scenario in which the agents have complete knowledge
about each others speed characteristics. When no additional assumptions are
made, we show that rendezvous in our model can be achieved after time in a -node graph, and that such time is essentially in some cases
the best possible. However, we prove that the rendezvous time can be reduced to
when the agents are allowed to exchange bits of
information at the start of the rendezvous process. We then show that under
some natural assumption about the traversal times of edges, the hardness of the
heterogeneous rendezvous problem can be substantially decreased, both in terms
of time required for rendezvous without communication, and the communication
complexity of achieving rendezvous in time
Byzantine Gathering in Networks
This paper investigates an open problem introduced in [14]. Two or more
mobile agents start from different nodes of a network and have to accomplish
the task of gathering which consists in getting all together at the same node
at the same time. An adversary chooses the initial nodes of the agents and
assigns a different positive integer (called label) to each of them. Initially,
each agent knows its label but does not know the labels of the other agents or
their positions relative to its own. Agents move in synchronous rounds and can
communicate with each other only when located at the same node. Up to f of the
agents are Byzantine. A Byzantine agent can choose an arbitrary port when it
moves, can convey arbitrary information to other agents and can change its
label in every round, in particular by forging the label of another agent or by
creating a completely new one.
What is the minimum number M of good agents that guarantees deterministic
gathering of all of them, with termination?
We provide exact answers to this open problem by considering the case when
the agents initially know the size of the network and the case when they do
not. In the former case, we prove M=f+1 while in the latter, we prove M=f+2.
More precisely, for networks of known size, we design a deterministic algorithm
gathering all good agents in any network provided that the number of good
agents is at least f+1. For networks of unknown size, we also design a
deterministic algorithm ensuring the gathering of all good agents in any
network but provided that the number of good agents is at least f+2. Both of
our algorithms are optimal in terms of required number of good agents, as each
of them perfectly matches the respective lower bound on M shown in [14], which
is of f+1 when the size of the network is known and of f+2 when it is unknown
Developing a tool to assess trainees during crisis management training for major risks
International audienceOften based on simulation exercises, crisis management training helps prepare decision-makers to manage crises better. However, this training has definite limits in terms of trainee assessment and the feed-back given during the debriefing phase. This paper presents a method for better organising the assessment of trainees involved in a real time crisis management training exercises and for giving them feedback during the debriefing phase. The approach presented is based on creating a typology of training objectives in order to or-ganise the assessment. The assessment includes expected outcomes techniques as well as the human and or-ganisational factors that can be observed within a group. The assessment tools developed were then experi-mented within crisis management exercises completed with trainees. Beyond the basic results, these tools helped redefine the basic roles played by observers and trainers during training exercises
Results from the Antarctic Muon and Neutrino Detector Array (AMANDA)
We show new results from both the older and newer incarnations of AMANDA
(AMANDA-B10 and AMANDA-II, respectively). These results demonstrate that AMANDA
is a functioning, multipurpose detector with significant physics and
astrophysics reach. They include a new higher-statistics measurement of the
atmospheric muon neutrino flux and preliminary results from searches for a
variety of sources of ultrahigh energy neutrinos: generic point sources,
gamma-ray bursters and diffuse sources producing muons in the detector, and
diffuse sources producing electromagnetic or hadronic showers in or near the
detector.Comment: Invited talk at the XXth International Conference on Neutrino Physics
and Astrophysics (Neutrino 2002), Munich, Germany, May 25-30, 200
Strangeness Enhancement in and Interactions at SPS Energies
The systematics of strangeness enhancement is calculated using the HIJING and
VENUS models and compared to recent data on , and
collisions at CERN/SPS energies (). The HIJING model is used to
perform a {\em linear} extrapolation from to . VENUS is used to
estimate the effects of final state cascading and possible non-conventional
production mechanisms. This comparison shows that the large enhancement of
strangeness observed in collisions, interpreted previously as possible
evidence for quark-gluon plasma formation, has its origins in non-equilibrium
dynamics of few nucleon systems. % Strangeness enhancement %is therefore traced
back to the change in the production dynamics %from to minimum bias
and central collisions. A factor of two enhancement of at
mid-rapidity is indicated by recent data, where on the average {\em one}
projectile nucleon interacts with only {\em two} target nucleons. There appears
to be another factor of two enhancement in the light ion reaction relative
to , when on the average only two projectile nucleons interact with two
target ones.Comment: 29 pages, 8 figures in uuencoded postscript fil
- …