122 research outputs found

    A New Self-Stabilizing Maximal Matching Algorithm

    Get PDF
    The maximal matching problem has received considerable attention in the self-stabilizing community. Previous work has given different self-stabilizing algorithms that solves the problem for both the adversarial and fair distributed daemon, the sequential adversarial daemon, as well as the synchronous daemon. In the following we present a single self-stabilizing algorithm for this problem that unites all of these algorithms in that it stabilizes in the same number of moves as the previous best algorithms for the sequential adversarial, the distributed fair, and the synchronous daemon. In addition, the algorithm improves the previous best moves complexities for the distributed adversarial daemon from O(n^2) and O(delta m) to O(m) where n is the number of processes, m is thenumber of edges, and delta is the maximum degree in the graph

    Alliance free and alliance cover sets

    Full text link
    A \emph{defensive} (\emph{offensive}) kk-\emph{alliance} in Γ=(V,E)\Gamma=(V,E) is a set S⊆VS\subseteq V such that every vv in SS (in the boundary of SS) has at least kk more neighbors in SS than it has in V∖SV\setminus S. A set X⊆VX\subseteq V is \emph{defensive} (\emph{offensive}) kk-\emph{alliance free,} if for all defensive (offensive) kk-alliance SS, S∖X≠∅S\setminus X\neq\emptyset, i.e., XX does not contain any defensive (offensive) kk-alliance as a subset. A set Y⊆VY \subseteq V is a \emph{defensive} (\emph{offensive}) kk-\emph{alliance cover}, if for all defensive (offensive) kk-alliance SS, S∩Y≠∅S\cap Y\neq\emptyset, i.e., YY contains at least one vertex from each defensive (offensive) kk-alliance of Γ\Gamma. In this paper we show several mathematical properties of defensive (offensive) kk-alliance free sets and defensive (offensive) kk-alliance cover sets, including tight bounds on the cardinality of defensive (offensive) kk-alliance free (cover) sets

    Self-stabilizing algorithms for Connected Vertex Cover and Clique decomposition problems

    Full text link
    In many wireless networks, there is no fixed physical backbone nor centralized network management. The nodes of such a network have to self-organize in order to maintain a virtual backbone used to route messages. Moreover, any node of the network can be a priori at the origin of a malicious attack. Thus, in one hand the backbone must be fault-tolerant and in other hand it can be useful to monitor all network communications to identify an attack as soon as possible. We are interested in the minimum \emph{Connected Vertex Cover} problem, a generalization of the classical minimum Vertex Cover problem, which allows to obtain a connected backbone. Recently, Delbot et al.~\cite{DelbotLP13} proposed a new centralized algorithm with a constant approximation ratio of 22 for this problem. In this paper, we propose a distributed and self-stabilizing version of their algorithm with the same approximation guarantee. To the best knowledge of the authors, it is the first distributed and fault-tolerant algorithm for this problem. The approach followed to solve the considered problem is based on the construction of a connected minimal clique partition. Therefore, we also design the first distributed self-stabilizing algorithm for this problem, which is of independent interest

    Reachability of Five Gossip Protocols

    Get PDF
    Gossip protocols use point-to-point communication to spread information within a network until every agent knows everything. Each agent starts with her own piece of information (‘secret’) and in each call two agents will exchange all secrets they currently know. Depending on the protocol, this leads to different distributions of secrets among the agents during its execution. We investigate which distributions of secrets are reachable when using several distributed epistemic gossip protocols from the literature. Surprisingly, a protocol may reach the distribution where all agents know all secrets, but not all other distributions. The five protocols we consider are called 햠햭햸, 햫햭햲, 햢햮, 햳햮햪, and 햲햯햨. We find that 햳햮햪 and 햠햭햸 reach the same distributions but all other protocols reach different sets of distributions, with some inclusions. Additionally, we show that all distributions are subreachable with all five protocols: any distribution can be reached, if there are enough additional agents

    An Introduction to Temporal Graphs: An Algorithmic Perspective

    Get PDF
    A \emph{temporal graph} is, informally speaking, a graph that changes with time. When time is discrete and only the relationships between the participating entities may change and not the entities themselves, a temporal graph may be viewed as a sequence G1,G2…,GlG_1,G_2\ldots,G_l of static graphs over the same (static) set of nodes VV. Though static graphs have been extensively studied, for their temporal generalization we are still far from having a concrete set of structural and algorithmic principles. Recent research shows that many graph properties and problems become radically different and usually substantially more difficult when an extra time dimension in added to them. Moreover, there is already a rich and rapidly growing set of modern systems and applications that can be naturally modeled and studied via temporal graphs. This, further motivates the need for the development of a temporal extension of graph theory. We survey here recent results on temporal graphs and temporal graph problems that have appeared in the Computer Science community

    Homomorphisms of graphs : technical report

    Full text link
    http://deepblue.lib.umich.edu/bitstream/2027.42/5440/5/bac4075.0001.001.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/5440/4/bac4075.0001.001.tx
    • …
    corecore