122 research outputs found
A New Self-Stabilizing Maximal Matching Algorithm
The maximal matching problem has received considerable attention in the self-stabilizing community. Previous work has given different self-stabilizing algorithms that solves the problem for both the adversarial and fair distributed daemon, the sequential adversarial daemon, as well as the synchronous daemon. In the following we present a single self-stabilizing algorithm for this problem that unites all of these algorithms in that it stabilizes in the same number of moves as the previous best algorithms for the sequential adversarial, the distributed fair, and the synchronous daemon. In addition, the algorithm improves the previous best moves complexities for the distributed adversarial daemon from O(n^2) and O(delta m) to O(m) where n is the number of processes, m is thenumber of edges, and delta is the maximum degree in the graph
Alliance free and alliance cover sets
A \emph{defensive} (\emph{offensive}) -\emph{alliance} in
is a set such that every in (in the boundary of ) has
at least more neighbors in than it has in . A set
is \emph{defensive} (\emph{offensive}) -\emph{alliance free,}
if for all defensive (offensive) -alliance , ,
i.e., does not contain any defensive (offensive) -alliance as a subset.
A set is a \emph{defensive} (\emph{offensive})
-\emph{alliance cover}, if for all defensive (offensive) -alliance ,
, i.e., contains at least one vertex from each
defensive (offensive) -alliance of . In this paper we show several
mathematical properties of defensive (offensive) -alliance free sets and
defensive (offensive) -alliance cover sets, including tight bounds on the
cardinality of defensive (offensive) -alliance free (cover) sets
Self-stabilizing algorithms for Connected Vertex Cover and Clique decomposition problems
In many wireless networks, there is no fixed physical backbone nor
centralized network management. The nodes of such a network have to
self-organize in order to maintain a virtual backbone used to route messages.
Moreover, any node of the network can be a priori at the origin of a malicious
attack. Thus, in one hand the backbone must be fault-tolerant and in other hand
it can be useful to monitor all network communications to identify an attack as
soon as possible. We are interested in the minimum \emph{Connected Vertex
Cover} problem, a generalization of the classical minimum Vertex Cover problem,
which allows to obtain a connected backbone. Recently, Delbot et
al.~\cite{DelbotLP13} proposed a new centralized algorithm with a constant
approximation ratio of for this problem. In this paper, we propose a
distributed and self-stabilizing version of their algorithm with the same
approximation guarantee. To the best knowledge of the authors, it is the first
distributed and fault-tolerant algorithm for this problem. The approach
followed to solve the considered problem is based on the construction of a
connected minimal clique partition. Therefore, we also design the first
distributed self-stabilizing algorithm for this problem, which is of
independent interest
Reachability of Five Gossip Protocols
Gossip protocols use point-to-point communication to spread information within a network until every agent knows everything. Each agent starts with her own piece of information (‘secret’) and in each call two agents will exchange all secrets they currently know. Depending on the protocol, this leads to different distributions of secrets among the agents during its execution. We investigate which distributions of secrets are reachable when using several distributed epistemic gossip protocols from the literature. Surprisingly, a protocol may reach the distribution where all agents know all secrets, but not all other distributions. The five protocols we consider are called í– í–í–¸, í–«í–í–², 햢햮, 햳햮햪, and 햲햯햨. We find that 햳햮햪 and í– í–í–¸ reach the same distributions but all other protocols reach different sets of distributions, with some inclusions. Additionally, we show that all distributions are subreachable with all five protocols: any distribution can be reached, if there are enough additional agents
An Introduction to Temporal Graphs: An Algorithmic Perspective
A \emph{temporal graph} is, informally speaking, a graph that changes with time. When time is discrete and only the relationships between the participating entities may change and not the entities themselves, a temporal graph may be viewed as a sequence of static graphs over the same (static) set of nodes . Though static graphs have been extensively studied, for their temporal generalization we are still far from having a concrete set of structural and algorithmic principles. Recent research shows that many graph properties and problems become radically different and usually substantially more difficult when an extra time dimension in added to them. Moreover, there is already a rich and rapidly growing set of modern systems and applications that can be naturally modeled and studied via temporal graphs. This, further motivates the need for the development of a temporal extension of graph theory. We survey here recent results on temporal graphs and temporal graph problems that have appeared in the Computer Science community
Homomorphisms of graphs : technical report
http://deepblue.lib.umich.edu/bitstream/2027.42/5440/5/bac4075.0001.001.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/5440/4/bac4075.0001.001.tx
- …