64 research outputs found
Signed graph embedding: when everybody can sit closer to friends than enemies
Signed graphs are graphs with signed edges. They are commonly used to
represent positive and negative relationships in social networks. While balance
theory and clusterizable graphs deal with signed graphs to represent social
interactions, recent empirical studies have proved that they fail to reflect
some current practices in real social networks. In this paper we address the
issue of drawing signed graphs and capturing such social interactions. We relax
the previous assumptions to define a drawing as a model in which every vertex
has to be placed closer to its neighbors connected via a positive edge than its
neighbors connected via a negative edge in the resulting space. Based on this
definition, we address the problem of deciding whether a given signed graph has
a drawing in a given -dimensional Euclidean space. We present forbidden
patterns for signed graphs that admit the introduced definition of drawing in
the Euclidean plane and line. We then focus on the -dimensional case, where
we provide a polynomial time algorithm that decides if a given complete signed
graph has a drawing, and constructs it when applicable
System Stability Under Adversarial Injection of Dependent Tasks
Technological changes (NFV, Osmotic Computing, Cyber-physical Systems) are making very
important devising techniques to efficiently run a flow of jobs formed by dependent tasks in a set of servers.
These problem can be seen as generalizations of the dynamic job-shop scheduling problem, with very
rich dependency patterns and arrival assumptions. In this work, we consider a computational model of a
distributed system formed by a set of servers in which jobs, that are continuously arriving, have to be
executed. Every job is formed by a set of dependent tasks (i. e., each task may have to wait for others to
be completed before it can be started), each of which has to be executed in one of the servers. The arrival of
jobs and their properties is assumed to be controlled by a bounded adversary, whose only restriction is that
it cannot overload any server. This model is a non-trivial generalization of the Adversarial Queuing Theory
model of Borodin et al., and, like that model, focuses on the stability of the system: whether the number of
jobs pending to be completed is bounded at all times. We show multiple results of stability and instability for
this adversarial model under different combinations of the scheduling policy used at the servers, the arrival
rate, and the dependence between tasks in the jobs
An Early-stopping Protocol for Computing Aggregate Functions in Sensor Networks
International audienceIn this paper, we study algebraic aggregate com- putations in Sensor Networks. The main contribution is the presentation of an early-stopping protocol that computes the average function under a harsh model of the conditions under which sensor nodes operate. This protocol is shown to be time-optimal in presence of unfrequent failures. The approach followed saves time and energy by relying the computation on a small network of delegate nodes that can be rebuilt fast in case of node failures and communicate using a collision- free schedule. Delegate nodes run simultaneously two protocols, namely, a collection/dissemination tree-based algorithm, which is shown to be optimal, and a mass-distribution algorithm. Both algorithms are analyzed under a model where the frequency of failures is a parameter. Other aggregate computation algo- rithms can be easily derived from this protocol. To the best of our knowledge, this is the ïŹrst optimal early-stopping algorithm for aggregate computations in Sensor Networks
- âŠ