首页 > 最新文献

Proceedings of the 2014 ACM symposium on Principles of distributed computing最新文献

英文 中文
Multi-message broadcast with abstract MAC layers and unreliable links 具有抽象MAC层和不可靠链路的多消息广播
Pub Date : 2014-05-07 DOI: 10.1145/2611462.2611492
M. Ghaffari, Erez Kantor, N. Lynch, Calvin C. Newport
We study the multi-message broadcast problem using abstract MAC layer models of wireless networks. These models capture the key guarantees of existing MAC layers while abstracting away low-level details such as signal propagation and contention.We begin by studying upper and lower bounds for this problem in a standard abstract MAC layer model---identifying an interesting dependence between the structure of unreliable links and achievable time complexity. In more detail, given a restriction that devices connected directly by an unreliable link are not too far from each other in the reliable link topology, we can (almost) match the efficiency of the reliable case. For the related restriction, however, that two devices connected by an unreliable link are not too far from each other in geographic distance, we prove a new lower bound that shows that this efficiency is impossible. We then investigate how much extra power must be added to the model to enable a new order of magnitude of efficiency. In more detail, we consider an enhanced abstract MAC layer model and present a new multi-message broadcast algorithm that (under certain natural assumptions) solves the problem in this model faster than any known solutions in an abstract MAC layer setting.
利用抽象的无线网络MAC层模型研究了多消息广播问题。这些模型捕获了现有MAC层的关键保证,同时抽象了信号传播和争用等低级细节。我们首先在一个标准抽象MAC层模型中研究这个问题的上界和下界——确定不可靠链路的结构和可实现的时间复杂度之间的有趣依赖关系。更详细地说,给定一个限制,即由不可靠链路直接连接的设备在可靠链路拓扑中彼此相距不太远,我们(几乎)可以匹配可靠情况的效率。然而,对于由不可靠链路连接的两个设备在地理距离上相距不太远的相关限制,我们证明了一个新的下界,该下界表明该效率是不可能的。然后,我们研究必须向模型添加多少额外功率才能实现新的效率数量级。更详细地说,我们考虑了一个增强的抽象MAC层模型,并提出了一个新的多消息广播算法(在某些自然假设下),该算法比抽象MAC层设置中的任何已知解决方案更快地解决该模型中的问题。
{"title":"Multi-message broadcast with abstract MAC layers and unreliable links","authors":"M. Ghaffari, Erez Kantor, N. Lynch, Calvin C. Newport","doi":"10.1145/2611462.2611492","DOIUrl":"https://doi.org/10.1145/2611462.2611492","url":null,"abstract":"We study the multi-message broadcast problem using abstract MAC layer models of wireless networks. These models capture the key guarantees of existing MAC layers while abstracting away low-level details such as signal propagation and contention.We begin by studying upper and lower bounds for this problem in a standard abstract MAC layer model---identifying an interesting dependence between the structure of unreliable links and achievable time complexity. In more detail, given a restriction that devices connected directly by an unreliable link are not too far from each other in the reliable link topology, we can (almost) match the efficiency of the reliable case. For the related restriction, however, that two devices connected by an unreliable link are not too far from each other in geographic distance, we prove a new lower bound that shows that this efficiency is impossible. We then investigate how much extra power must be added to the model to enable a new order of magnitude of efficiency. In more detail, we consider an enhanced abstract MAC layer model and present a new multi-message broadcast algorithm that (under certain natural assumptions) solves the problem in this model faster than any known solutions in an abstract MAC layer setting.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Consensus with an abstract MAC layer 与抽象MAC层的一致性
Pub Date : 2014-05-06 DOI: 10.1145/2611462.2611479
Calvin C. Newport
In this paper, we study distributed consensus in the radio network setting. We produce new upper and lower bounds for this problem in an abstract MAC layer model that captures the key guarantees provided by most wireless MAC layers. In more detail, we first generalize the well-known impossibility of deterministic consensus with a single crash failure [FLP 1985] from the asynchronous message passing model to our wireless setting. Proceeding under the assumption of no faults, we then investigate the amount of network knowledge required to solve consensus in our model---an important question given that these networks are often deployed in an ad hoc manner. We prove consensus is impossible without unique ids or without knowledge of network size (in multihop topologies). We also prove a lower bound on optimal time complexity. We then match these lower bounds with a pair of new deterministic consensus algorithms---one for single hop topologies and one for multihop topologies---providing a comprehensive characterization of the consensus problem in the wireless setting. From a theoretical perspective, our results shed new insight into the role of network information and the power of MAC layer abstractions in solving distributed consensus. From a practical perspective, given the level of abstraction used by our model, our upper bounds can be easily implemented in real wireless devices on existing MAC layers while preserving their correctness guarantees---facilitating the development of wireless distributed systems.
本文主要研究无线网络环境下的分布式一致性问题。我们在一个抽象的MAC层模型中给出了这个问题的上界和下界,该模型捕获了大多数无线MAC层提供的关键保证。更详细地说,我们首先从异步消息传递模型推广到我们的无线设置中,在单一崩溃故障下众所周知的确定性共识的不可能性[FLP 1985]。在没有故障的假设下进行,然后我们研究了在我们的模型中解决共识所需的网络知识的数量——考虑到这些网络通常以特别的方式部署,这是一个重要的问题。我们证明,如果没有唯一id或不知道网络大小(在多跳拓扑中),共识是不可能的。我们还证明了最优时间复杂度的下界。然后,我们将这些下界与一对新的确定性共识算法相匹配-一个用于单跳拓扑,一个用于多跳拓扑-提供无线设置中共识问题的全面表征。从理论的角度来看,我们的研究结果揭示了网络信息的作用和MAC层抽象在解决分布式共识中的作用。从实际的角度来看,考虑到我们的模型所使用的抽象级别,我们的上界可以很容易地在现有MAC层的实际无线设备中实现,同时保留其正确性保证,从而促进无线分布式系统的开发。
{"title":"Consensus with an abstract MAC layer","authors":"Calvin C. Newport","doi":"10.1145/2611462.2611479","DOIUrl":"https://doi.org/10.1145/2611462.2611479","url":null,"abstract":"In this paper, we study distributed consensus in the radio network setting. We produce new upper and lower bounds for this problem in an abstract MAC layer model that captures the key guarantees provided by most wireless MAC layers. In more detail, we first generalize the well-known impossibility of deterministic consensus with a single crash failure [FLP 1985] from the asynchronous message passing model to our wireless setting. Proceeding under the assumption of no faults, we then investigate the amount of network knowledge required to solve consensus in our model---an important question given that these networks are often deployed in an ad hoc manner. We prove consensus is impossible without unique ids or without knowledge of network size (in multihop topologies). We also prove a lower bound on optimal time complexity. We then match these lower bounds with a pair of new deterministic consensus algorithms---one for single hop topologies and one for multihop topologies---providing a comprehensive characterization of the consensus problem in the wireless setting. From a theoretical perspective, our results shed new insight into the role of network information and the power of MAC layer abstractions in solving distributed consensus. From a practical perspective, given the level of abstraction used by our model, our upper bounds can be easily implemented in real wireless devices on existing MAC layers while preserving their correctness guarantees---facilitating the development of wireless distributed systems.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133985682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Efficient lock-free binary search trees 高效的无锁二叉搜索树
Pub Date : 2014-04-12 DOI: 10.1145/2611462.2611500
Bapi Chatterjee, Nhan Nguyen Dang, P. Tsigas
In this paper we present a novel algorithm for concurrent lock-free internal binary search trees (BST) and implement a Set abstract data type (ADT) based on that. We show that in the presented lock-free BST algorithm the amortized step complexity of each set operation - Add, Remove and Contains - is O(H(n) + c), where H(n) is the height of the BST with n number of nodes and c is the contention during the execution. Our algorithm adapts to contention measures according to read-write load. If the situation is read-heavy, the operations avoid helping the concurrent Remove operations during traversal, and adapt to interval contention. However, for the write-heavy situations we let an operation help a concurrent Remove, even though it is not obstructed. In that case, an operation adapts to point contention. It uses single-word compare-and-swap (CAS) operations. We show that our algorithm has improved disjoint-access-parallelism compared to similar existing algorithms. We prove that the presented algorithm is linearizable. To the best of our knowledge, this is the first algorithm for any concurrent tree data-structure in which the modify operations are performed with an additive term of contention measure.
本文提出了一种新的并行无锁内部二叉搜索树(BST)算法,并在此基础上实现了一个集合抽象数据类型(ADT)。我们证明了在无锁BST算法中,每个集合操作(Add, Remove和Contains)的平摊步骤复杂度为O(H(n) + c),其中H(n)是具有n个节点的BST的高度,c是执行过程中的争用。我们的算法根据读写负载适应争用度量。如果情况是重读的,操作将避免在遍历期间帮助并发的Remove操作,并适应间隔争用。然而,对于写量大的情况,我们让一个操作帮助并发Remove,即使它没有被阻塞。在这种情况下,操作适应点争用。它使用单字比较与交换(CAS)操作。与现有的类似算法相比,我们的算法提高了分离访问并行性。我们证明了该算法是线性化的。据我们所知,这是任何并发树数据结构的第一种算法,在这种数据结构中,修改操作是用一个可加的争用项度量来执行的。
{"title":"Efficient lock-free binary search trees","authors":"Bapi Chatterjee, Nhan Nguyen Dang, P. Tsigas","doi":"10.1145/2611462.2611500","DOIUrl":"https://doi.org/10.1145/2611462.2611500","url":null,"abstract":"In this paper we present a novel algorithm for concurrent lock-free internal binary search trees (BST) and implement a Set abstract data type (ADT) based on that. We show that in the presented lock-free BST algorithm the amortized step complexity of each set operation - Add, Remove and Contains - is O(H(n) + c), where H(n) is the height of the BST with n number of nodes and c is the contention during the execution. Our algorithm adapts to contention measures according to read-write load. If the situation is read-heavy, the operations avoid helping the concurrent Remove operations during traversal, and adapt to interval contention. However, for the write-heavy situations we let an operation help a concurrent Remove, even though it is not obstructed. In that case, an operation adapts to point contention. It uses single-word compare-and-swap (CAS) operations. We show that our algorithm has improved disjoint-access-parallelism compared to similar existing algorithms. We prove that the presented algorithm is linearizable. To the best of our knowledge, this is the first algorithm for any concurrent tree data-structure in which the modify operations are performed with an additive term of contention measure.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Brief announcement: almost-tight approximation distributed algorithm for minimum cut 简短公告:最小切割的近紧密近似分布算法
Pub Date : 2014-03-24 DOI: 10.1145/2611462.2611511
Danupon Nanongkai
In this short paper, we present an improved algorithm for approximating the minimum cut on distributed (CONGEST) networks. Let λ be the minimum cut. Our algorithm can compute λ exactly in O((√n+D) poly(λ)) time, where n is the number of nodes (processors) in the network, D is the network diameter, and ~O hides poly log n. By a standard reduction, we can convert this algorithm into a (1+ε)-approximation O((√n+D)/poly(ε))-time algorithm. The latter result improves over the previous (2+ε)-approximation O((√n+D)/poly(ε))-time algorithm of Ghaffari and Kuhn (DISC 2013). Due to the lower bound of ~Ω(√n+D) by Das Sarma et al. (SICOMP 2013), this running time is tight up to a poly log n factor. Our algorithm is an extremely simple combination of Thorup's tree packing theorem [Combinatorica 2007], Kutten and Peleg's tree partitioning algorithm [J. Algorithms 1998], and Karger's dynamic programming [JACM 2000].
在这篇短文中,我们提出了一种改进的算法来逼近分布式(CONGEST)网络上的最小割。设λ为最小截距。我们的算法可以在O((√n+D) poly(λ))时间内精确地计算λ,其中n为网络中节点(处理器)的数量,D为网络直径,~O隐藏poly log n。通过标准约简,我们可以将该算法转换为(1+ε)-近似O((√n+D)/poly(ε))时间算法。后一种结果优于Ghaffari和Kuhn (DISC 2013)先前的(2+ε)-近似O((√n+D)/poly(ε))时间算法。由于Das Sarma等人(SICOMP 2013)的~Ω(√n+D)的下界,该运行时间紧到一个多log n因子。我们的算法是Thorup的树填充定理[Combinatorica 2007], Kutten和Peleg的树划分算法[J]的一个极其简单的组合。[算法1998],和kager的动态规划[JACM 2000]。
{"title":"Brief announcement: almost-tight approximation distributed algorithm for minimum cut","authors":"Danupon Nanongkai","doi":"10.1145/2611462.2611511","DOIUrl":"https://doi.org/10.1145/2611462.2611511","url":null,"abstract":"In this short paper, we present an improved algorithm for approximating the minimum cut on distributed (CONGEST) networks. Let λ be the minimum cut. Our algorithm can compute λ exactly in O((√n+D) poly(λ)) time, where n is the number of nodes (processors) in the network, D is the network diameter, and ~O hides poly log n. By a standard reduction, we can convert this algorithm into a (1+ε)-approximation O((√n+D)/poly(ε))-time algorithm. The latter result improves over the previous (2+ε)-approximation O((√n+D)/poly(ε))-time algorithm of Ghaffari and Kuhn (DISC 2013). Due to the lower bound of ~Ω(√n+D) by Das Sarma et al. (SICOMP 2013), this running time is tight up to a poly log n factor. Our algorithm is an extremely simple combination of Thorup's tree packing theorem [Combinatorica 2007], Kutten and Peleg's tree partitioning algorithm [J. Algorithms 1998], and Karger's dynamic programming [JACM 2000].","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129749022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Beyond geometry: towards fully realistic wireless models 超越几何:走向完全逼真的无线模型
Pub Date : 2014-02-20 DOI: 10.1145/2611462.2611476
Marijke H. L. Bodlaender, M. Halldórsson
Signal-strength models of wireless communications capture the gradual fading of signals and the additivity of interference. As such, they are closer to reality than other models. However, nearly all theoretic work in the SINR model depends on the assumption of smooth geometric decay, one that is true in free space but is far off in actual environments. The challenge is to model realistic environments, including walls, obstacles, reflections and anisotropic antennas, without making the models algorithmically impractical or analytically intractable. We present a simple solution that allows the modeling of arbitrary static situations by moving from geometry to arbitrary decay spaces. The complexity of a setting is captured by a metricity parameter ζ that indicates how far the decay space is from satisfying the triangular inequality. All results that hold in the SINR model in general metrics carry over to decay spaces, with the resulting time complexity and approximation depending on ζ in the same way that the original results depends on the path loss term α. For distributed algorithms, that to date have appeared to necessarily depend on the planarity, we indicate how they can be adapted to arbitrary decay spaces at a cost in time complexity that depends on a fading parameter of the decay space. In particular, for decay spaces that are doubling, the parameter is constant-bounded. Finally, we explore the dependence on ζ in the approximability of core problems. In particular, we observe that the capacity maximization problem has exponential upper and lower bounds in terms of ζ in general decay spaces. In Euclidean metrics and related growth-bounded decay spaces, the performance depends on the exact metricity definition, with a polynomial upper bound in terms of ζ, but an exponential lower bound in terms of a variant parameter φ. The upper bound result is the first approximation of a capacity-type SINR problem that is subexponential in α.
无线通信的信号强度模型捕捉信号的逐渐衰落和干扰的可加性。因此,它们比其他模型更接近现实。然而,几乎所有SINR模型的理论工作都依赖于平滑几何衰减的假设,这在自由空间中是正确的,但在实际环境中距离很远。挑战在于模拟现实环境,包括墙壁,障碍物,反射和各向异性天线,而不是使模型在算法上不切实际或难以分析。我们提出了一个简单的解决方案,允许通过从几何到任意衰减空间的任意静态情况的建模。设置的复杂性由度量参数ζ捕获,该参数表示衰变空间距离满足三角不等式有多远。所有在SINR模型中持有的结果在一般度量中延续到衰减空间,其结果的时间复杂度和近似依赖于ζ,就像原始结果依赖于路径损失项α一样。对于分布式算法,迄今为止似乎必须依赖于平面性,我们指出它们如何以依赖于衰减空间的衰落参数的时间复杂度为代价来适应任意衰减空间。特别地,对于加倍的衰减空间,参数是常数有界的。最后,我们探讨了在核心问题的近似性中对ζ的依赖。特别地,我们观察到容量最大化问题在一般的衰变空间中有指数的上下界。在欧几里得度量和相关的增长有界衰减空间中,性能依赖于确切的度量定义,具有多项式的ζ上界,但指数的下界是一个变量参数φ。上界结果是一个在α中是次指数的容量型SINR问题的第一个近似。
{"title":"Beyond geometry: towards fully realistic wireless models","authors":"Marijke H. L. Bodlaender, M. Halldórsson","doi":"10.1145/2611462.2611476","DOIUrl":"https://doi.org/10.1145/2611462.2611476","url":null,"abstract":"Signal-strength models of wireless communications capture the gradual fading of signals and the additivity of interference. As such, they are closer to reality than other models. However, nearly all theoretic work in the SINR model depends on the assumption of smooth geometric decay, one that is true in free space but is far off in actual environments. The challenge is to model realistic environments, including walls, obstacles, reflections and anisotropic antennas, without making the models algorithmically impractical or analytically intractable. We present a simple solution that allows the modeling of arbitrary static situations by moving from geometry to arbitrary decay spaces. The complexity of a setting is captured by a metricity parameter ζ that indicates how far the decay space is from satisfying the triangular inequality. All results that hold in the SINR model in general metrics carry over to decay spaces, with the resulting time complexity and approximation depending on ζ in the same way that the original results depends on the path loss term α. For distributed algorithms, that to date have appeared to necessarily depend on the planarity, we indicate how they can be adapted to arbitrary decay spaces at a cost in time complexity that depends on a fading parameter of the decay space. In particular, for decay spaces that are doubling, the parameter is constant-bounded. Finally, we explore the dependence on ζ in the approximability of core problems. In particular, we observe that the capacity maximization problem has exponential upper and lower bounds in terms of ζ in general decay spaces. In Euclidean metrics and related growth-bounded decay spaces, the performance depends on the exact metricity definition, with a polynomial upper bound in terms of ζ, but an exponential lower bound in terms of a variant parameter φ. The upper bound result is the first approximation of a capacity-type SINR problem that is subexponential in α.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"33 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131501592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Optimal gossip with direct addressing 直接寻址的最佳八卦
Pub Date : 2014-02-11 DOI: 10.1145/2611462.2611489
Bernhard Haeupler, D. Malkhi
Gossip algorithms spread information in distributed networks by nodes repeatedly forwarding information to a few random contacts. By their very nature, gossip algorithms tend to be distributed and fault tolerant. If done right, they can also be fast and message-efficient. A common model for gossip communication is the random phone call model, in which in each synchronous round each node can PUSH or PULL information to or from a random other node. For example, Karp et al. [FOCS 2000] gave algorithms in this model that spread a message to all nodes in Θ(log n) rounds while sending only O(log log n) messages per node on average. They also showed that at least Θ(log n) rounds are necessary in this model and that algorithms achieving this round-complexity need to send ω(1) messages per node on average. Recently, Avin and Elsasser [DISC 2013], studied the random phone call model with the natural and commonly used assumption of direct addressing. Direct addressing allows nodes to directly contact nodes whose ID (e.g., IP address) was learned before. They show that in this setting, one can "break the log n barrier" and achieve a gossip algorithm running in O(√log n) rounds, albeit while using O(√log n) messages per node. In this paper we study the same model and give a simple gossip algorithm which spreads a message in only O(log log n) rounds. We furthermore prove a matching Ω(log log n) lower bound which shows that this running time is best possible. In particular we show that any gossip algorithm takes with high probability at least 0.99 log log n rounds to terminate. Lastly, our algorithm can be tweaked to send only O(1) messages per node on average with only O(log n) bits per message. Our algorithm therefore simultaneously achieves the optimal round-, message-, and bit-complexity for this setting. As all prior gossip algorithms, our algorithm is also robust against failures. In particular, if in the beginning an oblivious adversary fails any F nodes our algorithm still, with high probability, informs all but o(F) surviving nodes.
八卦算法在分布式网络中传播信息,是通过节点反复将信息转发给几个随机的联系人。就其本质而言,八卦算法倾向于分布式和容错。如果使用得当,它们也可以是快速和高效的。闲谈通信的常见模型是随机电话呼叫模型,在每个同步轮中,每个节点都可以向随机的其他节点推送或提取信息。例如,Karp等人[FOCS 2000]给出了该模型中的算法,该算法以Θ(log n)轮向所有节点传播消息,而平均每个节点仅发送O(log log n)条消息。他们还表明,在这个模型中至少需要Θ(log n)轮,并且实现这种轮复杂度的算法平均需要每个节点发送ω(1)条消息。最近,Avin和Elsasser [DISC 2013]在自然和常用的直接寻址假设下研究了随机电话呼叫模型。直接寻址允许节点直接联系之前学习到ID(如IP地址)的节点。他们表明,在这种情况下,人们可以“打破log n障碍”,实现在O(√log n)轮内运行的八卦算法,尽管每个节点使用O(√log n)条消息。在本文中,我们研究了相同的模型,并给出了一个简单的流言算法,该算法只需要O(log log n)轮传播消息。我们进一步证明了一个匹配的Ω(log log n)下界,这表明这个运行时间是最好的。特别地,我们证明了任何八卦算法在高概率下至少需要0.99 log log n轮才能终止。最后,我们的算法可以调整为平均每个节点只发送O(1)条消息,每条消息只有O(log n)位。因此,我们的算法同时实现了此设置的最佳轮复杂度、消息复杂度和位复杂度。与之前所有的八卦算法一样,我们的算法对失败也具有鲁棒性。特别是,如果在一开始,一个无意识的对手失败了任何F个节点,我们的算法仍然有很大的概率通知除了o(F)个幸存节点之外的所有节点。
{"title":"Optimal gossip with direct addressing","authors":"Bernhard Haeupler, D. Malkhi","doi":"10.1145/2611462.2611489","DOIUrl":"https://doi.org/10.1145/2611462.2611489","url":null,"abstract":"Gossip algorithms spread information in distributed networks by nodes repeatedly forwarding information to a few random contacts. By their very nature, gossip algorithms tend to be distributed and fault tolerant. If done right, they can also be fast and message-efficient. A common model for gossip communication is the random phone call model, in which in each synchronous round each node can PUSH or PULL information to or from a random other node. For example, Karp et al. [FOCS 2000] gave algorithms in this model that spread a message to all nodes in Θ(log n) rounds while sending only O(log log n) messages per node on average. They also showed that at least Θ(log n) rounds are necessary in this model and that algorithms achieving this round-complexity need to send ω(1) messages per node on average. Recently, Avin and Elsasser [DISC 2013], studied the random phone call model with the natural and commonly used assumption of direct addressing. Direct addressing allows nodes to directly contact nodes whose ID (e.g., IP address) was learned before. They show that in this setting, one can \"break the log n barrier\" and achieve a gossip algorithm running in O(√log n) rounds, albeit while using O(√log n) messages per node. In this paper we study the same model and give a simple gossip algorithm which spreads a message in only O(log log n) rounds. We furthermore prove a matching Ω(log log n) lower bound which shows that this running time is best possible. In particular we show that any gossip algorithm takes with high probability at least 0.99 log log n rounds to terminate. Lastly, our algorithm can be tweaked to send only O(1) messages per node on average with only O(log n) bits per message. Our algorithm therefore simultaneously achieves the optimal round-, message-, and bit-complexity for this setting. As all prior gossip algorithms, our algorithm is also robust against failures. In particular, if in the beginning an oblivious adversary fails any F nodes our algorithm still, with high probability, informs all but o(F) surviving nodes.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Brief announcement: local approximability of minimum dominating set on planar graphs 简述:平面图上最小支配集的局部逼近性
Pub Date : 2014-02-11 DOI: 10.1145/2611462.2611504
Miikka Hilke, C. Lenzen, J. Suomela
We show that there is no deterministic local algorithm (constant-time distributed graph algorithm) that finds a (7-ε)-approximation of a minimum dominating set on planar graphs, for any positive constant ε. In prior work, the best lower bound on the approximation ratio has been 5-ε; there is also an upper bound of 52.
我们证明了没有确定性局部算法(常时间分布式图算法)能在平面图上找到一个(7-ε)-近似的最小支配集,对于任何正常数ε。在以前的工作中,近似比的最佳下界为5-ε;上限也是52。
{"title":"Brief announcement: local approximability of minimum dominating set on planar graphs","authors":"Miikka Hilke, C. Lenzen, J. Suomela","doi":"10.1145/2611462.2611504","DOIUrl":"https://doi.org/10.1145/2611462.2611504","url":null,"abstract":"We show that there is no deterministic local algorithm (constant-time distributed graph algorithm) that finds a (7-ε)-approximation of a minimum dominating set on planar graphs, for any positive constant ε. In prior work, the best lower bound on the approximation ratio has been 5-ε; there is also an upper bound of 52.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Distributed connectivity decomposition 分布式连通性分解
Pub Date : 2013-11-20 DOI: 10.1145/2611462.2611491
K. Censor-Hillel, M. Ghaffari, F. Kuhn
A fundamental problem in distributed network algorithms is to manage congestion and obtain information flow matching the graph's connectivity. In this paper, we present time-efficient distributed algorithms for decomposing graphs with large edge or vertex connectivity into multiple spanning or dominating trees, respectively. These decompositions allow us to achieve a flow with size close to the connectivity by parallelizing it along the trees. More specifically, our distributed decomposition algorithms are as follows: - A decomposition of each undirected graph with vertex-connectivity k into (fractionally) vertex-disjoint weighted dominating trees with total weight Ω(k/log n), in ~O(D+√n) rounds. - A decomposition of each undirected graph with edge-connectivity λ into (fractionally) edge-disjoint weighted spanning trees with total weight ⌈λ-1/2⌉(1-ε), in ~{O}(D+√nλ) rounds. We also show round complexity lower bounds of ~](D+√n/k) and ~Ω(D+√n/λ) for the above two decompositions, using techniques of [Das Sarma et al., STOC'11]. Moreover, our vertex-connectivity decomposition extends to centralized algorithms and improves the time complexity of [Censor-Hillel et al., SODA'14] from O(n3) to near-optimal ~O(m). Additional implications of our results are: a near-linear time centralized approximation of vertex connectivity which can be seen as a step towards a conjecture of Aho, Hopcroft and Ullman), the first distributed approximating of vertex connectivity, and distributed algorithms with near-optimal competitiveness for oblivious broadcast routing.
分布式网络算法的一个基本问题是管理拥塞并获得与图的连通性相匹配的信息流。在本文中,我们提出了一种时间高效的分布式算法,用于将具有大边或大顶点连接的图分别分解为多个生成树或支配树。这些分解允许我们通过沿着树并行化来实现与连接性接近的流。更具体地说,我们的分布式分解算法如下:-将每个具有顶点连通性k的无向图分解为(部分地)顶点不相交的加权支配树,总权重为Ω(k/log n),在~O(D+√n)轮中。-将每个具有边连性λ的无向图分解为(分数地)总权为(λ-1/2) (1-ε)的边不相交加权生成树,以~{O}(D+√nλ)轮进行分解。我们还使用[Das Sarma et al., STOC'11]的技术,展示了上述两种分解的圆复杂度下界~](D+√n/k)和~Ω(D+√n/λ)。此外,我们的顶点连通性分解扩展到集中式算法,并将[Censor-Hillel et al., SODA'14]的时间复杂度从O(n3)提高到接近最优的~O(m)。我们的结果的其他含义是:顶点连通性的近线性时间集中近似(可以看作是向Aho, Hopcroft和Ullman猜想迈出的一步),顶点连通性的第一个分布式近似,以及具有近最优竞争力的分布式算法对于遗忘广播路由。
{"title":"Distributed connectivity decomposition","authors":"K. Censor-Hillel, M. Ghaffari, F. Kuhn","doi":"10.1145/2611462.2611491","DOIUrl":"https://doi.org/10.1145/2611462.2611491","url":null,"abstract":"A fundamental problem in distributed network algorithms is to manage congestion and obtain information flow matching the graph's connectivity. In this paper, we present time-efficient distributed algorithms for decomposing graphs with large edge or vertex connectivity into multiple spanning or dominating trees, respectively. These decompositions allow us to achieve a flow with size close to the connectivity by parallelizing it along the trees. More specifically, our distributed decomposition algorithms are as follows: - A decomposition of each undirected graph with vertex-connectivity k into (fractionally) vertex-disjoint weighted dominating trees with total weight Ω(k/log n), in ~O(D+√n) rounds. - A decomposition of each undirected graph with edge-connectivity λ into (fractionally) edge-disjoint weighted spanning trees with total weight ⌈λ-1/2⌉(1-ε), in ~{O}(D+√nλ) rounds. We also show round complexity lower bounds of ~](D+√n/k) and ~Ω(D+√n/λ) for the above two decompositions, using techniques of [Das Sarma et al., STOC'11]. Moreover, our vertex-connectivity decomposition extends to centralized algorithms and improves the time complexity of [Censor-Hillel et al., SODA'14] from O(n3) to near-optimal ~O(m). Additional implications of our results are: a near-linear time centralized approximation of vertex connectivity which can be seen as a step towards a conjecture of Aho, Hopcroft and Ullman), the first distributed approximating of vertex connectivity, and distributed algorithms with near-optimal competitiveness for oblivious broadcast routing.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115941165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A generalized asynchronous computability theorem 广义异步可计算性定理
Pub Date : 2013-04-03 DOI: 10.1145/2611462.2611477
E. Gafni, P. Kuznetsov, Ciprian Manolescu
We consider the models of distributed computation defined as subsets of the runs of the iterated immediate snapshot model. Given a task T and a model M, we provide topological conditions for T to be solvable in M. When applied to the wait-free model, our conditions result in the celebrated Asynchronous Computability Theorem (ACT) of Herlihy and Shavit. To demonstrate the utility of our characterization, we consider a task that has been shown earlier to admit only a very complex t-resilient solution. In contrast, our generalized computability theorem confirms its t-resilient solvability in a straightforward manner.
我们将分布式计算模型定义为迭代即时快照模型运行的子集。给定任务T和模型M,我们提供了T在M中可解的拓扑条件。当应用于无等待模型时,我们的条件导致Herlihy和Shavit著名的异步可计算定理(ACT)。为了证明我们的表征的效用,我们考虑了一个任务,该任务之前已经显示,只承认一个非常复杂的t弹性解决方案。相反,我们的广义可计算性定理以一种直接的方式证实了它的t弹性可解性。
{"title":"A generalized asynchronous computability theorem","authors":"E. Gafni, P. Kuznetsov, Ciprian Manolescu","doi":"10.1145/2611462.2611477","DOIUrl":"https://doi.org/10.1145/2611462.2611477","url":null,"abstract":"We consider the models of distributed computation defined as subsets of the runs of the iterated immediate snapshot model. Given a task T and a model M, we provide topological conditions for T to be solvable in M. When applied to the wait-free model, our conditions result in the celebrated Asynchronous Computability Theorem (ACT) of Herlihy and Shavit. To demonstrate the utility of our characterization, we consider a task that has been shown earlier to admit only a very complex t-resilient solution. In contrast, our generalized computability theorem confirms its t-resilient solvability in a straightforward manner.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Rigorous system design 严谨的系统设计
Pub Date : 2013-03-20 DOI: 10.1145/2611462.2611517
J. Sifakis
We advocate rigorous system design as a coherent and accountable model-based process leading from requirements to implementations. We present the state of the art in system design, discuss its current limitations, and identify possible avenues for overcoming them. A rigorous system design flow [3] is defined as a formal accountable and iterative process composed of steps, and based on four principles: (1) separation of concerns; (2) component-based construction; (3) semantic coherency; and (4) correctness-by-construction. We show that the combined application of these principles allows the definition of rigorous design flows clearly identifying where human intervention and ingenuity are needed to resolve design choices, as well as activities that can be supported by tools to automate tedious and error-prone tasks. An implementable system model is progressively derived by source-to-source automated transformations in a single host component-based language rooted in well-defined semantics. Using a single modeling language throughout the design flow enforces semantic coherency. Correct-by-construction techniques allow well-known limitations of a posteriori verification to be overcome and ensure accountability. It is possible to explain, at each design step, which among the requirements are satisfied and which may not be satisfied. The presented view has been amply implemented in the BIP (Behavior, Interaction, Priority) component framework and substantiated by numerous experimental results showing both its relevance and feasibility [1]. We show in particular, how distributed implementations can be generated from BIP models with multiparty interactions by application of correct-by-construction transformations [2]. We conclude with a discussion advocating a system-centric vision for computing, identifying possible links with other disciplines, and emphasizing centrality of system design.
我们提倡严格的系统设计,将其作为从需求到实现的连贯且可靠的基于模型的过程。我们介绍了系统设计的艺术状态,讨论了其当前的局限性,并确定了克服它们的可能途径。严格的系统设计流程[3]被定义为由步骤组成的正式负责的迭代过程,并基于四个原则:(1)关注点分离;(2)组件化构建;(3)语义连贯;(4)构造正确性。我们表明,这些原则的组合应用允许定义严格的设计流程,清楚地确定需要人工干预和独创性来解决设计选择的地方,以及可以由工具支持的活动,以自动执行繁琐和易出错的任务。可实现的系统模型是通过源到源的自动化转换逐步派生出来的,这种转换使用基于良好定义语义的基于单一主机组件的语言。在整个设计流程中使用单一建模语言可以增强语义一致性。构造校正技术允许克服众所周知的后验验证的局限性,并确保问责制。在每个设计步骤中,可以解释哪些需求是满足的,哪些是不满足的。所提出的观点已经在BIP(行为、交互、优先级)组件框架中得到了充分的实现,并得到了大量实验结果的证实,显示了其相关性和可行性[1]。我们特别展示了如何通过应用构造正确转换从具有多方交互的BIP模型生成分布式实现[2]。最后,我们将讨论提倡以系统为中心的计算愿景,确定与其他学科的可能联系,并强调系统设计的中心性。
{"title":"Rigorous system design","authors":"J. Sifakis","doi":"10.1145/2611462.2611517","DOIUrl":"https://doi.org/10.1145/2611462.2611517","url":null,"abstract":"We advocate rigorous system design as a coherent and accountable model-based process leading from requirements to implementations. We present the state of the art in system design, discuss its current limitations, and identify possible avenues for overcoming them. A rigorous system design flow [3] is defined as a formal accountable and iterative process composed of steps, and based on four principles: (1) separation of concerns; (2) component-based construction; (3) semantic coherency; and (4) correctness-by-construction. We show that the combined application of these principles allows the definition of rigorous design flows clearly identifying where human intervention and ingenuity are needed to resolve design choices, as well as activities that can be supported by tools to automate tedious and error-prone tasks. An implementable system model is progressively derived by source-to-source automated transformations in a single host component-based language rooted in well-defined semantics. Using a single modeling language throughout the design flow enforces semantic coherency. Correct-by-construction techniques allow well-known limitations of a posteriori verification to be overcome and ensure accountability. It is possible to explain, at each design step, which among the requirements are satisfied and which may not be satisfied. The presented view has been amply implemented in the BIP (Behavior, Interaction, Priority) component framework and substantiated by numerous experimental results showing both its relevance and feasibility [1]. We show in particular, how distributed implementations can be generated from BIP models with multiparty interactions by application of correct-by-construction transformations [2]. We conclude with a discussion advocating a system-centric vision for computing, identifying possible links with other disciplines, and emphasizing centrality of system design.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
期刊
Proceedings of the 2014 ACM symposium on Principles of distributed computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1