Two mobile agents, starting from different nodes of an unknown network, have to meet at a node. Agents move in synchronous rounds using a deterministic algorithm. Each agent has a different label, which it can use in ...
详细信息
Two mobile agents, starting from different nodes of an unknown network, have to meet at a node. Agents move in synchronous rounds using a deterministic algorithm. Each agent has a different label, which it can use in the execution of the algorithm, but it does not know the label of the other agent. Agents do not know any bound on the size of the network. In each round an agent decides if it remains idle or if it wants to move to one of the adjacent nodes. Agents are subject to delay faults: if an agent incurs a fault in a given round, it remains in the current node, regardless of its decision. If it planned to move and the fault happened, the agent is aware of it. We consider three scenarios of fault distribution: random ( independently in each round and for each agent with constant probability 0 < p < 1), unbounded adversarial ( the adversary can delay an agent for an arbitrary finite number of consecutive rounds) and bounded adversarial ( the adversary can delay an agent for at most c consecutive rounds, where c is unknown to the agents). The quality measure of a rendezvous algorithm is its cost, which is the total number of edge traversals. For random faults, we show an algorithm with cost polynomial in the size n of the network and polylogarithmic in the larger label L, which achieves rendezvous with very high probability in arbitrary networks. By contrast, for unbounded adversarial faults we show that rendezvous is not possible, even in the class of rings. Under this scenario we give a rendezvous algorithm with cost O(nl), where l is the smaller label, working in arbitrary trees, and we show that Omega(l) is the lower bound on rendezvous cost, even for the two-node tree. For bounded adversarial faults, we give a rendezvous algorithm working for arbitrary networks, with cost polynomial in n, and logarithmic in the bound c and in the larger label L.
We analyse an extension of Shoup's (Inform. Process. Lett. 33 (1990) 261-267) deterministic algorithm for factoring polynomials over finite prime fields to arbitrary finite fields. In particular, we prove the exis...
详细信息
We analyse an extension of Shoup's (Inform. Process. Lett. 33 (1990) 261-267) deterministic algorithm for factoring polynomials over finite prime fields to arbitrary finite fields. In particular, we prove the existence of a deterministic algorithm which completely factors all monic polynomials of degree n over F-q, q odd, except possibly O(n(2) log(2) q/q) polynomials, using O(n(2+epsilon) log(2)q) arithmetical operations in F-q. (C) 2000 Elsevier Science B.V. All rights reserved.
We study the problem of computing a minimum cut in a simple, undirected graph and give a deterministic O(m log(2) n log log(2) n) time algorithm. This improves on both the best previously known deterministic running t...
详细信息
We study the problem of computing a minimum cut in a simple, undirected graph and give a deterministic O(m log(2) n log log(2) n) time algorithm. This improves on both the best previously known deterministic running time of O(m log(12) n) (Kawarabayashi and Thorup [J. ACM, 66 (2018), 41) and the best previously known randomized running time of O(m log(3) n) (Karger [J. ACM, 47 (2000), pp. 46-761) for this problem, though Karger's algorithm can be further applied to weighted graphs. Moreover, our result extends to balanced directed graphs, where the balance of a directed graph captures how close the graph is to being Eulerian. Our approach is using the Kawarabayashi and Thorup graph compression technique, which repeatedly finds low conductance cuts. To find these cuts they use a diffusion-based local algorithm. We use instead a flow-based local algorithm and suitably adjust their framework to work with our flow-based subroutine. Both flow-and diffusion-based methods have a long history of being applied to finding low conductance cuts. Diffusion algorithms have several variants that are naturally local, while it is more complicated to make flow methods local. Some prior work has proven nice properties for local flow-based algorithms with respect to improving or cleaning up low conductance cuts. Our flow subroutine, however, is the first that both is local and produces low conductance cuts. Thus, it may be of independent interest.
We study the gathering problem requiring a team of mobile agents to gather at a single node in arbitrary networks. The team consists of k agents with unique identifiers (IDs), and f of them are weakly Byzantine agents...
详细信息
We study the gathering problem requiring a team of mobile agents to gather at a single node in arbitrary networks. The team consists of k agents with unique identifiers (IDs), and f of them are weakly Byzantine agents, which behave arbitrarily except falsifying their identifiers. The agents move in synchronous rounds and cannot leave any information on nodes. If the number of nodes n is given to agents, the existing fastest algorithm tolerates any number of weakly Byzantine agents and achieves gathering with simultaneous termination in O(n(4). vertical bar Lambda(good)vertical bar . X(n)) rounds, where vertical bar Lambda(good)vertical bar is the length of the maximum ID of non-Byzantine agents and X(n) is the number of rounds required to explore any network composed of n nodes. In this paper, we ask the question of whether we can reduce the time complexity if we have a strong team, i.e., a team with a few Byzantine agents, because not so many agents are subject to faults in practice. We give a positive answer to this question by proposing two algorithms in the case where at least 4f(2) + 9f + 4 agents exist. Both the algorithms assume that the upper bound N of n is given to agents. The first algorithm achieves gathering with non-simultaneous termination in O((f + vertical bar Lambda(good)vertical bar) . X(N)) rounds. The second algorithm achieves gathering with simultaneous termination in O((f + vertical bar Lambda(all)vertical bar) . X(N)) rounds, where vertical bar Lambda(all)vertical bar is the length of the maximum ID of all agents. The second algorithm significantly reduces the time complexity compared to the existing one if n is given to agents and vertical bar Lambda(all)vertical bar = O(vertical bar Lambda(good)vertical bar) holds.
Distance transforms (DTs) are standard tools in image analysis, with applications in image registration and segmentation. The DT is based on extremal (minimal) distance values and is therefore highly sensitive to nois...
详细信息
Distance transforms (DTs) are standard tools in image analysis, with applications in image registration and segmentation. The DT is based on extremal (minimal) distance values and is therefore highly sensitive to noise. We present astochastic distance transform(SDT) based ondiscrete random sets, in which a model of element-wise probability is utilized and the SDT is computed as the first moment of the distance distribution to the random set. We present two methods for computing the SDT and analyze them w.r.t. accuracy and complexity. Further, we propose a method, utilizing kernel density estimation, for estimating probability functions and associated random sets to use with the SDT. We evaluate the accuracy of the SDT and the proposed framework on images of thin line structures and disks corrupted by salt and pepper noise and observe excellent performance. We also insert the SDT into a segmentation framework and apply it to overlapping objects, where it provides substantially improved performance over previous methods. Finally, we evaluate the SDT and observe very good performance, on simulated images from localization microscopy, a state-of-the-art super-resolution microscopy technique which yields highly spatially localized but noisy point-clouds.
Dimension reduction is often an important step in the analysis of high-dimensional data. PCA is a popular technique to find the best low-dimensional approximation of high dimensional data. However, classical PCA is ve...
详细信息
Dimension reduction is often an important step in the analysis of high-dimensional data. PCA is a popular technique to find the best low-dimensional approximation of high dimensional data. However, classical PCA is very sensitive to atypical data. Robust methods to estimate the low-dimensional subspace that best approximates the regular data have been proposed. However, for high-dimensional data these algorithms become computationally expensive. Alternative algorithms for the robust subspace estimators are proposed that are better suited to compute the solution for high-dimensional problems. The main ingredients of the new algorithms are twofold. First, the principal directions of the subspace are estimated directly by iterating the first order solutions corresponding to the estimators. Second, to reduce the computation time even further five robust deterministic values are proposed to initialize the algorithms instead of using random starting values. It is shown that the new algorithms yield robust solutions and the computation time is largely reduced, especially for high-dimensional data. (C) 2019 Elsevier B.V. All rights reserved.
Asynchrony is one of the main challenges in distributed computing. Some tasks, such as distributed Byzantine consensus, are impossible in the asynchronous setting, while they can be carried out synchronously. For othe...
详细信息
Asynchrony is one of the main challenges in distributed computing. Some tasks, such as distributed Byzantine consensus, are impossible in the asynchronous setting, while they can be carried out synchronously. For other tasks, such as rendezvous in arbitrary graphs, the best known synchronous algorithm has cost much lower than the best asynchronous one. Various degrees of asynchrony and synchrony and comparisons between them in terms of feasibility of distributed tasks have been particularly intensely studied in the context of mobile agents computing. However, somewhat surprisingly, there are no results showing a provable difference of cost between the synchronous and asynchronous versions of a task executed by mobile agents. The aim of this paper is to fill up this gap. We show for the first time that for some natural task executed by mobile agents in a network, the optimal cost of its deterministic solution in the asynchronous setting has higher order of magnitude than that in the synchronous scenario. The task for which we show this difference is well-studied: that of rendezvous of two agents in an infinite oriented grid. More precisely, we consider two agents with distinct integer labels starting at a distance D in the infinite oriented grid. Each agent knows D and its own label but not the label of the other agent and it does not know the position of the other agent relative to its own. Agents do not have any global system of coordinates. They have to meet in a node or inside an edge of the grid, and the cost of a rendezvous algorithm is the number of edge traversals by both agents until the meeting. We show that in the synchronous scenario rendezvous can be performed at cost O (Dl), where E is the length of the (binary representation of the) smaller label, while cost Omega(D-2 + D(l) is needed for asynchronous completion of rendezvous. Hence, for instances with l = o(D), the optimal cost of asynchronous rendezvous is asymptotically larger than that of synchrono
In wireless sensor networks (WSNs), due to the limited energy of nodes, discovering neighbors needs to be achieved in an energy-efficient way. This means that, at a given energy consumption, we need to reduce the wors...
详细信息
In wireless sensor networks (WSNs), due to the limited energy of nodes, discovering neighbors needs to be achieved in an energy-efficient way. This means that, at a given energy consumption, we need to reduce the worst-case neighbor discovery latency as far as possible. In this letter, we propose a novel deterministic neighbor discovery method, called Lightning. Lightning employs two kinds of active slots of different active lengths (we call A slot and C slot, respectively). The active time of C slot is much shorter than that of A slot in order to reduce the energy consumption. In addition, to maximize the energy efficiency, Lightning adopts one-way neighbor discovery method. This makes C slot have the smallest active length that is only enough to send one beaconing packet. Through proactively sending one beaconing packet after one-way discovery, Lightning also realizes bi-directional neighbor discovery. The theoretical analysis indicates that, with the same energy consumption, our method reduces the worst-case latency bound up to 37.9% compared with Searchlight-Trim, the best existing discovery algorithm. The simulation verifies the soundness and effectiveness of our design.
Present work performs a numerical study about the energy removal in a heated tubular array submitted to an external flow. Taking into account that a large variety of tubular arrangements can exists, in this work it is...
详细信息
Present work performs a numerical study about the energy removal in a heated tubular array submitted to an external flow. Taking into account that a large variety of tubular arrangements can exists, in this work it is developed a tubular array that does not use any kind of initial predefined arrangement. Using the principles of Constructal Theory (or Law) and a positioning function dependent on the velocity and temperature fields, it is calculated, in a deterministic way, the location where each tube should be positioned. Pressure drop is not taken in to account in this first algorithm implementation as a performance indicator. In order to validate the proposed methodology, the Constructal Array is compared with standard aligned and staggered arrangements suggested in literature. The minimum distance between tubes (p) is considered as a degree of freedom. Four variations are studied: p = 1D, p = 1.25D, p = 1.5D and p = 2D, where D is the tube diameter. It is considered here the simulation of a transient, incompressible and laminar flow of a Newtonian fluid in a two-dimensional domain with forced convection and Prandtl number equal to 0.71. Results are computed when the flow reaches to the steady state condition. It is evaluated three values for Reynolds number: Re-D = 10, 50 and 100. Thermal analysis of the formed patterns has shown that best thermal performance was not obtained with p = 1D, neither with p = 2D, i.e., tube distance has an influence on its formation and, consequently, on the heat transfer exchange. In all performed analyzes, Constructal arrays configuration showed higher energy removal (up to 71%) than the aligned and staggered arrangements, which highlights the capacity of proposed method. Constructal Array for p = 1.5D showed the most homogeneous distribution and proved to be the most effective in 4 of the six studied cases.
We consider single-hop radio networks with multiple channels as a model of wireless networks. There are n stations connected to b radio channels that do not provide collision detection. A station uses all the channels...
详细信息
We consider single-hop radio networks with multiple channels as a model of wireless networks. There are n stations connected to b radio channels that do not provide collision detection. A station uses all the channels concurrently and independently. Some k stations may become active spontaneously at arbitrary times. The goal is to wake up the network, which occurs when all the stations hear a successful transmission on some channel. Duration of a waking-up execution is measured starting from the first spontaneous activation. We present a deterministic algorithm that wakes up a network in O(k log(1/b) k log n) time, where k is unknown. We give a deterministic scalable algorithm for the special case when b > d log log n, for some constant d > 1, which wakes up a network in O(k/b log n log(b log n)) time, with k unknown. This algorithm misses time optimality by at most a factor of O(log n(log b + log log n)), because any deterministic algorithm requires Omega(k/b log n/k) time. We give a randomized algorithm that wakes up a network within O(k(1/b) In 1/epsilon) rounds with a probability that is at least 1 - epsilon, for any 0 < epsilon < 1, where k is known. We also consider a model of jamming, in which each channel in any round may be jammed to prevent a successful transmission, which happens with some known parameter probability p, independently across all channels and rounds. For this model, we give two deterministic algorithms for unknown k: one wakes up a network in time O(log(-1) (1/p) log n log(1/b) k), and the other in time O(log(-1) (1/p) k/b log n log(b log n)) when the inequality b > log(128b log n) holds, both with probabilities that are at least 1 - 1/poly(n). (c) 2015 Elsevier B.V. All rights reserved.
暂无评论