This paper focuses on studying the message complexity of implicit leader election in synchronous distributed networks of diameter two. Kutten et al. (J ACM 62(1):7:1-7:27, 2015) showed a fundamental lower bound of Ome...
详细信息
This paper focuses on studying the message complexity of implicit leader election in synchronous distributed networks of diameter two. Kutten et al. (J ACM 62(1):7:1-7:27, 2015) showed a fundamental lower bound of Omega(m) (m is the number of edges in the network) on the message complexity of (implicit) leader election that applied also to Monte Carlo randomized algorithms with constant success probability;this lower bound applies for graphs that have diameter at least three. On the other hand, for complete graphs (i.e., graphs with diameter one), Kutten et al. (Theor Comput Sci 561(Part B):134-143, 2015) established a tight bound of (Theta) over tilde(root n) on the message complexity of randomized leader election (n is the number of nodes in the network). For graphs of diameter two, the complexity was not known. In this paper, we settle this complexity by showing a tight bound of (Theta) over tilde (n) on the message complexity of leader election in diameter-two networks. We first give a simple randomized Monte-Carlo leader election algorithm that with high probability (i.e., probability at least 1 - n(-c), for some fixed positive constant c) succeeds and uses O(n log(3) n) messages and runs in O(1) rounds;this algorithm works without knowledge of n (and hence needs no global knowledge). We then show that any algorithm (even Monte Carlo randomized algorithms with large enough constant success probability) needs O(n) messages (even when n is known), regardless of the number of rounds. We also present an O(n log n) message deterministic algorithm that takes O(log n) rounds (but needs knowledge of n);we show that this message complexity is tight for deterministic algorithms. Together with the two previous results of Kutten et al., our results fully characterize the message complexity of leader election vis-a-vis the graph diameter.
This paper presents an improved randomized Circle Detection (RCD) algorithm with the characteristic of circularity to detect randomized circle in images with complex background, which is not based on the Hough Transfo...
详细信息
This paper presents an improved randomized Circle Detection (RCD) algorithm with the characteristic of circularity to detect randomized circle in images with complex background, which is not based on the Hough Transform. The experimental results denote that this algorithm can locate the circular mark of Printed Circuit Board (PCB).
Edit distance is a measure of similarity of two strings based on the minimum number of character insertions, deletions, and substitutions required to transform one string into the other. The edit distance can be compu...
详细信息
Edit distance is a measure of similarity of two strings based on the minimum number of character insertions, deletions, and substitutions required to transform one string into the other. The edit distance can be computed exactly using a dynamic programming algorithm that runs in quadratic time. Andoni, Krauthgamer, and Onak (2010) gave a nearly linear time algorithm that approximates edit distance within approximation factor poly(log n). In this article, we provide an algorithm with running time (O) over tildeO(n(2-2/7)) that approximates the edit distance within a constant factor.
MapReduce is a programming paradigm for large-scale distributed information processing. This paper proposes a MapReduce algorithm for the minimum vertex cover problem, which is known to be NP-hard. The MapReduce algor...
详细信息
MapReduce is a programming paradigm for large-scale distributed information processing. This paper proposes a MapReduce algorithm for the minimum vertex cover problem, which is known to be NP-hard. The MapReduce algorithm can efficiently obtain a minimal vertex cover in a small number of rounds. We show the effectiveness of the algorithm through experimental evaluation and comparison with exact and approximate algorithms which demonstrates a high quality in a small number of MapReduce rounds. We also confirm from experimentation that the algorithm has good scalability allowing high-quality solutions under restricted computation times due to increased graph size. Moreover, we extend our algorithm to randomized one to obtain a good expected approximate ratio.
Fast-acting reactive power support from distributed generations (DGs) is a promising approach for tackling rapid voltage fluctuations in distribution networks. However, the voltage regulation range via reactive power ...
详细信息
Fast-acting reactive power support from distributed generations (DGs) is a promising approach for tackling rapid voltage fluctuations in distribution networks. However, the voltage regulation range via reactive power of DGs alone is narrow especially in distribution networks with high resistance-reactance ratio. In this paper, a randomized algorithm is proposed to improve the voltage profile in distribution networks via coordinated regulation of the active and reactive power of DGs. To this end, first the variables of the proposed quadratically constrained quadratic programming problem on voltage control are partitioned into disjoint subsets, each of which corresponds to a unique low-dimensional subproblem. Second, these subsets are updated serially in a randomized manner via solving their corresponding subproblems, which overcomes the requirement for system-wide coordination among participating agents and guarantees an optimal solution. Compared with the existing algorithms, the proposed algorithm is resilient to network reconfigurations and achieves a wider voltage regulation range. The effectiveness and convergence performance of the proposed algorithm is validated by the case studies.
Even though the widespread use of social platforms provides convenience to our daily life, it causes some bad results at the same time. For example, misinformation and personal attack can be spread easily on social ne...
详细信息
Even though the widespread use of social platforms provides convenience to our daily life, it causes some bad results at the same time. For example, misinformation and personal attack can be spread easily on social networks, which drives us to study how to block the spread of misinformation effectively. Unlike the classical rumor blocking problem, we study how to protect the targeted users from being influenced by rumor, called targeted protection maximization (TPM). It aims to block the least edges such that the expected ratio of nodes in targeted set influenced by rumor is at most beta. Under the IC-model, the objective function of TPM is monotone non-decreasing, but not submodular and not supermodular, which makes it difficult for us to solve it by existing algorithms. In this paper, we propose two efficient techniques to solve TPM problem, called Greedy and General-TIM. The Greedy uses simple Hill-Climbing strategy, and get a theoretical bound, but the time complexity is hard to accept. The second algorithm, General-TIM, is formed by means of randomized sampling by Reverse Shortest Path (Random-RS-Path), which reduces the time consuming significantly. A precise approximation ratio cannot be promised in General-TIM, but in fact, it can get good results in reality. Considering the community structure in networks, both Greedy and General-TIM can be improved after removing unrelated communities. Finally, the effectiveness and efficiency of our algorithms is evaluated on several real datasets.
The simulation of exit times for diffusion processes is a challenging task since it concerns many applications in different fields like mathematical finance, neuroscience, reliability horizontal ellipsis The usual pro...
详细信息
The simulation of exit times for diffusion processes is a challenging task since it concerns many applications in different fields like mathematical finance, neuroscience, reliability horizontal ellipsis The usual procedure is to use discretization schemes which unfortunately introduce some error in the target distribution. Our aim is to present a new algorithm which simulates exactly the exit time for one-dimensional diffusions. This acceptance-rejection algorithm requires to simulate exactly the exit time of the Brownian motion on one side and the Brownian position at a given time, constrained not to have exit before, on the other side. Crucial tools in this study are the Girsanov transformation, the convergent series method for the simulation of random variables and the classical rejection sampling. The efficiency of the method is described through theoretical results and numerical examples.
The problem of small UAVs flight optimization is considered. To solve this problem thermal updrafts are used. For the precise detection of the thermal updrafts center the simultaneous perturbation stochastic approxima...
详细信息
The problem of small UAVs flight optimization is considered. To solve this problem thermal updrafts are used. For the precise detection of the thermal updrafts center the simultaneous perturbation stochastic approximation (SPSA) type algorithm is proposed. If UAVs use thermal updrafts so they can save the energy during the flight. Therefore the flight time will be vary for different UAVs. In order to optimize the area monitoring, the consensus approach has been proposed.
In this paper, we investigate the problem of optimal road side units (RSUs) placement in Vehicular Ad Hoc Network (VANET) on a highway, which enables the VANET maintain a good connectivity. Our goal is to find out min...
详细信息
ISBN:
(纸本)9780769551593
In this paper, we investigate the problem of optimal road side units (RSUs) placement in Vehicular Ad Hoc Network (VANET) on a highway, which enables the VANET maintain a good connectivity. Our goal is to find out minimal number of road side units, such that the vehicles could communicate with RSUs. These road side units are connected by wire. We develop a randomized algorithm to deploy road side units in the VANET. It gives an approximation to the optimal distance to guarantee the information can be passed to RSUs from the accident site via the VANET. Simulations are conducted to show the performance of our proposed method.
Square root extraction plays a key role in cryptosystems based on elliptic curves. Motwani and Raghavan had proposed an algorithm for square root extraction over finite field F-p, where p is an odd prime. It is a rand...
详细信息
ISBN:
(数字)9783642537035
ISBN:
(纸本)9783642537035;9783642537028
Square root extraction plays a key role in cryptosystems based on elliptic curves. Motwani and Raghavan had proposed an algorithm for square root extraction over finite field F-p, where p is an odd prime. It is a randomized algorithm with expected running time O(len(p)(4)). Its complexity relies mainly on the loops calling Euclid's algorithm for polynomials over F-p. In this paper, we propose an improvement of it. The new algorithm calls a subroutine for computing a Legendre symbol. Since the running time of computing a Legendre symbol is much less than that of Euclid's algorithm for polynomials over F-p, the new algorithm is more efficient. It only takes time O(len(p)(3)). We also compare the new algorithm with those algorithms for square root extraction over finite fields.
暂无评论