66 results on '"Masuzawa, Toshimitsu"'
Search Results
2. Constructing Approximate Single-Source Distance Sensitivity Oracles in Nearly Linear Time
- Author
-
Harada, Kaito, Kitamura, Naoki, Izumi, Taisuke, Masuzawa, Toshimitsu, Harada, Kaito, Kitamura, Naoki, Izumi, Taisuke, and Masuzawa, Toshimitsu
- Abstract
For an input graph $G=(V, E)$ and a source vertex $s \in V$, the \emph{$\alpha$-approximate vertex fault-tolerant distance sensitivity oracle} (\emph{$\alpha$-VSDO}) answers an $\alpha$-approximate distance from $s$ to $t$ in $G-x$ for any query $(x, t)$. It is a data structure version of the so-called single-source replacement path problem (SSRP). In this paper, we present a new \emph{nearly linear time} algorithm of constructing the $(1 + \epsilon)$-VSDO for any weighted directed graph of $n$ vertices and $m$ edges with integer weights in range $[1, W]$, and any positive constant $\epsilon \in (0, 1]$. More precisely, the presented oracle attains $\tilde{O}(m / \epsilon + n /\epsilon^2)$ construction time, $\tilde{O}(n/ \epsilon)$ size, and $\tilde{O}(1/\epsilon)$ query time for any polynomially-bounded $W$. To the best of our knowledge, this is the first non-trivial result for SSRP/VSDO beating the trivial $\tilde{O}(mn)$ computation time for directed graphs with polynomially-bounded edge weights. Such a result has been unknown so far even for the setting of $(1 + \epsilon)$-approximation. It also implies that the known barrier of $\Omega(m\sqrt{n})$ time for the exact SSRP by Chechik and Magen~[ICALP2020] does not apply to the case of approximation.
- Published
- 2024
3. Loosely-Stabilizing Leader Election on Arbitrary Graphs in Population Protocols Without Identifiers nor Random Numbers
- Author
-
Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
In the population protocol model Angluin et al. proposed in 2004, there exists no self-stabilizing leader election protocol for complete graphs, arbitrary graphs, trees, lines, degree-bounded graphs and so on unless the protocol knows the exact number of nodes. To circumvent the impossibility, we introduced the concept of loose-stabilization in 2009, which relaxes the closure requirement of self-stabilization. A loosely-stabilizing protocol guarantees that starting from any initial configuration a system reaches a safe configuration, and after that, the system keeps its specification (e.g. the unique leader) not forever, but for a sufficiently long time (e.g. exponentially large time with respect to the number of nodes). Our previous works presented two loosely-stabilizing leader election protocols for arbitrary graphs; One uses agent identifiers and the other uses random numbers to elect a unique leader. In this paper, we present a loosely-stabilizing protocol that solves leader election on arbitrary graphs without agent identifiers nor random numbers. By the combination of virus-propagation and token-circulation, the proposed protocol achieves polynomial convergence time and exponential holding time without such external entities. Specifically, given upper bounds N and Delta of the number of nodes n and the maximum degree of nodes delta respectively, it reaches a safe configuration within O(m*n^3*d + m*N*Delta^2*log(N)) expected steps, and keeps the unique leader for Omega(N*e^N) expected steps where m is the number of edges and d is the diameter of the graph. To measure the time complexity of the protocol, we assume the uniformly random scheduler which is widely used in the field of the population protocols., OPODIS 2015 : 19th International Conference on Principles of Distributed Systems, 14-17 Dec. 2015 , Rennes, France
- Published
- 2023
4. Dynamic Ring Exploration with (H,S) View
- Author
-
Gotoh, Tsuyoshi, Sudo, Yuichi, Ooshita, Fukuhito, Masuzawa, Toshimitsu, Gotoh, Tsuyoshi, Sudo, Yuichi, Ooshita, Fukuhito, and Masuzawa, Toshimitsu
- Abstract
The researches about a mobile entity (called agent) on dynamic networks have attracted a lot of attention in recent years. Exploration which requires an agent to visit all the nodes in the network is one of the most fundamental problems. While the exploration of dynamic networks with complete information or with no information about network changes has been studied, an agent with partial information about the network changes has not been considered yet despite its practical importance. In this paper, we consider the exploration of dynamic networks by a single agent with partial information about network changes. To the best of our knowledge, this is the very first work to investigate the exploration problem with such partial information. As a first step in this researchdirection, we focus on 1-interval connected rings as dynamic networks in this paper. We assume that the single agent has partial information called the (H, S) view by which it always knows whether or not each of the links within H hops is available in each of the next S time steps. In this setting, we show that H + S n and S dn/2e (n is the size of the network) are necessary and sufficient conditions to explore 1-interval connected rings. Moreover, we investigate the upper and lower bounds of the exploration time. It is proven that the exploration time is O(n2) for dn/2e S < 2H0 ???? 1,O(n2/H + nH) for S max(dn/2e, 2H0 ???? 1), O(n2/H + n log H) for S n ???? 1, and W(n2/H) forany S where H0 = min(H, bn/2c).
- Published
- 2023
5. Computational Power of a Single Oblivious Mobile Agent in Two-Edge-Connected Graphs
- Author
-
Inoue, Taichi, Kitamura, Naoki, Izumi, Taisuke, Masuzawa, Toshimitsu, Inoue, Taichi, Kitamura, Naoki, Izumi, Taisuke, and Masuzawa, Toshimitsu
- Published
- 2023
- Full Text
- View/download PDF
6. Gathering of Mobile Robots with Defected Views
- Author
-
Yonghwan Kim and Masahiro Shibata and Yuichi Sudo and Junya Nakamura and Yoshiaki Katayama and Toshimitsu Masuzawa, Kim, Yonghwan, Shibata, Masahiro, Sudo, Yuichi, Nakamura, Junya, Katayama, Yoshiaki, Masuzawa, Toshimitsu, Yonghwan Kim and Masahiro Shibata and Yuichi Sudo and Junya Nakamura and Yoshiaki Katayama and Toshimitsu Masuzawa, Kim, Yonghwan, Shibata, Masahiro, Sudo, Yuichi, Nakamura, Junya, Katayama, Yoshiaki, and Masuzawa, Toshimitsu
- Abstract
An autonomous mobile robot system consisting of many mobile computational entities (called robots) attracts much attention of researchers, and it is an emerging issue for a recent couple of decades to clarify the relation between the capabilities of robots and solvability of the problems. Generally, each robot can observe all other robots as long as there are no restrictions on visibility range or obstructions, regardless of the number of robots. In this paper, we provide a new perspective on the observation by robots; a robot cannot necessarily observe all other robots regardless of distances to them. We call this new computational model the defected view model. Under this model, in this paper, we consider the gathering problem that requires all the robots to gather at the same non-predetermined point and propose two algorithms to solve the gathering problem in the adversarial (N,N-2)-defected model for N ≥ 5 (where each robot observes at most N-2 robots chosen adversarially) and the distance-based (4,2)-defected model (where each robot observes at most two robots closest to itself), respectively, where N is the number of robots. Moreover, we present an impossibility result showing that there is no (deterministic) gathering algorithm in the adversarial or distance-based (3,1)-defected model, and we also show an impossibility result for the gathering in a relaxed (N, N-2)-defected model.
- Published
- 2023
- Full Text
- View/download PDF
7. A Near Time-optimal Population Protocol for Self-stabilizing Leader Election on Rings with a Poly-logarithmic Number of States
- Author
-
Yokota, Daisuke, Sudo, Yuichi, Ooshita, Fukuhito, Masuzawa, Toshimitsu, Yokota, Daisuke, Sudo, Yuichi, Ooshita, Fukuhito, and Masuzawa, Toshimitsu
- Abstract
We propose a self-stabilizing leader election (SS-LE) protocol on ring networks in the population protocol model. Given a rough knowledge $\psi = \lceil \log n \rceil + O(1)$ on the population size $n$, the proposed protocol lets the population reach a safe configuration within $O(n^2 \log n)$ steps with high probability starting from any configuration. Thereafter, the population keeps the unique leader forever. Since no protocol solves SS-LE in $o(n^2)$ steps with high probability, the convergence time is near-optimal: the gap is only an $O(\log n)$ multiplicative factor. This protocol uses only $polylog(n)$ states. There exist two state-of-the-art algorithms in current literature that solve SS-LE on ring networks. The first algorithm uses a polynomial number of states and solves SS-LE in $O(n^2)$ steps, whereas the second algorithm requires exponential time but it uses only a constant number of states. Our proposed algorithm provides an excellent middle ground between these two., Comment: arXiv admin note: text overlap with arXiv:2009.10926
- Published
- 2023
8. Near-linear Time Dispersion of Mobile Agents
- Author
-
Sudo, Yuichi, Shibata, Masahiro, Nakamura, Junya, Kim, Yonghwan, Masuzawa, Toshimitsu, Sudo, Yuichi, Shibata, Masahiro, Nakamura, Junya, Kim, Yonghwan, and Masuzawa, Toshimitsu
- Abstract
Consider that there are $k\le n$ agents in a simple, connected, and undirected graph $G=(V,E)$ with $n$ nodes and $m$ edges. The goal of the dispersion problem is to move these $k$ agents to distinct nodes. Agents can communicate only when they are at the same node, and no other means of communication such as whiteboards are available. We assume that the agents operate synchronously. We consider two scenarios: when all agents are initially located at any single node (rooted setting) and when they are initially distributed over any one or more nodes (general setting). Kshemkalyani and Sharma presented a dispersion algorithm for the general setting, which uses $O(m_k)$ time and $\log(k+\delta)$ bits of memory per agent [OPODIS 2021]. Here, $m_k$ is the maximum number of edges in any induced subgraph of $G$ with $k$ nodes, and $\delta$ is the maximum degree of $G$. This algorithm is the fastest in the literature, as no algorithm with $o(m_k)$ time has been discovered even for the rooted setting. In this paper, we present faster algorithms for both the rooted and general settings. First, we present an algorithm for the rooted setting that solves the dispersion problem in $O(k\log \min(k,\delta))=O(k\log k)$ time using $O(\log \delta)$ bits of memory per agent. Next, we propose an algorithm for the general setting that achieves dispersion in $O(k (\log k)\cdot (\log \min(k,\delta))=O(k \log^2 k)$ time using $O(\log (k+\delta))$ bits. Finally, for the rooted setting, we give a time-optimal, i.e.,$O(k)$-time, algorithm with $O(\delta)$ bits of space per agent.
- Published
- 2023
9. Computational Power of a Single Oblivious Mobile Agent in Two-Edge-Connected Graphs
- Author
-
Inoue, Taichi, Kitamura, Naoki, Izumi, Taisuke, Masuzawa, Toshimitsu, Inoue, Taichi, Kitamura, Naoki, Izumi, Taisuke, and Masuzawa, Toshimitsu
- Abstract
We investigated the computational power of a single mobile agent in an $n$-node graph with storage (i.e., node memory). Generally, a system with one-bit agent memory and $O(1)$-bit storage is as powerful as that with $O(n)$-bit agent memory and $O(1)$-bit storage. Thus, we focus on the difference between one-bit memory and oblivious (i.e., zero-bit memory) agents. Although their computational powers are not equivalent, all the known results exhibiting such a difference rely on the fact that oblivious agents cannot transfer any information from one side to the other across the bridge edge. Hence, our main question is as follows: Are the computational powers of one-bit memory and oblivious agents equivalent in 2-edge-connected graphs or not? The main contribution of this study is to answer this question under the relaxed assumption that each node has $O(\log\Delta)$-bit storage (where $\Delta$ is the maximum degree of the graph). We present an algorithm for simulating any algorithm for a single one-bit memory agent using an oblivious agent with $O(n^2)$-time overhead per round. Our results imply that the topological structure of graphs differentiating the computational powers of oblivious and non-oblivious agents is completely characterized by the existence of bridge edges., Comment: 14 pages, 2 figures
- Published
- 2022
10. Deciding a Graph Property by a Single Mobile Agent: One-Bit Memory Suffices
- Author
-
Izumi, Taisuke, Kakizawa, Kazuki, Kawabata, Yuya, Kitamura, Naoki, Masuzawa, Toshimitsu, Izumi, Taisuke, Kakizawa, Kazuki, Kawabata, Yuya, Kitamura, Naoki, and Masuzawa, Toshimitsu
- Abstract
We investigate the computational power of the deterministic single-agent model where the agent and each node are equipped with a limited amount of persistent memory. Tasks are formalized as decision problems on properties of input graphs, i.e., the task is defined as a subset $\mathcal{T}$ of all possible input graphs, and the agent must decide if the network belongs to $\mathcal{T}$ or not. We focus on the class of the decision problems which are solvable in a polynomial number of movements, and polynomial-time local computation. The contribution of this paper is the computational power of the very weak system with one-bit agent memory and $O(1)$-bit storage (i.e. node memory) is equivalent to the one with $O(n)$-bit agent memory and $O(1)$-bit storage. We also show that the one-bit agent memory is crucial to lead this equivalence: There exists a decision task which can be solved by the one-bit memory agent but cannot be solved by the zero-bit memory (i.e., oblivious) agent. Our result is deduced by the algorithm of simulating the $O(n)$-bit memory agent by the one-bit memory agent with polynomial-time overhead, which is developed by two novel technical tools. The first one is a dynamic $s$-$t$ path maintenance mechanism which uses only $O(1)$-bit storage per node. The second one is a new lexicographically-ordered DFS algorithm for the mobile agent system with $O(1)$-bit memory and $O(1)$-bit storage per node. These tools are of independent interest.
- Published
- 2022
11. Deterministic Fault-Tolerant Connectivity Labeling Scheme
- Author
-
Izumi, Taisuke, Emek, Yuval, Wadayama, Tadashi, Masuzawa, Toshimitsu, Izumi, Taisuke, Emek, Yuval, Wadayama, Tadashi, and Masuzawa, Toshimitsu
- Abstract
The \emph{$f$-fault-tolerant connectivity labeling} ($f$-FTC labeling) is a scheme of assigning each vertex and edge with a small-size label such that one can determine the connectivity of two vertices $s$ and $t$ under the presence of at most $f$ faulty edges only from the labels of $s$, $t$, and the faulty edges. This paper presents a new deterministic $f$-FTC labeling scheme attaining $O(f^2 \mathrm{polylog}(n))$-bit label size and a polynomial construction time, which settles the open problem left by Dory and Parter [PODC'21]. The key ingredient of our construction is to develop a deterministic counterpart of the graph sketch technique by Ahn, Guha, and McGreger [SODA'12], via some natural connection with the theory of error-correcting codes. This technique removes one major obstacle in de-randomizing the Dory-Parter scheme. The whole scheme is obtained by combining this technique with a new deterministic graph sparsification algorithm derived from the seminal $\epsilon$-net theory, which is also of independent interest. As byproducts, our result deduces the first deterministic fault-tolerant approximate distance labeling scheme with a non-trivial performance guarantee and an improved deterministic fault-tolerant compact routing. The authors believe that our new technique is potentially useful in the future exploration of more efficient FTC labeling schemes and other related applications based on graph sketches.
- Published
- 2022
12. Gathering Despite Defected View
- Author
-
Kim, Yonghwan, Shibata, Masahiro, Sudo, Yuichi, Nakamura, Junya, Katayama, Yoshiaki, Masuzawa, Toshimitsu, Kim, Yonghwan, Shibata, Masahiro, Sudo, Yuichi, Nakamura, Junya, Katayama, Yoshiaki, and Masuzawa, Toshimitsu
- Abstract
An autonomous mobile robot system consisting of many mobile computational entities (called robots) attracts much attention of researchers, and to clarify the relation between the capabilities of robots and solvability of the problems is an emerging issue for a recent couple of decades. Generally, each robot can observe all other robots as long as there are no restrictions for visibility range or obstructions, regardless of the number of robots. In this paper, we provide a new perspective on the observation by robots; a robot cannot necessarily observe all other robots regardless of distances to them. We call this new computational model defected view model. Under this model, in this paper, we consider the gathering problem that requires all the robots to gather at the same point and propose two algorithms to solve the gathering problem in the adversarial ($N$,$N-2$)-defected model for $N \geq 5$ (where each robot observes at most $N-2$ robots chosen adversarially) and the distance-based (4,2)-defected model (where each robot observes at most 2 closest robots to itself) respectively, where $N$ is the number of robots. Moreover, we present an impossibility result showing that there is no (deterministic) gathering algorithm in the adversarial or distance-based (3,1)-defected model. Moreover, we show an impossibility result for the gathering in a relaxed ($N$, $N-2$)-defected model., Comment: 18 pages, 11 figures, will be published as a brief announcement (short version) in DISC2022
- Published
- 2022
13. Brief Announcement: Gathering Despite Defected View
- Author
-
Yonghwan Kim and Masahiro Shibata and Yuichi Sudo and Junya Nakamura and Yoshiaki Katayama and Toshimitsu Masuzawa, Kim, Yonghwan, Shibata, Masahiro, Sudo, Yuichi, Nakamura, Junya, Katayama, Yoshiaki, Masuzawa, Toshimitsu, Yonghwan Kim and Masahiro Shibata and Yuichi Sudo and Junya Nakamura and Yoshiaki Katayama and Toshimitsu Masuzawa, Kim, Yonghwan, Shibata, Masahiro, Sudo, Yuichi, Nakamura, Junya, Katayama, Yoshiaki, and Masuzawa, Toshimitsu
- Abstract
In this paper, we provide a new perspective on the observation by robots; a robot cannot necessarily observe all other robots regardless of distances to them. We introduce a new computational model with defected views called a (N,k)-defected model where k robots among N-1 other robots can be observed. We propose two gathering algorithms: one in the adversarial (N,N-2)-defected model for N ≥ 5 (where N is the number of robots) and the other in the distance-based (4,2)-defected model. Moreover, we present two impossibility results for a (3,1)-defected model and a relaxed (N, N-2)-defected model respectively. This announcement is short; the full paper is available at [Yonghwan Kim and others, 2022].
- Published
- 2022
- Full Text
- View/download PDF
14. Time-Optimal Loosely-Stabilizing Leader Election in Population Protocols
- Author
-
Sudo, Yuichi, Eguchi, Ryota, Izumi, Taisuke, Masuzawa, Toshimitsu, Sudo, Yuichi, Eguchi, Ryota, Izumi, Taisuke, and Masuzawa, Toshimitsu
- Abstract
We consider the leader election problem in the population protocol model. In pragmatic settings of population protocols, self-stabilization is a highly desired feature owing to its fault resilience and the benefit of initialization freedom. However, the design of self-stabilizing leader election is possible only under a strong assumption (i.e., the knowledge of the exact size of a network) and rich computational resource (i.e., the number of states). Loose-stabilization is a promising relaxed concept of self-stabilization to address the aforementioned issue. Loose-stabilization guarantees that starting from any configuration, the network will reach a safe configuration where a single leader exists within a short time, and thereafter it will maintain the single leader for a long time, but not necessarily forever. The main contribution of this paper is giving a time-optimal loosely-stabilizing leader election protocol. The proposed protocol with design parameter ? ? 1 attains O(? log n) parallel convergence time and ?(n^?) parallel holding time (i.e., the length of the period keeping the unique leader), both in expectation. This protocol is time-optimal in the sense of both the convergence and holding times in expectation because any loosely-stabilizing leader election protocol with the same length of the holding time is known to require ?(? log n) parallel time.
- Published
- 2021
- Full Text
- View/download PDF
15. Self-stabilizing Population Protocols with Global Knowledge
- Author
-
Sudo, Yuichi, Shibata, Masahiro, Nakamura, Junya, Kim, Yonghwan, Masuzawa, Toshimitsu, Sudo, Yuichi, Shibata, Masahiro, Nakamura, Junya, Kim, Yonghwan, and Masuzawa, Toshimitsu
- Abstract
In the population protocol model, many problems cannot be solved in a self-stabilizing manner. However, global knowledge, such as the number of nodes in a network, sometimes enables the design of a self-stabilizing protocol for such problems. For example, it is known that we can solve the self-stabilizing leader election in complete graphs if and only if every node knows the exact number of nodes. In this article, we investigate the effect of global knowledge on the possibility of self-stabilizing population protocols in arbitrary graphs. Specifically, we clarify the solvability of the leader election problem, the ranking problem, the degree recognition problem, and the neighbor recognition problem by self-stabilizing population protocols with knowledge of the number of nodes and/or the number of edges in a network.
- Published
- 2021
16. A self-stabilizing algorithm for constructing a minimal reachable directed acyclic graph with two senders and two targets
- Author
-
Kim, Yonghwan, Shibata, Masahiro, Sudo Yuichi, Nakamura Junya, Katayama Yoshiaki, Masuzawa Toshimitsu, Kim, Yonghwan, Shibata, Masahiro, Sudo Yuichi, Nakamura Junya, Katayama Yoshiaki, and Masuzawa Toshimitsu
- Abstract
In this paper, we introduce a new graph structure named an ST-reachable directed acyclic graph which is a directed acyclic graph (DAG) that guarantees reachability (i.e., a directed path exists) from every sender to every target. When an arbitrarily connected undirected graph G = (V,E) and two sets of the vertices, senders S (⊂V) and targets T (⊂V), are given, we consider the construction of a minimal ST-reachable DAG by changing some undirected edges to arcs and removing the remaining edges. In this paper, we present the necessary and sufficient condition under which a minimal ST-reachable DAG can be constructed when |S| ≤ 2 and |T| ≤ 2, and propose a self-stabilizing algorithm for constructing a minimal ST-reachable DAG (if it exists) when an arbitrarily connected undirected graph, S(|S| ≤ 2) and T (|T| ≤ 2) are given. Moreover, our proposed algorithm can detect the non-existence of any ST-reachable DAG if the ST-reachable DAG of the given graph and two sets of vertices, S and T, do not exist.
- Published
- 2021
17. Time-Optimal Loosely-Stabilizing Leader Election in Population Protocols
- Author
-
Sudo, Yuichi, Eguchi, Ryota, Izumi, Taisuke, Masuzawa, Toshimitsu, Sudo, Yuichi, Eguchi, Ryota, Izumi, Taisuke, and Masuzawa, Toshimitsu
- Abstract
We consider the leader election problem in the population protocol model. In pragmatic settings of population protocols, self-stabilization is a highly desired feature owing to its fault resilience and the benefit of initialization freedom. However, the design of self-stabilizing leader election is possible only under a strong assumption (i.e., the knowledge of the exact size of a network) and rich computational resource (i.e., the number of states). Loose-stabilization is a promising relaxed concept of self-stabilization to address the aforementioned issue. Loose-stabilization guarantees that starting from any configuration, the network will reach a safe configuration where a single leader exists within a short time, and thereafter it will maintain the single leader for a long time, but not necessarily forever. The main contribution of this paper is giving a time-optimal loosely-stabilizing leader election protocol. The proposed protocol with design parameter ? ? 1 attains O(? log n) parallel convergence time and ?(n^?) parallel holding time (i.e., the length of the period keeping the unique leader), both in expectation. This protocol is time-optimal in the sense of both the convergence and holding times in expectation because any loosely-stabilizing leader election protocol with the same length of the holding time is known to require ?(? log n) parallel time.
- Published
- 2021
- Full Text
- View/download PDF
18. A cooperative partial snapshot algorithm for checkpoint-rollback recovery of large-scale and dynamic distributed systems and experimental evaluations
- Author
-
Nakamura, Junya, Kim, Yonghwan, Katayama, Yoshiaki, Masuzawa, Toshimitsu, Nakamura, Junya, Kim, Yonghwan, Katayama, Yoshiaki, and Masuzawa, Toshimitsu
- Abstract
A distributed system consisting of a huge number of computational entities is prone to faults, because faults in a few nodes cause the entire system to fail. Consequently, fault tolerance of distributed systems is a critical issue. Checkpoint-rollback recovery is a universal and representative technique for fault tolerance; it periodically records the entire system state (configuration) to non-volatile storage, and the system restores itself using the recorded configuration when the system fails. To record a configuration of a distributed system, a specific algorithm known as a snapshot algorithm is required. However, many snapshot algorithms require coordination among all nodes in the system; thus, frequent executions of snapshot algorithms require unacceptable communication cost, especially if the systems are large. As a sophisticated snapshot algorithm, a partial snapshot algorithm has been introduced that takes a partial snapshot (instead of a global snapshot). However, if two or more partial snapshot algorithms are concurrently executed, and their snapshot domains overlap, they should coordinate, so that the partial snapshots (taken by the algorithms) are consistent. In this paper, we propose a new efficient partial snapshot algorithm with the aim of reducing communication for the coordination. In a simulation, we show that the proposed algorithm drastically outperforms the existing partial snapshot algorithm, in terms of message and time complexity.
- Published
- 2021
- Full Text
- View/download PDF
19. Communication Efficient Self-Stabilizing Leader Election
- Author
-
Emek, Yuval, Kutten, Shay, Masuzawa, Toshimitsu, Tamura, Yasumasa, Emek, Yuval, Kutten, Shay, Masuzawa, Toshimitsu, and Tamura, Yasumasa
- Abstract
This paper presents a randomized self-stabilizing algorithm that elects a leader r in a general n-node undirected graph and constructs a spanning tree T rooted at r. The algorithm works under the synchronous message passing network model, assuming that the nodes know a linear upper bound on n and that each edge has a unique ID known to both its endpoints (or, alternatively, assuming the KT? model). The highlight of this algorithm is its superior communication efficiency: It is guaranteed to send a total of O? (n) messages, each of constant size, till stabilization, while stabilizing in O? (n) rounds, in expectation and with high probability. After stabilization, the algorithm sends at most one constant size message per round while communicating only over the (n - 1) edges of T. In all these aspects, the communication overhead of the new algorithm is far smaller than that of the existing (mostly deterministic) self-stabilizing leader election algorithms. The algorithm is relatively simple and relies mostly on known modules that are common in the fault free leader election literature; these modules are enhanced in various subtle ways in order to assemble them into a communication efficient self-stabilizing algorithm.
- Published
- 2020
- Full Text
- View/download PDF
20. Tight Bounds on Distributed Exploration of Temporal Graphs
- Author
-
Gotoh, Tsuyoshi, Flocchini, Paola, Masuzawa, Toshimitsu, Santoro, Nicola, Gotoh, Tsuyoshi, Flocchini, Paola, Masuzawa, Toshimitsu, and Santoro, Nicola
- Abstract
Temporal graphs (or evolving graphs) are time-varying graphs where time is assumed to be discrete. In this paper, we consider for the first time the problem of exploring temporal graphs of arbitrary unknown topology. We study the feasibility of exploration, under both the Fsync and Ssync schedulers, focusing on the number of agents necessary and sufficient to explore such graphs. We first consider the minimal (i.e., less restrictive) assumption on the dynamics of the graph under which exploration is still feasible: temporal connectivity. Let ? be the class of temporally connected graphs; we show that for any temporal graph ? ? ? the number of agents sufficient to perform exploration is related to the number of its transient edges, a parameter ?(?) we call evanescence of the graph. More precisely, any ? ? ? can be explored by a team of k ? 2 ?(?) +1 agents; this bound is tight as we prove there are ? ? ? that cannot be explored by 2 ?(?) agents. We then turn our attention to the well-known stronger assumption on the dynamics of the graph, called 1-interval connectivity: the graph is connected at any time step. Let ? ? ? be the class of these always-connected temporal graphs. For this class, we prove the existence of a difference between Fsync and Ssync when there is a bound ? on the number of edges missing at each time. In fact, we show a tight bound of 2 ? +1 on the number of agents necessary and sufficient in Ssync, and a smaller tight bound of 2 ? in Fsync. As a corollary, we re-establish two recently published bounds for 1-interval connected rings.
- Published
- 2020
- Full Text
- View/download PDF
21. Space-efficient uniform deployment of mobile agents in asynchronous unidirectional rings
- Author
-
Shibata, Masahiro, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Shibata, Masahiro, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
In this paper, we consider the uniform deployment problem of mobile agents in asynchronous unidirectional ring networks. This problem requires agents to spread uniformly in the network. In this paper, we focus on the memory space per agent required to solve the problem. We consider two problem settings. The first setting assumes that agents have no multiplicity detection, that is, agents cannot detect whether another agent is staying at the same node or not. In this case, we show that each agent requires memory space to solve the problem, where n is the number of nodes. In addition, we propose an algorithm to solve the problem with memory space per agent, where k is the number of agents. The second setting assumes that each agent is equipped with the weak multiplicity detection, that is, agents can detect whether another agent is staying at the same node or not, but cannot get any other information about the number of the agents. Then, we show that the memory space per agent can be reduced to. To the best of our knowledge, this is the first research considering the effect of the multiplicity detection on memory space required to solve problems.
- Published
- 2020
22. Uniform deployment of mobile agents in asynchronous rings
- Author
-
Kyushu Institute of Technology, 680-4, Kawadu, Iizuka, Fukuoka, 820-8502, Japan, Graduate School of Information Science and Technology, Osaka University, 1-5 Yamadaoka, Suita, Osaka 565-0871, Japan, Graduate School of Information Science, NAIST, Takayama 8916-5, Ikoma, Nara 630-0192, Japan, Shibata, Masahiro, Mega, Toshiya, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Kyushu Institute of Technology, 680-4, Kawadu, Iizuka, Fukuoka, 820-8502, Japan, Graduate School of Information Science and Technology, Osaka University, 1-5 Yamadaoka, Suita, Osaka 565-0871, Japan, Graduate School of Information Science, NAIST, Takayama 8916-5, Ikoma, Nara 630-0192, Japan, Shibata, Masahiro, Mega, Toshiya, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
type:Journal Article, In this paper, we consider the uniform deployment problem of mobile agents in asynchronous unidirectional rings, which requires the agents to uniformly spread in the ring. The uniform deployment problem is in striking contrast to the rendezvous problem which requires the agents to meet at the same node. While rendezvous aims to break the symmetry, uniform deployment aims to attain the symmetry. It is well known that the symmetry breaking is difficult in distributed systems and the rendezvous problem cannot be solved from some initial configurations. Hence, we are interested in clarifying what difference the uniform deployment problem has on the solvability and the number of agent moves compared to the rendezvous problem. We consider two problem settings, with knowledge of k (or n) and without knowledge of k or n where k is the number of agents and n is the number of nodes. First, we consider agents with knowledge of k (or n since k and n can be easily obtained if one of them is given). In this case, we propose two algorithms. The first algorithm solves the uniform deployment problem with termination detection. This algorithm requires O(k log n) memory space per agent, O(n) time, and O(kn) total moves. The second algorithm also solves the uniform deployment problem with termination detection. This algorithm reduces the memory space per agent to O(log n), but uses O(n log k) time, and requires O(kn) total moves. Both algorithms are asymptotically optimal in terms of total moves since there are some initial configurations such that agents re- quire Ω(kn) total moves to solve the problem. Next, we consider agents with no knowledge of k or n. In this case, we show that, when termination detection is required, there exists no algorithm to solve the uniform deployment problem. For this reason, we consider the relaxed uniform deployment problem that does not require termination detection, and we propose an algorithm to solve the relaxed uniform deployment problem. This algo
- Published
- 2020
23. Tight Bounds on Distributed Exploration of Temporal Graphs
- Author
-
Gotoh, Tsuyoshi, Flocchini, Paola, Masuzawa, Toshimitsu, Santoro, Nicola, Gotoh, Tsuyoshi, Flocchini, Paola, Masuzawa, Toshimitsu, and Santoro, Nicola
- Abstract
Temporal graphs (or evolving graphs) are time-varying graphs where time is assumed to be discrete. In this paper, we consider for the first time the problem of exploring temporal graphs of arbitrary unknown topology. We study the feasibility of exploration, under both the Fsync and Ssync schedulers, focusing on the number of agents necessary and sufficient to explore such graphs. We first consider the minimal (i.e., less restrictive) assumption on the dynamics of the graph under which exploration is still feasible: temporal connectivity. Let ? be the class of temporally connected graphs; we show that for any temporal graph ? ? ? the number of agents sufficient to perform exploration is related to the number of its transient edges, a parameter ?(?) we call evanescence of the graph. More precisely, any ? ? ? can be explored by a team of k ? 2 ?(?) +1 agents; this bound is tight as we prove there are ? ? ? that cannot be explored by 2 ?(?) agents. We then turn our attention to the well-known stronger assumption on the dynamics of the graph, called 1-interval connectivity: the graph is connected at any time step. Let ? ? ? be the class of these always-connected temporal graphs. For this class, we prove the existence of a difference between Fsync and Ssync when there is a bound ? on the number of edges missing at each time. In fact, we show a tight bound of 2 ? +1 on the number of agents necessary and sufficient in Ssync, and a smaller tight bound of 2 ? in Fsync. As a corollary, we re-establish two recently published bounds for 1-interval connected rings.
- Published
- 2020
- Full Text
- View/download PDF
24. Dynamic Ring Exploration with (H,S) View
- Author
-
Gotoh, Tsuyoshi, Sudo, Yuichi, 20362650, Ooshita, Fukuhito, Masuzawa, Toshimitsu, Gotoh, Tsuyoshi, Sudo, Yuichi, 20362650, Ooshita, Fukuhito, and Masuzawa, Toshimitsu
- Abstract
The researches about a mobile entity (called agent) on dynamic networks have attracted a lot of attention in recent years. Exploration which requires an agent to visit all the nodes in the network is one of the most fundamental problems. While the exploration of dynamic networks with complete information or with no information about network changes has been studied, an agent with partial information about the network changes has not been considered yet despite its practical importance. In this paper, we consider the exploration of dynamic networks by a single agent with partial information about network changes. To the best of our knowledge, this is the very first work to investigate the exploration problem with such partial information. As a first step in this researchdirection, we focus on 1-interval connected rings as dynamic networks in this paper. We assume that the single agent has partial information called the (H, S) view by which it always knows whether or not each of the links within H hops is available in each of the next S time steps. In this setting, we show that H + S n and S dn/2e (n is the size of the network) are necessary and sufficient conditions to explore 1-interval connected rings. Moreover, we investigate the upper and lower bounds of the exploration time. It is proven that the exploration time is O(n2) for dn/2e S < 2H0 ???? 1,O(n2/H + nH) for S max(dn/2e, 2H0 ???? 1), O(n2/H + n log H) for S n ???? 1, and W(n2/H) forany S where H0 = min(H, bn/2c).
- Published
- 2020
25. Dynamic Ring Exploration with (H,S) View
- Author
-
Gotoh, Tsuyoshi, 28645, Sudo, Yuichi, 28646, 36, 20362650, Masuzawa, Toshimitsu, 28647, Gotoh, Tsuyoshi, 28645, Sudo, Yuichi, 28646, 36, 20362650, Masuzawa, Toshimitsu, and 28647
- Abstract
The researches about a mobile entity (called agent) on dynamic networks have attracted a lot of attention in recent years. Exploration which requires an agent to visit all the nodes in the network is one of the most fundamental problems. While the exploration of dynamic networks with complete information or with no information about network changes has been studied, an agent with partial information about the network changes has not been considered yet despite its practical importance. In this paper, we consider the exploration of dynamic networks by a single agent with partial information about network changes. To the best of our knowledge, this is the very first work to investigate the exploration problem with such partial information. As a first step in this researchdirection, we focus on 1-interval connected rings as dynamic networks in this paper. We assume that the single agent has partial information called the (H, S) view by which it always knows whether or not each of the links within H hops is available in each of the next S time steps. In this setting, we show that H + S n and S dn/2e (n is the size of the network) are necessary and sufficient conditions to explore 1-interval connected rings. Moreover, we investigate the upper and lower bounds of the exploration time. It is proven that the exploration time is O(n2) for dn/2e S < 2H0 ???? 1,O(n2/H + nH) for S max(dn/2e, 2H0 ???? 1), O(n2/H + n log H) for S n ???? 1, and W(n2/H) forany S where H0 = min(H, bn/2c)., journal article
- Published
- 2020
26. Communication Efficient Self-Stabilizing Leader Election
- Author
-
Xavier Défago and Yuval Emek and Shay Kutten and Toshimitsu Masuzawa and Yasumasa Tamura, Défago, Xavier, Emek, Yuval, Kutten, Shay, Masuzawa, Toshimitsu, Tamura, Yasumasa, Xavier Défago and Yuval Emek and Shay Kutten and Toshimitsu Masuzawa and Yasumasa Tamura, Défago, Xavier, Emek, Yuval, Kutten, Shay, Masuzawa, Toshimitsu, and Tamura, Yasumasa
- Abstract
This paper presents a randomized self-stabilizing algorithm that elects a leader r in a general n-node undirected graph and constructs a spanning tree T rooted at r. The algorithm works under the synchronous message passing network model, assuming that the nodes know a linear upper bound on n and that each edge has a unique ID known to both its endpoints (or, alternatively, assuming the KT₁ model). The highlight of this algorithm is its superior communication efficiency: It is guaranteed to send a total of Õ (n) messages, each of constant size, till stabilization, while stabilizing in Õ (n) rounds, in expectation and with high probability. After stabilization, the algorithm sends at most one constant size message per round while communicating only over the (n - 1) edges of T. In all these aspects, the communication overhead of the new algorithm is far smaller than that of the existing (mostly deterministic) self-stabilizing leader election algorithms. The algorithm is relatively simple and relies mostly on known modules that are common in the fault free leader election literature; these modules are enhanced in various subtle ways in order to assemble them into a communication efficient self-stabilizing algorithm.
- Published
- 2020
- Full Text
- View/download PDF
27. Communication Efficient Self-Stabilizing Leader Election (Full Version)
- Author
-
Défago, Xavier, Emek, Yuval, Kutten, Shay, Masuzawa, Toshimitsu, Tamura, Yasumasa, Défago, Xavier, Emek, Yuval, Kutten, Shay, Masuzawa, Toshimitsu, and Tamura, Yasumasa
- Abstract
This paper presents a randomized self-stabilizing algorithm that elects a leader $r$ in a general $n$-node undirected graph and constructs a spanning tree $T$ rooted at $r$. The algorithm works under the synchronous message passing network model, assuming that the nodes know a linear upper bound on $n$ and that each edge has a unique ID known to both its endpoints (or, alternatively, assuming the $KT_{1}$ model). The highlight of this algorithm is its superior communication efficiency: It is guaranteed to send a total of $\tilde{O} (n)$ messages, each of constant size, till stabilization, while stabilizing in $\tilde{O} (n)$ rounds, in expectation and with high probability. After stabilization, the algorithm sends at most one constant size message per round while communicating only over the ($n - 1$) edges of $T$. In all these aspects, the communication overhead of the new algorithm is far smaller than that of the existing (mostly deterministic) self-stabilizing leader election algorithms. The algorithm is relatively simple and relies mostly on known modules that are common in the fault free leader election literature; these modules are enhanced in various subtle ways in order to assemble them into a communication efficient self-stabilizing algorithm., Comment: An extended abstract version of this manuscript has been accepted for publication in DISC 2020
- Published
- 2020
28. Time-optimal Loosely-stabilizing Leader Election in Population Protocols
- Author
-
Sudo, Yuichi, Eguchi, Ryota, Izumi, Taisuke, Masuzawa, Toshimitsu, Sudo, Yuichi, Eguchi, Ryota, Izumi, Taisuke, and Masuzawa, Toshimitsu
- Abstract
We consider the leader election problem in population protocol models. In pragmatic settings of population protocols, self-stabilization is a highly desired feature owing to its fault resilience and the benefit of initialization freedom. However, the design of self-stabilizing leader election is possible only under a strong assumption (i.e. the knowledge of the \emph{exact} size of a network) and rich computational resources (i.e. the number of states). Loose-stabilization, introduced by Sudo et al [Theoretical Computer Science, 2012], is a promising relaxed concept of self-stabilization to address the aforementioned issue. Loose-stabilization guarantees that starting from any configuration, the network will reach a safe configuration where a single leader exists within a short time, and thereafter it will maintain the single leader for a long time, but not forever. The main contribution of the paper is a time-optimal loosely-stabilizing leader election protocol. While the shortest convergence time achieved so far in loosely-stabilizing leader election is $O(\log^3 n)$ parallel time, the proposed protocol with design parameter $\tau \ge 1$ attains $O(\tau \log n)$ parallel convergence time and $\Omega(n^{\tau})$ parallel holding time (i.e. the length of the period keeping the unique leader), both in expectation. This protocol is time-optimal in the sense of both the convergence and holding times in expectation because any loosely-stabilizing leader election protocol with the same length of the holding time is known to require $\Omega(\tau \log n)$ parallel time.
- Published
- 2020
29. The Power of Global Knowledge on Self-stabilizing Population Protocols
- Author
-
Sudo, Yuichi, Shibata, Masahiro, Nakamura, Junya, Kim, Yonghwan, Masuzawa, Toshimitsu, Sudo, Yuichi, Shibata, Masahiro, Nakamura, Junya, Kim, Yonghwan, and Masuzawa, Toshimitsu
- Abstract
In the population protocol model, many problems cannot be solved in a self-stabilizing way. However, global knowledge, such as the number of nodes in a network, sometimes allows us to design a self-stabilizing protocol for such problems. In this paper, we investigate the effect of global knowledge on the possibility of self-stabilizing population protocols in arbitrary graphs. Specifically, we clarify the solvability of the leader election problem, the ranking problem, the degree recognition problem, and the neighbor recognition problem by self-stabilizing population protocols with knowledge of the number of nodes and/or the number of edges in a network.
- Published
- 2020
30. Time-Optimal Self-Stabilizing Leader Election on Rings in Population Protocols
- Author
-
Yokota, Daisuke, Sudo, Yuichi, Masuzawa, Toshimitsu, Yokota, Daisuke, Sudo, Yuichi, and Masuzawa, Toshimitsu
- Abstract
We propose a self-stabilizing leader election protocol on directed rings in the model of population protocols. Given an upper bound $N$ on the population size $n$, the proposed protocol elects a unique leader within $O(nN)$ expected steps starting from any configuration and uses $O(N)$ states. This convergence time is optimal if a given upper bound $N$ is asymptotically tight, i.e., $N=O(n)$.
- Published
- 2020
- Full Text
- View/download PDF
31. Efficient Dispersion of Mobile Agents without Global Knowledge
- Author
-
Shintaku, Takahiro, Sudo, Yuichi, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Shintaku, Takahiro, Sudo, Yuichi, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
We consider the dispersion problem for mobile agents. Initially, k agents are located at arbitrary nodes in an undirected graph. Agents can migrate from node to node via an edge in the graph synchronously. Our goal is to let the k agents be located at different k nodes with minimizing the number of steps before dispersion is completed and the working memory space used by the agents. Kshemkalyani and Ali [ICDCN, 2019] present a fast and space-efficient dispersion algorithm with the assumption that each agent has global knowledge such as the number of edges and the maximum degree of a graph. In this paper, we present a dispersion algorithm that does not require such global knowledge but keeps the asymptotically same running time and slightly smaller memory space.
- Published
- 2020
32. Self-Stabilizing Token Distribution with Constant-Space for Trees
- Author
-
Yuichi Sudo and Ajoy K. Datta and Lawrence L. Larmore and Toshimitsu Masuzawa, Sudo, Yuichi, Datta, Ajoy K., Larmore, Lawrence L., Masuzawa, Toshimitsu, Yuichi Sudo and Ajoy K. Datta and Lawrence L. Larmore and Toshimitsu Masuzawa, Sudo, Yuichi, Datta, Ajoy K., Larmore, Lawrence L., and Masuzawa, Toshimitsu
- Abstract
Self-stabilizing and silent distributed algorithms for token distribution in rooted tree networks are given. Initially, each process of a graph holds at most l tokens. Our goal is to distribute the tokens in the whole network so that every process holds exactly k tokens. In the initial configuration, the total number of tokens in the network may not be equal to nk where n is the number of processes in the network. The root process is given the ability to create a new token or remove a token from the network. We aim to minimize the convergence time, the number of token moves, and the space complexity. A self-stabilizing token distribution algorithm that converges within O(n l) asynchronous rounds and needs Theta(nh epsilon) redundant (or unnecessary) token moves is given, where epsilon = min(k,l-k) and h is the height of the tree network. Two novel ideas to reduce the number of redundant token moves are presented. One reduces the number of redundant token moves to O(nh) without any additional costs while the other reduces the number of redundant token moves to O(n), but increases the convergence time to O(nh l). All algorithms given have constant memory at each process and each link register.
- Published
- 2019
- Full Text
- View/download PDF
33. Loosely-Stabilizing Leader Election with Polylogarithmic Convergence Time
- Author
-
Yuichi Sudo and Fukuhito Ooshita and Hirotsugu Kakugawa and Toshimitsu Masuzawa and Ajoy K. Datta and Lawrence L. Larmore, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Datta, Ajoy K., Larmore, Lawrence L., Yuichi Sudo and Fukuhito Ooshita and Hirotsugu Kakugawa and Toshimitsu Masuzawa and Ajoy K. Datta and Lawrence L. Larmore, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Datta, Ajoy K., and Larmore, Lawrence L.
- Abstract
A loosely-stabilizing leader election protocol with polylogarithmic convergence time in the population protocol model is presented in this paper. In the population protocol model, which is a common abstract model of mobile sensor networks, it is known to be impossible to design a self-stabilizing leader election protocol. Thus, in our prior work, we introduced the concept of loose-stabilization, which is weaker than self-stabilization but has similar advantage as self-stabilization in practice. Following this work, several loosely-stabilizing leader election protocols are presented. The loosely-stabilizing leader election guarantees that, starting from an arbitrary configuration, the system reaches a safe configuration with a single leader within a relatively short time, and keeps the unique leader for an sufficiently long time thereafter. The convergence times of all the existing loosely-stabilizing protocols, i.e., the expected time to reach a safe configuration, are polynomial in n where n is the number of nodes (while the holding times to keep the unique leader are exponential in n). In this paper, a loosely-stabilizing protocol with polylogarithmic convergence time is presented. Its holding time is not exponential, but arbitrarily large polynomial in n.
- Published
- 2019
- Full Text
- View/download PDF
34. A Self-Stabilizing Minimal k-Grouping Algorithm
- Author
-
Datta, Ajoy K., Larmore, Lawrence L., Masuzawa, Toshimitsu, Sudo, Yuichi, Datta, Ajoy K., Larmore, Lawrence L., Masuzawa, Toshimitsu, and Sudo, Yuichi
- Abstract
We consider the minimal k-grouping problem: given a graph G=(V,E) and a constant k, partition G into subgraphs of diameter no greater than k, such that the union of any two subgraphs has diameter greater than k. We give a silent self-stabilizing asynchronous distributed algorithm for this problem in the composite atomicity model of computation, assuming the network has unique process identifiers. Our algorithm works under the weakly-fair daemon. The time complexity (i.e., the number of rounds to reach a legitimate configuration) of our algorithm is O(nD/k) where n is the number of processes in the network and \diam is the diameter of the network. The space complexity of each process is O((n +n_{false})log n) where n_{false} is the number of false identifiers, i.e., identifiers that do not match the identifier of any process, but which are stored in the local memory of at least one process at the initial configuration. Our algorithm guarantees that the number of groups is at most $2n/k+1$ after convergence. We also give a novel composition technique to concatenate a silent algorithm repeatedly, which we call loop composition., Comment: This is a revised version of the conference paper [6], which appears in the proceedings of the 18th International Conference on Distributed Computing and Networking (ICDCN), ACM, 2017. This revised version slightly generalize Theorem 1
- Published
- 2019
35. Leader Election Requires Logarithmic Time in Population Protocols
- Author
-
Sudo, Yuichi, Masuzawa, Toshimitsu, Sudo, Yuichi, and Masuzawa, Toshimitsu
- Abstract
This paper shows that every leader election protocol requires logarithmic stabilization time both in expectation and with high probability in the population protocol model. This lower bound holds even if each agent has knowledge of the exact size of a population and is allowed to use an arbitrarily large number of agent states. This lower bound concludes that the protocol given in [Sudo et al., SSS 2019] is time-optimal in expectation.
- Published
- 2019
36. Atomic Cross-Chain Swaps with Improved Space and Local Time Complexity
- Author
-
Imoto, Soichiro, Sudo, Yuichi, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Imoto, Soichiro, Sudo, Yuichi, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
An effective atomic cross-chain swap protocol is introduced by Herlihy [Herlihy, 2018] as a distributed coordination protocol in order to exchange assets across multiple blockchains among multiple parties. An atomic cross-chain swap protocol guarantees; (1) if all parties conform to the protocol, then all assets are exchanged among parties, (2) even if some parties or coalitions of parties deviate from the protocol, no party conforming to the protocol suffers a loss, and (3) no coalition has an incentive to deviate from the protocol. Herlihy [Herlihy, 2018] invented this protocol by using hashed timelock contracts. A cross-chain swap is modeled as a directed graph D = (V,A). Vertex set V denotes a set of parties and arc set A denotes a set of proposed asset transfers. Herlihy's protocol uses the graph topology and signature information to set appropriate hashed timelock contracts. The space complexity of the protocol (i.e., the total number of bits written in the blockchains in a swap) is O(|A|^2). The local time complexity of the protocol (i.e., the maximum execution time of a contract in a swap to transfer the corresponding asset) is O(|V||L|), where L is a feedback vertex set computed by the protocol. We propose a new atomic cross-chain swap protocol which uses only signature information and improves the space complexity to O(|A||V|) and the local time complexity to O(|V|).
- Published
- 2019
37. Loosely-Stabilizing Leader Election with Polylogarithmic Convergence Time
- Author
-
Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Datta, Ajoy K., Larmore, Lawrence L., Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Datta, Ajoy K., and Larmore, Lawrence L.
- Abstract
A loosely-stabilizing leader election protocol with polylogarithmic convergence time in the population protocol model is presented in this paper. In the population protocol model, which is a common abstract model of mobile sensor networks, it is known to be impossible to design a self-stabilizing leader election protocol. Thus, in our prior work, we introduced the concept of loose-stabilization, which is weaker than self-stabilization but has similar advantage as self-stabilization in practice. Following this work, several loosely-stabilizing leader election protocols are presented. The loosely-stabilizing leader election guarantees that, starting from an arbitrary configuration, the system reaches a safe configuration with a single leader within a relatively short time, and keeps the unique leader for an sufficiently long time thereafter. The convergence times of all the existing loosely-stabilizing protocols, i.e., the expected time to reach a safe configuration, are polynomial in n where n is the number of nodes (while the holding times to keep the unique leader are exponential in n). In this paper, a loosely-stabilizing protocol with polylogarithmic convergence time is presented. Its holding time is not exponential, but arbitrarily large polynomial in n.
- Published
- 2018
- Full Text
- View/download PDF
38. Self-Stabilizing Token Distribution with Constant-Space for Trees
- Author
-
Sudo, Yuichi, Datta, Ajoy K., Larmore, Lawrence L., Masuzawa, Toshimitsu, Sudo, Yuichi, Datta, Ajoy K., Larmore, Lawrence L., and Masuzawa, Toshimitsu
- Abstract
Self-stabilizing and silent distributed algorithms for token distribution in rooted tree networks are given. Initially, each process of a graph holds at most l tokens. Our goal is to distribute the tokens in the whole network so that every process holds exactly k tokens. In the initial configuration, the total number of tokens in the network may not be equal to nk where n is the number of processes in the network. The root process is given the ability to create a new token or remove a token from the network. We aim to minimize the convergence time, the number of token moves, and the space complexity. A self-stabilizing token distribution algorithm that converges within O(n l) asynchronous rounds and needs Theta(nh epsilon) redundant (or unnecessary) token moves is given, where epsilon = min(k,l-k) and h is the height of the tree network. Two novel ideas to reduce the number of redundant token moves are presented. One reduces the number of redundant token moves to O(nh) without any additional costs while the other reduces the number of redundant token moves to O(n), but increases the convergence time to O(nh l). All algorithms given have constant memory at each process and each link register.
- Published
- 2018
- Full Text
- View/download PDF
39. Logarithmic Expected-Time Leader Election in Population Protocol Model
- Author
-
Sudo, Yuichi, Ooshita, Fukuhito, Izumi, Taisuke, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Sudo, Yuichi, Ooshita, Fukuhito, Izumi, Taisuke, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
In this paper, the leader election problem in the population protocol model is considered. A leader election protocol with logarithmic stabilization time is given. Given a rough knowledge m of the population size n such that m >= \log_2 n and m=O(log n), the proposed protocol guarantees that exactly one leader is elected from n agents within O(log n) parallel time in expectation and the unique leader is kept forever thereafter. The number of states per agent of the protocol is O(log n)., Comment: 16 pages
- Published
- 2018
40. Brief Announcement: Loosely-stabilizing Leader Election with Polylogarithmic Convergence Time
- Author
-
Yuichi Sudo and Fukuhito Ooshita and Hirotsugu Kakugawa and Toshimitsu Masuzawa, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Yuichi Sudo and Fukuhito Ooshita and Hirotsugu Kakugawa and Toshimitsu Masuzawa, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
We present a fast loosely-stabilizing leader election protocol in the population protocol model. It elects a unique leader in a poly-logarithmic time and holds the leader for a polynomial time with arbitrarily large degree in terms of parallel time, i.e, the number of steps per the population size.
- Published
- 2018
- Full Text
- View/download PDF
41. Loosely-Stabilizing Leader Election on Arbitrary Graphs in Population Protocols Without Identifiers nor Random Numbers
- Author
-
Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
In the population protocol model Angluin et al. proposed in 2004, there exists no self-stabilizing leader election protocol for complete graphs, arbitrary graphs, trees, lines, degree-bounded graphs and so on unless the protocol knows the exact number of nodes. To circumvent the impossibility, we introduced the concept of loose-stabilization in 2009, which relaxes the closure requirement of self-stabilization. A loosely-stabilizing protocol guarantees that starting from any initial configuration a system reaches a safe configuration, and after that, the system keeps its specification (e.g. the unique leader) not forever, but for a sufficiently long time (e.g. exponentially large time with respect to the number of nodes). Our previous works presented two loosely-stabilizing leader election protocols for arbitrary graphs; One uses agent identifiers and the other uses random numbers to elect a unique leader. In this paper, we present a loosely-stabilizing protocol that solves leader election on arbitrary graphs without agent identifiers nor random numbers. By the combination of virus-propagation and token-circulation, the proposed protocol achieves polynomial convergence time and exponential holding time without such external entities. Specifically, given upper bounds N and Delta of the number of nodes n and the maximum degree of nodes delta respectively, it reaches a safe configuration within O(m*n^3*d + m*N*Delta^2*log(N)) expected steps, and keeps the unique leader for Omega(N*e^N) expected steps where m is the number of edges and d is the diameter of the graph. To measure the time complexity of the protocol, we assume the uniformly random scheduler which is widely used in the field of the population protocols.
- Published
- 2016
- Full Text
- View/download PDF
42. Maximum Matching for Anonymous Trees with Constant Space per Process
- Author
-
Datta, Ajoy K., Larmore, Lawrence L., Masuzawa, Toshimitsu, Datta, Ajoy K., Larmore, Lawrence L., and Masuzawa, Toshimitsu
- Abstract
We give a silent self-stabilizing protocol for computing a maximum matching in an anonymous network with a tree topology. The round complexity of our protocol is O(diam), where diam is the diameter of the network, and the step complexity is O(n*diam), where n is the number of processes in the network. The working space complexity is O(1) per process, although the output necessarily takes O(log(delta)) space per process, where delta is the degree of that process. To implement parent pointers in constant space, regardless of degree, we use the cyclic Abelian group Z_7.
- Published
- 2016
- Full Text
- View/download PDF
43. Maximum Matching for Anonymous Trees with Constant Space per Process
- Author
-
Ajoy K. Datta and Lawrence L. Larmore and Toshimitsu Masuzawa, Datta, Ajoy K., Larmore, Lawrence L., Masuzawa, Toshimitsu, Ajoy K. Datta and Lawrence L. Larmore and Toshimitsu Masuzawa, Datta, Ajoy K., Larmore, Lawrence L., and Masuzawa, Toshimitsu
- Abstract
We give a silent self-stabilizing protocol for computing a maximum matching in an anonymous network with a tree topology. The round complexity of our protocol is O(diam), where diam is the diameter of the network, and the step complexity is O(n*diam), where n is the number of processes in the network. The working space complexity is O(1) per process, although the output necessarily takes O(log(delta)) space per process, where delta is the degree of that process. To implement parent pointers in constant space, regardless of degree, we use the cyclic Abelian group Z_7.
- Published
- 2016
- Full Text
- View/download PDF
44. Loosely-Stabilizing Leader Election on Arbitrary Graphs in Population Protocols Without Identifiers nor Random Numbers
- Author
-
Yuichi Sudo and Fukuhito Ooshita and Hirotsugu Kakugawa and Toshimitsu Masuzawa, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Yuichi Sudo and Fukuhito Ooshita and Hirotsugu Kakugawa and Toshimitsu Masuzawa, Sudo, Yuichi, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
In the population protocol model Angluin et al. proposed in 2004, there exists no self-stabilizing leader election protocol for complete graphs, arbitrary graphs, trees, lines, degree-bounded graphs and so on unless the protocol knows the exact number of nodes. To circumvent the impossibility, we introduced the concept of loose-stabilization in 2009, which relaxes the closure requirement of self-stabilization. A loosely-stabilizing protocol guarantees that starting from any initial configuration a system reaches a safe configuration, and after that, the system keeps its specification (e.g. the unique leader) not forever, but for a sufficiently long time (e.g. exponentially large time with respect to the number of nodes). Our previous works presented two loosely-stabilizing leader election protocols for arbitrary graphs; One uses agent identifiers and the other uses random numbers to elect a unique leader. In this paper, we present a loosely-stabilizing protocol that solves leader election on arbitrary graphs without agent identifiers nor random numbers. By the combination of virus-propagation and token-circulation, the proposed protocol achieves polynomial convergence time and exponential holding time without such external entities. Specifically, given upper bounds N and Delta of the number of nodes n and the maximum degree of nodes delta respectively, it reaches a safe configuration within O(m*n^3*d + m*N*Delta^2*log(N)) expected steps, and keeps the unique leader for Omega(N*e^N) expected steps where m is the number of edges and d is the diameter of the graph. To measure the time complexity of the protocol, we assume the uniformly random scheduler which is widely used in the field of the population protocols.
- Published
- 2016
- Full Text
- View/download PDF
45. Distributed Online Data Aggregation in Dynamic Graphs
- Author
-
Bramas, Quentin, Masuzawa, Toshimitsu, Tixeuil, Sébastien, Bramas, Quentin, Masuzawa, Toshimitsu, and Tixeuil, Sébastien
- Abstract
We consider the problem of aggregating data in a dynamic graph, that is, aggregating the data that originates from all nodes in the graph to a specific node, the sink. We are interested in giving lower bounds for this problem, under different kinds of adversaries. In our model, nodes are endowed with unlimited memory and unlimited computational power. Yet, we assume that communications between nodes are carried out with pairwise interactions, where nodes can exchange control information before deciding whether they transmit their data or not, given that each node is allowed to transmit its data at most once. When a node receives a data from a neighbor, the node may aggregate it with its own data. We consider three possible adversaries: the online adaptive adversary, the oblivious adversary , and the randomized adversary that chooses the pairwise interactions uniformly at random. For the online adaptive and the oblivious adversary, we give impossibility results when nodes have no knowledge about the graph and are not aware of the future. Also, we give several tight bounds depending on the knowledge (be it topology related or time related) of the nodes. For the randomized adversary, we show that the Gathering algorithm, which always commands a node to transmit, is optimal if nodes have no knowledge at all. Also, we propose an algorithm called Waiting Greedy, where a node either waits or transmits depending on some parameter, that is optimal when each node knows its future pairwise interactions with the sink.
- Published
- 2016
46. Loosely-Stabilizing Leader Election on Arbitrary Graphs in Population Protocols Without Identifiers nor Random Numbers
- Author
-
Sudo, Yuichi, 20362650, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Sudo, Yuichi, 20362650, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
application/pdf, In the population protocol model Angluin et al. proposed in 2004, there exists no self-stabilizing leader election protocol for complete graphs, arbitrary graphs, trees, lines, degree-bounded graphs and so on unless the protocol knows the exact number of nodes. To circumvent the impossibility, we introduced the concept of loose-stabilization in 2009, which relaxes the closure requirement of self-stabilization. A loosely-stabilizing protocol guarantees that starting from any initial configuration a system reaches a safe configuration, and after that, the system keeps its specification (e.g. the unique leader) not forever, but for a sufficiently long time (e.g. exponentially large time with respect to the number of nodes). Our previous works presented two loosely-stabilizing leader election protocols for arbitrary graphs; One uses agent identifiers and the other uses random numbers to elect a unique leader. In this paper, we present a loosely-stabilizing protocol that solves leader election on arbitrary graphs without agent identifiers nor random numbers. By the combination of virus-propagation and token-circulation, the proposed protocol achieves polynomial convergence time and exponential holding time without such external entities. Specifically, given upper bounds N and Delta of the number of nodes n and the maximum degree of nodes delta respectively, it reaches a safe configuration within O(m*n^3*d + m*N*Delta^2*log(N)) expected steps, and keeps the unique leader for Omega(N*e^N) expected steps where m is the number of edges and d is the diameter of the graph. To measure the time complexity of the protocol, we assume the uniformly random scheduler which is widely used in the field of the population protocols.
- Published
- 2015
47. Loosely-Stabilizing Leader Election on Arbitrary Graphs in Population Protocols Without Identifiers nor Random Numbers
- Author
-
Sudo, Yuichi, 13245, Ooshita, Fukuhito, 36, 20362650, Kakugawa, Hirotsugu, 13246, Masuzawa, Toshimitsu, 13247, Sudo, Yuichi, 13245, Ooshita, Fukuhito, 36, 20362650, Kakugawa, Hirotsugu, 13246, Masuzawa, Toshimitsu, and 13247
- Abstract
In the population protocol model Angluin et al. proposed in 2004, there exists no self-stabilizing leader election protocol for complete graphs, arbitrary graphs, trees, lines, degree-bounded graphs and so on unless the protocol knows the exact number of nodes. To circumvent the impossibility, we introduced the concept of loose-stabilization in 2009, which relaxes the closure requirement of self-stabilization. A loosely-stabilizing protocol guarantees that starting from any initial configuration a system reaches a safe configuration, and after that, the system keeps its specification (e.g. the unique leader) not forever, but for a sufficiently long time (e.g. exponentially large time with respect to the number of nodes). Our previous works presented two loosely-stabilizing leader election protocols for arbitrary graphs; One uses agent identifiers and the other uses random numbers to elect a unique leader. In this paper, we present a loosely-stabilizing protocol that solves leader election on arbitrary graphs without agent identifiers nor random numbers. By the combination of virus-propagation and token-circulation, the proposed protocol achieves polynomial convergence time and exponential holding time without such external entities. Specifically, given upper bounds N and Delta of the number of nodes n and the maximum degree of nodes delta respectively, it reaches a safe configuration within O(m*n^3*d + m*N*Delta^2*log(N)) expected steps, and keeps the unique leader for Omega(N*e^N) expected steps where m is the number of edges and d is the diameter of the graph. To measure the time complexity of the protocol, we assume the uniformly random scheduler which is widely used in the field of the population protocols., conference paper
- Published
- 2015
48. Fast and compact self-stabilizing verification, computation, and fault detection of an MST
- Author
-
Korman, Amos, Kutten, Shay, Masuzawa, Toshimitsu, Korman, Amos, Kutten, Shay, and Masuzawa, Toshimitsu
- Abstract
This paper demonstrates the usefulness of distributed local verification of proofs, as a tool for the design of self-stabilizing algorithms.In particular, it introduces a somewhat generalized notion of distributed local proofs, and utilizes it for improving the time complexity significantly, while maintaining space optimality. As a result, we show that optimizing the memory size carries at most a small cost in terms of time, in the context of Minimum Spanning Tree (MST). That is, we present algorithms that are both time and space efficient for both constructing an MST and for verifying it.This involves several parts that may be considered contributions in themselves.First, we generalize the notion of local proofs, trading off the time complexity for memory efficiency. This adds a dimension to the study of distributed local proofs, which has been gaining attention recently. Specifically, we design a (self-stabilizing) proof labeling scheme which is memory optimal (i.e., $O(\log n)$ bits per node), and whose time complexity is $O(\log ^2 n)$ in synchronous networks, or $O(\Delta \log ^3 n)$ time in asynchronous ones, where $\Delta$ is the maximum degree of nodes. This answers an open problem posed by Awerbuch and Varghese (FOCS 1991). We also show that $\Omega(\log n)$ time is necessary, even in synchronous networks. Another property is that if $f$ faults occurred, then, within the requireddetection time above, they are detected by some node in the $O(f\log n)$ locality of each of the faults.Second, we show how to enhance a known transformer that makes input/output algorithms self-stabilizing. It now takes as input an efficient construction algorithm and an efficient self-stabilizing proof labeling scheme, and produces an efficient self-stabilizing algorithm. When used for MST, the transformer produces a memory optimal self-stabilizing algorithm, whose time complexity, namely, $O(n)$, is significantly better even than that of previous algorithms. (The time complexity
- Published
- 2015
- Full Text
- View/download PDF
49. Partial Gathering of Mobile Agents in Asynchronous Rings
- Author
-
Shibata, Masahiro, Kawai, Shinji, Ooshita, Fukuhito, Kakugawa, Hirotsugu, Masuzawa, Toshimitsu, Shibata, Masahiro, Kawai, Shinji, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
In this paper, we consider the partial gathering problem of mobile agents in asynchronous unidirectional rings equipped with whiteboards on nodes. The partial gathering problem is a new generalization of the total gathering problem. The partial gathering problem requires, for a given integer $g$, that each agent should move to a node and terminate so that at least $g$ agents should meet at the same node. The requirement for the partial gathering problem is weaker than that for the (well-investigated) total gathering problem, and thus, we have interests in clarifying the difference on the move complexity between them. We propose three algorithms to solve the partial gathering problem. The first algorithm is deterministic but requires unique ID of each agent. This algorithm achieves the partial gathering in $O(gn)$ total moves, where $n$ is the number of nodes. The second algorithm is randomized and requires no unique ID of each agent (i.e., anonymous). This algorithm achieves the partial gathering in expected $O(gn)$ total moves. The third algorithm is deterministic and requires no unique ID of each agent. For this case, we show that there exist initial configurations in which no algorithm can solve the problem and agents can achieve the partial gathering in $O(kn)$ total moves for solvable initial configurations, where $k$ is the number of agents. Note that the total gathering problem requires $\Omega (kn)$ total moves, while the partial gathering problem requires $\Omega (gn)$ total moves in each model. Hence, we show that the move complexity of the first and second algorithms is asymptotically optimal.
- Published
- 2015
50. Maximum Metric Spanning Tree made Byzantine Tolerant
- Author
-
Dubois, Swan, Masuzawa, Toshimitsu, Tixeuil, Sébastien, Dubois, Swan, Masuzawa, Toshimitsu, and Tixeuil, Sébastien
- Abstract
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permits to cope with arbitrary malicious behaviors. This paper focus on systems that are both self-stabilizing and Byzantine tolerant. We consider the well known problem of constructing a maximum metric tree in this context. Combining these two properties is known to induce many impossibility results. In this paper, we provide first two impossibility results about the construction of maximum metric tree in presence of transients and (permanent) Byzantine faults. Then, we provide a new self-stabilizing protocol that provides optimal containment of an arbitrary number of Byzantine faults.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.