28 results on '"Radzik, Tomasz"'
Search Results
2. Time-space trade-offs in population protocols for the majority problem.
- Author
-
Berenbrink, Petra, Elsässer, Robert, Friedetzky, Tom, Kaaser, Dominik, Kling, Peter, and Radzik, Tomasz
- Subjects
FINITE state machines ,DISTRIBUTED computing - Abstract
Population protocols are a model for distributed computing that is focused on simplicity and robustness. A system of n identical agents (finite state machines) performs a global task like electing a unique leader or determining the majority opinion when each agent has one of two opinions. Agents communicate in pairwise interactions with randomly assigned communication partners. Quality is measured in two ways: the number of interactions to complete the task and the number of states per agent. We present protocols for the majority problem that allow for a trade-off between these two measures. Compared to the only other trade-off result (Alistarh et al. in Proceedings of the 2015 ACM symposium on principles of distributed computing, Donostia-San Sebastián, 2015), we improve the number of interactions by almost a linear factor. Furthermore, our protocols can be made uniform (working correctly without any information on the population size n), yielding the first uniform majority protocols that stabilize in a subquadratic number of interactions. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
3. Bamboo Garden Trimming Problem (Perpetual Maintenance of Machines with Different Attendance Urgency Factors).
- Author
-
Gąsieniec, Leszek, Klasing, Ralf, Levcopoulos, Christos, Lingas, Andrzej, Min, Jie, and Radzik, Tomasz
- Published
- 2017
- Full Text
- View/download PDF
4. Robustness of the Rotor-Router Mechanism.
- Author
-
Bampas, Evangelos, Gąsieniec, Leszek, Hanusse, Nicolas, Ilcinkas, David, Klasing, Ralf, Kosowski, Adrian, and Radzik, Tomasz
- Subjects
ROBUST control ,RANDOM walks ,NETWORK routers ,EULER equations ,GRAPHIC methods - Abstract
The rotor-router model, also called the Propp machine, was first considered as a deterministic alternative to the random walk. The edges adjacent to each node v (or equivalently, the exit ports at v) are arranged in a fixed cyclic order, which does not change during the exploration. Each node v maintains a port pointer $$\pi _v$$ which indicates the exit port to be adopted by an agent on the conclusion of the next visit to this node (the 'next exit port'). The rotor-router mechanism guarantees that after each consecutive visit at the same node, the pointer at this node is moved to the next port in the cyclic order. It is known that, in an undirected graph G with m edges, the route adopted by an agent controlled by the rotor-router mechanism eventually forms an Euler tour based on arcs obtained via replacing each edge in G by two arcs with opposite direction. The process of ushering the agent to an Euler tour is referred to as the lock-in problem. In Yanovski et al. (Algorithmica 37(3):165-186, 2003), it was proved that, independently of the initial configuration of the rotor-router mechanism in G, the agent locks-in in time bounded by $$2mD$$ , where $$D$$ is the diameter of G. In this paper we examine the dependence of the lock-in time on the initial configuration of the rotor-router mechanism. Our analysis is performed in the form of a game between a player $${\mathcal {P}}$$ intending to lock-in the agent in an Euler tour as quickly as possible and its adversary $${\mathcal {A}}$$ with the counter objective. We consider all cases of who decides the initial cyclic orders and the initial values $$\pi _v$$ . We show, for example, that if $${\mathcal {A}}$$ provides its own port numbering after the initial setup of pointers by $${\mathcal {P}}$$ , the worst-case complexity of the lock-in problem is $${\varTheta }(m\cdot \min \{\log m,D\})$$ . We also investigate the robustness of the rotor-router graph exploration in presence of faults in the pointers $$\pi _v$$ or dynamic changes in the graph. We show, for example, that after the exploration establishes an Eulerian cycle, if k edges are added to the graph, then a new Eulerian cycle is established within $$\mathcal {O}(km)$$ steps. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
5. Fast Consensus for Voting on General Expander Graphs.
- Author
-
Cooper, Colin, Elsässer, Robert, Radzik, Tomasz, Rivera, Nicolás, and Shiraga, Takeharu
- Published
- 2015
- Full Text
- View/download PDF
6. Coalescing Walks on Rotor-Router Systems.
- Author
-
Cooper, Colin, Radzik, Tomasz, Rivera, Nicolás, and Shiraga, Takeharu
- Published
- 2015
- Full Text
- View/download PDF
7. The Power of Two Choices in Distributed Voting.
- Author
-
Cooper, Colin, Elsässer, Robert, and Radzik, Tomasz
- Published
- 2014
- Full Text
- View/download PDF
8. Artificial Neural Networks in the Detection of Known and Unknown DDoS Attacks: Proof-of-Concept.
- Author
-
Saied, Alan, Overill, Richard E., and Radzik, Tomasz
- Published
- 2014
- Full Text
- View/download PDF
9. Estimating network parameters using random walks.
- Author
-
Cooper, Colin, Radzik, Tomasz, and Siantos, Yiannis
- Abstract
Sampling from large graphs is an area of great interest, especially since the emergence of huge structures such as Online Social Networks and the World Wide Web (WWW). The large scale properties of a network can be summarized in terms of parameters of the underlying graph, such as the total number of vertices, edges and triangles. However, the large si ze of these networks makes it computationally expensive to obtain such structural properties of the underlying graph by exhaustive search. If we can estimate these properties by taking small but representative samples from the network, then size is no longer such a problem. In this paper we present a general framework to estimate network properties using random walks. These methods work under the assumption we are able to obtain local characteristics of a vertex during each step of the random walk, for example the number of its neighbours, and their labels. As examples of this approach, we present practical methods to estimate the total number of edges/links m, number of vertices/nodes n and number of connected triads of vertices (triangles) t in graphs. We also give a general method to count any type of small connected subgraph, of which vertices, edges and triangles are specific examples. Additionally we present experimental estimates for n, m, t we obtained using our methods on real or synthetic networks. The synthetic networks were random graphs with power-law degree distributions and designed to have a large number of triangles. We used these graphs as they tend to correspond to the structure of large online networks. The real networks were samples of the WWW and social networks obtained from the SNAP database. In order to test that the methods are indeed practical, the total number of steps made by the walk was limited to at most the size n of the network. In fact the estimates appear to converge to the correct value at a lower number of steps, indicating that our proposed methods are feasible in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
10. Fast Low-Cost Estimation of Network Properties Using Random Walks.
- Author
-
Cooper, Colin, Radzik, Tomasz, and Siantos, Yiannis
- Published
- 2013
- Full Text
- View/download PDF
11. Approximation Bounds on the Number of Mixedcast Rounds in Wireless Ad-Hoc Networks.
- Author
-
Lee, Sang Hyuk and Radzik, Tomasz
- Published
- 2013
- Full Text
- View/download PDF
12. Fractional Combinatorial Optimization.
- Author
-
Radzik, Tomasz
- Published
- 2013
- Full Text
- View/download PDF
13. Improved Approximation Bounds for Maximum Lifetime Problems in Wireless Ad-Hoc Network.
- Author
-
Lee, Sang Hyuk and Radzik, Tomasz
- Published
- 2012
- Full Text
- View/download PDF
14. A Fast Algorithm to Find All High Degree Vertices in Graphs with a Power Law Degree Sequence.
- Author
-
Cooper, Colin, Radzik, Tomasz, and Siantos, Yiannis
- Published
- 2012
- Full Text
- View/download PDF
15. Multiple Random Walks and Interacting Particle Systems.
- Author
-
Cooper, Colin, Frieze, Alan, and Radzik, Tomasz
- Abstract
We study properties of multiple random walks on a graph under various assumptions of interaction between the particles. To give precise results, we make our analysis for random regular graphs. The cover time of a random walk on a random r-regular graph was studied in [6], where it was shown with high probability (whp), that for r ≥ 3 the cover time is asymptotic to θ
r n ln n, where θr = (r − 1)/(r − 2). In this paper we prove the following (whp) results. For k independent walks on a random regular graph G, the cover time CG (k) is asymptotic to CG /k, where CG is the cover time of a single walk. For most starting positions, the expected number of steps before any of the walks meet is ]> . If the walks can communicate when meeting at a vertex, we show that, for most starting positions, the expected time for k walks to broadcast a single piece of information to each other is asymptotic to 2θr n (ln k)/k, as k,n → ∞. We also establish properties of walks where there are two types of particles, predator and prey, or where particles interact when they meet at a vertex by coalescing, or by annihilating each other. For example, the expected extinction time of k explosive particles (k even) tends to (2ln 2) θr n as k→ ∞. The case of n coalescing particles, where one particle is initially located at each vertex, corresponds to a voter model defined as follows: Initially each vertex has a distinct opinion, and at each step each vertex changes its opinion to that of a random neighbour. The expected time for a unique opinion to emerge is the expected time for all the particles to coalesce, which is asymptotic to 2 θr n. Combining results from the predator-prey and multiple random walk models allows us to compare expected detection time in the following cops and robbers scenarios: both the predator and the prey move randomly, the prey moves randomly and the predators stay fixed, the predators move randomly and the prey stays fixed. In all cases, with k predators and ℓ prey the expected detection time is θr Hℓ n/k, where Hℓ is the ℓ-th harmonic number. [ABSTRACT FROM AUTHOR]- Published
- 2009
- Full Text
- View/download PDF
16. Robustness of the Rotor-router Mechanism.
- Author
-
Bampas, Evangelos, Gąsieniec, Leszek, Klasing, Ralf, Kosowski, Adrian, and Radzik, Tomasz
- Abstract
We consider the model of exploration of an undirected graph G by a single agent which is called the rotor-router mechanism or the Propp machine (among other names). Let Π
v indicate the edge adjacent to a node v which the agent took on its last exit from v. The next time when the agent enters node v, first a ˵rotor″ at node v advances pointer Πv to the edge ]> which is next after the edge Πv in a fixed cyclic order of the edges adjacent to v. Then the agent is directed onto edge Πv to move to the next node. It was shown before that after initial O(mD) steps, the agent periodically follows one established Eulerian cycle, that is, in each period of 2m consecutive steps the agent traverses each edge exactly twice, once in each direction. The parameters m and D are the number of edges in G and the diameter of G. We investigate robustness of such exploration in presence of faults in the pointers Πv or dynamic changes in the graph. We show that after the exploration establishes an Eulerian cycle, if at some step the values of k pointers Πv are arbitrarily changed, then a new Eulerian cycle is established within O(km) steps; if at some step k edges are added to the graph, then a new Eulerian cycle is established within O(km) steps; if at some step an edge is deleted from the graph, then a new Eulerian cycle is established within O(νm) steps, where ν is the smallest number of edges in a cycle in graph G containing the deleted edge. Our proofs are based on the relation between Eulerian cycles and spanning trees known as the ˵BEST″ Theorem (after de Bruijn, van Aardenne-Ehrenfest, Smith and Tutte). [ABSTRACT FROM AUTHOR]- Published
- 2009
- Full Text
- View/download PDF
17. Locating and Repairing Faults in a Network with Mobile Agents.
- Author
-
Cooper, Colin, Klasing, Ralf, and Radzik, Tomasz
- Abstract
We consider a fixed, undirected, known network and a number of ˵mobile agents″ which can traverse the network in synchronized steps. Some nodes in the network may be faulty and the agents are to find the faults and repair them. The agents could be software agents, if the underlying network represents a computer network, or robots, if the underlying network represents some potentially hazardous physical terrain. Assuming that the first agent encountering a faulty node can immediately repair it, it is easy to see that the number of steps necessary and sufficient to complete this task is Θ(n/k + D), where n is the number of nodes in the network, D is the diameter of the network, and k is the number of agents. We consider the case where one agent can repair only one faulty node. After repairing the fault, the agent dies. We show that a simple deterministic algorithm for this problem terminates within O(n/k + Dlogf/loglogf) steps, where f = min {n/k, n/D}, assuming that the number of faulty nodes is at most k/2. We also demonstrate the worst-case asymptotic optimality of this algorithm by showing a network such that for any deterministic algorithm, there is a placement of k/2 faults forcing the algorithm to work for Ώ(n/k + Dlogf/loglogf) steps. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
18. Memory Efficient Anonymous Graph Exploration.
- Author
-
Gąsieniec, Leszek and Radzik, Tomasz
- Abstract
Efficient exploration of unknown or unmapped environments has become one of the fundamental problem domains in algorithm design. Its applications range from robot navigation in hazardous environments to rigorous searching, indexing and analysing digital data available on the Internet. A large number of exploration algorithms has been proposed under various assumptions about the capability of mobile (exploring) entities and various characteristics of the environment which are to be explored. This paper considers the graph model, where the environment is represented by a graph of connections in which discrete moves are permitted only along its edges. Designing efficient exploration algorithms in this model has been extensively studied under a diverse set of assumptions, e.g., directed vs undirected graphs, anonymous nodes vs nodes with distinct identities, deterministic vs probabilistic solutions, single vs multiple agent exploration, as well as in the context of different complexity measures including the time complexity, the memory consumption, and the use of other computational resources such as tokens and messages. In this work the emphasis is on memory efficient exploration of anonymous graphs. We discuss in more detail three approaches: random walk, Propp machine and basic walk, reviewing major relevant results, presenting recent developments, and commenting on directions for further research. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
19. On Many-to-Many Communication in Packet Radio Networks.
- Author
-
Chlebus, Bogdan S., Kowalski, Dariusz R., and Radzik, Tomasz
- Abstract
Radio networks model wireless data communication when bandwidth is limited to one wave frequency. The key restriction of such networks is mutual interference of packets arriving simultaneously to a node. The many-to-many (m2m) communication primitive involves p participant nodes of a distance at most d between any pair of them, from among n nodes in the network, and the task is to have all participants get to know all input messages. We consider three cases of the m2m communication problem. In the ad-hoc case, each participant knows only its name and the values of n, p and d. In the partially centralized case, each participant knows the topology of the network and the values of p and d, but does not know the names of other participants. In the centralized case each participant knows the topology of the network and the names of all the participants. For the centralized m2m problem, we give deterministic protocols, for both undirected and directed networks, working in O(d+p) time, which is provably optimal. For the partially centralized m2m problem, we give a randomized protocol for undirected networks working in O((d+p +log
2 n)log p) time with high probability (whp), and we show that any deterministic protocol requires Ώ(plogn/p n+d) time. For the ad-hoc m2m problem, we develop a randomized protocol for undirected networks that works in O((d+log p)log2 n +plog p) time whp. We show two lower bounds for the ad-hoc m2m problem. One states that any m2m deterministic protocol requires Ώ(nlogn/d + 1 n) time when n–p=Ώ(n) and d>1; Ώ(n) time when n–p=o(n); and Ώ(plogn/p n) time when d=1. The other lower bound states that any m2m randomized protocol requires Ώ(p+dlog(n/d+1)+log2 n) expected time. [ABSTRACT FROM AUTHOR]- Published
- 2006
- Full Text
- View/download PDF
20. Searching for Black-Hole Faults in a Network Using Multiple Agents.
- Author
-
Cooper, Colin, Klasing, Ralf, and Radzik, Tomasz
- Abstract
We consider a fixed communication network where (software) agents can move freely from node to node along the edges. A black hole is a faulty or malicious node in the network such that if an agent enters this node, then it immediately ˵dies.″ We are interested in designing an efficient communication algorithm for the agents to identify all black holes. We assume that we have k agents starting from the same node s and knowing the topology of the whole network. The agents move through the network in synchronous steps and can communicate only when they meet in a node. At the end of the exploration of the network, at least one agent must survive and must know the exact locations of the black holes. If the network has n nodes and b black holes, then any exploration algorithm needs Ώ(n/k + D
b ) steps in the worst-case, where Db is the worst case diameter of the network with at most b nodes deleted. We give a general algorithm which completes exploration in O((n/k)logn/loglogn + bDb ) steps for arbitrary networks, if b≤k/2. In the case when b≤k/2, ]> and ]> , we give a refined algorithm which completes exploration in asymptotically optimal O(n/k) steps. [ABSTRACT FROM AUTHOR]- Published
- 2006
- Full Text
- View/download PDF
21. Heuristic Enhancements to the k-best Method for Solving Biobjective Combinatorial Optimisation Problems.
- Author
-
Haasis, Hans-Dietrich, Kopfer, Herbert, Schönberger, Jörn, Steiner, Sarah, and Radzik, Tomasz
- Published
- 2006
- Full Text
- View/download PDF
22. Approximation Bounds for Black Hole Search Problems.
- Author
-
Anderson, James H., Prencipe, Giuseppe, Wattenhofer, Roger P., Klasing, Ralf, Markou, Euripides, Radzik, Tomasz, and Sarracco, Fabiano
- Abstract
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node without leaving any trace. The Black Hole Search is the task of locating all black holes in a network, through the exploration of its nodes by a set of mobile agents. In this paper we consider the problem of designing the fastest Black Hole Search, given the map of the network, the starting node and, possibly, a subset of nodes of the network initially known to be safe. We study the version of this problem that assumes that there is at most one black hole in the network and there are two agents, which move in synchronized steps. We prove that this problem is not polynomial-time approximable within $\frac{389}{388}$ (unless P=NP). We give a 6-approximation algorithm, thus improving on the 9.3-approximation algorithm from [3]. We also prove APX-hardness for a restricted version of the problem, in which only the starting node is initially known to be safe. Keywords: approximation algorithm, black hole search, graph exploration, mobile agent, inapproximability. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
23. Robust TCP (TCP-R) with Explicit Packet Drop Notification (EPDN) for Satellite Networks.
- Author
-
Lorenz, Pascal, Dini, Petre, Sathiaseelan, Arjuna, and Radzik, Tomasz
- Abstract
Numerous studies have shown that packet reordering is common, especially in satellite networks. Reordering of packets decreases the TCP performance of a network, mainly because it leads to overestimation of the congestion of the network. We consider satellite networks and analyze the performance of such networks when reordering of packets occurs. We propose a solution that could significantly improve the performance of the network when reordering of packets occurs in the satellite network. We report results of our simulation experiments, which support this claim. Our solution is based on enabling the senders to distinguish between dropped packets and reordered packets. [ABSTRACT FROM AUTHOR]
- Published
- 2005
24. On the Wake-Up Problem in Radio Networks.
- Author
-
Caires, Luís, Italiano, Giuseppe F., Monteiro, Luís, Palamidessi, Catuscia, Yung, Moti, Chlebus, Bogdan S., Gąsieniec, Leszek, Kowalski, Dariusz R., and Radzik, Tomasz
- Abstract
Radio networks model wireless communication when processing units communicate using one wave frequency. This is captured by the property that multiple messages arriving simultaneously to a node interfere with one another and none of them can be read reliably. We present improved solutions to the problem of waking up such a network. This requires activating all nodes in a scenario when some nodes start to be active spontaneously, while every sleeping node needs to be awaken by receiving successfully a message from a neighbor. Our contributions concern the existence and efficient construction of universal radio synchronizers, which are combinatorial structures introduced in [6] as building blocks of efficient wake-up algorithms. First we show by counting that there are (n,g)-universal synchronizers for . Next we show an explicit construction of (n,g)-universal-synchronizers for . By way of applications, we obtain an existential wake-up algorithm which works in time and an explicitly instantiated algorithm that works in time , where n is the number of nodes and Δ is the maximum in-degree in the network. Algorithms for leader-election and synchronization can be developed on top of wake-up ones, as shown in [7], such that they work in time slower by a factor of than the underlying wake-up ones. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
25. Hardness and Approximation Results for Black Hole Search in Arbitrary Graphs.
- Author
-
Pelc, Andrzej, Raynal, Michel, Klasing, Ralf, Markou, Euripides, Radzik, Tomasz, and Sarracco, Fabiano
- Abstract
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous arbitrary network, assuming an upper bound on the time of any edge traversal by an agent. For a given graph and a given starting node we are interested in finding the fastest possible Black Hole Search by two agents (the minimum number of agents capable to identify a black hole). We prove that this problem is NP-hard in arbitrary graphs, thus solving an open problem stated in [2]. We also give a 7/2-approximation algorithm, thus improving on the 4-approximation scheme observed in [2]. Our approach is to explore the given input graph via some spanning tree. Even if it represents a very natural technique, we prove that this approach cannot achieve an approximation ratio better than 3/2. Keywords: approximation algorithm, black hole search, graph exploration, mobile agent, NP-hardness. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
26. Fast deterministic approximation for the multicommodity flow problem.
- Author
-
Radzik, Tomasz
- Abstract
In this paper we consider an optimization version of the multicommodity flow problem which is known as the maximum concurrent flow problem. We show that an approximate solution to this problem can be computed deterministically using O( k( ε + log k) log n) 1-commodity minimum-cost flow computations, where k is the number of commodities, n is the number of nodes, and ε is the desired precision. We obtain this bound by proving that in the randomized algorithm developed by Leighton et al. (1995) the random selection of commodities can be replaced by the deterministic round-robin without increasing the total running time. Our bound significantly improves the previously known deterministic upper bounds and matches the best known randomized upper bound for the approximation concurrent flow problem. [ABSTRACT FROM AUTHOR]
- Published
- 1996
- Full Text
- View/download PDF
27. Shortest paths algorithms: Theory and experimental evaluation.
- Author
-
Cherkassky, Boris, Goldberg, Andrew, and Radzik, Tomasz
- Abstract
We conduct an extensive computational study of shortest paths algorithms, including some very recent algorithms. We also suggest new algorithms motivated by the experimental results and prove interesting theoretical results suggested by the experimental data. Our computational study is based on several natural problem classes which identify strengths and weaknesses of various algorithms. These problem classes and algorithm implementations form an environment for testing the performance of shortest paths algorithms. The interaction between the experimental evaluation of algorithm behavior and the theoretical analysis of algorithm performance plays an important role in our research. [ABSTRACT FROM AUTHOR]
- Published
- 1996
- Full Text
- View/download PDF
28. Tight bounds on the number of minimum-mean cycle cancellations and related results.
- Author
-
Radzik, Tomasz and Goldberg, Andrew
- Abstract
We prove a tight Θ(min( nm log(nC), nm)) bound on the number of iterations of the minimum-mean cycle-canceling algorithm of Goldberg and Tarjan [13]. We do this by giving the lower bound and by improving the strongly polynomial upper bound on the number of iterations to O(nm). We also give an improved version of the maximum-mean cut canceling algorithm of [7], which is a dual of the minimum-mean cycle-canceling algorithm. Our version of the dual algorithm runs in O(nm) iterations. [ABSTRACT FROM AUTHOR]
- Published
- 1994
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.