{"title":"Efficient assignment of identities in anonymous populations","authors":"Leszek Gąsieniec , Jesper Jansson , Christos Levcopoulos , Andrzej Lingas","doi":"10.1016/j.ic.2025.105265","DOIUrl":null,"url":null,"abstract":"<div><div>We consider the fundamental problem of assigning distinct labels to agents in the probabilistic model of population protocols. Our protocols operate under the assumption that the size <em>n</em> of the population is embedded in the transition function. W.h.p. (with high probability), they are silent, i.e., eventually each agent reaches its final state and remains in it forever, and they are safe, i.e., never change a label that has already been assigned to an agent. We provide efficient protocols for this problem complemented with tight lower bounds. Our fast labeling protocol uses only <span><math><mi>O</mi><mo>(</mo><mo>(</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo><mo>/</mo><mi>ε</mi><mo>)</mo></math></span> interactions w.h.p., <span><math><mo>(</mo><mn>2</mn><mo>+</mo><mi>ε</mi><mo>)</mo><mi>n</mi><mo>+</mo><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>a</mi></mrow></msup><mo>)</mo></math></span> states, and the label range <span><math><mo>[</mo><mn>1</mn><mo>,</mo><mo>(</mo><mn>1</mn><mo>+</mo><mi>ε</mi><mo>)</mo><mi>n</mi><mo>]</mo></math></span>, where <span><math><mn>1</mn><mo>≥</mo><mi>ε</mi><mo>></mo><mn>0</mn></math></span> and <span><math><mn>0</mn><mo><</mo><mi>a</mi><mo><</mo><mn>1</mn></math></span>, while our nearly state-optimal protocol uses only <span><math><mi>n</mi><mo>+</mo><mn>5</mn><msqrt><mrow><mi>n</mi></mrow></msqrt><mo>+</mo><mi>O</mi><mo>(</mo><mi>log</mi><mo></mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> states, the label range <span><math><mo>[</mo><mn>1</mn><mo>,</mo><mi>n</mi><mo>]</mo></math></span>, and w.h.p., <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></math></span> interactions.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105265"},"PeriodicalIF":0.8000,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information and Computation","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S089054012500001X","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
We consider the fundamental problem of assigning distinct labels to agents in the probabilistic model of population protocols. Our protocols operate under the assumption that the size n of the population is embedded in the transition function. W.h.p. (with high probability), they are silent, i.e., eventually each agent reaches its final state and remains in it forever, and they are safe, i.e., never change a label that has already been assigned to an agent. We provide efficient protocols for this problem complemented with tight lower bounds. Our fast labeling protocol uses only interactions w.h.p., states, and the label range , where and , while our nearly state-optimal protocol uses only states, the label range , and w.h.p., interactions.
期刊介绍:
Information and Computation welcomes original papers in all areas of theoretical computer science and computational applications of information theory. Survey articles of exceptional quality will also be considered. Particularly welcome are papers contributing new results in active theoretical areas such as
-Biological computation and computational biology-
Computational complexity-
Computer theorem-proving-
Concurrency and distributed process theory-
Cryptographic theory-
Data base theory-
Decision problems in logic-
Design and analysis of algorithms-
Discrete optimization and mathematical programming-
Inductive inference and learning theory-
Logic & constraint programming-
Program verification & model checking-
Probabilistic & Quantum computation-
Semantics of programming languages-
Symbolic computation, lambda calculus, and rewriting systems-
Types and typechecking