Proceedings of the 21st International Conference on Distributed Computing and Networking最新文献

筛选
英文 中文
Latecomers Help to Meet: Deterministic Anonymous Gathering in the Plane 迟到的人有助于见面:飞机上的确定性匿名聚会
A. Pelc, R. Yadav
{"title":"Latecomers Help to Meet: Deterministic Anonymous Gathering in the Plane","authors":"A. Pelc, R. Yadav","doi":"10.1145/3369740.3369767","DOIUrl":"https://doi.org/10.1145/3369740.3369767","url":null,"abstract":"A team of anonymous mobile agents represented by points freely moving in the plane have to gather at a single point and stop. Agents start at different points of the plane and at possibly different times chosen by the adversary. They are equipped with compasses, a common unit of distance and clocks. They execute the same deterministic algorithm. When moving, agents travel at the same speed normalized to 1. When agents are at distance at most ϵ, for some positive constant ϵ unknown to them, they see each other and can exchange all information known to date. Due to the anonymity of the agents and the symmetry of the plane, gathering is impossible, e.g., if agents start simultaneously at distances larger than ϵ. However, if some agents start with a delay with respect to others, gathering may become possible. In which situations can such latecomers enable gathering? How can delays be used to make it possible? To answer these questions we consider initial configurations formalized as sets of pairs {(p1, t1), (p2, t2),..., (pn, tn)}, for n ≥ 2, where pi is the starting point of the i-th agent and ti is its starting time. An initial configuration is gatherable if agents starting at it can be gathered by some algorithm, even dedicated to this particular configuration. Our first result is a characterization of all gatherable initial configurations. It is then natural to ask if there is a universal deterministic algorithm that can gather all gatherable configurations of a given size. It turns out that the answer to this question is negative. Indeed, we show that all gatherable configurations can be partitioned into two sets: bad configurations and good configurations. We show that bad gatherable configurations (even of size 2) cannot be gathered by a common gathering algorithm. On the other hand, we prove that there is a universal algorithm that gathers all good configurations of a given size. Then we ask the question of whether the exact knowledge of the number of agents is necessary to gather all good configurations. It turns out that the answer is no, and we prove a necessary and sufficient condition on the knowledge concerning the number of agents that an algorithm gathering all good configurations must have.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120908410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Bounding Box Overlay for Competitive Routing in Hybrid Communication Networks 混合通信网络中竞争路由的边界盒覆盖
Christina Kolb, C. Scheideler, Jannik Sundermeier
{"title":"A Bounding Box Overlay for Competitive Routing in Hybrid Communication Networks","authors":"Christina Kolb, C. Scheideler, Jannik Sundermeier","doi":"10.1145/3369740.3369777","DOIUrl":"https://doi.org/10.1145/3369740.3369777","url":null,"abstract":"We present a new approach for competitive geometric routing in wireless ad hoc networks. We design a routing strategy that finds c-competitive paths for a positive constant c: i.e., paths which have a length at most c times the length of a shortest path. It is well-known that this cannot be achieved by online routing strategies which only consider the local neighborhood of a node for their routing decisions [17]. The main difficulty is uncovered regions within the wireless ad hoc network, which we denote as radio holes. Complex shapes of radio holes, for example zig-zag-shapes, make local geometric routing difficult: i.e., forwarded messages in direction to the destination might get stuck in a dead end or could be routed along very long detours. To be able to find c-competitive paths, additional knowledge about the position and shape of radio holes is needed. In order to gather the knowledge efficiently, we make use of a hybrid network approach. This approach assumes that we can not just make use of the ad hoc network but also of some cellular infrastructure, which is used to gather knowledge about the underlying ad hoc network. Communication via the cellular infrastructure incurs costs as cell phone providers are involved. Therefore, we use the cellular infrastructure only to compute routing paths in the ad hoc network. The actual data transmission takes place in the ad hoc network. To find good routing paths we aim at computing an abstraction of the ad hoc network in which radio holes are abstracted by bounding boxes. The advantage of bounding boxes as hole abstraction is that we only have to consider a constant number of nodes per hole. We prove that bounding boxes are a suitable hole abstraction that allows us to find c-competitive paths in the ad hoc network in the case of non-intersecting bounding boxes. In the case of intersecting bounding boxes, we show via simulations that our routing strategy significantly outperforms the so far best online routing strategies for wireless ad hoc networks. Finally, we also present a routing strategy that is c-competitive in the case of pairwise intersecting bounding boxes.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116054571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Convex Hull Formation for Programmable Matter 可编程物质的凸包形成
Joshua J. Daymude, R. Gmyr, Kristian Hinnenthal, I. Kostitsyna, C. Scheideler, A. Richa
{"title":"Convex Hull Formation for Programmable Matter","authors":"Joshua J. Daymude, R. Gmyr, Kristian Hinnenthal, I. Kostitsyna, C. Scheideler, A. Richa","doi":"10.1145/3369740.3372916","DOIUrl":"https://doi.org/10.1145/3369740.3372916","url":null,"abstract":"We envision programmable matter as a system of nanoscale agents (called particles) with very limited computational capabilities that move and compute collectively to achieve a desired goal. Motivated by the problem of sealing an object using minimal resources, we show how a particle system can self-organize to form an object's convex hull. We give a distributed, local algorithm for convex hull formation and prove that it runs in O(B) asynchronous rounds, where B is the length of the object's boundary. Within the same asymptotic runtime, this algorithm can be extended to also form the object's (weak) O-hull, which uses the same number of particles but minimizes the area enclosed by the hull. Our algorithms are the first to compute convex hulls with distributed entities that have strictly local sensing, constant-size memory, and no shared sense of orientation or coordinates. Ours is also the first distributed approach to computing restricted-orientation convex hulls. This approach involves coordinating particles as distributed memory; thus, as a supporting but independent result, we present and analyze an algorithm for organizing particles with constant-size memory as distributed binary counters that efficiently support increments, decrements, and zero-tests --- even as the particles move.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129192227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Global Stabilization for Causally Consistent Partial Replication 因果一致部分复制的全局镇定
Zhuolun Xiang, N. Vaidya
{"title":"Global Stabilization for Causally Consistent Partial Replication","authors":"Zhuolun Xiang, N. Vaidya","doi":"10.1145/3369740.3369795","DOIUrl":"https://doi.org/10.1145/3369740.3369795","url":null,"abstract":"Causally consistent distributed storage systems have received significant attention due to the potential for providing high throughput. Global stabilization is a technique established for achieving causal consistency in distributed multi-version key-value store systems, adopted by previous works such as GentleRain [6] and Cure [1]. However, previous designs with global stabilization assume full replication, where the set of the data is split into partitions with each partition replicated at all data centers, and each client is restricted to access servers within only one data center. In this paper, we propose a theoretical framework of global stabilization to support general partial replication with causal consistency, where each server can store an arbitrary subset of the data, and each client is allowed to communicate with any subset of the servers and migrate among them without extra delays. We propose an algorithm that implements causal consistency for distributed multi-version key-value stores with general partial replication, and our algorithm is optimal in terms of the remote update visibility latency, i.e. how fast update from a remote server is visible to the client, under general partial replication. Simulation results on the performance of our algorithm compared to the previous work are also provided.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125584601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信