{"title":"Latecomers Help to Meet: Deterministic Anonymous Gathering in the Plane","authors":"A. Pelc, R. Yadav","doi":"10.1145/3369740.3369767","DOIUrl":"https://doi.org/10.1145/3369740.3369767","url":null,"abstract":"A team of anonymous mobile agents represented by points freely moving in the plane have to gather at a single point and stop. Agents start at different points of the plane and at possibly different times chosen by the adversary. They are equipped with compasses, a common unit of distance and clocks. They execute the same deterministic algorithm. When moving, agents travel at the same speed normalized to 1. When agents are at distance at most ϵ, for some positive constant ϵ unknown to them, they see each other and can exchange all information known to date. Due to the anonymity of the agents and the symmetry of the plane, gathering is impossible, e.g., if agents start simultaneously at distances larger than ϵ. However, if some agents start with a delay with respect to others, gathering may become possible. In which situations can such latecomers enable gathering? How can delays be used to make it possible? To answer these questions we consider initial configurations formalized as sets of pairs {(p1, t1), (p2, t2),..., (pn, tn)}, for n ≥ 2, where pi is the starting point of the i-th agent and ti is its starting time. An initial configuration is gatherable if agents starting at it can be gathered by some algorithm, even dedicated to this particular configuration. Our first result is a characterization of all gatherable initial configurations. It is then natural to ask if there is a universal deterministic algorithm that can gather all gatherable configurations of a given size. It turns out that the answer to this question is negative. Indeed, we show that all gatherable configurations can be partitioned into two sets: bad configurations and good configurations. We show that bad gatherable configurations (even of size 2) cannot be gathered by a common gathering algorithm. On the other hand, we prove that there is a universal algorithm that gathers all good configurations of a given size. Then we ask the question of whether the exact knowledge of the number of agents is necessary to gather all good configurations. It turns out that the answer is no, and we prove a necessary and sufficient condition on the knowledge concerning the number of agents that an algorithm gathering all good configurations must have.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120908410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bounding Box Overlay for Competitive Routing in Hybrid Communication Networks","authors":"Christina Kolb, C. Scheideler, Jannik Sundermeier","doi":"10.1145/3369740.3369777","DOIUrl":"https://doi.org/10.1145/3369740.3369777","url":null,"abstract":"We present a new approach for competitive geometric routing in wireless ad hoc networks. We design a routing strategy that finds c-competitive paths for a positive constant c: i.e., paths which have a length at most c times the length of a shortest path. It is well-known that this cannot be achieved by online routing strategies which only consider the local neighborhood of a node for their routing decisions [17]. The main difficulty is uncovered regions within the wireless ad hoc network, which we denote as radio holes. Complex shapes of radio holes, for example zig-zag-shapes, make local geometric routing difficult: i.e., forwarded messages in direction to the destination might get stuck in a dead end or could be routed along very long detours. To be able to find c-competitive paths, additional knowledge about the position and shape of radio holes is needed. In order to gather the knowledge efficiently, we make use of a hybrid network approach. This approach assumes that we can not just make use of the ad hoc network but also of some cellular infrastructure, which is used to gather knowledge about the underlying ad hoc network. Communication via the cellular infrastructure incurs costs as cell phone providers are involved. Therefore, we use the cellular infrastructure only to compute routing paths in the ad hoc network. The actual data transmission takes place in the ad hoc network. To find good routing paths we aim at computing an abstraction of the ad hoc network in which radio holes are abstracted by bounding boxes. The advantage of bounding boxes as hole abstraction is that we only have to consider a constant number of nodes per hole. We prove that bounding boxes are a suitable hole abstraction that allows us to find c-competitive paths in the ad hoc network in the case of non-intersecting bounding boxes. In the case of intersecting bounding boxes, we show via simulations that our routing strategy significantly outperforms the so far best online routing strategies for wireless ad hoc networks. Finally, we also present a routing strategy that is c-competitive in the case of pairwise intersecting bounding boxes.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116054571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joshua J. Daymude, R. Gmyr, Kristian Hinnenthal, I. Kostitsyna, C. Scheideler, A. Richa
{"title":"Convex Hull Formation for Programmable Matter","authors":"Joshua J. Daymude, R. Gmyr, Kristian Hinnenthal, I. Kostitsyna, C. Scheideler, A. Richa","doi":"10.1145/3369740.3372916","DOIUrl":"https://doi.org/10.1145/3369740.3372916","url":null,"abstract":"We envision programmable matter as a system of nanoscale agents (called particles) with very limited computational capabilities that move and compute collectively to achieve a desired goal. Motivated by the problem of sealing an object using minimal resources, we show how a particle system can self-organize to form an object's convex hull. We give a distributed, local algorithm for convex hull formation and prove that it runs in O(B) asynchronous rounds, where B is the length of the object's boundary. Within the same asymptotic runtime, this algorithm can be extended to also form the object's (weak) O-hull, which uses the same number of particles but minimizes the area enclosed by the hull. Our algorithms are the first to compute convex hulls with distributed entities that have strictly local sensing, constant-size memory, and no shared sense of orientation or coordinates. Ours is also the first distributed approach to computing restricted-orientation convex hulls. This approach involves coordinating particles as distributed memory; thus, as a supporting but independent result, we present and analyze an algorithm for organizing particles with constant-size memory as distributed binary counters that efficiently support increments, decrements, and zero-tests --- even as the particles move.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129192227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global Stabilization for Causally Consistent Partial Replication","authors":"Zhuolun Xiang, N. Vaidya","doi":"10.1145/3369740.3369795","DOIUrl":"https://doi.org/10.1145/3369740.3369795","url":null,"abstract":"Causally consistent distributed storage systems have received significant attention due to the potential for providing high throughput. Global stabilization is a technique established for achieving causal consistency in distributed multi-version key-value store systems, adopted by previous works such as GentleRain [6] and Cure [1]. However, previous designs with global stabilization assume full replication, where the set of the data is split into partitions with each partition replicated at all data centers, and each client is restricted to access servers within only one data center. In this paper, we propose a theoretical framework of global stabilization to support general partial replication with causal consistency, where each server can store an arbitrary subset of the data, and each client is allowed to communicate with any subset of the servers and migrate among them without extra delays. We propose an algorithm that implements causal consistency for distributed multi-version key-value stores with general partial replication, and our algorithm is optimal in terms of the remote update visibility latency, i.e. how fast update from a remote server is visible to the client, under general partial replication. Simulation results on the performance of our algorithm compared to the previous work are also provided.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125584601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}