scholarly journals A New Characterization of Tree Medians with Applications to Distributed Algorithms

1991 ◽  
Vol 20 (364) ◽  
Author(s):  
O. Gerstel ◽  
Shmuel Zaks

A new characterization of tree medians is presented: we show that a vertex <em>m</em> is a median of a tree <em>T</em> with <em>n</em> vertices iff there exists a partition of the vertex set into [<em>n</em>/2] disjoint pairs (excluding m when <em>n</em> is odd), such that all the paths connecting the two vertices in any of the pairs pass through <em>m</em>. We show that in this case this sum is the largest possible among all such partitions, and we use this fact to discuss lower bounds on the message complexity of the distributed sorting problem. This lower bound implies that, given a network of a tree topology, choosing a median and then route all the information through it is the best possible strategy, in terms of worst-case number of messages sent during any execution of any distributed sorting algorithm. We also discuss the implications for networks of a general topology and for the distributed ranking problem.

10.37236/1521 ◽  
2000 ◽  
Vol 7 (1) ◽  
Author(s):  
Paul J. Tanenbaum

Bound polysemy is the property of any pair $(G_1, G_2)$ of graphs on a shared vertex set $V$ for which there exists a partial order on $V$ such that any pair of vertices has an upper bound precisely when the pair is an edge in $G_1$ and a lower bound precisely when it is an edge in $G_2$. We examine several special cases and prove a characterization of the bound polysemic pairs that illuminates a connection with the squared graphs.


2019 ◽  
Vol 29 (01) ◽  
pp. 49-72
Author(s):  
Mark de Berg ◽  
Tim Leijsen ◽  
Aleksandar Markovic ◽  
André van Renssen ◽  
Marcel Roeloffzen ◽  
...  

We introduce the fully-dynamic conflict-free coloring problem for a set [Formula: see text] of intervals in [Formula: see text] with respect to points, where the goal is to maintain a conflict-free coloring for [Formula: see text] under insertions and deletions. A coloring is conflict-free if for each point [Formula: see text] contained in some interval, [Formula: see text] is contained in an interval whose color is not shared with any other interval containing [Formula: see text]. We investigate trade-offs between the number of colors used and the number of intervals that are recolored upon insertion or deletion of an interval. Our results include: a lower bound on the number of recolorings as a function of the number of colors, which implies that with [Formula: see text] recolorings per update the worst-case number of colors is [Formula: see text], and that any strategy using [Formula: see text] colors needs [Formula: see text] recolorings; a coloring strategy that uses [Formula: see text] colors at the cost of [Formula: see text] recolorings, and another strategy that uses [Formula: see text] colors at the cost of [Formula: see text] recolorings; stronger upper and lower bounds for special cases. We also consider the kinetic setting where the intervals move continuously (but there are no insertions or deletions); here we show how to maintain a coloring with only four colors at the cost of three recolorings per event and show this is tight.


2016 ◽  
Vol 27 (05) ◽  
pp. 579-594
Author(s):  
Savio S. H. Tse

We study the problem of credit-based adaptive polling in undirected arbitrary point-to-point asynchronous networks. Polling consists of two rounds, namely propagation (broadcast) and feedback (confirmation, response) rounds. By adaptive polling, a spanning tree of unknown topology is built dynamically during the propagation round, and feedback messages are free to choose their paths back to the initiator — a specific node who initiates the polling algorithm. The freedom in the feedback round relies on the use of credits in the propagation round. We re-visit three existing algorithms and analyse their average case communication bit complexities incurred by the credits in the propagation round, and these analyses match with the numerical results. We also give an optimal lower bound on the worst case bit message complexity for the case when the number of nodes in the network is unknown.


2020 ◽  
Vol 64 (7) ◽  
pp. 1197-1224
Author(s):  
Florian Stober ◽  
Armin Weiß

AbstractMergeInsertion, also known as the Ford-Johnson algorithm, is a sorting algorithm which, up to today, for many input sizes achieves the best known upper bound on the number of comparisons. Indeed, it gets extremely close to the information-theoretic lower bound. While the worst-case behavior is well understood, only little is known about the average case. This work takes a closer look at the average case behavior. In particular, we establish an upper bound of $n \log n - 1.4005n + o(n)$ n log n − 1.4005 n + o ( n ) comparisons. We also give an exact description of the probability distribution of the length of the chain a given element is inserted into and use it to approximate the average number of comparisons numerically. Moreover, we compute the exact average number of comparisons for n up to 148. Furthermore, we experimentally explore the impact of different decision trees for binary insertion. To conclude, we conduct experiments showing that a slightly different insertion order leads to a better average case and we compare the algorithm to Manacher’s combination of merging and MergeInsertion as well as to the recent combined algorithm with (1,2)-Insertionsort by Iwama and Teruyama.


1991 ◽  
Vol 20 (377) ◽  
Author(s):  
Ofer Biran ◽  
Shlomo Moran ◽  
Shmuel Zaks

<p>A distributed task T is 1-solvable if there exists a protocol that solves it in the presence of (at most) one crash failure. A precise characterization of the 1-solvable tasks was given by the authors in 1990.</p><p>In this paper we determine the number of rounds of communication that are required, in the worst case, by a protocol which 1-solves a given 1-solvable task T for <em>n</em> processors. We define the radius R(T) of T, and show that if R(T) is finite, then this number is Theta (log_n R(T)) ; more precisely, we give a lower bound of log_(n-1) R(T), and an upper bound of 2+|log_(n-1)R(T)| . The upper bound implies, for example, that each of the following tasks: renaming, order preserving renaming and binary monotone consensus can be solved in the presence of one fault in 3 rounds of communications. All previous protocols that 1-solved these tasks required Omega(n) rounds. The result is also generalized to tasks whose radii are not bounded, e.g., the approximate consensus and its variants.</p>


Molecules ◽  
2021 ◽  
Vol 26 (10) ◽  
pp. 2856
Author(s):  
Gary B. Smejkal ◽  
Edmund Y. Ting ◽  
Karthik Nambi Arul Nambi ◽  
Richard T. Schumacher ◽  
Alexander V. Lazarev

Stable, oil-in-water nanoemulsions containing astaxanthin (AsX) were produced by intense fluid shear forces resulting from pumping a coarse reagent emulsion through a self-throttling annular gap valve at 300 MPa. Compared to crude emulsions prepared by conventional homogenization, a size reduction of over two orders of magnitude was observed for AsX-encapsulated oil droplets following just one pass through the annular valve. In krill oil formulations, the mean hydrodynamic diameter of lipid particles was reduced to 60 nm after only two passes through the valve and reached a minimal size of 24 nm after eight passes. Repeated processing of samples through the valve progressively decreased lipid particle size, with an inflection in the rate of particle size reduction generally observed after 2–4 passes. Krill- and argan oil-based nanoemulsions were produced using an Ultra Shear Technology™ (UST™) approach and characterized in terms of their small particle size, low polydispersity, and stability.


2006 ◽  
Vol 17 (03) ◽  
pp. 677-701 ◽  
Author(s):  
YUNG H. TSIN

A distributed algorithm for finding the cut-edges and the 3-edge-connected components of an asynchronous computer network is presented. For a network with n nodes and m links, the algorithm has worst-case [Formula: see text] time and O(m + nhT) message complexity, where hT < n. The algorithm is message optimal when [Formula: see text] which includes dense networks (i.e. m ∈ Θ(n2)). The previously best known distributed algorithm has a worst-case O(n3) time and message complexity.


1998 ◽  
Vol 09 (02) ◽  
pp. 199-211
Author(s):  
SANGUTHEVAR RAJASEKARAN ◽  
THEODORE MCKENDALL

In this paper we demonstrate the power of reconfiguration by presenting efficient randomized algorithms for both packet routing and sorting on a reconfigurable mesh connected computer. The run times of these algorithms are better than the best achievable time bounds on a conventional mesh. Many variations of the reconfigurable mesh can be found in the literature. We define yet another variation which we call as Mr. We also make use of the standard PARBUS model. We show that permutation routing problem can be solved on a linear array Mr of size n in [Formula: see text] steps, whereas n-1 is the best possible run time without reconfiguration. A trivial lower bound for routing on Mr will be [Formula: see text]. On the PARBUS linear array, n is a lower bound and hence any standard n-step routing algorithm will be optimal. We also show that permutation routing on an n×n reconfigurable mesh Mr can be done in time n+o(n) using a randomized algorithm or in time 1.25n+o(n) deterministically. In contrast, 2n-2 is the diameter of a conventional mesh and hence routing and sorting will need at least 2n-2 steps on a conventional mesh. A lower bound of [Formula: see text] is in effect for routing on the 2D mesh Mr as well. On the other hand, n is a lower bound for routing on the PARBUS and our algorithms have the same time bounds on the PARBUS as well. Thus our randomized routing algorithm is optimal upto a lower order term. In addition we show that the problem of sorting can be solved in randomized time n+o(n) on Mr as well as on PARBUS. Clearly, this sorting algorithm will be optimal on the PARBUS model. The time bounds of our randomized algorithms hold with high probability.


1996 ◽  
Vol 3 (9) ◽  
Author(s):  
Thore Husfeldt ◽  
Theis Rauhe ◽  
Søren Skyum

We give a number of new lower bounds in the cell probe model<br />with logarithmic cell size, which entails the same bounds on the random access computer with logarithmic word size and unit cost operations. We study the signed prefix sum problem: given a string of length n of zeroes and signed ones, compute the sum of its ith prefix during updates. We show a<br />lower bound of  Omega(log n/log log n) time per operations, even if the prefix sums are bounded by log n/log log n during all updates. We also show that if the update time is bounded by the product of the worst-case update time and the<br />answer to the query, then the update time must be Omega(sqrt(log n/ log log n)).<br /> These results allow us to prove lower bounds for a variety of seemingly unrelated<br />dynamic problems. We give a lower bound for the dynamic planar point location in monotone subdivisions of <br />Omega(log n/ log log n) per operation. We give<br />a lower bound for the dynamic transitive closure problem on upward planar graphs with one source and one sink of <br />Omega(log n/(log logn)^2) per operation. We give a lower bound of  Omega(sqrt(log n/log log n)) for the dynamic membership problem of any Dyck language with two or more letters. This implies the same<br />lower bound for the dynamic word problem for the free group with k generators. We also give lower bounds for the dynamic prefix majority and prefix equality problems.


2017 ◽  
Vol 9 (1) ◽  
pp. 17-34
Author(s):  
Antal Iványi ◽  
Norbert Fogarasi

AbstractLet n and k be integers such that n ≥ 2 and 1 ≤ k ≤n. In this paper, we consider the problem of finding an ordered list of the k best players out of n participants by organizing a tournament of rounds of pairwise matches (comparisons). Assuming that (i) in each match there is a winner (no ties) (ii) the relative strength of the players is constant throughout the tournament and (iii) the players’ strengths are transitive, the problem is equivalent to partially sorting n different, comparable objects, allowing parallelization in rounds. The rounds are restricted as one player can only play one match in each round. We propose concrete pairing algorithms and make conjectures about their performance in terms of the worst case number of rounds and matches required. The research article was started by professor Antal Iványi who sadly passed away during the work and was completed in his honor by the co-author. He hopes, in this modest way, to reflect his deep admiration for professor Iványi’s many contributions to the theory, practice and appreciation of algorithm design and analysis.


Sign in / Sign up

Export Citation Format

Share Document