๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Optimal Algorithms for Probabilistic Solitude Detection on Anonymous Rings

โœ Scribed by Lisa Higham; David Kirkpatrick; Karl Abrahamson; Andrew Adler


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
340 KB
Volume
23
Category
Article
ISSN
0196-6774

No coin nor oath required. For personal study only.

โœฆ Synopsis


Probabilistic algorithms are developed for a basic problem in distributed computation, assuming anonymous, asynchronous, unidirectional rings of processors. The problem, known as Solitude Detection, requires that a nonempty subset of the processors, called contenders, determine whether or not there is exactly one contender. Monte Carlo algorithms are developed that err with probability bounded by a specified parameter โ‘€ and exhibit either message or processor termination. The algorithms transmit an optimal expected number of bits, to within a constant factor. Their bit complexities display a surprisingly rich dependence on the kind of termination exhibited and on the processors' knowledge of the size of the ring. Two probabilistic tools are isolated and then combined in various ways to achieve all our algorithms.


๐Ÿ“œ SIMILAR VOLUMES


Optimal-Algorithms for Multipacket Routi
โœ F. Makedon; A. Symvonis ๐Ÿ“‚ Article ๐Ÿ“… 1994 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 643 KB

We study multipacket routing problems on rings of processors. We prove a new lower bound of \(2 n / 3\) routing steps for the case that \(k\), the number of packets per processor, is at most 2 . We also give an algorithm that tightens this lower bound. For the case where \(k>2\), the lower bound is

Optimal Algorithms for All-to-All Person
โœ Chi Chung Lam; C.-H. Huang; P. Sadayappan ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 254 KB

All-to-all personalized communication is a basic communication operation in a parallel computing environment. In this operation, each processor sends a distinct message to every other processor. It is used in several parallel algorithms, such as for the fast Fourier transform. This paper presents ne