-
Two-stage growth for highly ordered epitaxial C$_{60}$ films on Au(111)
Authors:
Alexandra B. Tully,
Rysa Greenwood,
MengXing Na,
Vanessa King,
Erik Mårsell,
Yuran Niu,
Evangelos Golias,
Arthur K. Mills,
Giorgio Levy de Castro,
Matteo Michiardi,
Darius Menezes,
Jiabin Yu,
Sergey Zhdanovich,
Andrea Damascelli,
David J. Jones,
Sarah A. Burke
Abstract:
As an organic semiconductor and a prototypical acceptor molecule in organic photovoltaics, C$_{60}$ has broad relevance to the world of organic thin film electronics. Although highly uniform C$_{60}$ thin films are necessary to conduct spectroscopic analysis of the electronic structure of these C$_{60}$-based materials, reported C$_{60}$ films show a relatively low degree of order beyond a monolay…
▽ More
As an organic semiconductor and a prototypical acceptor molecule in organic photovoltaics, C$_{60}$ has broad relevance to the world of organic thin film electronics. Although highly uniform C$_{60}$ thin films are necessary to conduct spectroscopic analysis of the electronic structure of these C$_{60}$-based materials, reported C$_{60}$ films show a relatively low degree of order beyond a monolayer. Here, we develop a generalizable two-stage growth technique that consistently produces single-domain C$_{60}$ films of controllable thicknesses, using Au(111) as an epitaxially well-matched substrate. We characterize the films using low-energy electron diffraction, low-energy electron microscopy, scanning tunneling microscopy, and angle-resolved photoemission spectroscopy (ARPES). We report highly oriented epitaxial film growth of C$_{60}$/Au(111) from 1 monolayer (ML) up to 20 ML films. The high-quality of the C$_{60}$ thin films enables the direct observation of the electronic dispersion of the HOMO and HOMO-1 bands via ARPES without need for small spot sizes. Our results indicate a path for the growth of organic films on metallic substrates with long-range ordering.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Unknotted Curves on Seifert Surfaces
Authors:
Subhankar Dey,
Veronica King,
Colby T. Shaw,
Bülent Tosun,
Bruce Trace
Abstract:
We consider homologically essential simple closed curves on Seifert surfaces of genus one knots in $S^3$, and in particular those that are unknotted or slice in $S^3$. We completely characterize all such curves for most twist knots: they are either positive or negative braid closures; moreover, we determine exactly which of those are unknotted. A surprising consequence of our work is that the figu…
▽ More
We consider homologically essential simple closed curves on Seifert surfaces of genus one knots in $S^3$, and in particular those that are unknotted or slice in $S^3$. We completely characterize all such curves for most twist knots: they are either positive or negative braid closures; moreover, we determine exactly which of those are unknotted. A surprising consequence of our work is that the figure eight knot admits infinitely many unknotted essential curves up to isotopy on its genus one Seifert surface, and those curves are enumerated by Fibonacci numbers. On the other hand, we prove that many twist knots admit homologically essential curves that cannot be positive or negative braid closures. Indeed, among those curves, we exhibit an example of a slice but not unknotted homologically essential simple closed curve. We further investigate our study of unknotted essential curves for arbitrary Whitehead doubles of non-trivial knots, and obtain that there is a precisely one unknotted essential simple closed curve in the interior of the doubles' standard genus one Seifert surface. As a consequence of all these we obtain many new examples of 3-manifolds that bound contractible 4-manifolds.
△ Less
Submitted 9 July, 2023;
originally announced July 2023.
-
Computing (1+epsilon)-Approximate Degeneracy in Sublinear Time
Authors:
Valerie King,
Alex Thomo,
Quinton Yong
Abstract:
The problem of finding the degeneracy of a graph is a subproblem of the k-core decomposition problem. In this paper, we present a (1 + epsilon)-approximate solution to the degeneracy problem which runs in O(n log n) time, sublinear in the input size for dense graphs, by sampling a small number of neighbors adjacent to high degree nodes. Our algorithm can also be extended to an O(n log n) time solu…
▽ More
The problem of finding the degeneracy of a graph is a subproblem of the k-core decomposition problem. In this paper, we present a (1 + epsilon)-approximate solution to the degeneracy problem which runs in O(n log n) time, sublinear in the input size for dense graphs, by sampling a small number of neighbors adjacent to high degree nodes. Our algorithm can also be extended to an O(n log n) time solution to the k-core decomposition problem. This improves upon the method by Bhattacharya et al., which implies a (4 + epsilon)-approximate ~O(n) solution to the degeneracy problem, and our techniques are similar to other sketching methods which use sublinear space for k-core and degeneracy. We prove theoretical guarantees of our algorithm and provide optimizations, which improve the running time of our algorithm in practice. Experiments on massive real-world web graphs show that our algorithm performs significantly faster than previous methods for computing degeneracy, including the 2022 exact degeneracy algorithm by Li et al.
△ Less
Submitted 14 November, 2022; v1 submitted 8 November, 2022;
originally announced November 2022.
-
Bankrupting DoS Attackers
Authors:
Trisha Chakraborty,
Abir Islam,
Valerie King,
Daniel Rayborn,
Jared Saia,
Maxwell Young
Abstract:
To defend against denial-of-service (DoS) attacks, we employ a technique called resource burning (RB). RB is the verifiable expenditure of a resource, such as computational power, required from clients before receiving service from the server. To the best of our knowledge, we present the first DoS defense algorithms where the algorithmic cost -- the cost to both the server and the honest clients -…
▽ More
To defend against denial-of-service (DoS) attacks, we employ a technique called resource burning (RB). RB is the verifiable expenditure of a resource, such as computational power, required from clients before receiving service from the server. To the best of our knowledge, we present the first DoS defense algorithms where the algorithmic cost -- the cost to both the server and the honest clients -- is bounded as a function of the attacker's cost.
We model an omniscient, Byzantine attacker, and a server with access to an estimator that estimates the number of jobs from honest clients in any time interval. We examine two communication models: an idealized zero-latency model and a partially synchronous model. Notably, our algorithms for both models have asymptotically lower costs than the attacker's, as the attacker's costs grow large. Both algorithms use a simple rule to set required RB fees per job. We assume no prior knowledge of the number of jobs, the adversary's costs, or even the estimator's accuracy. However, these quantities parameterize the algorithms' costs.
We also prove a lower bound on the cost of any randomized algorithm. This lower bound shows that our algorithms achieve asymptotically tight costs as the number of jobs grows unbounded, whenever the estimator output is accurate to within a constant factor.
△ Less
Submitted 14 July, 2023; v1 submitted 17 May, 2022;
originally announced May 2022.
-
Communication Costs in a Geometric Communication Network
Authors:
Sima Hajiaghaei Shanjani,
Valerie King
Abstract:
A communication network is a graph in which each node has only local information about the graph and nodes communicate by passing messages along its edges. Here, we consider the {\it geometric communication network} where the nodes also occupy points in space and the distance between points is the Euclidean distance. Our goal is to understand the communication cost needed to solve several fundamen…
▽ More
A communication network is a graph in which each node has only local information about the graph and nodes communicate by passing messages along its edges. Here, we consider the {\it geometric communication network} where the nodes also occupy points in space and the distance between points is the Euclidean distance. Our goal is to understand the communication cost needed to solve several fundamental geometry problems, including Convex Hull, Diameter, Closest Pair, and approximations of these problems, in the asynchronous CONGEST KT1 model. This extends the 2011 result of Rajsbaum and Urrutia for finding a convex hull of a planar geometric communication network to networks of arbitrary topology.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
Random $k$-out subgraph leaves only $O(n/k)$ inter-component edges
Authors:
Jacob Holm,
Valerie King,
Mikkel Thorup,
Or Zamir,
Uri Zwick
Abstract:
Each vertex of an arbitrary simple graph on $n$ vertices chooses $k$ random incident edges. What is the expected number of edges in the original graph that connect different connected components of the sampled subgraph? We prove that the answer is $O(n/k)$, when $k\ge c\log n$, for some large enough $c$. We conjecture that the same holds for smaller values of $k$, possibly for any $k\ge 2$. Such a…
▽ More
Each vertex of an arbitrary simple graph on $n$ vertices chooses $k$ random incident edges. What is the expected number of edges in the original graph that connect different connected components of the sampled subgraph? We prove that the answer is $O(n/k)$, when $k\ge c\log n$, for some large enough $c$. We conjecture that the same holds for smaller values of $k$, possibly for any $k\ge 2$. Such a result is best possible for any $k\ge 2$. As an application, we use this sampling result to obtain a one-way communication protocol with \emph{private} randomness for finding a spanning forest of a graph in which each vertex sends only ${O}(\sqrt{n}\log n)$ bits to a referee.
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
Faster asynchronous MST and low diameter tree construction with sublinear communication
Authors:
Ali Mashreghi,
Valerie King
Abstract:
Building a spanning tree, minimum spanning tree (MST), and BFS tree in a distributed network are fundamental problems which are still not fully understood in terms of time and communication cost. x The first work to succeed in computing a spanning tree with communication sublinear in the number of edges in an asynchronous CONGEST network appeared in DISC 2018. That algorithm which constructs an MS…
▽ More
Building a spanning tree, minimum spanning tree (MST), and BFS tree in a distributed network are fundamental problems which are still not fully understood in terms of time and communication cost. x The first work to succeed in computing a spanning tree with communication sublinear in the number of edges in an asynchronous CONGEST network appeared in DISC 2018. That algorithm which constructs an MST is sequential in the worst case; its running time is proportional to the total number of messages sent. Our paper matches its message complexity but brings the running time down to linear in $n$. Our techniques can also be used to provide an asynchronous algorithm with sublinear communication to construct a tree in which the distance from a source to each node is within an additive term of $\sqrt{n}$ of its actual distance.
We can convert any asynchronous MST algorithm with time $T(n, m)$ and message complexity of $M(n, m)$ to an algorithm with time $O(n^{1 - 2ε} + T(n, n^{3/2 + ε}))$ and message complexity of $\tilde{O}(n^{3/2 + ε} + M(n, n^{3/2+ε}))$, for $ε\in [0, 1/4]$. Picking $ε= 0$ and using Awerbuch's algorithm \cite{awerbuch1987optimal}, this results in an MST algorithm with time $O(n)$ and message complexity $\tilde{O}(n^{3/2})$. However, if there were an asynchronous MST algorithm that takes time sublinear in $n$ and requires messages linear in $m$, by picking $ε> 0$ we could achieve sublinear time (in $n$) and sublinear communication (in $m$), simultaneously. To the best of our knowledge, there is no such algorithm.
All the algorithms presented here are Monte Carlo and succeed with high probability, in the KT1 CONGEST asynchronous model.
△ Less
Submitted 28 July, 2019;
originally announced July 2019.
-
Scalable and Secure Computation Among Strangers: Resource-Competitive Byzantine Protocols
Authors:
John Augustine,
Valerie King,
Anisur R. Molla,
Gopal Pandurangan,
Jared Saia
Abstract:
Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary nodes (whose identities are not known apriori) can join and leave at will, we extend established research in scalable Byzantine agreement to a more practical model where each node (initially) does not know the identity of other nodes. A node can send to new destinations only by sending to random (or arbitrary…
▽ More
Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary nodes (whose identities are not known apriori) can join and leave at will, we extend established research in scalable Byzantine agreement to a more practical model where each node (initially) does not know the identity of other nodes. A node can send to new destinations only by sending to random (or arbitrary) nodes, or responding (if it chooses) to messages received from those destinations. We assume a synchronous and fully-connected network, with a full-information, but static Byzantine adversary. A general drawback of existing Byzantine protocols is that the communication cost incurred by the honest nodes may not be proportional to those incurred by the Byzantine nodes; in fact, they can be significantly higher. Our goal is to design Byzantine protocols for fundamental problems which are {\em resource competitive}, i.e., the number of bits sent by honest nodes is not much more than those sent by Byzantine nodes.
We describe a randomized scalable algorithm to solve Byzantine agreement, leader election, and committee election in this model. Our algorithm sends an expected $O((T+n)\log n)$ bits and has latency $O(polylog(n))$, where $n$ is the number of nodes, and $T$ is the minimum of $n^2$ and the number of bits sent by adversarially controlled nodes. The algorithm is resilient to $(1/4-ε)n$ Byzantine nodes for any fixed $ε> 0$, and succeeds with high probability. Our work can be considered as a first application of resource-competitive analysis to fundamental Byzantine problems.
To complement our algorithm we also show lower bounds for resource-competitive Byzantine agreement. We prove that, in general, one cannot hope to design Byzantine protocols that have communication cost that is significantly smaller than the cost of the Byzantine adversary.
△ Less
Submitted 25 July, 2019; v1 submitted 24 July, 2019;
originally announced July 2019.
-
Correction to Byzantine Agreement in Expected Polynomial Time, JACM 2016
Authors:
Valerie King,
Jared Saia
Abstract:
This is a correction by the authors to "Byzantine Agreement in Expected Polynomial Time" which appeared in the Journal of the ACM in 2016. It corrects a failure in the paper to consider the adversary's ability to decide the number of fair coinflips in an iteration, where this number ranges between n(n-t) and n(n-2t).
This is a correction by the authors to "Byzantine Agreement in Expected Polynomial Time" which appeared in the Journal of the ACM in 2016. It corrects a failure in the paper to consider the adversary's ability to decide the number of fair coinflips in an iteration, where this number ranges between n(n-t) and n(n-2t).
△ Less
Submitted 7 August, 2019; v1 submitted 25 December, 2018;
originally announced December 2018.
-
Broadcast and minimum spanning tree with $o(m)$ messages in the asynchronous CONGEST model
Authors:
Ali Mashreghi,
Valerie King
Abstract:
We provide the first asynchronous distributed algorithms to compute broadcast and minimum spanning tree with $o(m)$ bits of communication, in a graph with $n$ nodes and $m$ edges. For decades, it was believed that $Ω(m)$ bits of communication are required for any algorithm that constructs a broadcast tree. In 2015, King, Kutten and Thorup showed that in the KT1 model where nodes have initial knowl…
▽ More
We provide the first asynchronous distributed algorithms to compute broadcast and minimum spanning tree with $o(m)$ bits of communication, in a graph with $n$ nodes and $m$ edges. For decades, it was believed that $Ω(m)$ bits of communication are required for any algorithm that constructs a broadcast tree. In 2015, King, Kutten and Thorup showed that in the KT1 model where nodes have initial knowledge of their neighbors' identities it is possible to construct MST in $\tilde{O}(n)$ messages in the synchronous CONGEST model. In the CONGEST model messages are of size $O(\log n)$. However, no algorithm with $o(m)$ messages were known for the asynchronous case. Here, we provide an algorithm that uses $O(n^{3/2} \log^{3/2} n)$ messages to find MST in the asynchronous CONGEST model. Our algorithm is randomized Monte Carlo and outputs MST with high probability. We will provide an algorithm for computing a spanning tree with $O(n^{3/2} \log^{3/2} n)$ messages. Given a spanning tree, we can compute MST with $\tilde{O}(n)$ messages.
△ Less
Submitted 26 January, 2019; v1 submitted 12 June, 2018;
originally announced June 2018.
-
A Deterministic Distributed Algorithm for Exact Weighted All-Pairs Shortest Paths in $\tilde{O}(n^{3/2})$ Rounds
Authors:
Udit Agarwal,
Vijaya Ramachandran,
Valerie King,
Matteo Pontecorvi
Abstract:
We present a deterministic distributed algorithm to compute all-pairs shortest paths(APSP) in an edge-weighted directed or undirected graph. Our algorithm runs in $\tilde{O}(n^{3/2})$ rounds in the Congest model, where $n$ is the number of nodes in the graph. This is the first $o(n^2)$ rounds deterministic distributed algorithm for the weighted APSP problem. Our algorithm is fairly simple and inco…
▽ More
We present a deterministic distributed algorithm to compute all-pairs shortest paths(APSP) in an edge-weighted directed or undirected graph. Our algorithm runs in $\tilde{O}(n^{3/2})$ rounds in the Congest model, where $n$ is the number of nodes in the graph. This is the first $o(n^2)$ rounds deterministic distributed algorithm for the weighted APSP problem. Our algorithm is fairly simple and incorporates a deterministic distributed algorithm we develop for computing a `blocker set' \cite{King99}, which has been used earlier in sequential dynamic computation of APSP.
△ Less
Submitted 15 April, 2018;
originally announced April 2018.
-
Dynamic graph connectivity with improved worst case update time and sublinear space
Authors:
David Gibb,
Bruce Kapron,
Valerie King,
Nolan Thorn
Abstract:
This paper considers fully dynamic graph algorithms with both faster worst case update time and sublinear space. The fully dynamic graph connectivity problem is the following: given a graph on a fixed set of n nodes, process an online sequence of edge insertions, edge deletions, and queries of the form "Is there a path between nodes a and b?" In 2013, the first data structure was presented with wo…
▽ More
This paper considers fully dynamic graph algorithms with both faster worst case update time and sublinear space. The fully dynamic graph connectivity problem is the following: given a graph on a fixed set of n nodes, process an online sequence of edge insertions, edge deletions, and queries of the form "Is there a path between nodes a and b?" In 2013, the first data structure was presented with worst case time per operation which was polylogarithmic in n. In this paper, we shave off a factor of log n from that time, to O(log^4 n) per update. For sequences which are polynomial in length, our algorithm answers queries in O(log n/\log\log n) time correctly with high probability and using O(n \log^2 n) words (of size log n). This matches the amount of space used by the most space-efficient graph connectivity streaming algorithm. We also show that 2-edge connectivity can be maintained using O(n log^2 n) words with an amortized update time of O(log^6 n).
△ Less
Submitted 22 September, 2015;
originally announced September 2015.
-
Construction and impromptu repair of an MST in a distributed network with o(m) communication
Authors:
Valerie King,
Shay Kutten,
Mikkel Thorup
Abstract:
In the CONGEST model, a communications network is an undirected graph whose $n$ nodes are processors and whose $m$ edges are the communications links between processors. At any given time step, a message of size $O(\log n)$ may be sent by each node to each of its neighbors. We show for the synchronous model: If all nodes start in the same round, and each node knows its ID and the ID's of its neigh…
▽ More
In the CONGEST model, a communications network is an undirected graph whose $n$ nodes are processors and whose $m$ edges are the communications links between processors. At any given time step, a message of size $O(\log n)$ may be sent by each node to each of its neighbors. We show for the synchronous model: If all nodes start in the same round, and each node knows its ID and the ID's of its neighbors, or in the case of MST, the distinct weights of its incident edges and knows $n$, then there are Monte Carlo algorithms which succeed w.h.p. to determine a minimum spanning forest (MST) and a spanning forest (ST) using $O(n \log^2 n/\log\log n)$ messages for MST and $O(n \log n )$ messages for ST, resp. These results contradict the "folk theorem" noted in Awerbuch, et.al., JACM 1990 that the distributed construction of a broadcast tree requires $Ω(m)$ messages. This lower bound has been shown there and in other papers for some CONGEST models; our protocol demonstrates the limits of these models.
A dynamic distributed network is one which undergoes online edge insertions or deletions. We also show how to repair an MST or ST in a dynamic network with asynchronous communication. An edge deletion can be processed in $O(n\log n /\log \log n)$ expected messages in the MST, and $O(n)$ expected messages for the ST problem, while an edge insertion uses $O(n)$ messages in the worst case. We call this "impromptu" updating as we assume that between processing of edge updates there is no preprocessing or storage of additional information. Previous algorithms for this problem that use an amortized $o(m)$ messages per update require substantial preprocessing and additional local storage between updates.
△ Less
Submitted 11 February, 2015;
originally announced February 2015.
-
Kinetic $k$-Semi-Yao Graph and its Applications
Authors:
Zahed Rahmati,
Mohammad Ali Abam,
Valerie King,
Sue Whitesides
Abstract:
This paper introduces a new proximity graph, called the $k$-Semi-Yao graph ($k$-SYG), on a set $P$ of points in $\mathbb{R}^d$, which is a supergraph of the $k$-nearest neighbor graph ($k$-NNG) of $P$. We provide a kinetic data structure (KDS) to maintain the $k$-SYG on moving points, where the trajectory of each point is a polynomial function whose degree is bounded by some constant. Our techniqu…
▽ More
This paper introduces a new proximity graph, called the $k$-Semi-Yao graph ($k$-SYG), on a set $P$ of points in $\mathbb{R}^d$, which is a supergraph of the $k$-nearest neighbor graph ($k$-NNG) of $P$. We provide a kinetic data structure (KDS) to maintain the $k$-SYG on moving points, where the trajectory of each point is a polynomial function whose degree is bounded by some constant. Our technique gives the first KDS for the theta graph (\ie, $1$-SYG) in $\mathbb{R}^d$. It generalizes and improves on previous work on maintaining the theta graph in $\mathbb{R}^2$.
As an application, we use the kinetic $k$-SYG to provide the first KDS for maintenance of all the $k$-nearest neighbors in $\mathbb{R}^d$, for any $k\geq 1$. Previous works considered the $k=1$ case only. Our KDS for all the $1$-nearest neighbors is deterministic. The best previous KDS for all the $1$-nearest neighbors in $ \mathbb{R}^d$ is randomized. Our structure and analysis are simpler and improve on this work for the $k=1$ case. We also provide a KDS for all the $(1+ε)$-nearest neighbors, which in fact gives better performance than previous KDS's for maintenance of all the exact $1$-nearest neighbors.
As another application, we present the first KDS for answering reverse $k$-nearest neighbor queries on moving points in $ \mathbb{R}^d$, for any $k\geq 1$.
△ Less
Submitted 17 December, 2014;
originally announced December 2014.
-
Kinetic Reverse $k$-Nearest Neighbor Problem
Authors:
Zahed Rahmati,
Valerie King,
Sue Whitesides
Abstract:
This paper provides the first solution to the kinetic reverse $k$-nearest neighbor (\rknn) problem in $\mathbb{R}^d$, which is defined as follows: Given a set $P$ of $n$ moving points in arbitrary but fixed dimension $d$, an integer $k$, and a query point $q\notin P$ at any time $t$, report all the points $p\in P$ for which $q$ is one of the $k$-nearest neighbors of $p$.
This paper provides the first solution to the kinetic reverse $k$-nearest neighbor (\rknn) problem in $\mathbb{R}^d$, which is defined as follows: Given a set $P$ of $n$ moving points in arbitrary but fixed dimension $d$, an integer $k$, and a query point $q\notin P$ at any time $t$, report all the points $p\in P$ for which $q$ is one of the $k$-nearest neighbors of $p$.
△ Less
Submitted 25 September, 2014; v1 submitted 20 June, 2014;
originally announced June 2014.
-
A Simple, Faster Method for Kinetic Proximity Problems
Authors:
Zahed Rahmati,
Mohammad Ali Abam,
Valerie King,
Sue Whitesides,
Alireza Zarei
Abstract:
For a set of $n$ points in the plane, this paper presents simple kinetic data structures (KDS's) for solutions to some fundamental proximity problems, namely, the all nearest neighbors problem, the closest pair problem, and the Euclidean minimum spanning tree (EMST) problem. Also, the paper introduces KDS's for maintenance of two well-studied sparse proximity graphs, the Yao graph and the Semi-Yao…
▽ More
For a set of $n$ points in the plane, this paper presents simple kinetic data structures (KDS's) for solutions to some fundamental proximity problems, namely, the all nearest neighbors problem, the closest pair problem, and the Euclidean minimum spanning tree (EMST) problem. Also, the paper introduces KDS's for maintenance of two well-studied sparse proximity graphs, the Yao graph and the Semi-Yao graph.
We use sparse graph representations, the Pie Delaunay graph and the Equilateral Delaunay graph, to provide new solutions for the proximity problems. Then we design KDS's that efficiently maintain these sparse graphs on a set of $n$ moving points, where the trajectory of each point is assumed to be an algebraic function of constant maximum degree $s$. We use the kinetic Pie Delaunay graph and the kinetic Equilateral Delaunay graph to create KDS's for maintenance of the Yao graph, the Semi-Yao graph, all the nearest neighbors, the closest pair, and the EMST. Our KDS's use $O(n)$ space and $O(n\log n)$ preprocessing time.
We provide the first KDS's for maintenance of the Semi-Yao graph and the Yao graph. Our KDS processes $O(n^2β_{2s+2}(n))$ (resp. $O(n^3β_{2s+2}^2(n)\log n)$) events to maintain the Semi-Yao graph (resp. the Yao graph); each event can be processed in time $O(\log n)$ in an amortized sense. Here, $β_s(n)$ is an extremely slow-growing function.
Our KDS for maintenance of all the nearest neighbors and the closest pair processes $O(n^2β^2_{2s+2}(n)\log n)$ events. For maintenance of the EMST, our KDS processes $O(n^3β_{2s+2}^2(n)\log n)$ events. For all three of these problems, each event can be handled in time $O(\log n)$ in an amortized sense.
We improve the previous randomized kinetic algorithm for maintenance of all the nearest neighbors by Agarwal, Kaplan, and Sharir, and the previous EMST KDS by Rahmati and Zarei.
△ Less
Submitted 4 January, 2014; v1 submitted 8 November, 2013;
originally announced November 2013.
-
Proceedings Ninth International Workshop on Foundations of Mobile Computing
Authors:
Keren Censor-Hillel,
Valerie King
Abstract:
Mobile communication has become a vigorous field of research in computer science, due to the wide spreading of mobile technologies, applications and services. The intertwining of communication, computation and mobility constantly poses new challenges to algorithmic design in this area. The Foundations of Mobile Computing (FOMC) workshop is dedicated to all aspects that cover contributions both in…
▽ More
Mobile communication has become a vigorous field of research in computer science, due to the wide spreading of mobile technologies, applications and services. The intertwining of communication, computation and mobility constantly poses new challenges to algorithmic design in this area. The Foundations of Mobile Computing (FOMC) workshop is dedicated to all aspects that cover contributions both in the design and analysis of discrete/distributed algorithms, and in the system modeling of mobile, wireless and similarly dynamic networks. It aims to bring together the practitioners and theoreticians of the field to foster cooperation between research in mobile computing and algorithms.
△ Less
Submitted 17 October, 2013;
originally announced October 2013.
-
Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation
Authors:
Varsha Dani,
Valerie King,
Mahnush Movahedi,
Jared Saia
Abstract:
We describe an asynchronous algorithm to solve secure multiparty computation (MPC) over n players, when strictly less than a 1/8 fraction of the players are controlled by a static adversary. For any function f over a field that can be computed by a circuit with m gates, our algorithm requires each player to send a number of field elements and perform an amount of computation that is O (m/n + \sqrt…
▽ More
We describe an asynchronous algorithm to solve secure multiparty computation (MPC) over n players, when strictly less than a 1/8 fraction of the players are controlled by a static adversary. For any function f over a field that can be computed by a circuit with m gates, our algorithm requires each player to send a number of field elements and perform an amount of computation that is O (m/n + \sqrt{n}). This significantly improves over traditional algorithms, which require each player to both send a number of messages and perform computation that is Ω(nm). Additionally, we define the threshold counting problem and present a distributed algorithm to solve it in the asynchronous communication model. Our algorithm is load balanced, with computation, communication and latency complexity of O(log n), and may be of independent interest to other applications with a load balancing goal in mind.
△ Less
Submitted 13 October, 2013;
originally announced October 2013.
-
Kinetic Data Structures for the Semi-Yao Graph and All Nearest Neighbors in R^d
Authors:
Zahed Rahmati,
Mohammad Ali Abam,
Valerie King,
Sue Whitesides
Abstract:
This paper presents a simple kinetic data structure for maintaining all the nearest neighbors of a set of $n$ moving points in $\mathbb{R}^d$, where the trajectory of each point is an algebraic function of at most constant degree $s$. The approach is based on maintaining the edges of the Semi-Yao graph, a sparse graph whose edge set includes the pairs of nearest neighbors as a subset.
Our kineti…
▽ More
This paper presents a simple kinetic data structure for maintaining all the nearest neighbors of a set of $n$ moving points in $\mathbb{R}^d$, where the trajectory of each point is an algebraic function of at most constant degree $s$. The approach is based on maintaining the edges of the Semi-Yao graph, a sparse graph whose edge set includes the pairs of nearest neighbors as a subset.
Our kinetic data structure (KDS) for maintaining all the nearest neighbors is deterministic. It processes $O(n^2β_{2s+2}^2(n)\log n)$ events with a total cost of $O(n^2β_{2s+2}(n)\log^{d+1} n)$. Here, $β_s(n)$ is an extremely slow-growing function. The best previous KDS for all the nearest neighbors in $ \mathbb{R}^d$ is by Agarwal, Kaplan, and Sharir (TALG 2008). It is a randomized result. Our structure and analysis are simpler than theirs. Also, we improve their result by a factor of $\log^d n$ in the number of events and by a $\log n$ factor in the total cost.
This paper generalizes and improves the 2013 work of Rahmati, King and Whitesides (SoCG 2013) on maintaining the Semi-Yao graph in $\mathbb{R}^2$; its new technique provides the first KDS for the Semi-Yao graph in $\mathbb{R}^d$. Our KDS is local in the worst case, meaning that only a constant number of events is associated with any one point at any time.
For maintaining all the nearest neighbors, neither our KDS nor the KDS by Agarwal~\etal~is local, and furthermore, each event in our KDS and in their KDS is handled in polylogarithmic time in an amortized sense.
Finally, in this paper, we also give a KDS for maintenance of all the $(1+ε)$-nearest neighbors which is local and each event can be handled in a polylogarithmic worst-case time.
△ Less
Submitted 14 November, 2013; v1 submitted 10 July, 2013;
originally announced July 2013.
-
Secure Multi-Party Computation in Large Networks
Authors:
Varsha Dani,
Valerie King,
Mahnush Movahedi,
Jared Saia,
Mahdi Zamani
Abstract:
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a large number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a $1/3$ fraction of the parties. In the asynchronous setting, we allow the adversary to co…
▽ More
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a large number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a $1/3$ fraction of the parties. In the asynchronous setting, we allow the adversary to corrupt less than a $1/8$ fraction of parties. For any deterministic function that can be computed by an arithmetic circuit with $m$ gates, both of our protocols require each party to send a number of field elements and perform an amount of computation that is $\tilde{O}(m/n + \sqrt n)$. We also show that our protocols provide perfect and universally-composable security.
To achieve our asynchronous MPC result, we define the \emph{threshold counting problem} and present a distributed protocol to solve it in the asynchronous setting. This protocol is load balanced, with computation, communication and latency complexity of $O(\log{n})$, and can also be used for designing other load-balanced applications in the asynchronous communication model.
△ Less
Submitted 27 September, 2015; v1 submitted 1 March, 2012;
originally announced March 2012.
-
A Resource-Competitive Jamming Defense
Authors:
Valerie King,
Seth Pettie,
Jared Saia,
Maxwell Young
Abstract:
Consider a scenario where Alice wishes to send a message $m$ to Bob in a time-slotted wireless network. However, there exists an adversary, Carol, who aims to prevent the transmission of $m$ by jamming the communication channel. There is a per-slot cost of $1$ to send, receive or jam $m$ on the channel, and we are interested in how much Alice and Bob need to spend relative to Carol in order to gua…
▽ More
Consider a scenario where Alice wishes to send a message $m$ to Bob in a time-slotted wireless network. However, there exists an adversary, Carol, who aims to prevent the transmission of $m$ by jamming the communication channel. There is a per-slot cost of $1$ to send, receive or jam $m$ on the channel, and we are interested in how much Alice and Bob need to spend relative to Carol in order to guarantee communication.
Our approach is to design an algorithm in the framework of resource-competitive analysis where the cost to correct network devices (i.e., Alice and Bob) is parameterized by the cost to faulty devices (i.e., Carol). We present an algorithm that guarantees the successful transmission of $m$ and has the following property: if Carol incurs a cost of $T$ to jam, then both Alice and Bob have a cost of $O(T^{\varphi - 1} + 1)=O(T^{.62}+1)$ in expectation, where $\varphi = (1+ \sqrt{5})/2$ is the golden ratio. In other words, it possible for Alice and Bob to communicate while incurring asymptotically less cost than Carol. We generalize to the case where Alice wishes to send $m$ to $n$ receivers, and we achieve a similar result.
Our findings hold even if (1) $T$ is unknown to either party; (2) Carol knows the algorithms of both parties, but not their random bits; (3) Carol can jam using knowledge of past actions of both parties; and (4) Carol can jam reactively, so long as there is sufficient network traffic in addition to $m$.
△ Less
Submitted 18 May, 2017; v1 submitted 29 February, 2012;
originally announced February 2012.
-
They Know Where You Live!
Authors:
Kazem Jahanbakhsh,
Valerie King,
Gholamali C. Shoja
Abstract:
In this paper, we demonstrate the possibility of predicting people's hometowns by using their geotagged photos posted on Flickr website. We employ Kruskal's algorithm to cluster photos taken by a user and predict the user's hometown. Our results prove that using social profiles of photographers allows researchers to predict the locations of their taken photos with higher accuracies. This in return…
▽ More
In this paper, we demonstrate the possibility of predicting people's hometowns by using their geotagged photos posted on Flickr website. We employ Kruskal's algorithm to cluster photos taken by a user and predict the user's hometown. Our results prove that using social profiles of photographers allows researchers to predict the locations of their taken photos with higher accuracies. This in return can improve the previous methods which were purely based on visual features of photos \cite{Hays:im2gps}.
△ Less
Submitted 15 February, 2012;
originally announced February 2012.
-
Breaking the O(n^2) Bit Barrier: Scalable Byzantine agreement with an Adaptive Adversary
Authors:
Valerie King,
Jared Saia
Abstract:
We describe an algorithm for Byzantine agreement that is scalable in the sense that each processor sends only $\tilde{O}(\sqrt{n})$ bits, where $n$ is the total number of processors. Our algorithm succeeds with high probability against an \emph{adaptive adversary}, which can take over processors at any time during the protocol, up to the point of taking over arbitrarily close to a 1/3 fraction.…
▽ More
We describe an algorithm for Byzantine agreement that is scalable in the sense that each processor sends only $\tilde{O}(\sqrt{n})$ bits, where $n$ is the total number of processors. Our algorithm succeeds with high probability against an \emph{adaptive adversary}, which can take over processors at any time during the protocol, up to the point of taking over arbitrarily close to a 1/3 fraction. We assume synchronous communication but a \emph{rushing} adversary. Moreover, our algorithm works in the presence of flooding: processors controlled by the adversary can send out any number of messages. We assume the existence of private channels between all pairs of processors but make no other cryptographic assumptions. Finally, our algorithm has latency that is polylogarithmic in $n$. To the best of our knowledge, ours is the first algorithm to solve Byzantine agreement against an adaptive adversary, while requiring $o(n^{2})$ total bits of communication.
△ Less
Submitted 24 February, 2010;
originally announced February 2010.
-
Slee** on the Job: Energy-Efficient Broadcast for Radio Networks
Authors:
Valerie King,
Cynthia Phillips,
Jared Saia,
Maxwell Young
Abstract:
We address the problem of minimizing power consumption when performing reliable broadcast on a radio network under the following popular model. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message, all awake nodes within distance r receive the message. In the broadcast problem, some node wants to successfully send a message to all other no…
▽ More
We address the problem of minimizing power consumption when performing reliable broadcast on a radio network under the following popular model. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message, all awake nodes within distance r receive the message. In the broadcast problem, some node wants to successfully send a message to all other nodes in the network even when up to a 1/2 fraction of the nodes within every neighborhood can be deleted by an adversary. The set of deleted nodes is carefully chosen by the adversary to foil our algorithm and moreover, the set of deleted nodes may change periodically. This models worst-case behavior due to mobile nodes, static nodes losing power or simply some points in the grid being unoccupied. A trivial solution requires each node in the network to be awake roughly 1/2 the time, and a trivial lower bound shows that each node must be awake for at least a 1/n fraction of the time. Our first result is an algorithm that requires each node to be awake for only a 1/sqrt(n) fraction of the time in expectation. Our algorithm achieves this while ensuring correctness with probability 1, and kee** optimal values for other resource costs such as latency and number of messages sent. We give a lower-bound that shows that this reduction in power consumption is asymptotically optimal when latency and number of messages sent must be optimal. If we can increase the latency and messages sent by only a log*n factor we give a Las Vegas algorithm that requires each node to be awake for only a (log*n)/n expected fraction of the time; we give a lower-bound showing that this second algorithm is near optimal. Finally, we show how to ensure energy-efficient broadcast in the presence of Byzantine faults.
△ Less
Submitted 12 October, 2007;
originally announced October 2007.