-
Concurrent Distributed Serving with Mobile Servers
Authors:
Abdolhamid Ghodselahi,
Fabian Kuhn,
Volker Turau
Abstract:
This paper introduces a new resource allocation problem in distributed computing called distributed serving with mobile servers (DSMS). In DSMS, there are $k$ identical mobile servers residing at the processors of a network. At arbitrary points of time, any subset of processors can invoke one or more requests. To serve a request, one of the servers must move to the processor that invoked the reque…
▽ More
This paper introduces a new resource allocation problem in distributed computing called distributed serving with mobile servers (DSMS). In DSMS, there are $k$ identical mobile servers residing at the processors of a network. At arbitrary points of time, any subset of processors can invoke one or more requests. To serve a request, one of the servers must move to the processor that invoked the request. Resource allocation is performed in a distributed manner since only the processor that invoked the request initially knows about it. All processors cooperate by passing messages to achieve correct resource allocation. They do this with the goal to minimize the communication cost.
Routing servers in large-scale distributed systems requires a scalable location service. We introduce the distributed protocol GNN that solves the DSMS problem on overlay trees. We prove that GNN is starvation-free and correctly integrates locating the servers and synchronizing the concurrent access to servers despite asynchrony, even when the requests are invoked over time. Further, we analyze GNN for "one-shot" executions, i.e., all requests are invoked simultaneously. We prove that when running GNN on top of a special family of tree topologies---known as hierarchically well-separated trees (HSTs)---we obtain a randomized distributed protocol with an expected competitive ratio of $O(\log n)$ on general network topologies with $n$ processors. From a technical point of view, our main result is that GNN optimally solves the DSMS problem on HSTs for one-shot executions, even if communication is asynchronous. Further, we present a lower bound of $Ω(\max\{k, \log n/\log\log n\})$ on the competitive ratio for DSMS. The lower bound even holds when communication is synchronous and requests are invoked sequentially.
△ Less
Submitted 16 November, 2019; v1 submitted 19 February, 2019;
originally announced February 2019.
-
Schauder estimates for Poisson equations associated with non-local Feller generators
Authors:
Franziska Kühn
Abstract:
We show how Hölder estimates for Feller semigroups can be used to obtain regularity results for solutions to the Poisson equation $Af=g$ associated with the (extended) infinitesimal generator $A$ of a Feller process. The regularity of $f$ is described in terms of Hölder-Zygmund spaces of variable order and, moreover, we establish Schauder estimates. Since Hölder estimates for Feller semigroups hav…
▽ More
We show how Hölder estimates for Feller semigroups can be used to obtain regularity results for solutions to the Poisson equation $Af=g$ associated with the (extended) infinitesimal generator $A$ of a Feller process. The regularity of $f$ is described in terms of Hölder-Zygmund spaces of variable order and, moreover, we establish Schauder estimates. Since Hölder estimates for Feller semigroups have been intensively studied in the last years, our results apply to a wide class of Feller processes, e.g. random time changes of Lévy processes and solutions to Lévy-driven stochastic differential equations. Most prominently, we establish Schauder estimates for the Poisson equation associated with the fractional Laplacian of variable order. As a by-product, we obtain new regularity estimates for semigroups associated with stable-like processes.
△ Less
Submitted 9 August, 2019; v1 submitted 5 February, 2019;
originally announced February 2019.
-
Schauder estimates for equations associated with Lévy generators
Authors:
Franziska Kühn
Abstract:
We study the regularity of solutions to the integro-differential equation $Af-λf=g$ associated with the infinitesimal generator $A$ of a Lévy process. We show that gradient estimates for the transition density can be used to derive Schauder estimates for $f$. Our main result allows us to establish Schauder estimates for a wide class of Lévy generators, including generators of stable Lévy processes…
▽ More
We study the regularity of solutions to the integro-differential equation $Af-λf=g$ associated with the infinitesimal generator $A$ of a Lévy process. We show that gradient estimates for the transition density can be used to derive Schauder estimates for $f$. Our main result allows us to establish Schauder estimates for a wide class of Lévy generators, including generators of stable Lévy processes and subordinate Brownian motions. Moreover, we obtain new insights on the (domain of the) infinitesimal generator of a Lévy process whose characteristic exponent $ψ$ satisfies $\text{Re} \, ψ(ξ) \asymp |ξ|^α$ for large $|ξ|$. We discuss the optimality of our results by studying in detail the domain of the infinitesimal generator of the Cauchy process.
△ Less
Submitted 18 February, 2019; v1 submitted 14 December, 2018;
originally announced December 2018.
-
Optimal strategies for patrolling fences
Authors:
Bernhard Haeupler,
Fabian Kuhn,
Anders Martinsson,
Kalina Petrova,
Pascal Pfister
Abstract:
A classical multi-agent fence patrolling problem asks: What is the maximum length $L$ of a line that $k$ agents with maximum speeds $v_1,\ldots,v_k$ can patrol if each point on the line needs to be visited at least once every unit of time. It is easy to see that $L = α\sum_{i=1}^k v_i$ for some efficiency $α\in [\frac{1}{2},1)$. After a series of works giving better and better efficiencies, it was…
▽ More
A classical multi-agent fence patrolling problem asks: What is the maximum length $L$ of a line that $k$ agents with maximum speeds $v_1,\ldots,v_k$ can patrol if each point on the line needs to be visited at least once every unit of time. It is easy to see that $L = α\sum_{i=1}^k v_i$ for some efficiency $α\in [\frac{1}{2},1)$. After a series of works giving better and better efficiencies, it was conjectured that the best possible efficiency approaches $\frac{2}{3}$. No upper bounds on the efficiency below $1$ were known. We prove the first such upper bounds and tightly bound the optimal efficiency in terms of the minimum ratio of speeds $s = {v_{\max}}/{v_{\min}}$ and the number of agents $k$. Guided by our upper bounds, we construct a scheme whose efficiency approaches $1$, disproving the conjecture of Kawamura and Soejima. Our scheme asymptotically matches our upper bounds in terms of the maximal speed difference and the number of agents used, proving them to be asymptotically tight.
A variation of the fence patrolling problem considers a circular fence instead and asks for its circumference to be maximized. We consider the unidirectional case of this variation, where all agents are only allowed to move in one direction, say clockwise. At first, a strategy yielding $L = \max_{r \in [k]} r \cdot v_r$ where $v_1 \geq v_2 \geq \dots \geq v_k$ was conjectured to be optimal by Czyzowicz et al. This was proven not to be the case by giving constructions for only specific numbers of agents with marginal improvements of $L$. We give a general construction that yields $L = \frac{1}{33 \log_e\log_2(k)} \sum_{i=1}^k v_i$ for any set of agents, which in particular for the case $1, 1/2, \dots, 1/k$ diverges as $k \rightarrow \infty$, thus resolving a conjecture by Kawamura and Soejima affirmatively.
△ Less
Submitted 12 June, 2019; v1 submitted 18 September, 2018;
originally announced September 2018.
-
Viscosity solutions to Hamilton-Jacobi-Bellman equations associated with sublinear Lévy(-type) processes
Authors:
Franziska Kühn
Abstract:
Using probabilistic methods we study the existence of viscosity solutions to non-linear integro-differential equations $$\partial_t u(t,x) - \sup_{α\in I} \bigg( b_α(x) \cdot \nabla_x u(t,x) + \frac{1}{2} \text{tr}\left(Q_α(x) \cdot \nabla^2_x u(t,x)\right) +\int_{y \neq 0} \big(u(t,x+y)-u(t,x)-\nabla_x u(t,x) \cdot h(y) \big) \, ν_α(x,dy) \bigg) = 0$$ with initial condition $u(0,x)= \varphi(x)$;…
▽ More
Using probabilistic methods we study the existence of viscosity solutions to non-linear integro-differential equations $$\partial_t u(t,x) - \sup_{α\in I} \bigg( b_α(x) \cdot \nabla_x u(t,x) + \frac{1}{2} \text{tr}\left(Q_α(x) \cdot \nabla^2_x u(t,x)\right) +\int_{y \neq 0} \big(u(t,x+y)-u(t,x)-\nabla_x u(t,x) \cdot h(y) \big) \, ν_α(x,dy) \bigg) = 0$$ with initial condition $u(0,x)= \varphi(x)$; here $(b_α(x),Q_α(x),ν_α(x,dy))$, $α\in I$, $x \in \mathbb{R}^d$, is a family of Lévy triplets and $h$ is some truncation function. The solutions, which we construct, are of the form $u(t,x) = T_t \varphi(x)$ for a sublinear Markov semigroup $(T_t)_{t \geq 0}$ with representation $$T_t \varphi(x) = \mathcal{E}^x \varphi(X_t):= \sup_{\mathbb{P} \in \mathfrak{P}_x} \int_Ω \varphi(X_t) \, d\mathbb{P}$$ where $(X_t)_{t \geq 0}$ is a stochastic process and $\mathfrak{P}_x$, $x \in \mathbb{R}^d$, are families of probability measures. The key idea is to exploit the connection between sublinear Markov semigroups and the associated Kolmogorov backward equation. In particular, we obtain new existence and uniqueness results for viscosity solutions to Kolmogorov backward equations associated with Lévy(-type) processes for sublinear expectations and Feller processes on classical probability spaces.
△ Less
Submitted 6 March, 2019; v1 submitted 7 August, 2018;
originally announced August 2018.
-
A probabilistic proof of Schoenberg's theorem
Authors:
Franziska Kühn,
René L. Schilling
Abstract:
Assume that $g(|ξ|^2)$, $ξ\in\mathbb{R}^k$, is for every dimension $k\in\mathbb{N}$ the characteristic function of an infinitely divisible random variable $X^k$. By a classical result of Schoenberg $f:=-\log g$ is a Bernstein function. We give a simple probabilistic proof of this result starting from the observation that $X^k = X_1^k$ can be embedded into a Lévy process $(X_t^k)_{t\geq 0}$ and tha…
▽ More
Assume that $g(|ξ|^2)$, $ξ\in\mathbb{R}^k$, is for every dimension $k\in\mathbb{N}$ the characteristic function of an infinitely divisible random variable $X^k$. By a classical result of Schoenberg $f:=-\log g$ is a Bernstein function. We give a simple probabilistic proof of this result starting from the observation that $X^k = X_1^k$ can be embedded into a Lévy process $(X_t^k)_{t\geq 0}$ and that Schoenberg's theorem says that $(X_t^k)_{t\geq 0}$ is subordinate to a Brownian motion. A key ingredient of our proof are concrete formulae which connect the transition densities, resp., Lévy measures of subordinated Brownian motions across different dimensions. As a by-product of our proof we obtain a gradient estimate for the transition semigroup of a subordinated Brownian motion.
△ Less
Submitted 1 August, 2018;
originally announced August 2018.
-
The Communication Cost of Information Spreading in Dynamic Networks
Authors:
Mohamad Ahmadi,
Fabian Kuhn,
Shay Kutten,
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
This paper investigates the message complexity of distributed information spreading (a.k.a gossip or token dissemination) in adversarial dynamic networks, where the goal is to spread $k$ tokens of information to every node on an $n$-node network. We consider the amortized (average) message complexity of spreading a token, assuming that the number of tokens is large. Our focus is on token-forwardin…
▽ More
This paper investigates the message complexity of distributed information spreading (a.k.a gossip or token dissemination) in adversarial dynamic networks, where the goal is to spread $k$ tokens of information to every node on an $n$-node network. We consider the amortized (average) message complexity of spreading a token, assuming that the number of tokens is large. Our focus is on token-forwarding algorithms, which do not manipulate tokens in any way other than storing, copying, and forwarding them.
We consider two types of adversaries that arbitrarily rewire the network while kee** it connected: the adaptive adversary that is aware of the status of all the nodes and the algorithm (including the current random choices), and the oblivious adversary that is oblivious to the random choices made by the algorithm. The central question that motivates our work is whether one can achieve subquadratic amortized message complexity for information spreading.
We present two sets of results depending on how nodes send messages to their neighbors: (1) Local broadcast: We show a tight lower bound of $Ω(n^2)$ on the number of amortized local broadcasts, which is matched by the naive flooding algorithm, (2) Unicast: We study the message complexity as a function of the number of dynamic changes in the network. To facilitate this, we introduce a natural complexity measure for analyzing dynamic networks called adversary-competitive message complexity where the adversary pays a unit cost for every topological change. Under this model, it is shown that if $k$ is sufficiently large, we can obtain an optimal amortized message complexity of $O(n)$. We also present a randomized algorithm that achieves subquadratic amortized message complexity when the number of tokens is not large under an oblivious adversary.
△ Less
Submitted 26 June, 2018;
originally announced June 2018.
-
Distributed Computation in Node-Capacitated Networks
Authors:
John Augustine,
Mohsen Ghaffari,
Robert Gmyr,
Kristian Hinnenthal,
Fabian Kuhn,
Jason Li,
Christian Scheideler
Abstract:
In this paper, we study distributed graph algorithms in networks in which the nodes have a limited communication capacity. Many distributed systems are built on top of an underlying networking infrastructure, for example by using a virtual communication topology known as an overlay network. Although this underlying network might allow each node to directly communicate with a large number of other…
▽ More
In this paper, we study distributed graph algorithms in networks in which the nodes have a limited communication capacity. Many distributed systems are built on top of an underlying networking infrastructure, for example by using a virtual communication topology known as an overlay network. Although this underlying network might allow each node to directly communicate with a large number of other nodes, the amount of communication that a node can perform in a fixed amount of time is typically much more limited. We introduce the Node-Capacitated Clique model as an abstract communication model, which allows us to study the effect of nodes having limited communication capacity on the complexity of distributed graph computations. In this model, the $n$ nodes of a network are connected as a clique and communicate in synchronous rounds. In each round, every node can exchange messages of $O(\log n)$ bits with at most $O(\log n)$ other nodes. When solving a graph problem, the input graph $G$ is defined on the same set of $n$ nodes, where each node knows which other nodes are its neighbors in $G$. To initiate research on the Node-Capacitated Clique model, we present distributed algorithms for the Minimum Spanning Tree (MST), BFS Tree, Maximal Independent Set, Maximal Matching, and Vertex Coloring problems. We show that even with only $O(\log n)$ concurrent interactions per node, the MST problem can still be solved in polylogarithmic time. In all other cases, the runtime of our algorithms depends linearly on the arboricity of $G$, which is a constant for many important graph families such as planar graphs.
△ Less
Submitted 25 April, 2019; v1 submitted 18 May, 2018;
originally announced May 2018.
-
Deterministic Distributed Ruling Sets of Line Graphs
Authors:
Fabian Kuhn,
Yannic Maus,
Simon Weidner
Abstract:
An $(α,β)$-ruling set of a graph $G=(V,E)$ is a set $R\subseteq V$ such that for any node $v\in V$ there is a node $u\in R$ in distance at most $β$ from $v$ and such that any two nodes in $R$ are at distance at least $α$ from each other. The concept of ruling sets can naturally be extended to edges, i.e., a subset $F\subseteq E$ is an $(α,β)$-ruling edge set of a graph $G=(V,E)$ if the correspondi…
▽ More
An $(α,β)$-ruling set of a graph $G=(V,E)$ is a set $R\subseteq V$ such that for any node $v\in V$ there is a node $u\in R$ in distance at most $β$ from $v$ and such that any two nodes in $R$ are at distance at least $α$ from each other. The concept of ruling sets can naturally be extended to edges, i.e., a subset $F\subseteq E$ is an $(α,β)$-ruling edge set of a graph $G=(V,E)$ if the corresponding nodes form an $(α,β)$-ruling set in the line graph of $G$. This paper presents a simple deterministic, distributed algorithm, in the $\mathsf{CONGEST}$ model, for computing $(2,2)$-ruling edge sets in $O(\log^* n)$ rounds. Furthermore, we extend the algorithm to compute ruling sets of graphs with bounded diversity. Roughly speaking, the diversity of a graph is the maximum number of maximal cliques a vertex belongs to. We devise $(2,O(\mathcal{D}))$-ruling sets on graphs with diversity $\mathcal{D}$ in $O(\mathcal{D}+\log^* n)$ rounds. This also implies a fast, deterministic $(2,O(\ell))$-ruling edge set algorithm for hypergraphs with rank at most $\ell$.
Furthermore, we provide a ruling set algorithm for general graphs that for any $B\geq 2$ computes an $\big(α, α\lceil \log_B n \rceil \big)$-ruling set in $O(α\cdot B \cdot \log_B n)$ rounds in the $\mathsf{CONGEST}$ model. The algorithm can be modified to compute a $\big(2, β\big)$-ruling set in $O(βΔ^{2/β} + \log^* n)$ rounds in the $\mathsf{CONGEST}$~ model, which matches the currently best known such algorithm in the more general $\mathsf{LOCAL}$ model.
△ Less
Submitted 18 May, 2018;
originally announced May 2018.
-
Efficient Distributed Computation of MIS and Generalized MIS in Linear Hypergraphs
Authors:
Fabian Kuhn,
Chaodong Zheng
Abstract:
Given a graph, a maximal independent set (MIS) is a maximal subset of pairwise non-adjacent vertices. Finding an MIS is a fundamental problem in distributed computing. Although the problem is extensively studied and well understood in simple graphs, our knowledge is still quite limited when solving it in hypergraphs, especially in the distributed CONGEST model. In this paper, we focus on linear hy…
▽ More
Given a graph, a maximal independent set (MIS) is a maximal subset of pairwise non-adjacent vertices. Finding an MIS is a fundamental problem in distributed computing. Although the problem is extensively studied and well understood in simple graphs, our knowledge is still quite limited when solving it in hypergraphs, especially in the distributed CONGEST model. In this paper, we focus on linear hypergraphs---a class of hypergraphs in which any two hyperedges overlap on at most one node.
We first present a randomized algorithm for computing an MIS in linear hypergraphs. It has poly-logarithmic runtime and it works in the CONGEST model. The algorithm uses a network decomposition to achieve fast parallel processing. Within each cluster of the decomposition, we run a distributed variant of a parallel hypergraph MIS algorithm by Luczak and Szymanska.
We then propose the concept of a generalized maximal independent set (GMIS) as an extension to the classical MIS in hypergraphs. More specifically, in a GMIS, for each hyperedge $e$ in a hypergraph $\mathcal{H}$, we associate an integer threshold $t_e$ in the range $[1, |e|-1]$, and the goal is to find a maximal subset $\mathcal{I}$ of vertices that do not violate any threshold constraints: $\forall e \in E(\mathcal{H}), |e \cap \mathcal{I}| \leq t_e$. We hope that GMIS might capture a broader class of real-world problems than MIS; we also believe that GMIS is an interesting and challenging symmetry breaking problem on its own.
Our second upper bound result is a distributed algorithm for computing a GMIS in linear hypergraphs, subject to the constraint that the maximum hyperedge size is bounded by some constant. Again, the algorithm has poly-logarithmic runtime and it works in the CONGEST model. It is obtained by generalizing our previous (linear) hypergraph MIS algorithm.
△ Less
Submitted 8 May, 2018;
originally announced May 2018.
-
Existence of (Markovian) solutions to martingale problems associated with Lévy-type operators
Authors:
Franziska Kühn
Abstract:
Let $A$ be a pseudo-differential operator with symbol $q(x,ξ)$. In this paper we derive sufficient conditions which ensure the existence of a solution to the $(A,C_c^{\infty}(\mathbb{R}^d))$-martingale problem. If the symbol $q$ depends continuously on the space variable $x$, then the existence of solutions is well understood, and therefore the focus lies on martingale problems for pseudo-differen…
▽ More
Let $A$ be a pseudo-differential operator with symbol $q(x,ξ)$. In this paper we derive sufficient conditions which ensure the existence of a solution to the $(A,C_c^{\infty}(\mathbb{R}^d))$-martingale problem. If the symbol $q$ depends continuously on the space variable $x$, then the existence of solutions is well understood, and therefore the focus lies on martingale problems for pseudo-differential operators with discontinuous coefficients. We prove an existence result which allows us, in particular, to obtain new insights on the existence of weak solutions to a class of Lévy-driven SDEs with Borel measurable coefficients and on the the existence of stable-like processes with discontinuous coefficients. Moreover, we establish a Markovian selection theorem which shows that - under mild assumptions - the $(A,C_c^{\infty}(\mathbb{R}^d))$-martingale problem gives rise to a strong Markov process. The result applies, in particular, to Lévy-driven SDEs. We illustrate the Markovian selection theorem with applications in the theory of non-local operators and equations; in particular, we establish under weak regularity assumptions a Harnack inequality for non-local operators of variable order.
△ Less
Submitted 15 March, 2018;
originally announced March 2018.
-
Improved Distributed $Δ$-Coloring
Authors:
Mohsen Ghaffari,
Juho Hirvonen,
Fabian Kuhn,
Yannic Maus
Abstract:
We present a randomized distributed algorithm that computes a $Δ$-coloring in any non-complete graph with maximum degree $Δ\geq 4$ in $O(\log Δ) + 2^{O(\sqrt{\log\log n})}$ rounds, as well as a randomized algorithm that computes a $Δ$-coloring in $O((\log \log n)^2)$ rounds when $Δ\in [3, O(1)]$. Both these algorithms improve on an $O(\log^3 n/\log Δ)$-round algorithm of Panconesi and Srinivasan~[…
▽ More
We present a randomized distributed algorithm that computes a $Δ$-coloring in any non-complete graph with maximum degree $Δ\geq 4$ in $O(\log Δ) + 2^{O(\sqrt{\log\log n})}$ rounds, as well as a randomized algorithm that computes a $Δ$-coloring in $O((\log \log n)^2)$ rounds when $Δ\in [3, O(1)]$. Both these algorithms improve on an $O(\log^3 n/\log Δ)$-round algorithm of Panconesi and Srinivasan~[STOC'1993], which has remained the state of the art for the past 25 years. Moreover, the latter algorithm gets (exponentially) closer to an $Ω(\log\log n)$ round lower bound of Brandt et al.~[STOC'16].
△ Less
Submitted 2 August, 2020; v1 submitted 8 March, 2018;
originally announced March 2018.
-
Local Distributed Algorithms in Highly Dynamic Networks
Authors:
Philipp Bamberger,
Fabian Kuhn,
Yannic Maus
Abstract:
The present paper studies local distributed graph problems in highly dynamic networks. Communication and changes of the graph happen in synchronous rounds and our algorithms always, i.e., in every round, satisfy non-trivial guarantees, no matter how dynamic the network is.
We define a (in our view) natural generalization of static graph problems to the dynamic graph setting. Throughout the execu…
▽ More
The present paper studies local distributed graph problems in highly dynamic networks. Communication and changes of the graph happen in synchronous rounds and our algorithms always, i.e., in every round, satisfy non-trivial guarantees, no matter how dynamic the network is.
We define a (in our view) natural generalization of static graph problems to the dynamic graph setting. Throughout the execution of an algorithm we consider a sliding window over the last $T$, e.g., polylogarithmic, rounds. Then, in some round, the feasibility of an output only depends on the topology of the graphs in the current sliding window and we call a feasible output a $T$-dynamic solution. The guarantees of a $T$-dynamic solution become stronger the more stable the graph is during this sliding window and, in particular, they coincide with the definition of the static graph problem if the graph is static throughout the window. We further present an abstract framework that allows to develop algorithms that output $T$-dynamic solutions in all rounds. The resulting algorithms have another desirable property: If a constant neighborhood around some part of the graph is stable during an interval $[t_1,t_2]$, the algorithms compute a static solution for this part of the graph throughout the interval $[t_1+T',t_2]$ for some (small) $T'>0$.
We demonstrate our generic framework with two sample problems that abstract basic operations in dynamic networks, namely $\textit{(degree+1)-vertex coloring}$ and $\textit{maximal independent set (MIS)}$. To illustrate the given guarantees consider the vertex coloring problem: The sliding window of our (randomized) algorithm is of length $T=O(\log n)$ and any conflict between two nodes caused by a newly inserted edge is resolved within that time. During this conflict resolving both nodes always output colors that are not in conflict with their respective 'old' neighbors.
△ Less
Submitted 7 December, 2018; v1 submitted 27 February, 2018;
originally announced February 2018.
-
Deterministic Distributed Edge-Coloring with Fewer Colors
Authors:
Mohsen Ghaffari,
Fabian Kuhn,
Yannic Maus,
Jara Uitto
Abstract:
We present a deterministic distributed algorithm, in the LOCAL model, that computes a $(1+o(1))Δ$-edge-coloring in polylogarithmic-time, so long as the maximum degree $Δ=\tildeΩ(\log n)$. For smaller $Δ$, we give a polylogarithmic-time $3Δ/2$-edge-coloring. These are the first deterministic algorithms to go below the natural barrier of $2Δ-1$ colors, and they improve significantly on the recent po…
▽ More
We present a deterministic distributed algorithm, in the LOCAL model, that computes a $(1+o(1))Δ$-edge-coloring in polylogarithmic-time, so long as the maximum degree $Δ=\tildeΩ(\log n)$. For smaller $Δ$, we give a polylogarithmic-time $3Δ/2$-edge-coloring. These are the first deterministic algorithms to go below the natural barrier of $2Δ-1$ colors, and they improve significantly on the recent polylogarithmic-time $(2Δ-1)(1+o(1))$-edge-coloring of Ghaffari and Su [SODA'17] and the $(2Δ-1)$-edge-coloring of Fischer, Ghaffari, and Kuhn [FOCS'17], positively answering the main open question of the latter. The key technical ingredient of our algorithm is a simple and novel gradual packing of judiciously chosen near-maximum matchings, each of which becomes one of the color classes.
△ Less
Submitted 15 November, 2017;
originally announced November 2017.
-
On Derandomizing Local Distributed Algorithms
Authors:
Mohsen Ghaffari,
David G. Harris,
Fabian Kuhn
Abstract:
The gap between the known randomized and deterministic local distributed algorithms underlies arguably the most fundamental and central open question in distributed graph algorithms. In this paper, we develop a generic and clean recipe for derandomizing LOCAL algorithms. We also exhibit how this simple recipe leads to significant improvements on a number of problem. Two main results are:
- An im…
▽ More
The gap between the known randomized and deterministic local distributed algorithms underlies arguably the most fundamental and central open question in distributed graph algorithms. In this paper, we develop a generic and clean recipe for derandomizing LOCAL algorithms. We also exhibit how this simple recipe leads to significant improvements on a number of problem. Two main results are:
- An improved distributed hypergraph maximal matching algorithm, improving on Fischer, Ghaffari, and Kuhn [FOCS'17], and giving improved algorithms for edge-coloring, maximum matching approximation, and low out-degree edge orientation. The first gives an improved algorithm for Open Problem 11.4 of the book of Barenboim and Elkin, and the last gives the first positive resolution of their Open Problem 11.10.
- An improved distributed algorithm for the Lovász Local Lemma, which gets closer to a conjecture of Chang and Pettie [FOCS'17], and moreover leads to improved distributed algorithms for problems such as defective coloring and $k$-SAT.
△ Less
Submitted 17 September, 2019; v1 submitted 6 November, 2017;
originally announced November 2017.
-
Strong convergence of the Euler--Maruyama approximation for a class of Lévy-driven SDEs
Authors:
Franziska Kühn,
René L. Schilling
Abstract:
Consider the following stochastic differential equation (SDE) $$dX_t = b(t,X_{t-}) \, dt+ dL_t, \quad X_0 = x,$$ driven by a $d$-dimensional Lévy process $(L_t)_{t \geq 0}$. We establish conditions on the Lévy process and the drift coefficient $b$ such that the Euler--Maruyama approximation converges strongly to a solution of the SDE with an explicitly given rate. The convergence rate depends on t…
▽ More
Consider the following stochastic differential equation (SDE) $$dX_t = b(t,X_{t-}) \, dt+ dL_t, \quad X_0 = x,$$ driven by a $d$-dimensional Lévy process $(L_t)_{t \geq 0}$. We establish conditions on the Lévy process and the drift coefficient $b$ such that the Euler--Maruyama approximation converges strongly to a solution of the SDE with an explicitly given rate. The convergence rate depends on the regularity of $b$ and the behaviour of the Lévy measure at the origin. As a by-product of the proof, we obtain that the SDE has a pathwise unique solution. Our result covers many important examples of Lévy processes, e.g. isotropic stable, relativistic stable, tempered stable and layered stable.
△ Less
Submitted 29 April, 2020; v1 submitted 11 September, 2017;
originally announced September 2017.
-
Nearest Common Ancestors: Universal Trees and Improved Labeling Schemes
Authors:
Fabian Kuhn,
Konstantinos Panagiotou,
Pascal Su
Abstract:
We investigate the nearest common ancestor (NCA) function in rooted trees. As the main conceptual contribution, the paper introduces universal trees for the NCA function: For a given family of rooted trees, an NCA-universal tree $S$ is a rooted tree such that any tree $T$ of the family can be embedded into $S$ such that the embedding of the NCA in $T$ of two nodes of $T$ is equal to the NCA in…
▽ More
We investigate the nearest common ancestor (NCA) function in rooted trees. As the main conceptual contribution, the paper introduces universal trees for the NCA function: For a given family of rooted trees, an NCA-universal tree $S$ is a rooted tree such that any tree $T$ of the family can be embedded into $S$ such that the embedding of the NCA in $T$ of two nodes of $T$ is equal to the NCA in $S$ of the embeddings of the two nodes.
As the main technical result we give explicit constructions of NCA-universal trees of size $n^{2.318}$ for the family of rooted $n$-vertex trees and of size $n^{1.894}$ for the family of rooted binary $n$-vertex trees. A direct consequence is the explicit construction of NCA-labeling schemes with labels of size $2.318\log_2 n$ and $1.894\log_2 n$ for the two families of rooted trees. This improves on the best known such labeling schemes established by Alstrup, Halvorsen and Larsen [SODA 2014].
△ Less
Submitted 27 July, 2017;
originally announced July 2017.
-
Improved Distributed Degree Splitting and Edge Coloring
Authors:
Mohsen Ghaffari,
Juho Hirvonen,
Fabian Kuhn,
Yannic Maus,
Jukka Suomela,
Jara Uitto
Abstract:
The degree splitting problem requires coloring the edges of a graph red or blue such that each node has almost the same number of edges in each color, up to a small additive discrepancy. The directed variant of the problem requires orienting the edges such that each node has almost the same number of incoming and outgoing edges, again up to a small additive discrepancy.
We present deterministic…
▽ More
The degree splitting problem requires coloring the edges of a graph red or blue such that each node has almost the same number of edges in each color, up to a small additive discrepancy. The directed variant of the problem requires orienting the edges such that each node has almost the same number of incoming and outgoing edges, again up to a small additive discrepancy.
We present deterministic distributed algorithms for both variants, which improve on their counterparts presented by Ghaffari and Su [SODA'17]: our algorithms are significantly simpler and faster, and have a much smaller discrepancy. This also leads to a faster and simpler deterministic algorithm for $(2+o(1))Δ$-edge-coloring, improving on that of Ghaffari and Su.
△ Less
Submitted 3 January, 2019; v1 submitted 15 June, 2017;
originally announced June 2017.
-
On Martingale Problems and Feller Processes
Authors:
Franziska Kühn
Abstract:
Let $A$ be a pseudo-differential operator with negative definite symbol $q$. In this paper we establish a sufficient condition such that the well-posedness of the $(A,C_c^{\infty}(\mathbb{R}^d))$-martingale problem implies that the unique solution to the martingale problem is a Feller process. This provides a proof of a former claim by van Casteren. As an application we prove new existence and uni…
▽ More
Let $A$ be a pseudo-differential operator with negative definite symbol $q$. In this paper we establish a sufficient condition such that the well-posedness of the $(A,C_c^{\infty}(\mathbb{R}^d))$-martingale problem implies that the unique solution to the martingale problem is a Feller process. This provides a proof of a former claim by van Casteren. As an application we prove new existence and uniqueness results for Lévy-driven stochastic differential equations and stable-like processes with unbounded coefficients.
△ Less
Submitted 13 June, 2017;
originally announced June 2017.
-
Dynamic Analysis of the Arrow Distributed Directory Protocol in General Networks
Authors:
Abdolhamid Ghodselahi,
Fabian Kuhn
Abstract:
The Arrow protocol is a simple and elegant protocol to coordinate exclusive access to a shared object in a network. The protocol solves the underlying distributed queueing problem by using path reversal on a pre-computed spanning tree (or any other tree topology simulated on top of the given network).
It is known that the Arrow protocol solves the problem with a competitive ratio of O(log D) on…
▽ More
The Arrow protocol is a simple and elegant protocol to coordinate exclusive access to a shared object in a network. The protocol solves the underlying distributed queueing problem by using path reversal on a pre-computed spanning tree (or any other tree topology simulated on top of the given network).
It is known that the Arrow protocol solves the problem with a competitive ratio of O(log D) on trees of diameter D. This implies a distributed queueing algorithm with competitive ratio O(s*log D) for general networks with a spanning tree of diameter D and stretch s. In this work we show that when running the Arrow protocol on top of the well-known probabilistic tree embedding of Fakcharoenphol, Rao, and Talwar [STOC 03], we obtain a randomized distributed queueing algorithm with a competitive ratio of O(log n) even on general network topologies. The result holds even if the queueing requests occur in an arbitrarily dynamic and concurrent fashion and even if communication is asynchronous. From a technical point of view, the main of the paper shows that the competitive ratio of the Arrow protocol is constant on a special family of tree topologies, known as hierarchically well separated trees.
△ Less
Submitted 20 May, 2017;
originally announced May 2017.
-
Random time changes of Feller processes
Authors:
Franziska Kühn
Abstract:
We show that the SDE $dX_t = σ(X_{t-}) \, dL_t$, $X_0 \sim μ$ driven by a one-dimensional symnmetric $α$-stable Lévy process $(L_t)_{t \geq 0}$, $α\in (0,2]$, has a unique weak solution for any continuous function $σ: \mathbb{R} \to (0,\infty)$ which grows at most linearly. Our approach relies on random time changes of Feller processes. We study under which assumptions the random-time change of a…
▽ More
We show that the SDE $dX_t = σ(X_{t-}) \, dL_t$, $X_0 \sim μ$ driven by a one-dimensional symnmetric $α$-stable Lévy process $(L_t)_{t \geq 0}$, $α\in (0,2]$, has a unique weak solution for any continuous function $σ: \mathbb{R} \to (0,\infty)$ which grows at most linearly. Our approach relies on random time changes of Feller processes. We study under which assumptions the random-time change of a Feller process is a conservative $C_b$-Feller process and prove the existence of a class of Feller processes with decomposable symbols. In particular, we establish new existence results for Feller processes with unbounded coefficients. As a by-product, we obtain a sufficient condition in terms of the symbol of a Feller process $(X_t)_{t \geq 0}$ for the perpetual integral $\int_{(0,\infty)} f(X_{s}) \, ds$ to be infinite almost surely.
△ Less
Submitted 7 February, 2018; v1 submitted 8 May, 2017;
originally announced May 2017.
-
Deterministic Distributed Edge-Coloring via Hypergraph Maximal Matching
Authors:
Manuela Fischer,
Mohsen Ghaffari,
Fabian Kuhn
Abstract:
We present a deterministic distributed algorithm that computes a $(2Δ-1)$-edge-coloring, or even list-edge-coloring, in any $n$-node graph with maximum degree $Δ$, in $O(\log^7 Δ\log n)$ rounds. This answers one of the long-standing open questions of \emph{distributed graph algorithms} from the late 1980s, which asked for a polylogarithmic-time algorithm. See, e.g., Open Problem 4 in the Distribut…
▽ More
We present a deterministic distributed algorithm that computes a $(2Δ-1)$-edge-coloring, or even list-edge-coloring, in any $n$-node graph with maximum degree $Δ$, in $O(\log^7 Δ\log n)$ rounds. This answers one of the long-standing open questions of \emph{distributed graph algorithms} from the late 1980s, which asked for a polylogarithmic-time algorithm. See, e.g., Open Problem 4 in the Distributed Graph Coloring book of Barenboim and Elkin. The previous best round complexities were $2^{O(\sqrt{\log n})}$ by Panconesi and Srinivasan [STOC'92] and $\tilde{O}(\sqrtΔ) + O(\log^* n)$ by Fraigniaud, Heinrich, and Kosowski [FOCS'16]. A corollary of our deterministic list-edge-coloring also improves the randomized complexity of $(2Δ-1)$-edge-coloring to poly$(\log\log n)$ rounds.
The key technical ingredient is a deterministic distributed algorithm for \emph{hypergraph maximal matching}, which we believe will be of interest beyond this result. In any hypergraph of rank $r$ --- where each hyperedge has at most $r$ vertices --- with $n$ nodes and maximum degree $Δ$, this algorithm computes a maximal matching in $O(r^5 \log^{6+\log r } Δ\log n)$ rounds.
This hypergraph matching algorithm and its extensions lead to a number of other results. In particular, a polylogarithmic-time deterministic distributed maximal independent set algorithm for graphs with bounded neighborhood independence, hence answering Open Problem 5 of Barenboim and Elkin's book, a $((\log Δ/\varepsilon)^{O(\log (1/\varepsilon))})$-round deterministic algorithm for $(1+\varepsilon)$-approximation of maximum matching, and a quasi-polylogarithmic-time deterministic distributed algorithm for orienting $λ$-arboricity graphs with out-degree at most $(1+\varepsilon)λ$, for any constant $\varepsilon>0$, hence partially answering Open Problem 10 of Barenboim and Elkin's book.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.
-
Communication Primitives in Cognitive Radio Networks
Authors:
Seth Gilbert,
Fabian Kuhn,
Chaodong Zheng
Abstract:
Cognitive radio networks are a new type of multi-channel wireless network in which different nodes can have access to different sets of channels. By providing multiple channels, they improve the efficiency and reliability of wireless communication. However, the heterogeneous nature of cognitive radio networks also brings new challenges to the design and analysis of distributed algorithms.
In thi…
▽ More
Cognitive radio networks are a new type of multi-channel wireless network in which different nodes can have access to different sets of channels. By providing multiple channels, they improve the efficiency and reliability of wireless communication. However, the heterogeneous nature of cognitive radio networks also brings new challenges to the design and analysis of distributed algorithms.
In this paper, we focus on two fundamental problems in cognitive radio networks: neighbor discovery, and global broadcast. We consider a network containing $n$ nodes, each of which has access to $c$ channels. We assume the network has diameter $D$, and each pair of neighbors have at least $k\geq 1$, and at most $k_{max}\leq c$, shared channels. We also assume each node has at most $Δ$ neighbors. For the neighbor discovery problem, we design a randomized algorithm CSeek which has time complexity $\tilde{O}((c^2/k)+(k_{max}/k)\cdotΔ)$. CSeek is flexible and robust, which allows us to use it as a generic "filter" to find "well-connected" neighbors with an even shorter running time. We then move on to the global broadcast problem, and propose CGCast, a randomized algorithm which takes $\tilde{O}((c^2/k)+(k_{max}/k)\cdotΔ+D\cdotΔ)$ time. CGCast uses CSeek to achieve communication among neighbors, and uses edge coloring to establish an efficient schedule for fast message dissemination.
Towards the end of the paper, we give lower bounds for solving the two problems. These lower bounds demonstrate that in many situations, CSeek and CGCast are near optimal.
△ Less
Submitted 17 March, 2017;
originally announced March 2017.
-
Transition probabilities of Lévy-type processes: Parametrix construction
Authors:
Franziska Kühn
Abstract:
We present an existence result for Lévy-type processes which requires only weak regularity assumptions on the symbol $q(x,ξ)$ with respect to the space variable $x$. Applications range from existence and uniqueness results for Lévy-driven SDEs with Hölder continuous coefficients to existence results for stable-like processes and Lévy-type processes with symbols of variable order. Moreover, we obta…
▽ More
We present an existence result for Lévy-type processes which requires only weak regularity assumptions on the symbol $q(x,ξ)$ with respect to the space variable $x$. Applications range from existence and uniqueness results for Lévy-driven SDEs with Hölder continuous coefficients to existence results for stable-like processes and Lévy-type processes with symbols of variable order. Moreover, we obtain heat kernel estimates for a class of Lévy and Lévy-type processes. The paper includes an extensive list of Lévy(-type) processes satisfying the assumptions of our results.
△ Less
Submitted 28 February, 2017; v1 submitted 2 February, 2017;
originally announced February 2017.
-
On the Complexity of Local Distributed Graph Problems
Authors:
Mohsen Ghaffari,
Fabian Kuhn,
Yannic Maus
Abstract:
This paper is centered on the complexity of graph problems in the well-studied LOCAL model of distributed computing, introduced by Linial [FOCS '87]. It is widely known that for many of the classic distributed graph problems (including maximal independent set (MIS) and $(Δ+1)$-vertex coloring), the randomized complexity is at most polylogarithmic in the size $n$ of the network, while the best dete…
▽ More
This paper is centered on the complexity of graph problems in the well-studied LOCAL model of distributed computing, introduced by Linial [FOCS '87]. It is widely known that for many of the classic distributed graph problems (including maximal independent set (MIS) and $(Δ+1)$-vertex coloring), the randomized complexity is at most polylogarithmic in the size $n$ of the network, while the best deterministic complexity is typically $2^{O(\sqrt{\log n})}$. Understanding and narrowing down this exponential gap is considered to be one of the central long-standing open questions in the area of distributed graph algorithms. We investigate the problem by introducing a complexity-theoretic framework that allows us to shed some light on the role of randomness in the LOCAL model. We define the SLOCAL model as a sequential version of the LOCAL model. Our framework allows us to prove completeness results with respect to the class of problems which can be solved efficiently in the SLOCAL model, implying that if any of the complete problems can be solved deterministically in $\log^{O(1)} n$ rounds in the LOCAL model, we can deterministically solve all efficient SLOCAL-problems (including MIS and $(Δ+1)$-coloring) in $\log^{O(1)} n$ rounds in the LOCAL model. We show that a rather rudimentary looking graph coloring problem is complete in the above sense: Color the nodes of a graph with colors red and blue such that each node of sufficiently large polylogarithmic degree has at least one neighbor of each color. The problem admits a trivial zero-round randomized solution. The result can be viewed as showing that the only obstacle to getting efficient determinstic algorithms in the LOCAL model is an efficient algorithm to approximately round fractional values into integer values.
△ Less
Submitted 28 October, 2017; v1 submitted 8 November, 2016;
originally announced November 2016.
-
On the domain of fractional Laplacians and related generators of Feller processes
Authors:
Franziska Kühn,
René L. Schilling
Abstract:
In this paper we study the domain of stable processes, stable-like processes and more general pseudo- and integro-differential operators which naturally arise both in analysis and as infinitesimal generators of Lévy- and Lévy-type (Feller) processes. In particular we obtain conditions on the symbol of the operator ensuring that certain (variable order) Hölder and Hölder-Zygmund spaces are in the d…
▽ More
In this paper we study the domain of stable processes, stable-like processes and more general pseudo- and integro-differential operators which naturally arise both in analysis and as infinitesimal generators of Lévy- and Lévy-type (Feller) processes. In particular we obtain conditions on the symbol of the operator ensuring that certain (variable order) Hölder and Hölder-Zygmund spaces are in the domain. We use tools from probability theory to investigate the small-time asymptotics of the generalized moments of a Lévy or Lévy-type process $(X_t)_{t \geq 0}$, \begin{equation*}
\lim_{t \to 0} \frac 1t\left(\mathbb{E}^x f(X_t)-f(x)\right), \quad x\in\mathbb{R}^d, \end{equation*} for functions $f$ which are not necessarily bounded or differentiable. The pointwise limit exists for fixed $x \in \mathbb{R}^d$ if $f$ satisfies a Hölder condition at $x$. Moreover, we give sufficient conditions which ensure that the limit exists uniformly in the space of continuous functions vanishing at infinity. As an application we prove that the domain of the generator of $(X_t)_{t \geq 0}$ contains certain Hölder spaces of variable order. Our results apply, in particular, to stable-like processes, relativistic stable-like processes, solutions of Lévy-driven SDEs and Lévy processes.
△ Less
Submitted 20 December, 2018; v1 submitted 26 October, 2016;
originally announced October 2016.
-
Multi-Message Broadcast in Dynamic Radio Networks
Authors:
Mohamad Ahmadi,
Fabian Kuhn
Abstract:
We continue the recent line of research studying information dissemination problems in adversarial dynamic radio networks. We give two generic algorithms which allow to transform generalized version of single-message broadcast algorithms into multi-message broadcast algorithms. Based on these generic algorithms, we obtain multi-message broadcast algorithms for dynamic radio networks for a number o…
▽ More
We continue the recent line of research studying information dissemination problems in adversarial dynamic radio networks. We give two generic algorithms which allow to transform generalized version of single-message broadcast algorithms into multi-message broadcast algorithms. Based on these generic algorithms, we obtain multi-message broadcast algorithms for dynamic radio networks for a number of different dynamic network settings. For one of the modeling assumptions, our algorithms are complemented by a lower bound which shows that the upper bound is close to optimal.
△ Less
Submitted 10 October, 2016;
originally announced October 2016.
-
Solutions of Lévy-driven SDEs with unbounded coefficients as Feller processes
Authors:
Franziska Kühn
Abstract:
Let $(L_t)_{t \geq 0}$ be a $k$-dimensional Lévy process and $σ: \mathbb{R}^d \to \mathbb{R}^{d \times k}$ a continuous function such that the Lévy-driven stochastic differential equation (SDE) $$dX_t = σ(X_{t-}) \, dL_t, \qquad X_0 \sim μ$$ has a unique weak solution. We show that the solution is a Feller process whose domain of the generator contains the smooth functions with compact support if,…
▽ More
Let $(L_t)_{t \geq 0}$ be a $k$-dimensional Lévy process and $σ: \mathbb{R}^d \to \mathbb{R}^{d \times k}$ a continuous function such that the Lévy-driven stochastic differential equation (SDE) $$dX_t = σ(X_{t-}) \, dL_t, \qquad X_0 \sim μ$$ has a unique weak solution. We show that the solution is a Feller process whose domain of the generator contains the smooth functions with compact support if, and only if, the Lévy measure $ν$ of the driving Lévy process $(L_t)_{t \geq 0}$ satisfies $$ν(\{y \in \mathbb{R}^k; |σ(x)y+x|<r\}) \xrightarrow[]{|x| \to \infty} 0.$$
△ Less
Submitted 10 May, 2017; v1 submitted 7 October, 2016;
originally announced October 2016.
-
Polynomial Lower Bound for Distributed Graph Coloring in a Weak LOCAL Model
Authors:
Dan Hefetz,
Fabian Kuhn,
Yannic Maus,
Angelika Steger
Abstract:
We show an $Ω\big(Δ^{\frac{1}{3}-\fracη{3}}\big)$ lower bound on the runtime of any deterministic distributed $\mathcal{O}\big(Δ^{1+η}\big)$-graph coloring algorithm in a weak variant of the \LOCAL\ model.
In particular, given a network graph \mbox{$G=(V,E)$}, in the weak \LOCAL\ model nodes communicate in synchronous rounds and they can use unbounded local computation. We assume that the nodes…
▽ More
We show an $Ω\big(Δ^{\frac{1}{3}-\fracη{3}}\big)$ lower bound on the runtime of any deterministic distributed $\mathcal{O}\big(Δ^{1+η}\big)$-graph coloring algorithm in a weak variant of the \LOCAL\ model.
In particular, given a network graph \mbox{$G=(V,E)$}, in the weak \LOCAL\ model nodes communicate in synchronous rounds and they can use unbounded local computation. We assume that the nodes have no identifiers, but that instead, the computation starts with an initial valid vertex coloring. A node can \textbf{broadcast} a \textbf{single} message of \textbf{unbounded} size to its neighbors and receives the \textbf{set of messages} sent to it by its neighbors. That is, if two neighbors of a node $v\in V$ send the same message to $v$, $v$ will receive this message only a single time; without any further knowledge, $v$ cannot know whether a received message was sent by only one or more than one neighbor.
Neighborhood graphs have been essential in the proof of lower bounds for distributed coloring algorithms, e.g., \cite{linial92,Kuhn2006On}. Our proof analyzes the recursive structure of the neighborhood graph of the respective model to devise an $Ω\big(Δ^{\frac{1}{3}-\fracη{3}}\big)$ lower bound on the runtime for any deterministic distributed $\mathcal{O}\big(Δ^{1+η}\big)$-graph coloring algorithm.
Furthermore, we hope that the proof technique improves the understanding of neighborhood graphs in general and that it will help towards finding a lower (runtime) bound for distributed graph coloring in the standard \LOCAL\ model. Our proof technique works for one-round algorithms in the standard \LOCAL\ model and provides a simpler and more intuitive proof for an existing $Ω(Δ^2)$ lower bound.
△ Less
Submitted 14 September, 2016; v1 submitted 18 July, 2016;
originally announced July 2016.
-
The Cost of Global Broadcast in Dynamic Radio Networks
Authors:
Mohamad Ahmadi,
Abdolhamid Ghodselahi,
Fabian Kuhn,
Anisur Rahaman Molla
Abstract:
We study the single-message broadcast problem in dynamic radio networks. We show that the time complexity of the problem depends on the amount of stability and connectivity of the dynamic network topology and on the adaptiveness of the adversary providing the dynamic topology. More formally, we model communication using the standard graph-based radio network model. To model the dynamic network, we…
▽ More
We study the single-message broadcast problem in dynamic radio networks. We show that the time complexity of the problem depends on the amount of stability and connectivity of the dynamic network topology and on the adaptiveness of the adversary providing the dynamic topology. More formally, we model communication using the standard graph-based radio network model. To model the dynamic network, we use a generalization of the synchronous dynamic graph model introduced in [Kuhn et al., STOC 2010]. For integer parameters $T\geq 1$ and $k\geq 1$, we call a dynamic graph $T$-interval $k$-connected if for every interval of $T$ consecutive rounds, there exists a $k$-vertex-connected stable subgraph. Further, for an integer parameter $τ\geq 0$, we say that the adversary providing the dynamic network is $τ$-oblivious if for constructing the graph of some round $t$, the adversary has access to all the randomness (and states) of the algorithm up to round $t-τ$.
As our main result, we show that for any $T\geq 1$, any $k\geq 1$, and any $τ\geq 1$, for a $τ$-oblivious adversary, there is a distributed algorithm to broadcast a single message in time $O\big(\big(1+\frac{n}{k\cdot\min\left\{τ,T\right\}}\big)\cdot n\log^3 n\big)$. We further show that even for large interval $k$-connectivity, efficient broadcast is not possible for the usual adaptive adversaries. For a $1$-oblivious adversary, we show that even for any $T\leq (n/k)^{1-\varepsilon}$ (for any constant $\varepsilon>0$) and for any $k\geq 1$, global broadcast in $T$-interval $k$-connected networks requires at least $Ω(n^2/(k^2\log n))$ time. Further, for a $0$ oblivious adversary, broadcast cannot be solved in $T$-interval $k$-connected networks as long as $T<n-k$.
△ Less
Submitted 8 January, 2016;
originally announced January 2016.
-
Near-Optimal Distributed Maximum Flow
Authors:
Mohsen Ghaffari,
Andreas Karrenbauer,
Fabian Kuhn,
Christoph Lenzen,
Boaz Patt-Shamir
Abstract:
We present a near-optimal distributed algorithm for $(1+o(1))$-approximation of single-commodity maximum flow in undirected weighted networks that runs in $(D+ \sqrt{n})\cdot n^{o(1)}$ communication rounds in the \Congest model. Here, $n$ and $D$ denote the number of nodes and the network diameter, respectively. This is the first improvement over the trivial bound of $O(n^2)$, and it nearly matche…
▽ More
We present a near-optimal distributed algorithm for $(1+o(1))$-approximation of single-commodity maximum flow in undirected weighted networks that runs in $(D+ \sqrt{n})\cdot n^{o(1)}$ communication rounds in the \Congest model. Here, $n$ and $D$ denote the number of nodes and the network diameter, respectively. This is the first improvement over the trivial bound of $O(n^2)$, and it nearly matches the $\tildeΩ(D+ \sqrt{n})$ round complexity lower bound.
The development of the algorithm contains two results of independent interest:
(i) A $(D+\sqrt{n})\cdot n^{o(1)}$-round distributed construction of a spanning tree of average stretch $n^{o(1)}$.
(ii) A $(D+\sqrt{n})\cdot n^{o(1)}$-round distributed construction of an $n^{o(1)}$-congestion approximator consisting of the cuts induced by $O(\log n)$ virtual trees. The distributed representation of the cut approximator allows for evaluation in $(D+\sqrt{n})\cdot n^{o(1)}$ rounds.
All our algorithms make use of randomization and succeed with high probability.
△ Less
Submitted 19 August, 2015;
originally announced August 2015.
-
Tight Bounds for MIS in Multichannel Radio Networks
Authors:
Sebastian Daum,
Fabian Kuhn
Abstract:
Daum et al. [PODC'13] presented an algorithm that computes a maximal independent set (MIS) within $O(\log^2 n/F+\log n \mathrm{polyloglog} n)$ rounds in an $n$-node multichannel radio network with $F$ communication channels. The paper uses a multichannel variant of the standard graph-based radio network model without collision detection and it assumes that the network graph is a polynomially bound…
▽ More
Daum et al. [PODC'13] presented an algorithm that computes a maximal independent set (MIS) within $O(\log^2 n/F+\log n \mathrm{polyloglog} n)$ rounds in an $n$-node multichannel radio network with $F$ communication channels. The paper uses a multichannel variant of the standard graph-based radio network model without collision detection and it assumes that the network graph is a polynomially bounded independence graph (BIG), a natural combinatorial generalization of well-known geographic families. The upper bound of that paper is known to be optimal up to a polyloglog factor.
In this paper, we adapt algorithm and analysis to improve the result in two ways. Mainly, we get rid of the polyloglog factor in the runtime and we thus obtain an asymptotically optimal multichannel radio network MIS algorithm. In addition, our new analysis allows to generalize the class of graphs from those with polynomially bounded local independence to graphs where the local independence is bounded by an arbitrary function of the neighborhood radius.
△ Less
Submitted 18 August, 2015;
originally announced August 2015.
-
Existence and estimates of moments for Lévy-type processes
Authors:
Franziska Kühn
Abstract:
In this paper, we establish the existence of moments and moment estimates for Lévy-type processes. We discuss whether the existence of moments is a time dependent distributional property, give sufficient conditions for the existence of moments and prove estimates of fractional moments. Our results apply in particular to SDEs and stable-like processes.
In this paper, we establish the existence of moments and moment estimates for Lévy-type processes. We discuss whether the existence of moments is a time dependent distributional property, give sufficient conditions for the existence of moments and prove estimates of fractional moments. Our results apply in particular to SDEs and stable-like processes.
△ Less
Submitted 27 October, 2016; v1 submitted 28 July, 2015;
originally announced July 2015.
-
Rumor Spreading with Bounded In-Degree
Authors:
Sebastian Daum,
Fabian Kuhn,
Yannic Maus
Abstract:
In the classic gossip-based model of communication for disseminating information in a network, in each time unit, every node $u$ is allowed to contact a single random neighbor $v$. If $u$ knows the data (rumor) to be disseminated, it disperses it to $v$ (known as PUSH) and if it does not, it requests it from $v$ (known as PULL). While in the classic gossip model, each node is only allowed to conta…
▽ More
In the classic gossip-based model of communication for disseminating information in a network, in each time unit, every node $u$ is allowed to contact a single random neighbor $v$. If $u$ knows the data (rumor) to be disseminated, it disperses it to $v$ (known as PUSH) and if it does not, it requests it from $v$ (known as PULL). While in the classic gossip model, each node is only allowed to contact a single neighbor in each time unit, each node can possibly be contacted by many neighboring nodes.
In the present paper, we consider a restricted model where at each node only one incoming request can be served. As long as only a single piece of information needs to be disseminated, this does not make a difference for push requests. It however has a significant effect on pull requests. In the paper, we therefore concentrate on this weaker pull version, which we call 'restricted pull'.
We distinguish two versions of the restricted pull protocol depending on whether the request to be served among a set of pull requests at a given node is chosen adversarially or uniformly at random. As a first result, we prove an exponential separation between the two variants. We show that there are instances where if an adversary picks the request to be served, the restricted pull protocol requires a polynomial number of rounds whereas if the winning request is chosen uniformly at random, the restricted pull protocol only requires a polylogarithmic number of rounds to inform the whole network. Further, as the main technical contribution, we show that if the request to be served is chosen randomly, the slowdown of using restricted pull versus using the classic pull protocol can w.h.p. be upper bounded by $O(Δ/ δ\log n)$, where $Δ$ and $δ$ are the largest and smallest degree of the network.
△ Less
Submitted 22 September, 2015; v1 submitted 2 June, 2015;
originally announced June 2015.
-
Moderate deviations and Strassen's law for additive processes
Authors:
Franziska Kühn,
René L. Schilling
Abstract:
We establish a moderate deviation principle for processes with independent increments under certain growth conditions for the characteristics of the process. Using this moderate deviation principle, we give a new proof for Strassen's functional law of the iterated logarithm. In particular, we show that any square-integrable Lévy process satisfies Strassen's law.
We establish a moderate deviation principle for processes with independent increments under certain growth conditions for the characteristics of the process. Using this moderate deviation principle, we give a new proof for Strassen's functional law of the iterated logarithm. In particular, we show that any square-integrable Lévy process satisfies Strassen's law.
△ Less
Submitted 13 October, 2014; v1 submitted 27 June, 2014;
originally announced June 2014.
-
Toward Online Mobile Facility Location on General Metrics
Authors:
Abdolhamid Ghodselahi,
Fabian Kuhn
Abstract:
We introduce an online variant of mobile facility location (MFL) (introduced by Demaine et al. [SODA' 07]). We call this new problem online mobile facility location (OMFL). In the OMFL problem, initially, we are given a set of $k$ mobile facilities with their starting locations. One by one, requests are added. After each request arrives, one can make some changes to the facility locations before t…
▽ More
We introduce an online variant of mobile facility location (MFL) (introduced by Demaine et al. [SODA' 07]). We call this new problem online mobile facility location (OMFL). In the OMFL problem, initially, we are given a set of $k$ mobile facilities with their starting locations. One by one, requests are added. After each request arrives, one can make some changes to the facility locations before the subsequent request arrives. Each request is always assigned to the nearest facility. The cost of this assignment is the distance from the request to the facility. The objective is to minimize the total cost, which consists of the relocation cost of facilities and the distance cost of requests to their nearest facilities.
We provide a lower bound for the OMFL problem that even holds on uniform metrics. A natural approach to solve the OMFL problem for general metric spaces is to utilize hierarchically well-separated trees (HSTs) and directly solve the OMFL problem on HSTs. In this paper, we provide the first step in this direction by solving a generalized variant of the OMFL problem on uniform metrics that we call G-OMFL. We devise a simple deterministic online algorithm and provide a tight analysis for the algorithm. The second step remains an open question. Inspired by the $k$-server problem, we introduce a new variant of the OMFL problem that focuses solely on minimizing movement cost. We refer to this variant as M-OMFL. Additionally, we provide a lower bound for M-OMFL that is applicable even on uniform metrics.
△ Less
Submitted 12 October, 2023; v1 submitted 22 April, 2014;
originally announced April 2014.
-
Distributed Connectivity Decomposition
Authors:
Keren Censor-Hillel,
Mohsen Ghaffari,
Fabian Kuhn
Abstract:
We present time-efficient distributed algorithms for decomposing graphs with large edge or vertex connectivity into multiple spanning or dominating trees, respectively. As their primary applications, these decompositions allow us to achieve information flow with size close to the connectivity by parallelizing it along the trees. More specifically, our distributed decomposition algorithms are as fo…
▽ More
We present time-efficient distributed algorithms for decomposing graphs with large edge or vertex connectivity into multiple spanning or dominating trees, respectively. As their primary applications, these decompositions allow us to achieve information flow with size close to the connectivity by parallelizing it along the trees. More specifically, our distributed decomposition algorithms are as follows:
(I) A decomposition of each undirected graph with vertex-connectivity $k$ into (fractionally) vertex-disjoint weighted dominating trees with total weight $Ω(\frac{k}{\log n})$, in $\widetilde{O}(D+\sqrt{n})$ rounds.
(II) A decomposition of each undirected graph with edge-connectivity $λ$ into (fractionally) edge-disjoint weighted spanning trees with total weight $\lceil\frac{λ-1}{2}\rceil(1-\varepsilon)$, in $\widetilde{O}(D+\sqrt{nλ})$ rounds.
We also show round complexity lower bounds of $\tildeΩ(D+\sqrt{\frac{n}{k}})$ and $\tildeΩ(D+\sqrt{\frac{n}λ})$ for the above two decompositions, using techniques of [Das Sarma et al., STOC'11]. Moreover, our vertex-connectivity decomposition extends to centralized algorithms and improves the time complexity of [Censor-Hillel et al., SODA'14] from $O(n^3)$ to near-optimal $\tilde{O}(m)$.
As corollaries, we also get distributed oblivious routing broadcast with $O(1)$-competitive edge-congestion and $O(\log n)$-competitive vertex-congestion. Furthermore, the vertex connectivity decomposition leads to near-time-optimal $O(\log n)$-approximation of vertex connectivity: centralized $\widetilde{O}(m)$ and distributed $\tilde{O}(D+\sqrt{n})$. The former moves toward the 1974 conjecture of Aho, Hopcroft, and Ullman postulating an $O(m)$ centralized exact algorithm while the latter is the first distributed vertex connectivity approximation.
△ Less
Submitted 21 November, 2013;
originally announced November 2013.
-
Distributed Minimum Cut Approximation
Authors:
Mohsen Ghaffari,
Fabian Kuhn
Abstract:
We study the problem of computing approximate minimum edge cuts by distributed algorithms. We use a standard synchronous message passing model where in each round, $O(\log n)$ bits can be transmitted over each edge (a.k.a. the CONGEST model). We present a distributed algorithm that, for any weighted graph and any $ε\in (0, 1)$, with high probability finds a cut of size at most $O(ε^{-1}λ)$ in…
▽ More
We study the problem of computing approximate minimum edge cuts by distributed algorithms. We use a standard synchronous message passing model where in each round, $O(\log n)$ bits can be transmitted over each edge (a.k.a. the CONGEST model). We present a distributed algorithm that, for any weighted graph and any $ε\in (0, 1)$, with high probability finds a cut of size at most $O(ε^{-1}λ)$ in $O(D) + \tilde{O}(n^{1/2 + ε})$ rounds, where $λ$ is the size of the minimum cut. This algorithm is based on a simple approach for analyzing random edge sampling, which we call the random layering technique. In addition, we also present another distributed algorithm, which is based on a centralized algorithm due to Matula [SODA '93], that with high probability computes a cut of size at most $(2+ε)λ$ in $\tilde{O}((D+\sqrt{n})/ε^5)$ rounds for any $ε>0$.
The time complexities of both of these algorithms almost match the $\tildeΩ(D + \sqrt{n})$ lower bound of Das Sarma et al. [STOC '11], thus leading to an answer to an open question raised by Elkin [SIGACT-News '04] and Das Sarma et al. [STOC '11].
Furthermore, we also strengthen the lower bound of Das Sarma et al. by extending it to unweighted graphs. We show that the same lower bound also holds for unweighted multigraphs (or equivalently for weighted graphs in which $O(w\log n)$ bits can be transmitted in each round over an edge of weight $w$), even if the diameter is $D=O(\log n)$. For unweighted simple graphs, we show that even for networks of diameter $\tilde{O}(\frac{1}λ\cdot \sqrt{\frac{n}{αλ}})$, finding an $α$-approximate minimum cut in networks of edge connectivity $λ$ or computing an $α$-approximation of the edge connectivity requires $\tildeΩ(D + \sqrt{\frac{n}{αλ}})$ rounds.
△ Less
Submitted 20 November, 2013; v1 submitted 23 May, 2013;
originally announced May 2013.
-
A New Perspective on Vertex Connectivity
Authors:
Keren Censor-Hillel,
Mohsen Ghaffari,
Fabian Kuhn
Abstract:
Edge connectivity and vertex connectivity are two fundamental concepts in graph theory. Although by now there is a good understanding of the structure of graphs based on their edge connectivity, our knowledge in the case of vertex connectivity is much more limited. An essential tool in capturing edge connectivity are edge-disjoint spanning trees. The famous results of Tutte and Nash-Williams show…
▽ More
Edge connectivity and vertex connectivity are two fundamental concepts in graph theory. Although by now there is a good understanding of the structure of graphs based on their edge connectivity, our knowledge in the case of vertex connectivity is much more limited. An essential tool in capturing edge connectivity are edge-disjoint spanning trees. The famous results of Tutte and Nash-Williams show that a graph with edge connectivity $λ$ contains $\floor{λ/2}$ edge-disjoint spanning trees.
We present connected dominating set (CDS) partition and packing as tools that are analogous to edge-disjoint spanning trees and that help us to better grasp the structure of graphs based on their vertex connectivity. The objective of the CDS partition problem is to partition the nodes of a graph into as many connected dominating sets as possible. The CDS packing problem is the corresponding fractional relaxation, where CDSs are allowed to overlap as long as this is compensated by assigning appropriate weights. CDS partition and CDS packing can be viewed as the counterparts of the well-studied edge-disjoint spanning trees, focusing on vertex disjointedness rather than edge disjointness.
We constructively show that every $k$-vertex-connected graph with $n$ nodes has a CDS packing of size $Ω(k/\log n)$ and a CDS partition of size $Ω(k/\log^5 n)$. We prove that the $Ω(k/\log n)$ CDS packing bound is existentially optimal.
Using CDS packing, we show that if vertices of a $k$-vertex-connected graph are independently sampled with probability $p$, then the graph induced by the sampled vertices has vertex connectivity $\tildeΩ(kp^2)$. Moreover, using our $Ω(k/\log n)$ CDS packing, we get a store-and-forward broadcast algorithm with optimal throughput in the networking model where in each round, each node can send one bounded-size message to all its neighbors.
△ Less
Submitted 16 April, 2013;
originally announced April 2013.
-
Precise measurement of the absolute fluorescence yield of the 337 nm band in atmospheric gases
Authors:
AIRFLY Collaboration,
M. Ave,
M. Bohacova,
E. Curry,
P. Di Carlo,
C. Di Giulio,
P. Facal San Luis,
D. Gonzales,
C. Hojvat,
J. Hörandel,
M. Hrabovsky,
M. Iarlori,
B. Keilhauer,
H. Klages,
M. Kleifges,
F. Kuehn,
S. Li,
M. Monasor,
L. Nozka,
M. Palatka,
S. Petrera,
P. Privitera,
J. Ridky,
V. Rizi,
B. Rouille D'Orfeuil
, et al. (7 additional authors not shown)
Abstract:
A measurement of the absolute fluorescence yield of the 337 nm nitrogen band, relevant to ultra-high energy cosmic ray (UHECR) detectors, is reported. Two independent calibrations of the fluorescence emission induced by a 120 GeV proton beam were employed: Cherenkov light from the beam particle and calibrated light from a nitrogen laser. The fluorescence yield in air at a pressure of 1013 hPa and…
▽ More
A measurement of the absolute fluorescence yield of the 337 nm nitrogen band, relevant to ultra-high energy cosmic ray (UHECR) detectors, is reported. Two independent calibrations of the fluorescence emission induced by a 120 GeV proton beam were employed: Cherenkov light from the beam particle and calibrated light from a nitrogen laser. The fluorescence yield in air at a pressure of 1013 hPa and temperature of 293 K was found to be $Y_{337} = 5.61\pm 0.06_{stat} \pm 0.21_{syst}$ photons/MeV. When compared to the fluorescence yield currently used by UHECR experiments, this measurement improves the uncertainty by a factor of three, and has a significant impact on the determination of the energy scale of the cosmic ray spectrum.
△ Less
Submitted 24 October, 2012;
originally announced October 2012.
-
Lower Bounds on Information Dissemination in Dynamic Networks
Authors:
Bernhard Haeupler,
Fabian Kuhn
Abstract:
We study lower bounds on information dissemination in adversarial dynamic networks. Initially, k pieces of information (henceforth called tokens) are distributed among n nodes. The tokens need to be broadcast to all nodes through a synchronous network in which the topology can change arbitrarily from round to round provided that some connectivity requirements are satisfied.
If the network is gua…
▽ More
We study lower bounds on information dissemination in adversarial dynamic networks. Initially, k pieces of information (henceforth called tokens) are distributed among n nodes. The tokens need to be broadcast to all nodes through a synchronous network in which the topology can change arbitrarily from round to round provided that some connectivity requirements are satisfied.
If the network is guaranteed to be connected in every round and each node can broadcast a single token per round to its neighbors, there is a simple token dissemination algorithm that manages to deliver all k tokens to all the nodes in O(nk) rounds. Interestingly, in a recent paper, Dutta et al. proved an almost matching Omega(n + nk/log n) lower bound for deterministic token-forwarding algorithms that are not allowed to combine, split, or change tokens in any way. In the present paper, we extend this bound in different ways.
If nodes are allowed to forward b < k tokens instead of only one token in every round, a straight-forward extension of the O(nk) algorithm disseminates all k tokens in time O(nk/b). We show that for any randomized token-forwarding algorithm, Omega(n + nk/(b^2 log n log log n)) rounds are necessary. If nodes can only send a single token per round, but we are guaranteed that the network graph is c-vertex connected in every round, we show a lower bound of Omega(nk/(c log^{3/2} n)), which almost matches the currently best O(nk/c) upper bound. Further, if the network is T-interval connected, a notion that captures connection stability over time, we prove that Omega(n + nk/(T^2 log n)) rounds are needed. The best known upper bound in this case manages to solve the problem in O(n + nk/T) rounds. Finally, we show that even if each node only needs to obtain a delta-fraction of all the tokens for some delta in [0,1], Omega(nk delta^3 log n) are still required.
△ Less
Submitted 29 August, 2012;
originally announced August 2012.
-
Bee** a Maximal Independent Set
Authors:
Yehuda Afek,
Noga Alon,
Ziv Bar-Joseph,
Alejandro Cornejo,
Bernhard Haeupler,
Fabian Kuhn
Abstract:
We consider the problem of computing a maximal independent set (MIS) in an extremely harsh broadcast model that relies only on carrier sensing. The model consists of an anonymous broadcast network in which nodes have no knowledge about the topology of the network or even an upper bound on its size. Furthermore, it is assumed that an adversary chooses at which time slot each node wakes up. At each…
▽ More
We consider the problem of computing a maximal independent set (MIS) in an extremely harsh broadcast model that relies only on carrier sensing. The model consists of an anonymous broadcast network in which nodes have no knowledge about the topology of the network or even an upper bound on its size. Furthermore, it is assumed that an adversary chooses at which time slot each node wakes up. At each time slot a node can either beep, that is, emit a signal, or be silent. At a particular time slot, bee** nodes receive no feedback, while silent nodes can only differentiate between none of its neighbors bee**, or at least one of its neighbors bee**.
We start by proving a lower bound that shows that in this model, it is not possible to locally converge to an MIS in sub-polynomial time. We then study four different relaxations of the model which allow us to circumvent the lower bound and find an MIS in polylogarithmic time. First, we show that if a polynomial upper bound on the network size is known, it is possible to find an MIS in O(log^3 n) time. Second, if we assume slee** nodes are awoken by neighboring beeps, then we can also find an MIS in O(log^3 n) time. Third, if in addition to this wakeup assumption we allow sender-side collision detection, that is, bee** nodes can distinguish whether at least one neighboring node is bee** concurrently or not, we can find an MIS in O(log^2 n) time. Finally, if instead we endow nodes with synchronous clocks, it is also possible to find an MIS in O(log^2 n) time.
△ Less
Submitted 1 June, 2012;
originally announced June 2012.
-
A search for ultra-high energy neutrinos in highly inclined events at the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
M. Ahlers,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
A. Almela,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Anticic,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave
, et al. (475 additional authors not shown)
Abstract:
The Surface Detector of the Pierre Auger Observatory is sensitive to neutrinos of all flavours above 0.1 EeV. These interact through charged and neutral currents in the atmosphere giving rise to extensive air showers. When interacting deeply in the atmosphere at nearly horizontal incidence, neutrinos can be distinguished from regular hadronic cosmic rays by the broad time structure of their shower…
▽ More
The Surface Detector of the Pierre Auger Observatory is sensitive to neutrinos of all flavours above 0.1 EeV. These interact through charged and neutral currents in the atmosphere giving rise to extensive air showers. When interacting deeply in the atmosphere at nearly horizontal incidence, neutrinos can be distinguished from regular hadronic cosmic rays by the broad time structure of their shower signals in the water-Cherenkov detectors. In this paper we present for the first time an analysis based on down-going neutrinos. We describe the search procedure, the possible sources of background, the method to compute the exposure and the associated systematic uncertainties. No candidate neutrinos have been found in data collected from 1 January 2004 to 31 May 2010. Assuming an E^-2 differential energy spectrum the limit on the single flavour neutrino is (E^2 * dN/dE) < 1.74x10^-7 GeV cm^-2 s^-1 sr^-1 at 90% C.L. in the energy range 1x10^17 eV < E < 1x10^20 eV.
△ Less
Submitted 7 February, 2012;
originally announced February 2012.
-
Description of Atmospheric Conditions at the Pierre Auger Observatory using the Global Data Assimilation System (GDAS)
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
M. Ahlers,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
A. Almela,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave
, et al. (477 additional authors not shown)
Abstract:
Atmospheric conditions at the site of a cosmic ray observatory must be known for reconstructing observed extensive air showers. The Global Data Assimilation System (GDAS) is a global atmospheric model predicated on meteorological measurements and numerical weather predictions. GDAS provides altitude-dependent profiles of the main state variables of the atmosphere like temperature, pressure, and hu…
▽ More
Atmospheric conditions at the site of a cosmic ray observatory must be known for reconstructing observed extensive air showers. The Global Data Assimilation System (GDAS) is a global atmospheric model predicated on meteorological measurements and numerical weather predictions. GDAS provides altitude-dependent profiles of the main state variables of the atmosphere like temperature, pressure, and humidity. The original data and their application to the air shower reconstruction of the Pierre Auger Observatory are described. By comparisons with radiosonde and weather station measurements obtained on-site in Malargüe and averaged monthly models, the utility of the GDAS data is shown.
△ Less
Submitted 24 January, 2012; v1 submitted 11 January, 2012;
originally announced January 2012.
-
The effect of the geomagnetic field on cosmic ray energy estimates and large scale anisotropy searches on data from the Pierre Auger Observatory
Authors:
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier,
G. Avila
, et al. (473 additional authors not shown)
Abstract:
We present a comprehensive study of the influence of the geomagnetic field on the energy estimation of extensive air showers with a zenith angle smaller than $60^\circ$, detected at the Pierre Auger Observatory. The geomagnetic field induces an azimuthal modulation of the estimated energy of cosmic rays up to the ~2% level at large zenith angles. We present a method to account for this modulation…
▽ More
We present a comprehensive study of the influence of the geomagnetic field on the energy estimation of extensive air showers with a zenith angle smaller than $60^\circ$, detected at the Pierre Auger Observatory. The geomagnetic field induces an azimuthal modulation of the estimated energy of cosmic rays up to the ~2% level at large zenith angles. We present a method to account for this modulation of the reconstructed energy. We analyse the effect of the modulation on large scale anisotropy searches in the arrival direction distributions of cosmic rays. At a given energy, the geomagnetic effect is shown to induce a pseudo-dipolar pattern at the percent level in the declination distribution that needs to be accounted for.
△ Less
Submitted 30 November, 2011;
originally announced November 2011.
-
Trigger and Aperture of the Surface Detector Array of the Pierre Auger Observatory
Authors:
J. Abraham,
P. Abreu,
M. Aglietta,
C. Aguirre,
E. J. Ahn,
D. Allard,
I. Allekotte,
J. Allen,
J. Alvarez-Muñiz,
M. Ambrosio,
L. Anchordoqui,
S. Andringa,
A. Anzalone,
C. Aramo,
E. Arganda,
S. Argirò,
K. Arisaka,
F. Arneodo,
F. Arqueros,
T. Asch,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
G. Avila
, et al. (447 additional authors not shown)
Abstract:
The surface detector array of the Pierre Auger Observatory consists of 1600 water-Cherenkov detectors, for the study of extensive air showers (EAS) generated by ultra-high-energy cosmic rays. We describe the trigger hierarchy, from the identification of candidate showers at the level of a single detector, amongst a large background (mainly random single cosmic ray muons), up to the selection of re…
▽ More
The surface detector array of the Pierre Auger Observatory consists of 1600 water-Cherenkov detectors, for the study of extensive air showers (EAS) generated by ultra-high-energy cosmic rays. We describe the trigger hierarchy, from the identification of candidate showers at the level of a single detector, amongst a large background (mainly random single cosmic ray muons), up to the selection of real events and the rejection of random coincidences. Such trigger makes the surface detector array fully efficient for the detection of EAS with energy above $3\times 10^{18}$ eV, for all zenith angles between 0$^\circ$ and 60$^\circ$, independently of the position of the impact point and of the mass of the primary particle. In these range of energies and angles, the exposure of the surface array can be determined purely on the basis of the geometrical acceptance.
△ Less
Submitted 29 November, 2011;
originally announced November 2011.
-
The Lateral Trigger Probability function for the Ultra-High Energy Cosmic Ray Showers detected by the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (473 additional authors not shown)
Abstract:
In this paper we introduce the concept of Lateral Trigger Probability (LTP) function, i.e., the probability for an extensive air shower (EAS) to trigger an individual detector of a ground based array as a function of distance to the shower axis, taking into account energy, mass and direction of the primary cosmic ray. We apply this concept to the surface array of the Pierre Auger Observatory consi…
▽ More
In this paper we introduce the concept of Lateral Trigger Probability (LTP) function, i.e., the probability for an extensive air shower (EAS) to trigger an individual detector of a ground based array as a function of distance to the shower axis, taking into account energy, mass and direction of the primary cosmic ray. We apply this concept to the surface array of the Pierre Auger Observatory consisting of a 1.5 km spaced grid of about 1600 water Cherenkov stations. Using Monte Carlo simulations of ultra-high energy showers the LTP functions are derived for energies in the range between 10^{17} and 10^{19} eV and zenith angles up to 65 degs. A parametrization combining a step function with an exponential is found to reproduce them very well in the considered range of energies and zenith angles. The LTP functions can also be obtained from data using events simultaneously observed by the fluorescence and the surface detector of the Pierre Auger Observatory (hybrid events). We validate the Monte-Carlo results showing how LTP functions from data are in good agreement with simulations.
△ Less
Submitted 28 November, 2011;
originally announced November 2011.
-
Search for signatures of magnetically-induced alignment in the arrival directions measured by the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (474 additional authors not shown)
Abstract:
We present the results of an analysis of data recorded at the Pierre Auger Observatory in which we search for groups of directionally-aligned events (or `multiplets') which exhibit a correlation between arrival direction and the inverse of the energy. These signatures are expected from sets of events coming from the same source after having been deflected by intervening coherent magnetic fields. T…
▽ More
We present the results of an analysis of data recorded at the Pierre Auger Observatory in which we search for groups of directionally-aligned events (or `multiplets') which exhibit a correlation between arrival direction and the inverse of the energy. These signatures are expected from sets of events coming from the same source after having been deflected by intervening coherent magnetic fields. The observation of several events from the same source would open the possibility to accurately reconstruct the position of the source and also measure the integral of the component of the magnetic field orthogonal to the trajectory of the cosmic rays. We describe the largest multiplets found and compute the probability that they appeared by chance from an isotropic distribution. We find no statistically significant evidence for the presence of multiplets arising from magnetic deflections in the present data.
△ Less
Submitted 10 November, 2011;
originally announced November 2011.
-
Computing a Maximal Independent Set Using Beeps
Authors:
Alejandro Cornejo,
Bernhard Haeupler,
Fabian Kuhn
Abstract:
We consider the problem of finding a maximal independent set (MIS) in the discrete bee** model. At each time, a node in the network can either beep (i.e., emit a signal) or be silent. Silent nodes can only differentiate between no neighbor bee**, or at least one neighbor bee**. This basic communication model relies only on carrier-sensing. Furthermore, we assume nothing about the underlying…
▽ More
We consider the problem of finding a maximal independent set (MIS) in the discrete bee** model. At each time, a node in the network can either beep (i.e., emit a signal) or be silent. Silent nodes can only differentiate between no neighbor bee**, or at least one neighbor bee**. This basic communication model relies only on carrier-sensing. Furthermore, we assume nothing about the underlying communication graph and allow nodes to wake up (and crash) arbitrarily.
We show that if a polynomial upper bound on the size of the network n is known, then with high probability every node becomes stable in O(\log^3 n) time after it is woken up. To contrast this, we establish a polynomial lower bound when no a priori upper bound on the network size is known. This holds even in the much stronger model of local message broadcast with collision detection.
Finally, if we assume nodes have access to synchronized clocks or we consider a somewhat restricted wake up, we can solve the MIS problem in O(\log^2 n) time without requiring an upper bound on the size of the network, thereby achieving the same bit complexity as Luby's MIS algorithm.
△ Less
Submitted 9 August, 2011;
originally announced August 2011.
-
The Pierre Auger Observatory I: The Cosmic Ray Energy Spectrum and Related Measurements
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Studies of the cosmic ray energy spectrum at the highest energies with the Pierre Auger Observatory
Studies of the cosmic ray energy spectrum at the highest energies with the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.