Skip to main content

Showing 1–30 of 30 results for author: Mandal, P S

.
  1. arXiv:2407.05280  [pdf, other

    cs.DC

    Perpetual Exploration of a Ring in Presence of Byzantine Black Hole

    Authors: Pritam Goswami, Adri Bhattacharya, Raja Das, Partha Sarathi Mandal

    Abstract: Perpetual exploration is a fundamental problem in the domain of mobile agents, where an agent needs to visit each node infinitely often. This issue has received lot of attention, mainly for ring topologies, presence of black holes adds more complexity. A black hole can destroy any incoming agent without any observable trace. In \cite{BampasImprovedPeriodicDataRetrieval,KralovivcPeriodicDataRetriev… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  2. arXiv:2405.18367  [pdf, other

    cs.DC

    Black Hole Search in Dynamic Graphs

    Authors: Tanvir Kaur, Ashish Saxena, Partha Sarathi Mandal, Kaushik Mondal

    Abstract: A black hole in a graph is a dangerous site that disposes any incoming agent into that node without leaving any trace of its existence. In the Black Hole Search (BHS) problem, the goal is for at least one agent to survive, locate the position of the black hole, and then terminate. This problem has been extensively studied for static graphs, where the edges do not disappear with time. In dynamic gr… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  3. arXiv:2402.16085  [pdf, other

    cs.DS

    Online Drone Scheduling for Last-mile Delivery

    Authors: Saswata Jana, Giuseppe F. Italiano, Manas Jyoti Kashyop, Athanasios L. Konstantinidis, Evangelos Kosinas, Partha Sarathi Mandal

    Abstract: Delivering a parcel from the distribution hub to the customer's doorstep is called the \textit{last-mile delivery} step in delivery logistics. In this paper, we study a hybrid {\it truck-drones} model for the last-mile delivery step, in which a truck moves on a predefined path carrying parcels and drones deliver the parcels. We define the \textsc{online drone scheduling} problem, where the truck m… ▽ More

    Submitted 25 February, 2024; originally announced February 2024.

  4. arXiv:2402.04746  [pdf, other

    cs.DC

    Black Hole Search in Dynamic Tori

    Authors: Adri Bhattacharya, Giuseppe F. Italiano, Partha Sarathi Mandal

    Abstract: We investigate the black hole search problem by a set of mobile agents in a dynamic torus. Black hole is defined to be a dangerous stationary node which has the capability to destroy any number of incoming agents without leaving any trace of its existence. A torus of size $n\times m$ ($3\leq n \leq m$) is a collection of $n$ row rings and $m$ column rings, and the dynamicity is such that each ring… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  5. arXiv:2311.10984  [pdf, other

    cs.DC

    Black Hole Search in Dynamic Cactus Graph

    Authors: Adri Bhattacharya, Giuseppe F. Italiano, Partha Sarathi Mandal

    Abstract: We study the problem of black hole search by a set of mobile agents, where the underlying graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates any visiting agent without leaving any trace behind. Key parameters that dictate the complexity of finding the black hole include: the number of agents required (termed as \textit{size}), the number of moves performed b… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

    Comments: This paper recently got accepted in WALCOM 2024

  6. arXiv:2311.04536  [pdf, other

    cs.DC

    Uniform Partitioning of a Bounded Region using Opaque ASYNC Luminous Mobile Robots

    Authors: Subhajit Pramanick, Saswata Jana, Adri Bhattacharya, Partha Sarathi Mandal

    Abstract: We are given $N$ autonomous mobile robots inside a bounded region. The robots are opaque which means that three collinear robots are unable to see each other as one of the robots acts as an obstruction for the other two. They operate in classical \emph{Look-Compute-Move} (LCM) activation cycles. Moreover, the robots are oblivious except for a persistent light (which is why they are called \emph{Lu… ▽ More

    Submitted 1 May, 2024; v1 submitted 8 November, 2023; originally announced November 2023.

    Comments: This paper recently got accepted in ICDCN 2024

  7. arXiv:2305.06067  [pdf, other

    cs.DC cs.DS

    Pebble guided Treasure Hunt in Plane

    Authors: Adri Bhattacharya, Barun Gorain, Partha Sarathi Mandal

    Abstract: We study the problem of treasure hunt in a Euclidean plane by a mobile agent with the guidance of pebbles. The initial position of the agent and position of the treasure are modeled as special points in the Euclidean plane. The treasure is situated at a distance at most $D>0$ from the initial position of the agent. The agent has a perfect compass, but an adversary controls the speed of the agent.… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  8. arXiv:2211.06636  [pdf, other

    cs.DS

    Approximation Algorithms for Drone Delivery Scheduling Problem

    Authors: Saswata Jana, Partha Sarathi Mandal

    Abstract: The coordination among drones and ground vehicles for last-mile delivery has gained significant interest in recent years. In this paper, we study \textit{multiple drone delivery scheduling problem(MDSP) \cite{Betti_ICDCN22} for last-mile delivery, where we have a set of drones with an identical battery budget and a set of delivery locations, along with reward or profit for delivery, cost and deliv… ▽ More

    Submitted 12 November, 2022; originally announced November 2022.

  9. arXiv:2209.00857  [pdf, other

    cs.DC cs.DS

    Treasure Hunt in Graph using Pebbles

    Authors: Adri Bhattacharya, Barun Gorain, Partha Sarathi Mandal

    Abstract: In this paper, we study the treasure hunt problem in a graph by a mobile agent. The nodes in the graph $G=(V,E)$ are anonymous and the edges incident to a vertex $v\in V$ whose degree is $deg(v)$ are labeled arbitrarily as $0,1,\ldots, deg(v)-1$. At a node $t$ in $G$ a stationary object, called {\it treasure} is located. The mobile agent that is initially located at a node $s$ in $G$, the starting… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

  10. arXiv:2208.14304  [pdf, ps, other

    cs.DS

    Approximation Algorithms for Drone Delivery Packing Problem

    Authors: Saswata Jana, Partha Sarathi Mandal

    Abstract: Recent advancements in unmanned aerial vehicles, also known as drones, have motivated logistics to use drones for multiple operations. Collaboration between drones and trucks in a last-mile delivery system has numerous benefits and reduces a number of challenges. In this paper, we introduce \textit{drone-delivery packing problem} (DDP), where we have a set of deliveries and respective customers wi… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

  11. arXiv:2202.05710  [pdf, other

    cs.DS cs.DC

    Collaborative Dispersion by Silent Robots

    Authors: Barun Gorain, Partha Sarathi Mandal, Kaushik Mondal, Supantha Pandit

    Abstract: In the dispersion problem, a set of $k$ co-located mobile robots must relocate themselves in distinct nodes of an unknown network. The network is modeled as an anonymous graph $G=(V,E)$, where the nodes of the graph are not labeled. The edges incident to a node $v$ with degree $d$ are labeled with port numbers in the range $0,1, \cdots, d-1$ at $v$. The robots have unique ids in the range $[0,L]$,… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  12. arXiv:2107.04885  [pdf, other

    cs.DC

    Filling MIS Vertices by Myopic Luminous Robots

    Authors: Subhajit Pramanick, Sai Vamshi Samala, Debasish Pattanayak, Partha Sarathi Mandal

    Abstract: We present the problem of finding a maximal independent set (MIS) (named as \emph{MIS Filling problem}) of an arbitrary connected graph having $n$ vertices with luminous myopic mobile robots. The robots enter the graph one after another from a particular vertex called the \emph{Door} and disperse along the edges of the graph without collision to occupy vertices such that the set of vertices occupi… ▽ More

    Submitted 15 October, 2022; v1 submitted 10 July, 2021; originally announced July 2021.

    Comments: A version of this paper appears in the Proceedings of ICDCIT'23

  13. arXiv:2011.15074  [pdf, other

    cs.CC

    Fort Formation by an Automaton

    Authors: Kartikey Kant, Debasish Pattanayak, Partha Sarathi Mandal

    Abstract: Building structures by low capability robots is a very recent research development. A robot (or a mobile agent) is designed as a deterministic finite automaton. The objective is to make a structure from a given distribution of materials (\textit{bricks}) in an infinite grid $Z\times Z$. The grid cells may contain a brick (\textit{full cells}) or it may be empty (\textit{empty cells}). The \textit{… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

  14. A Distributed Algorithm for Overlapped Community Detection in Large-Scale Networks

    Authors: Dibakar Saha, Partha Sarathi Mandal

    Abstract: Overlapped community detection in social networks has become an important research area with the increasing popularity and complexity of the networks. Most of the existing solutions are either centralized or parallel algorithms, which are computationally intensive - require complete knowledge of the entire networks. But it isn't easy to collect entire network data because the size of the actual ne… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Report number: 10.1109/COMSNETS51098.2021.9352856

    Journal ref: 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)

  15. arXiv:2010.07083  [pdf, other

    cond-mat.mtrl-sci

    Magnetization relaxation and search for the magnetic gap in bulk-insulating V-doped (Bi, Sb)$_2$Te$_3$

    Authors: E. Golias, E. Weschke, T. Flanagan, E. Schierle, A. Richardella, E. D. L. Rienks, P. S. Mandal, A. Varykhalov, J. Sánchez-Barriga, F. Radu, N. Samarth, O. Rader

    Abstract: V-doped (Bi,Sb)$_2$Te$_3$ has a ten times higher magnetic coercivity than its Cr-doped counterpart and therefore is believed to be a superior system for the quantum anomalous Hall effect (QAHE). The QAHE requires the opening of a magnetic band gap at the Dirac point. We do not find this gap by angle-resolved photoelectron spectroscopy down to 1 K. By x-ray magnetic circular dichroism (XMCD) we dir… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: 12 pages, 3 figures

  16. arXiv:2003.01914  [pdf, other

    cs.DC

    Conic Formation in Presence of Faulty Robots

    Authors: Debasish Pattanayak, Klaus-Tycho Foerster, Partha Sarathi Mandal, Stefan Schmid

    Abstract: Pattern formation is one of the most fundamental problems in distributed computing, which has recently received much attention. In this paper, we initiate the study of distributed pattern formation in situations when some robots can be \textit{faulty}. In particular, we consider the well-established \textit{look-compute-move} model with oblivious, anonymous robots. We first present lower bounds an… ▽ More

    Submitted 27 August, 2020; v1 submitted 4 March, 2020; originally announced March 2020.

    Comments: Full version of the conference paper in ALGOSENSORS, 2020

  17. arXiv:1909.10004  [pdf, other

    cs.DC

    Randomized Gathering of Asynchronous Mobile Robots

    Authors: Debasish Pattanayak, John Augustine, Partha Sarathi Mandal

    Abstract: This paper revisits the widely researched \textit{gathering} problem for two robots in a scenario which allows randomization in the asynchronous scheduling model. The scheduler is considered to be the adversary which determines the activation schedule of the robots. The adversary comes in two flavors, namely, oblivious and adaptive, based on the knowledge of the outcome of random bits. The robots… ▽ More

    Submitted 22 September, 2019; originally announced September 2019.

  18. arXiv:1906.03024  [pdf, other

    cs.DC

    Chauffeuring a Crashed Robot from a Disk

    Authors: Debasish Pattanayak, H. Ramesh, Partha Sarathi Mandal

    Abstract: Evacuation of robots from a disk has attained a lot of attention recently. We visit the problem from the perspective of fault-tolerance. We consider two robots trying to evacuate from a disk via a single hidden exit on the perimeter of the disk. The robots communicate wirelessly. The robots are susceptible to crash faults after which they stop moving and communicating. We design the algorithms for… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

  19. Large magnetic gap at the Dirac point in a Mn-induced Bi$_2$Te$_3$ heterostructure

    Authors: E. D. L. Rienks, S. Wimmer, P. S. Mandal, O. Caha, J. Růžička, A. Ney, H. Steiner, V. V. Volobuev, H. Groiss, M. Albu, S. A. Khan, J. Minár, H. Ebert, G. Bauer, A. Varykhalov, J. Sánchez-Barriga, O. Rader, G. Springholz

    Abstract: Magnetically doped topological insulators enable the quantum anomalous Hall effect (QAHE) which provides quantized edge states for lossless charge transport applications. The edge states are hosted by a magnetic energy gap at the Dirac point but all attempts to observe it directly have been unsuccessful. The gap size is considered crucial to overcoming the present limitations of the QAHE, which so… ▽ More

    Submitted 15 October, 2018; originally announced October 2018.

    Comments: 23 pages, 5 figures

  20. arXiv:1708.03792  [pdf, other

    cs.DC

    Evacuating Two Robots from Two Unknown Exits on the Perimeter of a Disk

    Authors: Debasish Pattanayak, H. Ramesh, Partha Sarathi Mandal, Stefan Schmid

    Abstract: Distributed evacuation of mobile robots is a recent development. We consider the evacuation problem of two robots which are initially located at the center of a unit disk. Both the robots have to evacuate the disk through the exits situated on the perimeter of the disk at an unknown location. The distance between two exits along the perimeter $d$ is given. We consider two different communication m… ▽ More

    Submitted 12 August, 2017; originally announced August 2017.

  21. arXiv:1704.02436  [pdf, ps, other

    cs.DC

    Approximation Algorithms for Barrier Sweep Coverage

    Authors: Barun Gorain, Partha Sarathi Mandal

    Abstract: Time-varying coverage, namely sweep coverage is a recent development in the area of wireless sensor networks, where a small number of mobile sensors sweep or monitor comparatively large number of locations periodically. In this article we study barrier sweep coverage with mobile sensors where the barrier is considered as a finite length continuous curve on a plane. The coverage at every point on t… ▽ More

    Submitted 8 April, 2017; originally announced April 2017.

  22. Negative longitudinal magnetoresistance from anomalous N=0 Landau level in topological materials

    Authors: B. A. Assaf, T. Phuphachong, E. Kampert, V. V. Volobuev, P. S. Mandal, J. Sánchez-Barriga, O. Rader, G. Bauer, G. Springholz, L. A. de Vaulchier, Y. Guldner

    Abstract: Negative longitudinal magnetoresistance (NLMR) is shown to occur in topological materials in the extreme quantum limit, when a magnetic field is applied parallel to the excitation current. We perform pulsed and DC field measurements on Pb1-xSnxSe epilayers where the topological state can be chemically tuned. The NLMR is observed in the topological state, but is suppressed and becomes positive when… ▽ More

    Submitted 11 August, 2017; v1 submitted 6 April, 2017; originally announced April 2017.

    Comments: Accepted in Physical Review Letters

    Journal ref: Phys. Rev. Lett. 119, 106602 (2017)

  23. arXiv:1608.06002  [pdf, other

    cs.DC

    Convergence of Even Simpler Robots without Location Information

    Authors: Debasish Pattanayak, Kaushik Mondal, Partha Sarathi Mandal, Stefan Schmid

    Abstract: The design of distributed gathering and convergence algorithms for tiny robots has recently received much attention. In particular, it has been shown that convergence problems can even be solved for very weak, \emph{oblivious} robots: robots which cannot maintain state from one round to the next. The oblivious robot model is hence attractive from a self-stabilization perspective, where state is su… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Comments: 15 pages, 13 figures

  24. arXiv:1608.02432  [pdf, other

    cs.DC

    Fault-Tolerant Gathering of Mobile Robots with Weak Multiplicity Detection

    Authors: Debasish Pattanayak, Kaushik Mondal, H. Ramesh, Partha Sarathi Mandal

    Abstract: There has been a wide interest in designing distributed algorithms for tiny robots. In particular, it has been shown that the robots can complete certain tasks even in the presence of faulty robots. In this paper, we focus on gathering of all non-faulty robots at a single point in presence of faulty robots. We propose a wait-free algorithm (i.e., no robot waits for other robot and algorithm instru… ▽ More

    Submitted 8 August, 2016; originally announced August 2016.

  25. arXiv:1409.0085  [pdf, ps, other

    cs.DC cs.NI

    Designing Path Planning Algorithms for Mobile Anchor towards Range-Free Localization

    Authors: Kaushik Mondal, Arindam Karmakar, Partha Sarathi Mandal

    Abstract: Localization is one of the most important factor in wireless sensor networks as many applications demand position information of sensors. Recently there is an increasing interest on the use of mobile anchors for localizing sensors. Most of the works available in the literature either looks into the aspect of reducing path length of mobile anchor or tries to increase localization accuracy. The chal… ▽ More

    Submitted 30 August, 2014; originally announced September 2014.

    Comments: 17 pages

    MSC Class: 68W15 ACM Class: C.2.1; C.2.4

  26. arXiv:1211.0157  [pdf, ps, other

    cs.DC cs.DS

    Optimal Covering with Mobile Sensors in an Unbounded Region

    Authors: Barun Gorain, Partha Sarathi Mandal

    Abstract: Covering a bounded region with minimum number of homogeneous sensor nodes is a NP-complete problem \cite{Li09}. In this paper we have proposed an {\it id} based distributed algorithm for optimal coverage in an unbounded region. The proposed algorithm guarantees maximum spreading in $O(\sqrt{n})$ rounds without creating any coverage hole. The algorithm executes in synchronous rounds without exchang… ▽ More

    Submitted 1 November, 2012; originally announced November 2012.

    Comments: 7 pages, submitted in the Eighth International Conference on Wireless Communication and Sensor Networks (WCSN-2012)

    ACM Class: C.2.4; H.5.3; C.1.4

  27. arXiv:1111.3334  [pdf, ps, other

    cs.DC

    Fixing Data Anomalies with Prediction Based Algorithm in Wireless Sensor Networks

    Authors: Abhishek Kr. Singh, Bollibisai Giridhar, Partha Sarathi Mandal

    Abstract: Data inconsistencies are present in the data collected over a large wireless sensor network (WSN), usually deployed for any kind of monitoring applications. Before passing this data to some WSN applications for decision making, it is necessary to ensure that the data received are clean and accurate. In this paper, we have used a statistical tool to examine the past data to fit in a highly sophisti… ▽ More

    Submitted 14 November, 2011; originally announced November 2011.

    Comments: 6 pages, 8 figures, The paper has been accepted for presentation at 7th IEEE Conference on Wireless Communication and Sensor Networks (WCSN-2011) December 05-09, 2011, Panna National Park, Madhya Pradesh, India

  28. arXiv:1105.0668  [pdf, ps, other

    cs.DC

    Secure Position Verification for Wireless Sensor Networks in Noisy Channels

    Authors: Partha Sarathi Mandal, Anil K. Ghosh

    Abstract: Position verification in wireless sensor networks (WSNs) is quite tricky in presence of attackers (malicious sensor nodes), who try to break the verification protocol by reporting their incorrect positions (locations) during the verification stage. In the literature of WSNs, most of the existing methods of position verification have used trusted verifiers, which are in fact vulnerable to attacks b… ▽ More

    Submitted 5 May, 2011; v1 submitted 3 May, 2011; originally announced May 2011.

    Comments: 16 pages, The paper has been accepted for presentation at the 10th International Conference on Ad Hoc Networks and Wireless (ADHOC NOW 2011) July 18-20, 2011, Paderborn, Germany

    MSC Class: DS; DC

  29. arXiv:1010.0958  [pdf, ps, other

    cs.DC

    Reconstruction of Aggregation Tree in spite of Faulty Nodes in Wireless Sensor Networks

    Authors: Punit Sharma, Partha Sarathi Mandal

    Abstract: Recent advances in wireless sensor networks (WSNs) have led to many new promissing applications. However data communication between nodes consumes a large portion of the total energy of WSNs. Consequently efficient data aggregation technique can help greatly to reduce power consumption. Data aggregation has emerged as a basic approach in WSNs in order to reduce the number of transmissions of senso… ▽ More

    Submitted 5 October, 2010; originally announced October 2010.

    Comments: this is a 5 page paper. this paper has been submitted to WCSN 2010

  30. arXiv:0710.3824  [pdf, ps, other

    cs.CR cs.DC cs.DS cs.NI

    Deterministic Secure Positioning in Wireless Sensor Networks

    Authors: Sylvie Delaët, Partha Sarathi Mandal, Mariusz Rokicki, Sébastien Tixeuil

    Abstract: Properly locating sensor nodes is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location and distance information in order to fake their actual location. In this paper we propose a general distributed deterministic protocol for accurate identificatio… ▽ More

    Submitted 22 October, 2007; originally announced October 2007.