-
Low complexity convergence rate bounds for the synchronous gossip subclass of push-sum algorithms
Authors:
Balázs Gerencsér,
Miklós Kornyik
Abstract:
We develop easily accessible quantities for bounding the almost sure exponential convergence rate of push-sum algorithms. We analyze the scenario of i.i.d. synchronous gossip, every agent communicating towards its single target at every step. Multiple bounding expressions are developed depending on the generality of the setup, all functions of the spectrum of the network. While the most general bo…
▽ More
We develop easily accessible quantities for bounding the almost sure exponential convergence rate of push-sum algorithms. We analyze the scenario of i.i.d. synchronous gossip, every agent communicating towards its single target at every step. Multiple bounding expressions are developed depending on the generality of the setup, all functions of the spectrum of the network. While the most general bound awaits further improvement, with more symmetries, close bounds can be established, as demonstrated by numerical simulations.
△ Less
Submitted 22 September, 2023; v1 submitted 12 July, 2023;
originally announced July 2023.
-
Fast synchronization of inhomogenous random automata
Authors:
Balázs Gerencsér,
Zsombor Várkonyi
Abstract:
We examine the reset threshold of randomly generated deterministic automata. We present a simple proof that an automaton with a random map** and two random permutation letters has a reset threshold of $\mathcal{O}\big( \sqrt{n \log^3 n} \big)$ with high probability, assuming only certain partial independence of the letters. Our observation is motivated by Nicaud (2014) providing a near-linear bo…
▽ More
We examine the reset threshold of randomly generated deterministic automata. We present a simple proof that an automaton with a random map** and two random permutation letters has a reset threshold of $\mathcal{O}\big( \sqrt{n \log^3 n} \big)$ with high probability, assuming only certain partial independence of the letters. Our observation is motivated by Nicaud (2014) providing a near-linear bound in the case of two random map** letters, among multiple other results. The upper bound for the latter case has been recently improved by the breakthrough work of Chapuy and Perarnau (2023) to $\mathcal{O}(\sqrt{n} \log n)$.
△ Less
Submitted 3 December, 2023; v1 submitted 10 June, 2022;
originally announced June 2022.
-
Trajectory convergence from coordinate-wise decrease of quadratic energy functions, and applications to platoons
Authors:
Julien M. Hendrickx,
Balazs Gerencser,
Baris Fidan
Abstract:
We consider trajectories where the sign of the derivative of each entry is opposite to that of the corresponding entry in the gradient of an energy function. We show that this condition guarantees convergence when the energy function is quadratic and positive definite and partly extend that result to some classes of positive semi-definite quadratic functions including those defined using a graph L…
▽ More
We consider trajectories where the sign of the derivative of each entry is opposite to that of the corresponding entry in the gradient of an energy function. We show that this condition guarantees convergence when the energy function is quadratic and positive definite and partly extend that result to some classes of positive semi-definite quadratic functions including those defined using a graph Laplacian. We show how this condition allows establishing the convergence of a platoon application in which it naturally appears, due to deadzones in the control laws designed to avoid instabilities caused by inconsistent measurements of the same distance by different agents.
△ Less
Submitted 10 June, 2019; v1 submitted 1 March, 2019;
originally announced March 2019.
-
Tight bounds on the convergence rate of generalized ratio consensus algorithms
Authors:
Balázs Gerencsér,
László Gerencsér
Abstract:
The problems discussed in this paper are motivated by general ratio consensus algorithms, introduced by Kempe, Dobra, and Gehrke (2003) in a simple form as the push-sum algorithm, later extended by Bénézit et al. (2010) under the name weighted gossip algorithm. We consider a communication protocol described by a strictly stationary, ergodic, sequentially primitive sequence of non-negative matrices…
▽ More
The problems discussed in this paper are motivated by general ratio consensus algorithms, introduced by Kempe, Dobra, and Gehrke (2003) in a simple form as the push-sum algorithm, later extended by Bénézit et al. (2010) under the name weighted gossip algorithm. We consider a communication protocol described by a strictly stationary, ergodic, sequentially primitive sequence of non-negative matrices, applied iteratively to a pair of fixed initial vectors, the components of which are called values and weights defined at the nodes of a network. The subject of ratio consensus problems is to study the asymptotic properties of ratios of values and weights at each node, expecting convergence to the same limit for all nodes. The main results of the paper provide upper bounds for the rate of the almost sure exponential convergence in terms of the spectral gap associated with the given sequence of random matrices. It will be shown that these upper bounds are sharp. Our results complement previous results of Picci and Taylor (2013) and Iutzeler, Ciblat and Hachem (2013).
△ Less
Submitted 15 May, 2020; v1 submitted 31 January, 2019;
originally announced January 2019.
-
On the interplay between Babai and Cerny's conjectures
Authors:
François Gonze,
Vladimir Gusev,
Balázs Gerencsér,
Raphaël M. Jungers,
Mikhail V. Volkov
Abstract:
Motivated by the Babai conjecture and the Cerny conjecture, we study the reset thresholds of automata with the transition monoid equal to the full monoid of transformations of the state set. For automata with $n$ states in this class, we prove that the reset thresholds are upper-bounded by $2n^2-6n+5$ and can attain the value $\tfrac{n(n-1)}{2}$. In addition, we study diameters of the pair digraph…
▽ More
Motivated by the Babai conjecture and the Cerny conjecture, we study the reset thresholds of automata with the transition monoid equal to the full monoid of transformations of the state set. For automata with $n$ states in this class, we prove that the reset thresholds are upper-bounded by $2n^2-6n+5$ and can attain the value $\tfrac{n(n-1)}{2}$. In addition, we study diameters of the pair digraphs of permutation automata and construct $n$-state permutation automata with diameter $\tfrac{n^2}{4} + o(n^2)$.
△ Less
Submitted 6 August, 2017; v1 submitted 13 April, 2017;
originally announced April 2017.
-
Primitive sets of nonnegative matrices and synchronizing automata
Authors:
Balázs Gerencsér,
Vladimir V. Gusev,
Raphaël M. Jungers
Abstract:
A set of nonnegative matrices $\mathcal{M}=\{M_1, M_2, \ldots, M_k\}$ is called primitive if there exist indices $i_1, i_2, \ldots, i_m$ such that $M_{i_1} M_{i_2} \ldots M_{i_m}$ is positive (i.e. has all its entries $>0$). The length of the shortest such product is called the exponent of $\mathcal{M}$. The concept of primitive sets of matrices comes up in a number of problems within control theo…
▽ More
A set of nonnegative matrices $\mathcal{M}=\{M_1, M_2, \ldots, M_k\}$ is called primitive if there exist indices $i_1, i_2, \ldots, i_m$ such that $M_{i_1} M_{i_2} \ldots M_{i_m}$ is positive (i.e. has all its entries $>0$). The length of the shortest such product is called the exponent of $\mathcal{M}$. The concept of primitive sets of matrices comes up in a number of problems within control theory, non-homogeneous Markov chains, automata theory etc. Recently, connections between synchronizing automata and primitive sets of matrices were established. In the present paper, we significantly strengthen these links by providing equivalence results, both in terms of combinatorial characterization, and computational aspects. We study the maximal exponent among all primitive sets of $n \times n$ matrices, which we denote by $\exp(n)$. We prove that $\lim_{n\rightarrow\infty} \tfrac{\log \exp(n)}{n} = \tfrac{\log 3}{3}$, and moreover, we establish that this bound leads to a resolution of the Černý problem for carefully synchronizing automata. We also study the set of matrices with no zero rows and columns, denoted by $\mathcal{NZ}$, due to its intriguing connections to the Černý conjecture and the recent generalization of Perron-Frobenius theory for this class. We characterize computational complexity of different problems related to the exponent of $\mathcal{NZ}$ matrix sets, and present a quadratic bound on the exponents of sets belonging to a special subclass. Namely, we show that the exponent of a set of matrices having total support is bounded by $2n^2 -5n +5$.
△ Less
Submitted 24 February, 2016;
originally announced February 2016.
-
Markov modeling of online inter-arrival times
Authors:
Corentin Vande Kerckhove,
Balázs Gerencsér,
Julien M. Hendrickx,
Vincent D. Blondel
Abstract:
In this paper, we investigate the arising communication patterns on social media, and in particular the series of events happening for a single user. While the distribution of inter-event times is often assimilated to power-law density functions, a debate persists on the nature of an underlying model that explains the observed distribution. In the present, we propose an intuitive explanation to un…
▽ More
In this paper, we investigate the arising communication patterns on social media, and in particular the series of events happening for a single user. While the distribution of inter-event times is often assimilated to power-law density functions, a debate persists on the nature of an underlying model that explains the observed distribution. In the present, we propose an intuitive explanation to understand the observed dependence of subsequent waiting times. Our contribution is twofold. The first idea consists of separating the short waiting times -- out of scope for power-law distributions -- from the long ones. The model is further enhanced by introducing a two-state Markovian process to incorporate memory.
△ Less
Submitted 7 December, 2018; v1 submitted 16 September, 2015;
originally announced September 2015.
-
Push sum with transmission failures
Authors:
Balázs Gerencsér,
Julien M. Hendrickx
Abstract:
The push-sum algorithm allows distributed computing of the average on a directed graph, and is particularly relevant when one is restricted to one-way and/or asynchronous communications. We investigate its behavior in the presence of unreliable communication channels where messages can be lost. We show that exponential convergence still holds and deduce fundamental properties that implicitly descr…
▽ More
The push-sum algorithm allows distributed computing of the average on a directed graph, and is particularly relevant when one is restricted to one-way and/or asynchronous communications. We investigate its behavior in the presence of unreliable communication channels where messages can be lost. We show that exponential convergence still holds and deduce fundamental properties that implicitly describe the distribution of the final value obtained. We analyze the error of the final common value we get for the essential case of two nodes, both theoretically and numerically. We provide performance comparison with a standard consensus algorithm.
△ Less
Submitted 31 May, 2017; v1 submitted 30 April, 2015;
originally announced April 2015.
-
Improved bound on the worst case complexity of Policy Iteration
Authors:
Romain Hollanders,
Balázs Gerencsér,
Jean-Charles Delvenne,
Raphaël M. Jungers
Abstract:
Solving Markov Decision Processes (MDPs) is a recurrent task in engineering. Even though it is known that solutions for minimizing the infinite horizon expected reward can be found in polynomial time using Linear Programming techniques, iterative methods like the Policy Iteration algorithm (PI) remain usually the most efficient in practice. This method is guaranteed to converge in a finite number…
▽ More
Solving Markov Decision Processes (MDPs) is a recurrent task in engineering. Even though it is known that solutions for minimizing the infinite horizon expected reward can be found in polynomial time using Linear Programming techniques, iterative methods like the Policy Iteration algorithm (PI) remain usually the most efficient in practice. This method is guaranteed to converge in a finite number of steps. Unfortunately, it is known that it may require an exponential number of steps in the size of the problem to converge. On the other hand, many open questions remain considering the actual worst case complexity. In this work, we provide the first improvement over the fifteen years old upper bound from Mansour & Singh (1999) by showing that PI requires at most k/(k-1)*k^n/n + o(k^n/n) iterations to converge, where n is the number of states of the MDP and k is the maximum number of actions per state. Perhaps more importantly, we also show that this bound is optimal for an important relaxation of the problem.
△ Less
Submitted 28 October, 2014;
originally announced October 2014.
-
A complexity analysis of Policy Iteration through combinatorial matrices arising from Unique Sink Orientations
Authors:
Romain Hollanders,
Balázs Gerencsér,
Jean-Charles Delvenne,
Raphaël M. Jungers
Abstract:
Unique Sink Orientations (USOs) are an appealing abstraction of several major optimization problems of applied mathematics such as for instance Linear Programming (LP), Markov Decision Processes (MDPs) or 2-player Turn Based Stochastic Games (2TBSGs). A polynomial time algorithm to find the sink of a USO would translate into a strongly polynomial time algorithm to solve the aforementioned problems…
▽ More
Unique Sink Orientations (USOs) are an appealing abstraction of several major optimization problems of applied mathematics such as for instance Linear Programming (LP), Markov Decision Processes (MDPs) or 2-player Turn Based Stochastic Games (2TBSGs). A polynomial time algorithm to find the sink of a USO would translate into a strongly polynomial time algorithm to solve the aforementioned problems---a major quest for all three cases. In addition, we may translate MDPs and 2TBSGs into the problem of finding the sink of an acyclic USO of a cube, which can be done using the well-known Policy Iteration algorithm (PI). The study of its complexity is the object of this work. Despite its exponential worst case complexity, the principle of PI is a powerful source of inspiration for other methods.
As our first contribution, we disprove Hansen and Zwick's conjecture claiming that the number of steps of PI should follow the Fibonacci sequence in the worst case. Our analysis relies on a new combinatorial formulation of the problem---the so-called Order-Regularity formulation (OR). Then, for our second contribution, we (exponentially) improve the $Ω(1.4142^n)$ lower bound on the number of steps of PI from Schurr and Szabó in the case of the OR formulation and obtain an $Ω(1.4269^n)$ bound.
△ Less
Submitted 9 January, 2015; v1 submitted 16 July, 2014;
originally announced July 2014.
-
Optimal one-dimensional coverage by unreliable sensors
Authors:
Paolo Frasca,
Federica Garin,
Balazs Gerencser,
Julien M. Hendrickx
Abstract:
This paper regards the problem of optimally placing unreliable sensors in a one-dimensional environment. We assume that sensors can fail with a certain probability and we minimize the expected maximum distance from any point in the environment to the closest active sensor. We provide a computational method to find the optimal placement and we estimate the relative quality of equispaced and random…
▽ More
This paper regards the problem of optimally placing unreliable sensors in a one-dimensional environment. We assume that sensors can fail with a certain probability and we minimize the expected maximum distance from any point in the environment to the closest active sensor. We provide a computational method to find the optimal placement and we estimate the relative quality of equispaced and random placements. We prove that the former is asymptotically equivalent to the optimal placement when the number of sensors goes to infinity, with a cost ratio converging to 1, while the cost of the latter remains strictly larger.
△ Less
Submitted 14 November, 2014; v1 submitted 30 April, 2014;
originally announced April 2014.