Skip to main content

Showing 1–22 of 22 results for author: King, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.04627  [pdf, other

    cs.DS

    Computing (1+epsilon)-Approximate Degeneracy in Sublinear Time

    Authors: Valerie King, Alex Thomo, Quinton Yong

    Abstract: The problem of finding the degeneracy of a graph is a subproblem of the k-core decomposition problem. In this paper, we present a (1 + epsilon)-approximate solution to the degeneracy problem which runs in O(n log n) time, sublinear in the input size for dense graphs, by sampling a small number of neighbors adjacent to high degree nodes. Our algorithm can also be extended to an O(n log n) time solu… ▽ More

    Submitted 14 November, 2022; v1 submitted 8 November, 2022; originally announced November 2022.

  2. arXiv:2205.08287  [pdf, other

    cs.CR cs.DC cs.DS

    Bankrupting DoS Attackers

    Authors: Trisha Chakraborty, Abir Islam, Valerie King, Daniel Rayborn, Jared Saia, Maxwell Young

    Abstract: To defend against denial-of-service (DoS) attacks, we employ a technique called resource burning (RB). RB is the verifiable expenditure of a resource, such as computational power, required from clients before receiving service from the server. To the best of our knowledge, we present the first DoS defense algorithms where the algorithmic cost -- the cost to both the server and the honest clients -… ▽ More

    Submitted 14 July, 2023; v1 submitted 17 May, 2022; originally announced May 2022.

  3. Communication Costs in a Geometric Communication Network

    Authors: Sima Hajiaghaei Shanjani, Valerie King

    Abstract: A communication network is a graph in which each node has only local information about the graph and nodes communicate by passing messages along its edges. Here, we consider the {\it geometric communication network} where the nodes also occupy points in space and the distance between points is the Euclidean distance. Our goal is to understand the communication cost needed to solve several fundamen… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

    Comments: A version of this work was submitted to ICDCN 2021

  4. arXiv:1909.11147  [pdf, other

    cs.DM cs.DC cs.DS

    Random $k$-out subgraph leaves only $O(n/k)$ inter-component edges

    Authors: Jacob Holm, Valerie King, Mikkel Thorup, Or Zamir, Uri Zwick

    Abstract: Each vertex of an arbitrary simple graph on $n$ vertices chooses $k$ random incident edges. What is the expected number of edges in the original graph that connect different connected components of the sampled subgraph? We prove that the answer is $O(n/k)$, when $k\ge c\log n$, for some large enough $c$. We conjecture that the same holds for smaller values of $k$, possibly for any $k\ge 2$. Such a… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: 22 pages, 1 figure, to appear at FOCS 2019

  5. arXiv:1907.12152  [pdf, ps, other

    cs.DC

    Faster asynchronous MST and low diameter tree construction with sublinear communication

    Authors: Ali Mashreghi, Valerie King

    Abstract: Building a spanning tree, minimum spanning tree (MST), and BFS tree in a distributed network are fundamental problems which are still not fully understood in terms of time and communication cost. x The first work to succeed in computing a spanning tree with communication sublinear in the number of edges in an asynchronous CONGEST network appeared in DISC 2018. That algorithm which constructs an MS… ▽ More

    Submitted 28 July, 2019; originally announced July 2019.

  6. arXiv:1907.10308  [pdf, other

    cs.DC cs.DS

    Scalable and Secure Computation Among Strangers: Resource-Competitive Byzantine Protocols

    Authors: John Augustine, Valerie King, Anisur R. Molla, Gopal Pandurangan, Jared Saia

    Abstract: Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary nodes (whose identities are not known apriori) can join and leave at will, we extend established research in scalable Byzantine agreement to a more practical model where each node (initially) does not know the identity of other nodes. A node can send to new destinations only by sending to random (or arbitrary… ▽ More

    Submitted 25 July, 2019; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: 24 pages, one figure. The author list has been corrected in the metadata. There are no other changes from version 1

  7. arXiv:1812.10169  [pdf, ps, other

    cs.DC

    Correction to Byzantine Agreement in Expected Polynomial Time, JACM 2016

    Authors: Valerie King, Jared Saia

    Abstract: This is a correction by the authors to "Byzantine Agreement in Expected Polynomial Time" which appeared in the Journal of the ACM in 2016. It corrects a failure in the paper to consider the adversary's ability to decide the number of fair coinflips in an iteration, where this number ranges between n(n-t) and n(n-2t).

    Submitted 7 August, 2019; v1 submitted 25 December, 2018; originally announced December 2018.

    Comments: 4 pages

  8. arXiv:1806.04328  [pdf, ps, other

    cs.DC

    Broadcast and minimum spanning tree with $o(m)$ messages in the asynchronous CONGEST model

    Authors: Ali Mashreghi, Valerie King

    Abstract: We provide the first asynchronous distributed algorithms to compute broadcast and minimum spanning tree with $o(m)$ bits of communication, in a graph with $n$ nodes and $m$ edges. For decades, it was believed that $Ω(m)$ bits of communication are required for any algorithm that constructs a broadcast tree. In 2015, King, Kutten and Thorup showed that in the KT1 model where nodes have initial knowl… ▽ More

    Submitted 26 January, 2019; v1 submitted 12 June, 2018; originally announced June 2018.

    Comments: Submitted to DISC 2018 conference

    ACM Class: C.2.4

  9. arXiv:1804.05441  [pdf, ps, other

    cs.DS cs.DC

    A Deterministic Distributed Algorithm for Exact Weighted All-Pairs Shortest Paths in $\tilde{O}(n^{3/2})$ Rounds

    Authors: Udit Agarwal, Vijaya Ramachandran, Valerie King, Matteo Pontecorvi

    Abstract: We present a deterministic distributed algorithm to compute all-pairs shortest paths(APSP) in an edge-weighted directed or undirected graph. Our algorithm runs in $\tilde{O}(n^{3/2})$ rounds in the Congest model, where $n$ is the number of nodes in the graph. This is the first $o(n^2)$ rounds deterministic distributed algorithm for the weighted APSP problem. Our algorithm is fairly simple and inco… ▽ More

    Submitted 15 April, 2018; originally announced April 2018.

  10. arXiv:1509.06464  [pdf, ps, other

    cs.DS

    Dynamic graph connectivity with improved worst case update time and sublinear space

    Authors: David Gibb, Bruce Kapron, Valerie King, Nolan Thorn

    Abstract: This paper considers fully dynamic graph algorithms with both faster worst case update time and sublinear space. The fully dynamic graph connectivity problem is the following: given a graph on a fixed set of n nodes, process an online sequence of edge insertions, edge deletions, and queries of the form "Is there a path between nodes a and b?" In 2013, the first data structure was presented with wo… ▽ More

    Submitted 22 September, 2015; originally announced September 2015.

    MSC Class: 68W20 ACM Class: E.1

  11. arXiv:1502.03320  [pdf, ps, other

    cs.DC cs.DS

    Construction and impromptu repair of an MST in a distributed network with o(m) communication

    Authors: Valerie King, Shay Kutten, Mikkel Thorup

    Abstract: In the CONGEST model, a communications network is an undirected graph whose $n$ nodes are processors and whose $m$ edges are the communications links between processors. At any given time step, a message of size $O(\log n)$ may be sent by each node to each of its neighbors. We show for the synchronous model: If all nodes start in the same round, and each node knows its ID and the ID's of its neigh… ▽ More

    Submitted 11 February, 2015; originally announced February 2015.

  12. arXiv:1412.5697  [pdf, ps, other

    cs.CG

    Kinetic $k$-Semi-Yao Graph and its Applications

    Authors: Zahed Rahmati, Mohammad Ali Abam, Valerie King, Sue Whitesides

    Abstract: This paper introduces a new proximity graph, called the $k$-Semi-Yao graph ($k$-SYG), on a set $P$ of points in $\mathbb{R}^d$, which is a supergraph of the $k$-nearest neighbor graph ($k$-NNG) of $P$. We provide a kinetic data structure (KDS) to maintain the $k$-SYG on moving points, where the trajectory of each point is a polynomial function whose degree is bounded by some constant. Our techniqu… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Comments: arXiv admin note: text overlap with arXiv:1307.2700, arXiv:1406.5554

  13. arXiv:1406.5554  [pdf, ps, other

    cs.CG

    Kinetic Reverse $k$-Nearest Neighbor Problem

    Authors: Zahed Rahmati, Valerie King, Sue Whitesides

    Abstract: This paper provides the first solution to the kinetic reverse $k$-nearest neighbor (\rknn) problem in $\mathbb{R}^d$, which is defined as follows: Given a set $P$ of $n$ moving points in arbitrary but fixed dimension $d$, an integer $k$, and a query point $q\notin P$ at any time $t$, report all the points $p\in P$ for which $q$ is one of the $k$-nearest neighbors of $p$.

    Submitted 25 September, 2014; v1 submitted 20 June, 2014; originally announced June 2014.

  14. arXiv:1311.2032  [pdf, ps, other

    cs.CG

    A Simple, Faster Method for Kinetic Proximity Problems

    Authors: Zahed Rahmati, Mohammad Ali Abam, Valerie King, Sue Whitesides, Alireza Zarei

    Abstract: For a set of $n$ points in the plane, this paper presents simple kinetic data structures (KDS's) for solutions to some fundamental proximity problems, namely, the all nearest neighbors problem, the closest pair problem, and the Euclidean minimum spanning tree (EMST) problem. Also, the paper introduces KDS's for maintenance of two well-studied sparse proximity graphs, the Yao graph and the Semi-Yao… ▽ More

    Submitted 4 January, 2014; v1 submitted 8 November, 2013; originally announced November 2013.

    Comments: Preliminary versions of parts of this paper appeared in Proceedings of the 29th ACM Symposium on Computational Geometry (SoCG 2013) and Proceedings of the 13th Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2012)

  15. arXiv:1310.4595   

    cs.DC cs.DS cs.NI

    Proceedings Ninth International Workshop on Foundations of Mobile Computing

    Authors: Keren Censor-Hillel, Valerie King

    Abstract: Mobile communication has become a vigorous field of research in computer science, due to the wide spreading of mobile technologies, applications and services. The intertwining of communication, computation and mobility constantly poses new challenges to algorithmic design in this area. The Foundations of Mobile Computing (FOMC) workshop is dedicated to all aspects that cover contributions both in… ▽ More

    Submitted 17 October, 2013; originally announced October 2013.

    Journal ref: EPTCS 132, 2013

  16. arXiv:1310.3486  [pdf, other

    cs.DS cs.CR cs.DC

    Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation

    Authors: Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia

    Abstract: We describe an asynchronous algorithm to solve secure multiparty computation (MPC) over n players, when strictly less than a 1/8 fraction of the players are controlled by a static adversary. For any function f over a field that can be computed by a circuit with m gates, our algorithm requires each player to send a number of field elements and perform an amount of computation that is O (m/n + \sqrt… ▽ More

    Submitted 13 October, 2013; originally announced October 2013.

    Comments: ICDCN version: 15 pages

  17. arXiv:1307.2700  [pdf, ps, other

    cs.CG

    Kinetic Data Structures for the Semi-Yao Graph and All Nearest Neighbors in R^d

    Authors: Zahed Rahmati, Mohammad Ali Abam, Valerie King, Sue Whitesides

    Abstract: This paper presents a simple kinetic data structure for maintaining all the nearest neighbors of a set of $n$ moving points in $\mathbb{R}^d$, where the trajectory of each point is an algebraic function of at most constant degree $s$. The approach is based on maintaining the edges of the Semi-Yao graph, a sparse graph whose edge set includes the pairs of nearest neighbors as a subset. Our kineti… ▽ More

    Submitted 14 November, 2013; v1 submitted 10 July, 2013; originally announced July 2013.

  18. arXiv:1203.0289  [pdf, other

    cs.DS

    Secure Multi-Party Computation in Large Networks

    Authors: Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani

    Abstract: We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a large number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a $1/3$ fraction of the parties. In the asynchronous setting, we allow the adversary to co… ▽ More

    Submitted 27 September, 2015; v1 submitted 1 March, 2012; originally announced March 2012.

    Comments: 51 pages

  19. arXiv:1202.6456  [pdf, ps, other

    cs.DC

    A Resource-Competitive Jamming Defense

    Authors: Valerie King, Seth Pettie, Jared Saia, Maxwell Young

    Abstract: Consider a scenario where Alice wishes to send a message $m$ to Bob in a time-slotted wireless network. However, there exists an adversary, Carol, who aims to prevent the transmission of $m$ by jamming the communication channel. There is a per-slot cost of $1$ to send, receive or jam $m$ on the channel, and we are interested in how much Alice and Bob need to spend relative to Carol in order to gua… ▽ More

    Submitted 18 May, 2017; v1 submitted 29 February, 2012; originally announced February 2012.

  20. arXiv:1202.3504  [pdf, ps, other

    cs.SI

    They Know Where You Live!

    Authors: Kazem Jahanbakhsh, Valerie King, Gholamali C. Shoja

    Abstract: In this paper, we demonstrate the possibility of predicting people's hometowns by using their geotagged photos posted on Flickr website. We employ Kruskal's algorithm to cluster photos taken by a user and predict the user's hometown. Our results prove that using social profiles of photographers allows researchers to predict the locations of their taken photos with higher accuracies. This in return… ▽ More

    Submitted 15 February, 2012; originally announced February 2012.

  21. arXiv:1002.4561  [pdf, other

    cs.DC

    Breaking the O(n^2) Bit Barrier: Scalable Byzantine agreement with an Adaptive Adversary

    Authors: Valerie King, Jared Saia

    Abstract: We describe an algorithm for Byzantine agreement that is scalable in the sense that each processor sends only $\tilde{O}(\sqrt{n})$ bits, where $n$ is the total number of processors. Our algorithm succeeds with high probability against an \emph{adaptive adversary}, which can take over processors at any time during the protocol, up to the point of taking over arbitrarily close to a 1/3 fraction.… ▽ More

    Submitted 24 February, 2010; originally announced February 2010.

  22. arXiv:0710.2532  [pdf, ps, other

    cs.DS

    Slee** on the Job: Energy-Efficient Broadcast for Radio Networks

    Authors: Valerie King, Cynthia Phillips, Jared Saia, Maxwell Young

    Abstract: We address the problem of minimizing power consumption when performing reliable broadcast on a radio network under the following popular model. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message, all awake nodes within distance r receive the message. In the broadcast problem, some node wants to successfully send a message to all other no… ▽ More

    Submitted 12 October, 2007; originally announced October 2007.

    Comments: 15 pages, 1 figure

    ACM Class: F.2.0; C.2.1