-
Distributed Model Checking on Graphs of Bounded Treedepth
Authors:
Fedor V. Fomin,
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
We establish that every monadic second-order logic (MSO) formula on graphs with bounded treedepth is decidable in a constant number of rounds within the CONGEST model. To our knowledge, this marks the first meta-theorem regarding distributed model-checking. Various optimization problems on graphs are expressible in MSO. Examples include determining whether a graph $G$ has a clique of size $k$, whe…
▽ More
We establish that every monadic second-order logic (MSO) formula on graphs with bounded treedepth is decidable in a constant number of rounds within the CONGEST model. To our knowledge, this marks the first meta-theorem regarding distributed model-checking. Various optimization problems on graphs are expressible in MSO. Examples include determining whether a graph $G$ has a clique of size $k$, whether it admits a coloring with $k$ colors, whether it contains a graph $H$ as a subgraph or minor, or whether terminal vertices in $G$ could be connected via vertex-disjoint paths. Our meta-theorem significantly enhances the work of Bousquet et al. [PODC 2022], which was focused on distributed certification of MSO on graphs with bounded treedepth. Moreover, our results can be extended to solving optimization and counting problems expressible in MSO, in graphs of bounded treedepth.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
The Hardness of Local Certification of Finite-State Dynamics
Authors:
Diego Maldonado,
Pedro Montealegre,
Martín Ríos-Wilson
Abstract:
Finite-State Dynamics (FSD) is one of the simplest and constrained distributed systems. An FSD is defined by an $n$-node network, with each node maintaining an internal state selected from a finite set. At each time-step, these nodes synchronously update their internal states based solely on the states of their neighboring nodes.
Rather than focusing on specific types of local functions, in this…
▽ More
Finite-State Dynamics (FSD) is one of the simplest and constrained distributed systems. An FSD is defined by an $n$-node network, with each node maintaining an internal state selected from a finite set. At each time-step, these nodes synchronously update their internal states based solely on the states of their neighboring nodes.
Rather than focusing on specific types of local functions, in this article, our primary focus is on the problem of determining the maximum time required for an FSD to reach a stable global state. This global state can be seen as the acceptance state or as the output of a distributed computation. For fixed $k$ and $q$, we define the problem $\text{convergence}(k,q)$, which consists of deciding if a $q$-state FSD converges in at most $k$ time-steps.
Our main focus is to study the problem $\text{convergence}$ from the perspective of distributed certification, with a focus on the model of proof-labeling schemes (PLS). First, we study the problem $\text{convergence}$ on arbitrary graphs and show that every PLS has certificates of size $Θ(n^2)$ (up to logarithmic factors). Then, we turn to the restriction of the problem on graphs of maximum degree $Δ$. Roughly, we show that the problem admits a PLS with certificates of size $Δ^{k+1}$, while every PLS requires certificates of size at least $2^{k/6} \cdot 6/k$ on graphs of maximum degree 3.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Recognizing Hereditary Properties in the Presence of Byzantine Nodes
Authors:
David Cifuentes-Núñez,
Pedro Montealegre,
Ivan Rapaport
Abstract:
Augustine et al. [DISC 2022] initiated the study of distributed graph algorithms in the presence of Byzantine nodes in the congested clique model. In this model, there is a set $B$ of Byzantine nodes, where $|B|$ is less than a third of the total number of nodes. These nodes have complete knowledge of the network and the state of other nodes, and they conspire to alter the output of the system. Th…
▽ More
Augustine et al. [DISC 2022] initiated the study of distributed graph algorithms in the presence of Byzantine nodes in the congested clique model. In this model, there is a set $B$ of Byzantine nodes, where $|B|$ is less than a third of the total number of nodes. These nodes have complete knowledge of the network and the state of other nodes, and they conspire to alter the output of the system. The authors addressed the connectivity problem, showing that it is solvable under the promise that either the subgraph induced by the honest nodes is connected, or the graph has $2|B|+1$ connected components.
In the current work, we continue the study of the Byzantine congested clique model by considering the recognition of other graph properties, specifically \emph{hereditary properties}. A graph property is \emph{hereditary} if it is closed under taking induced subgraphs. Examples of hereditary properties include acyclicity, bipartiteness, planarity, and bounded (chromatic, independence) number, etc.
For each class of graphs $\mathcal{G}$ satisfying an hereditary property (an hereditary graph-class), we propose a randomized algorithm which, with high probability, (1) accepts if the input graph $G$ belongs to $\mathcal{G}$, and (2) rejects if $G$ contains at least $|B| + 1$ disjoint subgraphs not belonging to $\mathcal{G}$. The round complexity of our algorithm is $$\mathcal{O}\left(\left(\dfrac{\log \left(\left|\mathcal{G}_n\right|\right)}{n} +|B|\right)\cdot\textrm{polylog}(n)\right),$$ where $\mathcal{G}_n$ is the set of $n$-node graphs in $\mathcal{G}$.
Finally, we obtain an impossibility result that proves that our result is tight. Indeed, we consider the hereditary class of acyclic graphs, and we prove that there is no algorithm that can distinguish between a graph being acyclic and a graph having $|B|$ disjoint cycles.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Local Certification of Some Geometric Intersection Graph Classes
Authors:
Benjamín Jauregui,
Pedro Montealegre,
Diego Ramírez-Romero,
Ivan Rapaport
Abstract:
In the context of distributed certification, the recognition of graph classes has started to be intensively studied. For instance, different results related to the recognition of planar, bounded tree-width and $H$-minor free graphs have been recently obtained. The goal of the present work is to design compact certificates for the local recognition of relevant geometric intersection graph classes,…
▽ More
In the context of distributed certification, the recognition of graph classes has started to be intensively studied. For instance, different results related to the recognition of planar, bounded tree-width and $H$-minor free graphs have been recently obtained. The goal of the present work is to design compact certificates for the local recognition of relevant geometric intersection graph classes, namely interval, chordal, circular arc, trapezoid and permutation. More precisely, we give proof labeling schemes recognizing each of these classes with logarithmic-sized certificates. We also provide tight logarithmic lower bounds on the size of the certificates on the proof labeling schemes for the recognition of any of the aforementioned geometric intersection graph classes.
△ Less
Submitted 9 September, 2023;
originally announced September 2023.
-
Dynamical Stability of Threshold Networks over Undirected Signed Graphs
Authors:
Eric Goles,
Pedro Montealegre,
Martín Ríos-Wilson,
Sylvain Sené
Abstract:
In this paper, we explore the dynamic behavior of threshold networks on undirected signed graphs. Much attention has been dedicated to understand the convergence and long-term behavior of this model. Yet, an open question persists: How does the underlying graph structure impact network dynamics? Similar studies have been carried out for threshold networks and other types of networks, but these pri…
▽ More
In this paper, we explore the dynamic behavior of threshold networks on undirected signed graphs. Much attention has been dedicated to understand the convergence and long-term behavior of this model. Yet, an open question persists: How does the underlying graph structure impact network dynamics? Similar studies have been carried out for threshold networks and other types of networks, but these primarily focus on unsigned networks. Here, we address the question on signed threshold networks. We introduce the stability index of a graph, related to the concepts of frustration and balance in signed graphs, to establish a connection between the structure and the dynamics of such networks. We show that graphs which present a negative stability index exhibit stable dynamics, i.e., the dynamics converges to fixed points regardless of its threshold parameters. Conversely, if at least one subgraph has a positive stability index, oscillations in long term behavior may appear. Furthermore, we generalize the analysis to network dynamics under periodic update modes and explore the case of the existence of some subgraph with a positive stability index, for which we find that attractors of super-polynomial period in the size of the network may appear.
△ Less
Submitted 29 January, 2024; v1 submitted 4 September, 2023;
originally announced September 2023.
-
Local Certification of Majority Dynamics
Authors:
Diego Maldonado,
Pedro Montealegre,
Martín Ríos-Wilson,
Guillaume Theyssier
Abstract:
In majority voting dynamics, a group of $n$ agents in a social network are asked for their preferred candidate in a future election between two possible choices. At each time step, a new poll is taken, and each agent adjusts their vote according to the majority opinion of their network neighbors. After $T$ time steps, the candidate with the majority of votes is the leading contender in the electio…
▽ More
In majority voting dynamics, a group of $n$ agents in a social network are asked for their preferred candidate in a future election between two possible choices. At each time step, a new poll is taken, and each agent adjusts their vote according to the majority opinion of their network neighbors. After $T$ time steps, the candidate with the majority of votes is the leading contender in the election. In general, it is very hard to predict who will be the leading candidate after a large number of time-steps.
We study, from the perspective of local certification, the problem of predicting the leading candidate after a certain number of time-steps, which we call Election-Prediction. We show that in graphs with sub-exponential growth Election-Prediction admits a proof labeling scheme of size $\mathcal{O}(\log n)$. We also find non-trivial upper bounds for graphs with a bounded degree, in which the size of the certificates are sub-linear in $n$.
Furthermore, we explore lower bounds for the unrestricted case, showing that locally checkable proofs for Election-Prediction on arbitrary $n$-node graphs have certificates on $Ω(n)$ bits. Finally, we show that our upper bounds are tight even for graphs of constant growth.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Distributed Certification for Classes of Dense Graphs
Authors:
Pierre Fraigniaud,
Frédéric Mazoit,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
A proof-labeling scheme (PLS) for a boolean predicate $Π$ on labeled graphs is a mechanism used for certifying the legality with respect to $Π$ of global network states in a distributed manner. In a PLS, a certificate is assigned to each processing node of the network, and the nodes are in charge of checking that the collection of certificates forms a global proof that the system is in a correct s…
▽ More
A proof-labeling scheme (PLS) for a boolean predicate $Π$ on labeled graphs is a mechanism used for certifying the legality with respect to $Π$ of global network states in a distributed manner. In a PLS, a certificate is assigned to each processing node of the network, and the nodes are in charge of checking that the collection of certificates forms a global proof that the system is in a correct state, by exchanging the certificates once, between neighbors only. The main measure of complexity is the size of the certificates. Many PLSs have been designed for certifying specific predicates, including cycle-freeness, minimum-weight spanning tree, planarity, etc.
In 2021, a breakthrough has been obtained, as a meta-theorem stating that a large set of properties have compact PLSs in a large class of networks. Namely, for every $\mathrm{MSO}_2$ property $Π$ on labeled graphs, there exists a PLS for $Π$ with $O(\log n)$-bit certificates for all graphs of bounded tree-depth. This result has been extended to the larger class of graphs with bounded {tree-width}, using certificates on $O(\log^2 n)$ bits.
We extend this result even further, to the larger class of graphs with bounded clique-width, which, as opposed to the other two aforementioned classes, includes dense graphs. We show that, for every $\mathrm{MSO}_1$ property $Π$ on labeled graphs, there exists a PLS for $Π$ with $O(\log^2 n)$ bit certificates for all graphs of bounded clique-width.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Energy-Efficient Distributed Algorithms for Synchronous Networks
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
We study the design of energy-efficient algorithms for the LOCAL and CONGEST models. Specifically, as a measure of complexity, we consider the maximum, taken over all the edges, or over all the nodes, of the number of rounds at which an edge, or a node, is active in the algorithm. We first show that every Turing-computable problem has a CONGEST algorithm with constant node-activation complexity, a…
▽ More
We study the design of energy-efficient algorithms for the LOCAL and CONGEST models. Specifically, as a measure of complexity, we consider the maximum, taken over all the edges, or over all the nodes, of the number of rounds at which an edge, or a node, is active in the algorithm. We first show that every Turing-computable problem has a CONGEST algorithm with constant node-activation complexity, and therefore constant edge-activation complexity as well. That is, every node (resp., edge) is active in sending (resp., transmitting) messages for only $O(1)$ rounds during the whole execution of the algorithm. In other words, every Turing-computable problem can be solved by an algorithm consuming the least possible energy. In the LOCAL model, the same holds obviously, but with the additional feature that the algorithm runs in $O(\mbox{poly}(n))$ rounds in $n$-node networks. However, we show that insisting on algorithms running in $O(\mbox{poly}(n))$ rounds in the CONGEST model comes with a severe cost in terms of energy. Namely, there are problems requiring $Ω(\mbox{poly}(n))$ edge-activations (and thus $Ω(\mbox{poly}(n))$ node-activations as well) in the CONGEST model whenever solved by algorithms bounded to run in $O(\mbox{poly}(n))$ rounds. Finally, we demonstrate the existence of a sharp separation between the edge-activation complexity and the node-activation complexity in the CONGEST model, for algorithms bounded to run in $O(\mbox{poly}(n))$ rounds. Specifically, under this constraint, there is a problem with $O(1)$ edge-activation complexity but $\tildeΩ(n^{1/4})$ node-activation complexity.
△ Less
Submitted 5 April, 2023; v1 submitted 27 January, 2023;
originally announced January 2023.
-
Computing Power of Hybrid Models in Synchronous Networks
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Pablo Paredes,
Ivan Rapaport,
Martín Ríos-Wilson,
Ioan Todinca
Abstract:
During the last two decades, a small set of distributed computing models for networks have emerged, among which LOCAL, CONGEST, and Broadcast Congested Clique (BCC) play a prominent role. We consider hybrid models resulting from combining these three models. That is, we analyze the computing power of models allowing to, say, perform a constant number of rounds of CONGEST, then a constant number of…
▽ More
During the last two decades, a small set of distributed computing models for networks have emerged, among which LOCAL, CONGEST, and Broadcast Congested Clique (BCC) play a prominent role. We consider hybrid models resulting from combining these three models. That is, we analyze the computing power of models allowing to, say, perform a constant number of rounds of CONGEST, then a constant number of rounds of LOCAL, then a constant number of rounds of BCC, possibly repeating this figure a constant number of times. We specifically focus on 2-round models, and we establish the complete picture of the relative powers of these models. That is, for every pair of such models, we determine whether one is (strictly) stronger than the other, or whether the two models are incomparable. The separation results are obtained by approaching communication complexity through an original angle, which may be of independent interest. The two players are not bounded to compute the value of a binary function, but the combined outputs of the two players are constrained by this value. In particular, we introduce the XOR-Index problem, in which Alice is given a binary vector $x\in\{0,1\}^n$ together with an index $i\in[n]$, Bob is given a binary vector $y\in\{0,1\}^n$ together with an index $j\in[n]$, and, after a single round of 2-way communication, Alice must output a boolean $\textrm{out}_A$, and Bob must output a boolean $\textrm{out}_B$, such that $\mbox{out}_A\land\mbox{out}_B = x_j\oplus y_i$. We show that the communication complexity of XOR-Index is $Ω(n)$ bits.
△ Less
Submitted 4 August, 2022;
originally announced August 2022.
-
Distributed Interactive Proofs for the Recognition of Some Geometric Intersection Graph Classes
Authors:
Benjamin Jauregui,
Pedro Montealegre,
Ivan Rapaport
Abstract:
A graph $G=(V,E)$ is a geometric intersection graph if every node $v \in V$ is identified with a geometric object of some particular type, and two nodes are adjacent if the corresponding objects intersect. Geometric intersection graph classes have been studied from both the theoretical and practical point of view. On the one hand, many hard problems can be efficiently solved or approximated when t…
▽ More
A graph $G=(V,E)$ is a geometric intersection graph if every node $v \in V$ is identified with a geometric object of some particular type, and two nodes are adjacent if the corresponding objects intersect. Geometric intersection graph classes have been studied from both the theoretical and practical point of view. On the one hand, many hard problems can be efficiently solved or approximated when the input graph is restricted to a geometric intersection class of graphs. On the other hand, these graphs appear naturally in many applications such as sensor networks, scheduling problems, and others. Recently, in the context of distributed certification and distributed interactive proofs, the recognition of graph classes has started to be intensively studied. Different results related to the recognition of trees, bipartite graphs, bounded diameter graphs, triangle-free graphs, planar graphs, bounded genus graphs, $H$-minor free graphs, etc., have been obtained.
The goal of the present work is to design efficient distributed protocols for the recognition of relevant geometric intersection graph classes, namely permutation graphs, trapezoid graphs, circle graphs, and polygon-circle graphs. More precisely, for the two first classes, we give proof labeling schemes recognizing them with logarithmic-sized certificates. For the other two classes, we give three-round distributed interactive protocols that use messages and certificates of size $\mathcal{O}(\log n)$. Finally, we provide logarithmic lower-bounds on the size of the certificates on the proof labeling schemes for the recognition of any of the aforementioned geometric intersection graph classes.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
A Meta-Theorem for Distributed Certification
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
Distributed certification, whether it be proof-labeling schemes, locally checkable proofs, etc., deals with the issue of certifying the legality of a distributed system with respect to a given boolean predicate. A certificate is assigned to each process in the system by a non-trustable oracle, and the processes are in charge of verifying these certificates, so that two properties are satisfied: co…
▽ More
Distributed certification, whether it be proof-labeling schemes, locally checkable proofs, etc., deals with the issue of certifying the legality of a distributed system with respect to a given boolean predicate. A certificate is assigned to each process in the system by a non-trustable oracle, and the processes are in charge of verifying these certificates, so that two properties are satisfied: completeness, i.e., for every legal instance, there is a certificate assignment leading all processes to accept, and soundness, i.e., for every illegal instance, and for every certificate assignment, at least one process rejects. The verification of the certificates must be fast, and the certificates themselves must be small. A large quantity of results have been produced in this framework, each aiming at designing a distributed certification mechanism for specific boolean predicates. This paper presents a "meta-theorem", applying to many boolean predicates at once. Specifically, we prove that, for every boolean predicate on graphs definable in the monadic second-order (MSO) logic of graphs, there exists a distributed certification mechanism using certificates on $O(\log^2n)$ bits in $n$-node graphs of bounded treewidth, with a verification protocol involving a single round of communication between neighbors.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
On the complexity of the generalized Q2R automaton
Authors:
Eric Goles,
Marco Montalva-Medel,
Pedro Montealegre,
Martín Ríos-Wilson
Abstract:
We study the dynamic and complexity of the generalized Q2R automaton. We show the existence of non-polynomial cycles as well as its capability to simulate with the synchronous update the classical version of the automaton updated under a block sequential update scheme. Furthermore, we show that the decision problem consisting in determine if a given node in the network changes its state is \textbf…
▽ More
We study the dynamic and complexity of the generalized Q2R automaton. We show the existence of non-polynomial cycles as well as its capability to simulate with the synchronous update the classical version of the automaton updated under a block sequential update scheme. Furthermore, we show that the decision problem consisting in determine if a given node in the network changes its state is \textbf{P}-Hard.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
Generating Boolean Functions on Totalistic Automata Networks
Authors:
Eric Goles,
Andrew Adamatzky,
Pedro Montealegre,
Martín Ríos-Wilson
Abstract:
We consider the problem of studying the simulation capabilities of the dynamics of arbitrary networks of finite states machines. In these models, each node of the network takes two states 0 (passive) and 1 (active). The states of the nodes are updated in parallel following a local totalistic rule, i.e., depending only on the sum of active states. Four families of totalistic rules are considered: l…
▽ More
We consider the problem of studying the simulation capabilities of the dynamics of arbitrary networks of finite states machines. In these models, each node of the network takes two states 0 (passive) and 1 (active). The states of the nodes are updated in parallel following a local totalistic rule, i.e., depending only on the sum of active states. Four families of totalistic rules are considered: linear or matrix defined rules (a node takes state 1 if each of its neighbours is in state 1), threshold rules (a node takes state 1 if the sum of its neighbours exceed a threshold), isolated rules (a node takes state 1 if the sum of its neighbours equals to some single number) and interval rule (a node takes state 1 if the sum of its neighbours belong to some discrete interval). We focus in studying the simulation capabilities of the dynamics of each of the latter classes. In particular, we show that totalistic automata networks governed by matrix defined rules can only implement constant functions and other matrix defined functions. In addition, we show that t by threshold rules can generate any monotone Boolean functions. Finally, we show that networks driven by isolated and the interval rules exhibit a very rich spectrum of boolean functions as they can, in fact, implement any arbitrary Boolean functions. We complement this results by studying experimentally the set of different Boolean functions generated by totalistic rules on random graphs.
△ Less
Submitted 30 July, 2021;
originally announced July 2021.
-
Compact Distributed Interactive Proofs for the Recognition of Cographs and Distance-Hereditary Graphs
Authors:
Pedro Montealegre,
Diego Ramírez-Romero,
Iván Rapaport
Abstract:
We present compact distributed interactive proofs for the recognition of two important graph classes, well-studied in the context of centralized algorithms, namely complement reducible graphs and distance-hereditary graphs. Complement reducible graphs (also called cographs) are defined as the graphs not containing a four-node path $P_4$ as an induced subgraph. Distance-hereditary graphs are a supe…
▽ More
We present compact distributed interactive proofs for the recognition of two important graph classes, well-studied in the context of centralized algorithms, namely complement reducible graphs and distance-hereditary graphs. Complement reducible graphs (also called cographs) are defined as the graphs not containing a four-node path $P_4$ as an induced subgraph. Distance-hereditary graphs are a super-class of cographs, defined as the graphs where the distance (shortest paths) between any pair of vertices is the same on every induced connected subgraph.
First, we show that there exists a distributed interactive proof for the recognition of cographs with two rounds of interaction. More precisely, we give a $\mathsf{dAM}$ protocol with a proof size of $\mathcal{O}(\log n)$ bits that uses shared randomness and recognizes cographs with high probability. Moreover, our protocol can be adapted to verify any Turing-decidable predicate restricted to cographs in $\mathsf{dAM}$ with certificates of size $\mathcal{O}(\log n)$.
Second, we give a three-round, $\mathsf{dMAM}$ interactive protocol for the recognition of distance-hereditary graphs, still with a proof size of $\mathcal{O}(\log n)$ bits and also using shared randomness.
Finally, we show that any one-round (denoted $\mathsf{dM}$) or two-round, $\mathsf{dMA}$ protocol for the recognition of cographs or distance-hereditary graphs requires certificates of size $Ω(\log n)$ bits. Moreover, we show that any constant-round $\mathsf{dAM}$ protocol using shared randomness requires certificates of size $Ω(\log \log n)$.
△ Less
Submitted 6 December, 2020;
originally announced December 2020.
-
Local Certification of Graphs with Bounded Genus
Authors:
Laurent Feuilloley,
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Éric Rémila,
Ioan Todinca
Abstract:
Naor, Parter, and Yogev [SODA 2020] recently designed a compiler for automatically translating standard centralized interactive protocols to distributed interactive protocols, as introduced by Kol, Oshman, and Saxena [PODC 2018]. In particular, by using this compiler, every linear-time algorithm for deciding the membership to some fixed graph class can be translated into a…
▽ More
Naor, Parter, and Yogev [SODA 2020] recently designed a compiler for automatically translating standard centralized interactive protocols to distributed interactive protocols, as introduced by Kol, Oshman, and Saxena [PODC 2018]. In particular, by using this compiler, every linear-time algorithm for deciding the membership to some fixed graph class can be translated into a $\mathsf{dMAM}(O(\log n))$ protocol for this class, that is, a distributed interactive protocol with $O(\log n)$-bit proof size in $n$-node graphs, and three interactions between the (centralizer) computationally-unbounded but non-trustable prover Merlin, and the (decentralized) randomized computationally-limited verifier Arthur. As a corollary, there is a $\mathsf{dMAM}(O(\log n))$ protocol for the class of planar graphs, as well as for the class of graphs with bounded genus.
We show that there exists a distributed interactive protocol for the class of graphs with bounded genus performing just a single interaction, from the prover to the verifier, yet preserving proof size of $O(\log n)$ bits. This result also holds for the class of graphs with bounded demi-genus, that is, graphs that can be embedded on a non-orientable surface of bounded genus. The interactive protocols described in this paper are actually proof-labeling schemes, i.e., a subclass of interactive protocols, previously introduced by Korman, Kutten, and Peleg [PODC 2005]. In particular, these schemes do not require any randomization from the verifier, and the proofs may often be computed a priori, at low cost, by the nodes themselves. Our results thus extend the recent proof-labeling scheme for planar graphs by Feuilloley et al. [PODC 2020], to graphs of bounded genus, and to graphs of bounded demigenus.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
Shared vs Private Randomness in Distributed Interactive Proofs
Authors:
Pedro Montealegre,
Diego Ramírez-Romero,
Ivan Rapaport
Abstract:
In distributed interactive proofs, the nodes of a graph G interact with a powerful but untrustable prover who tries to convince them, in a small number of rounds and through short messages, that G satisfies some property. This series of interactions is followed by a phase of distributed verification, which may be either deterministic or randomized, where nodes exchange messages with their neighbor…
▽ More
In distributed interactive proofs, the nodes of a graph G interact with a powerful but untrustable prover who tries to convince them, in a small number of rounds and through short messages, that G satisfies some property. This series of interactions is followed by a phase of distributed verification, which may be either deterministic or randomized, where nodes exchange messages with their neighbors.
The nature of this last verification round defines the two types of interactive protocols. We say that the protocol is of Arthur-Merlin type if the verification round is deterministic. We say that the protocol is of Merlin-Arthur type if, in the verification round, the nodes are allowed to use a fresh set of random bits.
In the original model introduced by Kol, Oshman, and Saxena [PODC 2018], the randomness was private in the sense that each node had only access to an individual source of random coins. Crescenzi, Fraigniaud, and Paz [DISC 2019] initiated the study of the impact of shared randomness (the situation where the coin tosses are visible to all nodes) in the distributed interactive model.
In this work, we continue that research line by showing that the impact of the two forms of randomness is very different depending on whether we are considering Arthur-Merlin protocols or Merlin-Arthur protocols. While private randomness gives more power to the first type of protocols, shared randomness provides more power to the second. Our results also connect shared randomness in distributed interactive proofs with distributed verification, and new lower bounds are obtained.
△ Less
Submitted 29 June, 2020;
originally announced June 2020.
-
On the impact of treewidth in the computational complexity of freezing dynamics
Authors:
Eric Goles,
Pedro Montealegre,
Martín Ríos-Wilson,
Guillaume Theyssier
Abstract:
An automata network is a network of entities, each holding a state from a finite set and evolving according to a local update rule which depends only on its neighbors in the network's graph. It is freezing if there is an order on states such that the state evolution of any node is non-decreasing in any orbit. They are commonly used to model epidemic propagation, diffusion phenomena like bootstrap…
▽ More
An automata network is a network of entities, each holding a state from a finite set and evolving according to a local update rule which depends only on its neighbors in the network's graph. It is freezing if there is an order on states such that the state evolution of any node is non-decreasing in any orbit. They are commonly used to model epidemic propagation, diffusion phenomena like bootstrap percolation or cristal growth. In this paper we establish how treewidth and maximum degree of the underlying graph are key parameters which influence the overall computational complexity of finite freezing automata networks. First, we define a general model checking formalism that captures many classical decision problems: prediction, nilpotency, predecessor, asynchronous reachability. Then, on one hand, we present an efficient parallel algorithm that solves the general model checking problem in NC for any graph with bounded degree and bounded treewidth. On the other hand, we show that these problems are hard in their respective classes when restricted to families of graph with polynomially growing treewidth. For prediction, predecessor and asynchronous reachability, we establish the hardness result with a fixed set-defiend update rule that is universally hard on any input graph of such families.
△ Less
Submitted 2 February, 2021; v1 submitted 24 May, 2020;
originally announced May 2020.
-
Compact Distributed Certification of Planar Graphs
Authors:
Laurent Feuilloley,
Pierre Fraigniaud,
Ivan Rapaport,
Éric Rémila,
Pedro Montealegre,
Ioan Todinca
Abstract:
Naor, Parter, and Yogev (SODA 2020) have recently demonstrated the existence of a \emph{distributed interactive proof} for planarity (i.e., for certifying that a network is planar), using a sophisticated generic technique for constructing distributed IP protocols based on sequential IP protocols. The interactive proof for planarity is based on a distributed certification of the correct execution o…
▽ More
Naor, Parter, and Yogev (SODA 2020) have recently demonstrated the existence of a \emph{distributed interactive proof} for planarity (i.e., for certifying that a network is planar), using a sophisticated generic technique for constructing distributed IP protocols based on sequential IP protocols. The interactive proof for planarity is based on a distributed certification of the correct execution of any given sequential linear-time algorithm for planarity testing. It involves three interactions between the prover and the randomized distributed verifier (i.e., it is a \dMAM\/ protocol), and uses small certificates, on $O(\log n)$ bits in $n$-node networks. We show that a single interaction from the prover suffices, and randomization is unecessary, by providing an explicit description of a \emph{proof-labeling scheme} for planarity, still using certificates on just $O(\log n)$ bits. We also show that there are no proof-labeling schemes -- in fact, even no \emph{locally checkable proofs} -- for planarity using certificates on $o(\log n)$ bits.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
On the Complexity of the Stability Problem of Binary Freezing Totalistic Cellular Automata
Authors:
Eric Goles,
Diego Maldonado,
Pedro Montealegre,
Nicolas Ollinger
Abstract:
In this paper we study the family of two-state Totalistic Freezing Cellular Automata (TFCA) defined over the triangular and square grids with von Neumann neighborhoods. We say that a Cellular Automaton is Freezing and Totalistic if the active cells remain unchanged, and the new value of an inactive cell depends only on the sum of its active neighbors. We classify all the Cellular Automata in the c…
▽ More
In this paper we study the family of two-state Totalistic Freezing Cellular Automata (TFCA) defined over the triangular and square grids with von Neumann neighborhoods. We say that a Cellular Automaton is Freezing and Totalistic if the active cells remain unchanged, and the new value of an inactive cell depends only on the sum of its active neighbors. We classify all the Cellular Automata in the class of TFCA, grou** them in five different classes: the Trivial rules, Turing Universal rules,Algebraic rules, Topological rules and Fractal Growing rules. At the same time, we study in this family the Stability problem, consisting in deciding whether an inactive cell becomes active, given an initial configuration.We exploit the properties of the automata in each group to show that:
- For Algebraic and Topological Rules the Stability problem is in $\text{NC}$.
- For Turing Universal rules the Stability problem is $\text{P}$-Complete.
△ Less
Submitted 5 December, 2019;
originally announced December 2019.
-
On the Complexity of Asynchronous Freezing Cellular Automata
Authors:
Eric Goles,
Diego Maldonado,
Pedro Montealegre,
Martín Ríos-Wilson
Abstract:
In this paper we study the family of freezing cellular automata (FCA) in the context of asynchronous updating schemes. A cellular automaton is called freezing if there exists an order of its states, and the transitions are only allowed to go from a lower to a higher state. A cellular automaton is asynchronous if at each time-step only one cell is updated. Given configuration, we say that a cell is…
▽ More
In this paper we study the family of freezing cellular automata (FCA) in the context of asynchronous updating schemes. A cellular automaton is called freezing if there exists an order of its states, and the transitions are only allowed to go from a lower to a higher state. A cellular automaton is asynchronous if at each time-step only one cell is updated. Given configuration, we say that a cell is unstable if there exists a sequential updating scheme that changes its state. In this context, we define the problem AsyncUnstability, which consists in deciding if a cell is unstable or not. In general AsyncUnstability is in NP, and we study in which cases we can solve the problem by a more efficient algorithm.
We begin showing that AsyncUnstability is in NL for any one-dimensional FCA. Then we focus on the family of life-like freezing CA (LFCA), which is a family of two-dimensional two-state FCA that generalize the freezing version of the game of life, known as life without death. We study the complexity of AsyncUnstability for all LFCA in the triangular and square grids, showing that almost all of them can be solved in NC, except for one rule for which the problem is NP-complete.
△ Less
Submitted 23 October, 2019;
originally announced October 2019.
-
Computational Complexity of Biased Diffusion Limited Aggregation
Authors:
Nicolas Bitar,
Eric Goles,
Pedro Montealegre
Abstract:
Diffusion-Limited Aggregation (DLA) is a cluster-growth model that consists in a set of particles that are sequentially aggregated over a two-dimensional grid. In this paper, we introduce a biased version of the DLA model, in which particles are limited to move in a subset of possible directions. We denote by $k$-DLA the model where the particles move only in $k$ possible directions. We study the…
▽ More
Diffusion-Limited Aggregation (DLA) is a cluster-growth model that consists in a set of particles that are sequentially aggregated over a two-dimensional grid. In this paper, we introduce a biased version of the DLA model, in which particles are limited to move in a subset of possible directions. We denote by $k$-DLA the model where the particles move only in $k$ possible directions. We study the biased DLA model from the perspective of Computational Complexity, defining two decision problems The first problem is Prediction, whose input is a site of the grid $c$ and a sequence $S$ of walks, representing the trajectories of a set of particles. The question is whether a particle stops at site $c$ when sequence $S$ is realized. The second problem is Realization, where the input is a set of positions of the grid, $P$. The question is whether there exists a sequence $S$ that realizes $P$, i.e. all particles of $S$ exactly occupy the positions in $P$. Our aim is to classify the Prediciton and Realization problems for the different versions of DLA. We first show that Prediction is P-Complete for 2-DLA (thus for 3-DLA). Later, we show that Prediction can be solved much more efficiently for 1-DLA. In fact, we show that in that case the problem is NL-Complete. With respect to Realization, we show that restricted to 2-DLA the problem is in P, while in the 1-DLA case, the problem is in L.
△ Less
Submitted 17 December, 2021; v1 submitted 22 April, 2019;
originally announced April 2019.
-
On the effects of firing memory in the dynamics of conjunctive networks
Authors:
Eric Goles,
Pedro Montealegre,
Martín Ríos Wilson
Abstract:
Boolean networks are one of the most studied discrete models in the context of the study of gene expression. In order to define the dynamics associated to a Boolean network, there are several \emph{update schemes} that range from parallel or \emph{synchronous} to \emph{asynchronous.} However, studying each possible dynamics defined by different update schemes might not be efficient. In this contex…
▽ More
Boolean networks are one of the most studied discrete models in the context of the study of gene expression. In order to define the dynamics associated to a Boolean network, there are several \emph{update schemes} that range from parallel or \emph{synchronous} to \emph{asynchronous.} However, studying each possible dynamics defined by different update schemes might not be efficient. In this context, considering some type of temporal delay in the dynamics of Boolean networks emerges as an alternative approach. In this paper, we focus in studying the effect of a particular type of delay called \emph{firing memory} in the dynamics of Boolean networks. Particularly, we focus in symmetric (non-directed) conjunctive networks and we show that there exist examples that exhibit attractors of non-polynomial period. In addition, we study the prediction problem consisting in determinate if some vertex will eventually change its state, given an initial condition. We prove that this problem is {\bf PSPACE}-complete.
△ Less
Submitted 28 January, 2019;
originally announced January 2019.
-
Finding Connected Secluded Subgraphs
Authors:
Petr A. Golovach,
Pinar Heggernes,
Paloma Lima,
Pedro Montealegre
Abstract:
Problems related to finding induced subgraphs satisfying given properties form one of the most studied areas within graph algorithms. Such problems have given rise to breakthrough results and led to development of new techniques both within the traditional P vs NP dichotomy and within parameterized complexity. The Π-Subgraph problem asks whether an input graph contains an induced subgraph on at le…
▽ More
Problems related to finding induced subgraphs satisfying given properties form one of the most studied areas within graph algorithms. Such problems have given rise to breakthrough results and led to development of new techniques both within the traditional P vs NP dichotomy and within parameterized complexity. The Π-Subgraph problem asks whether an input graph contains an induced subgraph on at least k vertices satisfying graph property Π. For many applications, it is desirable that the found subgraph has as few connections to the rest of the graph as possible, which gives rise to the Secluded Π-Subgraph problem. Here, input k is the size of the desired subgraph, and input t is a limit on the number of neighbors this subgraph has in the rest of the graph. This problem has been studied from a parameterized perspective, and unfortunately it turns out to be W[1]-hard for many graph properties Π, even when parameterized by k+t. We show that the situation changes when we are looking for a connected induced subgraph satisfying Π. In particular, we show that the Connected Π-Secluded Subgraph problem is FPT when parameterized by just t for many important graph properties Π.
△ Less
Submitted 30 October, 2017;
originally announced October 2017.
-
Distributed Subgraph Detection
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Dennis Olivetti,
Ivan Rapaport,
Ioan Todinca
Abstract:
In the standard CONGEST model for distributed network computing, it is known that "global" tasks such as minimum spanning tree, diameter, and all-pairs shortest paths, consume large bandwidth, for their running-time is $Ω(\mbox{poly}(n))$ rounds in $n$-node networks with constant diameter. Surprisingly, "local" tasks such as detecting the presence of a 4-cycle as a subgraph also requires…
▽ More
In the standard CONGEST model for distributed network computing, it is known that "global" tasks such as minimum spanning tree, diameter, and all-pairs shortest paths, consume large bandwidth, for their running-time is $Ω(\mbox{poly}(n))$ rounds in $n$-node networks with constant diameter. Surprisingly, "local" tasks such as detecting the presence of a 4-cycle as a subgraph also requires $\widetildeΩ(\sqrt{n})$ rounds, even using randomized algorithms, and the best known upper bound for detecting the presence of a 3-cycle is $\widetilde{O}(n^{\frac{2}{3}})$ rounds. The objective of this paper is to better understand the landscape of such subgraph detection tasks. We show that, in contrast to \emph{cycles}, which are hard to detect in the CONGEST model, there exists a deterministic algorithm for detecting the presence of a subgraph isomorphic to $T$ running in a \emph{constant} number of rounds, for every tree $T$. Our algorithm provides a distributed implementation of a combinatorial technique due to Erdős et al. for sparsening the set of partial solutions kept by the nodes at each round. Our result has important consequences to \emph{distributed property-testing}, i.e., to randomized algorithms whose aim is to distinguish between graphs satisfying a property, and graphs far from satisfying that property. In particular, we get that, for every graph pattern $H$ composed of an edge and a tree connected in an arbitrary manner, there exists a distributed testing algorithm for $H$-freeness, performing in a constant number of rounds. Although the class of graph patterns $H$ formed by a tree and an edge connected arbitrarily may look artificial, all previous results of the literature concerning testing $H$-freeness for classical patterns such as cycles and cliques can be viewed as direct consequences of our result, while our algorithm enables testing more complex patterns.
△ Less
Submitted 13 June, 2017;
originally announced June 2017.
-
Graph Reconstruction in the Congested Clique
Authors:
Pedro Montealegre,
Sebastian Perez-Salazar,
Ivan Rapaport,
Ioan Todinca
Abstract:
The congested clique model is a message-passing model of distributed computation where the underlying communication network is the complete graph of $n$ nodes. In this paper we consider the situation where the joint input to the nodes is an $n$-node labeled graph $G$, i.e., the local input received by each node is the indicator function of its neighborhood in $G$. Nodes execute an algorithm, commu…
▽ More
The congested clique model is a message-passing model of distributed computation where the underlying communication network is the complete graph of $n$ nodes. In this paper we consider the situation where the joint input to the nodes is an $n$-node labeled graph $G$, i.e., the local input received by each node is the indicator function of its neighborhood in $G$. Nodes execute an algorithm, communicating with each other in synchronous rounds and their goal is to compute some function that depends on $G$. In every round, each of the $n$ nodes may send up to $n-1$ different $b$-bit messages through each of its $n-1$ communication links. We denote by $R$ the number of rounds of the algorithm. The product $Rb$, that is, the total number of bits received by a node through one link, is the cost of the algorithm.
The most difficult problem we could attempt to solve is the reconstruction problem, where nodes are asked to recover all the edges of the input graph $G$. Formally, given a class of graphs $\mathcal G$, the problem is defined as follows: if $G \notin {\mathcal G}$, then every node must reject; on the other hand, if $G \in {\mathcal G}$, then every node must end up, after the $R$ rounds, knowing all the edges of $G$. It is not difficult to see that the cost $Rb$ of any algorithm that solves this problem (even with public coins) is at least $Ω(\log|\mathcal{G}_n|/n)$, where $\mathcal{G}_n$ is the subclass of all $n$-node labeled graphs in $\mathcal G$. In this paper we prove that previous bound is tight and that it is possible to achieve it with only $R=2$ rounds. More precisely, we exhibit (i) a one-round algorithm that achieves this bound for hereditary graph classes; and (ii) a two-round algorithm that achieves this bound for arbitrary graph classes.
△ Less
Submitted 9 June, 2017;
originally announced June 2017.
-
Fixing improper colorings of graphs
Authors:
Valentin Garnero,
Konstanty Junosza-Szaniawski,
Mathieu Liedloff,
Pedro Montealegre,
Paweł Rzążewski
Abstract:
In this paper we consider a variation of a recoloring problem, called the Color-Fixing. Let us have some non-proper $r$-coloring $\varphi$ of a graph $G$. We investigate the problem of finding a proper $r$-coloring of $G$, which is "the most similar" to $\varphi$, i.e. the number $k$ of vertices that have to be recolored is minimum possible. We observe that the problem is NP-complete for any…
▽ More
In this paper we consider a variation of a recoloring problem, called the Color-Fixing. Let us have some non-proper $r$-coloring $\varphi$ of a graph $G$. We investigate the problem of finding a proper $r$-coloring of $G$, which is "the most similar" to $\varphi$, i.e. the number $k$ of vertices that have to be recolored is minimum possible. We observe that the problem is NP-complete for any $r \geq 3$, even for bipartite planar graphs. On the other hand, the problem is fixed-parameter tractable, when parameterized by the number of allowed transformations $k$. We provide an $2^n \cdot n^{\mathcal{O}(1)}$ algorithm for the problem (for any fixed $r$) and a linear algorithm for graphs with bounded treewidth. We also show several lower complexity bounds, using standard complexity assumptions. Finally, we investigate the {\em fixing number} of a graph $G$. It is the maximum possible distance (in the number of transformations) between some non-proper coloring of $G$ and a proper one.
△ Less
Submitted 14 November, 2017; v1 submitted 23 July, 2016;
originally announced July 2016.
-
On Distance-$d$ Independent Set and other problems in graphs with few minimal separators
Authors:
Pedro Montealegre,
Ioan Todinca
Abstract:
Fomin and Villanger (STACS 2010) proved that Maximum Independent Set, Feedback Vertex Set, and more generally the problem of finding a maximum induced subgraph of treewith at most a constant $t$, can be solved in polynomial time on graph classes with polynomially many minimal separators. We extend these results in two directions. Let $\Gpoly$ be the class of graphs with at most $\poly(n)$ minimal…
▽ More
Fomin and Villanger (STACS 2010) proved that Maximum Independent Set, Feedback Vertex Set, and more generally the problem of finding a maximum induced subgraph of treewith at most a constant $t$, can be solved in polynomial time on graph classes with polynomially many minimal separators. We extend these results in two directions. Let $\Gpoly$ be the class of graphs with at most $\poly(n)$ minimal separators, for some polynomial $\poly$.
We show that the odd powers of a graph $G$ have at most as many minimal separators as $G$. Consequently, \textsc{Distance-$d$ Independent Set}, which consists in finding maximum set of vertices at pairwise distance at least $d$, is polynomial on $\Gpoly$, for any even $d$. The problem is NP-hard on chordal graphs for any odd $d \geq 3$.
We also provide polynomial algorithms for Connected Vertex Cover and Connected Feedback Vertex Set on subclasses of $\Gpoly$ including chordal and circular-arc graphs, and we discuss variants of independent domination problems.
△ Less
Submitted 15 July, 2016;
originally announced July 2016.
-
Deterministic graph connectivity in the broadcast congested clique
Authors:
Pedro Montealegre,
Ioan Todinca
Abstract:
We present deterministic constant-round protocols for the graph connectivity problem in the model where each of the $n$ nodes of a graph receives a row of the adjacency matrix, and broadcasts a single sublinear size message to all other nodes. Communication rounds are synchronous. This model is sometimes called the broadcast congested clique. Specifically, we exhibit a deterministic protocol that…
▽ More
We present deterministic constant-round protocols for the graph connectivity problem in the model where each of the $n$ nodes of a graph receives a row of the adjacency matrix, and broadcasts a single sublinear size message to all other nodes. Communication rounds are synchronous. This model is sometimes called the broadcast congested clique. Specifically, we exhibit a deterministic protocol that computes the connected components of the input graph in $\lceil 1/ε\rceil$ rounds, each player communicating $\mathcal{O}(n^ε \cdot \log n)$ bits per round, with $0 < ε\leq 1$.
We also provide a deterministic one-round protocol for connectivity, in the model when each node receives as input the graph induced by the nodes at distance at most $r>0$, and communicates $\mathcal{O}(n^{1/r} \cdot \log n)$ bits. This result is based on a $d$-pruning protocol, which consists in successively removing nodes of degree at most $d$ until obtaining a graph with minimum degree larger than $d$. Our technical novelty is the introduction of deterministic sparse linear sketches: a linear compression function that permits to recover sparse Boolean vectors deterministically.
△ Less
Submitted 9 June, 2017; v1 submitted 12 February, 2016;
originally announced February 2016.
-
Automata networks for multi-party communication in the Naming Game
Authors:
Javier Vera,
Pedro Montealegre,
Eric Goles
Abstract:
The Naming Game has been studied to explore the role of self-organization in the development and negotiation of linguistic conventions. In this paper, we define an automata networks approach to the Naming Game. Two problems are faced: (1) the definition of an automata networks for multi-party communicative interactions; and (2) the proof of convergence for three different orders in which the indiv…
▽ More
The Naming Game has been studied to explore the role of self-organization in the development and negotiation of linguistic conventions. In this paper, we define an automata networks approach to the Naming Game. Two problems are faced: (1) the definition of an automata networks for multi-party communicative interactions; and (2) the proof of convergence for three different orders in which the individuals are updated (updating schemes). Finally, computer simulations are explored in two-dimensional lattices with the purpose to recover the main features of the Naming Game and to describe the dynamics under different updating schemes.
△ Less
Submitted 6 April, 2016; v1 submitted 8 October, 2015;
originally announced October 2015.
-
PSPACE-Completeness of Majority Automata Networks
Authors:
Eric Goles,
Pedro Montealegre,
Ville Salo,
Ilkka Törmä
Abstract:
We study the dynamics of majority automata networks when the vertices are updated according to a block sequential updating scheme. In particular, we show that the complexity of the problem of predicting an eventual state change in some vertex, given an initial configuration, is PSPACE-complete.
We study the dynamics of majority automata networks when the vertices are updated according to a block sequential updating scheme. In particular, we show that the complexity of the problem of predicting an eventual state change in some vertex, given an initial configuration, is PSPACE-complete.
△ Less
Submitted 16 January, 2015;
originally announced January 2015.
-
Algorithms parameterized by vertex cover and modular width, through potential maximal cliques
Authors:
Fedor V. Fomin,
Mathieu Liedloff,
Pedro Montealegre,
Ioan Todinca
Abstract:
In this paper we give upper bounds on the number of minimal separators and potential maximal cliques of graphs w.r.t. two graph parameters, namely vertex cover ($\operatorname{vc}$) and modular width ($\operatorname{mw}$). We prove that for any graph, the number of minimal separators is $\mathcal{O}^*(3^{\operatorname{vc}})$ and $\mathcal{O}^*(1.6181^{\operatorname{mw}})$, and the number of potent…
▽ More
In this paper we give upper bounds on the number of minimal separators and potential maximal cliques of graphs w.r.t. two graph parameters, namely vertex cover ($\operatorname{vc}$) and modular width ($\operatorname{mw}$). We prove that for any graph, the number of minimal separators is $\mathcal{O}^*(3^{\operatorname{vc}})$ and $\mathcal{O}^*(1.6181^{\operatorname{mw}})$, and the number of potential maximal cliques is $\mathcal{O}^*(4^{\operatorname{vc}})$ and $\mathcal{O}^*(1.7347^{\operatorname{mw}})$, and these objects can be listed within the same running times. (The $\mathcal{O}^*$ notation suppresses polynomial factors in the size of the input.) Combined with known results, we deduce that a large family of problems, e.g., Treewidth, Minimum Fill-in, Longest Induced Path, Feedback vertex set and many others, can be solved in time $\mathcal{O}^*(4^{\operatorname{vc}})$ or $\mathcal{O}^*(1.7347^{\operatorname{mw}})$.
△ Less
Submitted 15 April, 2014;
originally announced April 2014.