Skip to main content

Showing 1–24 of 24 results for author: Moses, W K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16661  [pdf, other

    cs.DC

    Towards Communication-Efficient Peer-to-Peer Networks

    Authors: Khalid Hourani, William K. Moses Jr., Gopal Pandurangan

    Abstract: We focus on designing Peer-to-Peer (P2P) networks that enable efficient communication. Over the last two decades, there has been substantial algorithmic research on distributed protocols for building P2P networks with various desirable properties such as high expansion, low diameter, and robustness to a large number of deletions. A key underlying theme in all of these works is to distributively bu… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: 33 pages, 7 figures, full version of paper to appear in ESA 2024

    ACM Class: F.2

  2. arXiv:2312.07140  [pdf, other

    cs.DS

    Exploiting Automorphisms of Temporal Graphs for Fast Exploration and Rendezvous

    Authors: Konstantinos Dogeas, Thomas Erlebach, Frank Kammer, Johannes Meintrup, William K. Moses Jr

    Abstract: Temporal graphs are dynamic graphs where the edge set can change in each time step, while the vertex set stays the same. Exploration of temporal graphs whose snapshot in each time step is a connected graph, called connected temporal graphs, has been widely studied. In this paper, we extend the concept of graph automorphisms from static graphs to temporal graphs for the first time and show that sym… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  3. arXiv:2311.17115  [pdf, ps, other

    cs.DC

    Time- and Communication-Efficient Overlay Network Construction via Gossip

    Authors: Fabien Dufoulon, Michael Moorman, William K. Moses Jr., Gopal Pandurangan

    Abstract: We focus on the well-studied problem of distributed overlay network construction. We consider a synchronous gossip-based communication model where in each round a node can send a message of small size to another node whose identifier it knows. The network is assumed to be reconfigurable, i.e., a node can add new connections (edges) to other nodes whose identifier it knows or drop existing connecti… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: Slightly shortened abstract

  4. arXiv:2311.01511  [pdf, ps, other

    cs.DC

    Dispersion, Capacitated Nodes, and the Power of a Trusted Shepherd

    Authors: William K. Moses Jr., Amanda Redlich

    Abstract: In this paper, we look at and expand the problems of dispersion and Byzantine dispersion of mobile robots on a graph, introduced by Augustine and Moses~Jr.~[ICDCN~2018] and by Molla, Mondal, and Moses~Jr.~[ALGOSENSORS~2020], respectively, to graphs where nodes have variable capacities. We use the idea of a single shepherd, a more powerful robot that will never act in a Byzantine manner, to achieve… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    ACM Class: F.2

  5. arXiv:2305.01753  [pdf, other

    cs.DC

    Fast Deterministic Gathering with Detection on Arbitrary Graphs: The Power of Many Robots

    Authors: Anisur Rahaman Molla, Kaushik Mondal, William K. Moses Jr

    Abstract: Over the years, much research involving mobile computational entities has been performed. From modeling actual microscopic (and smaller) robots, to modeling software processes on a network, many important problems have been studied in this context. Gathering is one such fundamental problem in this area. The problem of gathering $k$ robots, initially arbitrarily placed on the nodes of an $n$-node g… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: 19 pages, accepted at IPDPS 2023

    ACM Class: F.2.3

  6. arXiv:2210.01173  [pdf, other

    cs.DC cs.DS

    An Almost Singularly Optimal Asynchronous Distributed MST Algorithm

    Authors: Fabien Dufoulon, Shay Kutten, William K. Moses Jr., Gopal Pandurangan, David Peleg

    Abstract: A singularly (near) optimal distributed algorithm is one that is (near) optimal in \emph{two} criteria, namely, its time and message complexities. For \emph{synchronous} CONGEST networks, such algorithms are known for fundamental distributed computing problems such as leader election [Kutten et al., JACM 2015] and Minimum Spanning Tree (MST) construction [Pandurangan et al., STOC 2017, Elkin, PODC… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

    Comments: 27 pages, accepted to DISC 2022

    ACM Class: F.2.2; F.2.3; G.3

  7. arXiv:2204.08385  [pdf, other

    cs.DC cs.DS cs.NI

    Awake Complexity of Distributed Minimum Spanning Tree

    Authors: John Augustine, William K. Moses Jr., Gopal Pandurangan

    Abstract: We study the distributed minimum spanning tree (MST) problem, a fundamental problem in distributed computing. It is well-known that distributed MST can be solved in $\tilde{O}(D+\sqrt{n})$ rounds in the standard CONGEST model (where $n$ is the network size and $D$ is the network diameter) and this is essentially the best possible round complexity (up to logarithmic factors). However, in resource-c… ▽ More

    Submitted 19 December, 2023; v1 submitted 18 April, 2022; originally announced April 2022.

    Comments: 29 pages, 1 table, 5 figures, abstract modified to fit arXiv constraints

    ACM Class: F.2.2; F.2.3; G.2.2; G.3

  8. arXiv:2204.08359  [pdf, other

    cs.DC cs.DS

    Distributed MIS in $O(\log\log{n} )$ Awake Complexity

    Authors: Fabien Dufoulon, William K. Moses Jr., Gopal Pandurangan

    Abstract: Maximal Independent Set (MIS) is one of the fundamental and most well-studied problems in distributed graph algorithms. Even after four decades of intensive research, the best-known (randomized) MIS algorithms have $O(\log{n})$ round complexity on general graphs [Luby, STOC 1986] (where $n$ is the number of nodes), while the best-known lower bound is $Ω(\sqrt{\log{n}/\log\log{n}})$ [Kuhn, Moscibro… ▽ More

    Submitted 19 December, 2023; v1 submitted 18 April, 2022; originally announced April 2022.

    Comments: Abstract shortened to fit arXiv constraints

    ACM Class: F.2.2; F.2.3; G.2

  9. arXiv:2108.02197  [pdf, other

    cs.DC cs.DS

    Singularly Near Optimal Leader Election in Asynchronous Networks

    Authors: Shay Kutten, William K. Moses Jr., Gopal Pandurangan, David Peleg

    Abstract: This paper concerns designing distributed algorithms that are {\em singularly optimal}, i.e., algorithms that are {\em simultaneously} time and message {\em optimal}, for the fundamental leader election problem in {\em asynchronous} networks. Kutten et al. (JACM 2015) presented a singularly near optimal randomized leader election algorithm for general {\em synchronous} networks that ran in… ▽ More

    Submitted 9 August, 2021; v1 submitted 4 August, 2021; originally announced August 2021.

    Comments: 22 pages. Accepted to DISC 2021

    ACM Class: F.2.2; F.2.3; G.3

  10. arXiv:2106.01108  [pdf, other

    cs.DC cs.DS

    Efficient Deterministic Leader Election for Programmable Matter

    Authors: Fabien Dufoulon, Shay Kutten, William K. Moses Jr.

    Abstract: It was suggested that a programmable matter system (composed of multiple computationally weak mobile particles) should remain connected at all times since otherwise, reconnection is difficult and may be impossible. At the same time, it was not clear that allowing the system to disconnect carried a significant advantage in terms of time complexity. We demonstrate for a fundamental task, that of lea… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: PODC 2021

  11. arXiv:2102.07528  [pdf, ps, other

    cs.DC cs.DS

    Byzantine Dispersion on Graphs

    Authors: Anisur Rahaman Molla, Kaushik Mondal, William K. Moses Jr

    Abstract: This paper considers the problem of Byzantine dispersion and extends previous work along several parameters. The problem of Byzantine dispersion asks: given $n$ robots, up to $f$ of which are Byzantine, initially placed arbitrarily on an $n$ node anonymous graph, design a terminating algorithm to be run by the robots such that they eventually reach a configuration where each node has at most one n… ▽ More

    Submitted 26 September, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

  12. arXiv:2008.02782  [pdf, other

    cs.DC cs.DS

    Singularly Optimal Randomized Leader Election

    Authors: Shay Kutten, William K. Moses Jr., Gopal Pandurangan, David Peleg

    Abstract: This paper concerns designing distributed algorithms that are singularly optimal, i.e., algorithms that are simultaneously time and message optimal, for the fundamental leader election problem in networks. Our main result is a randomized distributed leader election algorithm for asynchronous complete networks that is essentially (up to a polylogarithmic factor) singularly optimal. Our algorithm us… ▽ More

    Submitted 16 August, 2020; v1 submitted 6 August, 2020; originally announced August 2020.

    Comments: 24 pages. Full version of paper accepted at DISC 2020

    ACM Class: F.2.2; F.2.3; G.2.2; G.3

  13. arXiv:2004.11439  [pdf, ps, other

    cs.DC cs.DS

    Efficient Dispersion on an Anonymous Ring in the Presence of Weak Byzantine Robots

    Authors: Anisur Rahaman Molla, Kaushik Mondal, William K. Moses Jr

    Abstract: The problem of dispersion of mobile robots on a graph asks that $n$ robots initially placed arbitrarily on the nodes of an $n$-node anonymous graph, autonomously move to reach a final configuration where exactly each node has at most one robot on it. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, lo… ▽ More

    Submitted 3 September, 2020; v1 submitted 23 April, 2020; originally announced April 2020.

    Comments: 20 pages

  14. arXiv:2001.04525  [pdf, other

    cs.DC cs.DS

    Live Exploration with Mobile Robots in a Dynamic Ring, Revisited

    Authors: Subhrangsu Mandal, Anisur Rahaman Molla, William K. Moses Jr

    Abstract: The graph exploration problem requires a group of mobile robots, initially placed arbitrarily on the nodes of a graph, to work collaboratively to explore the graph such that each node is eventually visited by at least one robot. One important requirement of exploration is the {\em termination} condition, i.e., the robots must know that exploration is completed. The problem of live exploration of a… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 13 pages

  15. arXiv:1905.00580  [pdf, other

    cs.DC cs.DS cs.RO

    Deterministic Leader Election in Programmable Matter

    Authors: Yuval Emek, Shay Kutten, Ron Lavi, William K. Moses Jr

    Abstract: Addressing a fundamental problem in programmable matter, we present the first deterministic algorithm to elect a unique leader in a system of connected amoebots assuming only that amoebots are initially contracted. Previous algorithms either used randomization, made various assumptions (shapes with no holes, or known shared chirality), or elected several co-leaders in some cases. Some of the bui… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

    Comments: 33 pages, 16 figures, to appear in the proceedings of ICALP 2019

  16. Dispersion of Mobile Robots: The Power of Randomness

    Authors: Anisur Rahaman Molla, William K. Moses Jr

    Abstract: We consider cooperation among insects, modeled as cooperation between mobile robots on a graph. Within this setting, we consider the problem of mobile robot dispersion on graphs. The study of mobile robots on a graph is an interesting paradigm with many interesting problems and applications. The problem of dispersion in this context, introduced by Augustine and Moses Jr., asks that $n$ robots, ini… ▽ More

    Submitted 27 February, 2019; originally announced February 2019.

    Comments: 20 pages, 1 table. Accepted at TAMC 2019: Theory & Applications of Models of Computation. The final authenticated version is available online at https://doi.org/10.1007/978-3-030-14812-6_30

  17. arXiv:1707.06391  [pdf, other

    cs.DC cs.DS

    Deterministic Dispersion of Mobile Robots in Dynamic Rings

    Authors: Ankush Agarwalla, John Augustine, William K. Moses Jr., Madhav Sankar K., Arvind Krishna Sridhar

    Abstract: In this work, we study the problem of dispersion of mobile robots on dynamic rings. The problem of dispersion of $n$ robots on an $n$ node graph, introduced by Augustine and Moses Jr. [1], requires robots to coordinate with each other and reach a configuration where exactly one robot is present on each node. This problem has real world applications and applies whenever we want to minimize the tota… ▽ More

    Submitted 16 October, 2017; v1 submitted 20 July, 2017; originally announced July 2017.

    Comments: 21 pages, 10 figures, concise version of paper to appear in ICDCN 2018

    ACM Class: F.2.2; G.2.2

  18. arXiv:1707.05629  [pdf, ps, other

    cs.DC cs.DS

    Dispersion of Mobile Robots: A Study of Memory-Time Trade-offs

    Authors: John Augustine, William K. Moses Jr

    Abstract: We introduce a new problem in the domain of mobile robots, which we term dispersion. In this problem, $n$ robots are placed in an $n$ node graph arbitrarily and must coordinate with each other to reach a final configuration such that exactly one robot is at each node. We study this problem through the lenses of minimizing the memory required by each robot and of minimizing the number of rounds req… ▽ More

    Submitted 17 July, 2018; v1 submitted 18 July, 2017; originally announced July 2017.

    Comments: 18 pages, conference version appeared in ICDCN 2018

    ACM Class: F.2.2; G.2.2

  19. arXiv:1702.02460  [pdf, ps, other

    cs.DC cs.DS

    Deterministic Backbone Creation in an SINR Network without Knowledge of Location

    Authors: Dariusz R. Kowalski, William K. Moses Jr., Shailesh Vaya

    Abstract: For a given network, a backbone is an overlay network consisting of a connected dominating set with additional accessibility properties. Once a backbone is created for a network, it can be utilized for fast communication amongst the nodes of the network. The Signal-to-Interference-plus-Noise-Ratio (SINR) model has become the standard for modeling communication among devices in wireless networks.… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: 12 pages, 1 table

    ACM Class: F.2.2; G.2.2

  20. arXiv:1702.02455  [pdf, other

    cs.DC cs.DS

    Deterministic Protocols in the SINR Model without Knowledge of Coordinates

    Authors: William K. Moses Jr., Shailesh Vaya

    Abstract: Much work has been developed for studying the classical broadcasting problem in the SINR (Signal-to-Interference-plus-Noise-Ratio) model for wireless device transmission. The setting typically studied is when all radio nodes transmit a signal of the same strength. This work studies the challenging problem of devising a distributed algorithm for multi-broadcasting, assuming a subset of nodes are in… ▽ More

    Submitted 15 August, 2020; v1 submitted 8 February, 2017; originally announced February 2017.

    Comments: This is the author version of the paper which will appear in the Journal of Computer and System Sciences. 36 pages, 1 table, 4 figures; v3 improves the presentation, style, and some technical matter of the paper

    ACM Class: F.2.2; G.2.2

  21. arXiv:1702.01973  [pdf, ps, other

    cs.DC

    Achieving Dilution without Knowledge of Coordinates in the SINR Model

    Authors: William K. Moses Jr., Shailesh Vaya

    Abstract: Considerable literature has been developed for various fundamental distributed problems in the SINR (Signal-to-Interference-plus-Noise-Ratio) model for radio transmission. A setting typically studied is when all nodes transmit a signal of the same strength, and each device only has access to knowledge about the total number of nodes in the network $n$, the range from which each node's label is tak… ▽ More

    Submitted 7 February, 2017; originally announced February 2017.

    Comments: 10 pages

    ACM Class: F.2.2

  22. Balanced Allocation: Patience is not a Virtue

    Authors: John Augustine, William K. Moses Jr., Amanda Redlich, Eli Upfal

    Abstract: Load balancing is a well-studied problem, with balls-in-bins being the primary framework. The greedy algorithm $\mathsf{Greedy}[d]$ of Azar et al. places each ball by probing $d > 1$ random bins and placing the ball in the least loaded of them. With high probability, the maximum load under $\mathsf{Greedy}[d]$ is exponentially lower than the result when balls are placed uniformly randomly. Vöcking… ▽ More

    Submitted 22 January, 2018; v1 submitted 26 February, 2016; originally announced February 2016.

    Comments: 26 pages, preliminary version accepted at SODA 2016

    ACM Class: F.2.2; G.2.0; G.3

    Journal ref: In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2016), 655-671

  23. arXiv:1311.6209  [pdf

    cs.DC cs.DS

    Distributed Algorithms for Large-Scale Graphs

    Authors: Khalid Hourani, Hartmut Klauck, William K. Moses Jr., Danupon Nanongkai, Gopal Pandurangan, Peter Robinson, Michele Scquizzato

    Abstract: Motivated by the increasing need for fast processing of large-scale graphs, we study a number of fundamental graph problems in a message-passing model for distributed computing, called $k$-machine model, where we have $k$ machines that jointly perform computations on $n$-node graphs. The graph is assumed to be partitioned in a balanced fashion among the $k$ machines, a common implementation in man… ▽ More

    Submitted 8 February, 2023; v1 submitted 25 November, 2013; originally announced November 2013.

    Comments: Preliminary version appeared at SODA 2015

    ACM Class: C.2.4; F.1.1

  24. Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security

    Authors: William K. Moses Jr., C. Pandu Rangan

    Abstract: We consider the problem of rational secret sharing introduced by Halpern and Teague [1], where the players involved in secret sharing play only if it is to their advantage. This can be characterized in the form of preferences. Players would prefer to get the secret than to not get it and secondly with lesser preference, they would like as few other players to get the secret as possible. Several po… ▽ More

    Submitted 17 December, 2011; originally announced December 2011.

    Comments: 18 pages, 2 tables

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Volume 3, Number 6, November 2011, pp. 1-18