1987
DOI: 10.1137/0147013
|View full text |Cite
|
Sign up to set email alerts
|

On Spreading a Rumor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
263
0
3

Year Published

1988
1988
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 310 publications
(271 citation statements)
references
References 9 publications
5
263
0
3
Order By: Relevance
“…In one of the first papers in this area, Frieze and Grimmett [19] proved that if the underlying graph is a complete graph with n nodes, then the runtime of Push is log 2 n + log n ± o(log n) with high probability 1 , where log n denotes the natural logarithm of n. This result was later strengthened by Pittel [29]. For the standard Push-Pull protocol, Karp et al [24] proved a runtime bound of log 3 n + O(log log n).…”
Section: Introductionmentioning
confidence: 63%
See 1 more Smart Citation
“…In one of the first papers in this area, Frieze and Grimmett [19] proved that if the underlying graph is a complete graph with n nodes, then the runtime of Push is log 2 n + log n ± o(log n) with high probability 1 , where log n denotes the natural logarithm of n. This result was later strengthened by Pittel [29]. For the standard Push-Pull protocol, Karp et al [24] proved a runtime bound of log 3 n + O(log log n).…”
Section: Introductionmentioning
confidence: 63%
“…We point out that the lower bound in Theorem 1.2 is tight up to constant factors, as the results in [19,29] for the standard Push protocol imply an upper bound of O(log n) rounds. We now consider the Push-Pull protocol and extend the lower bound of Ω(log n) from Theorem 1.1.…”
Section: Theorem 12 Assume That R Is Any Distribution With E [R] = mentioning
confidence: 96%
“…The idea of randomized rumor distribution dates back to Frieze and Grimmett [10], and later, Pittel [11] and Feige [12], who showed that one can distribute a single rumor in a complete graph with n vertices in time log n + ln n + o(1), as well as in other types of random graphs. Demers et al [2] showed that rumor spreading can be used for efficient distributed database maintenance.…”
Section: Related Workmentioning
confidence: 99%
“…Distributed Hash Tables (DHTs) [25,13,22] is a structured overlay solution that are leveraging the power of consistent hashing [9]. On the other hand, the gossip-based information sharing protocols [18], also known as epidemic or flooding protocols, process requests from clients in unstructured way. The core implementation relies in flooding search requests to peering neighbors.…”
Section: Control and Signaling Approachesmentioning
confidence: 99%