2015 IEEE 35th International Conference on Distributed Computing Systems 2015
DOI: 10.1109/icdcs.2015.66
|View full text |Cite
|
Sign up to set email alerts
|

Space-Optimal Time-Efficient Silent Self-Stabilizing Constructions of Constrained Spanning Trees

Abstract: International audienceSelf-stabilizing algorithms are distributed algorithms supporting transient failures. Starting from any configuration, they allow the system to detect whether the actual configuration is legal, and, if not, they allow the system to eventually reach a legal configuration. In the context of network computing, it is known that, for every task, there is a self-stabilizing algorithm solving that task, with optimal space-complexity, but converging in an exponential number of rounds. On the othe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
11
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 62 publications
(89 reference statements)
1
11
0
Order By: Relevance
“…The main ingredient to achieve this result is an exact algorithm for MST (that is selfstabilizing, silent and polynomial-time), that uses O(log n • s) space, where s is the number of bits used to encode an edge weight. This matches the performance of the O(log 2 n)-space algorithm of [2], for polynomial weights, but applies to any weight range. We conjecture that this result is tight, because for weights polynomially large, an Ω(log n • s) bound is known [15], and it seems likely that it is also the right answer for smaller weights.…”
Section: Our Resultssupporting
confidence: 71%
See 1 more Smart Citation
“…The main ingredient to achieve this result is an exact algorithm for MST (that is selfstabilizing, silent and polynomial-time), that uses O(log n • s) space, where s is the number of bits used to encode an edge weight. This matches the performance of the O(log 2 n)-space algorithm of [2], for polynomial weights, but applies to any weight range. We conjecture that this result is tight, because for weights polynomially large, an Ω(log n • s) bound is known [15], and it seems likely that it is also the right answer for smaller weights.…”
Section: Our Resultssupporting
confidence: 71%
“…But an algorithm in constant space cannot exist for this problem because one cannot break symmetry in constant space [1]. On the positive side, [2] shows that for various tree construction problems, one can match the space bound and have polynomial-time stabilization. In particular, one can get down to Θ(log 2 n) for minimum spanning tree, which is optimal when the edge weight are in a polynomial range.…”
Section: Optimal Space In Polynomial Timementioning
confidence: 99%
“…Such objects can be the outcome of an algorithm that might be subject to failures, or be a-priori correctly given objects but subject to later corruption. There are several mechanisms for checking the correctness of distributed objects (see, e.g., [2,3,7,[10][11][12]), and here we focus on one classical mechanism which is both simple and versatile, known as proof-labeling schemes [37], or as locally checkable proofs [30]. 1 Roughly, a proof-labeling scheme assigns certificates to each node of the network.…”
Section: Context and Objectivementioning
confidence: 99%
“…Indeed, such data structures can be the outcome of an algorithm that might be subject to failures, or be a-priori correctly given data-structures but subject to later corruption. Several mechanisms exist enabling checking the correctness of distributed data structures (see, e.g., [2,5,9,10,11]). For its simplicity and versatility, we shall focus on one classical mechanism known as proof-labeling schemes [31], a.k.a.…”
Section: Context and Objectivementioning
confidence: 99%