Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014
DOI: 10.1007/978-3-319-09620-9_8
|View full text |Cite
|
Sign up to set email alerts
|

The Simultaneous Number-in-Hand Communication Model for Networks: Private Coins, Public Coins and Determinism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…On the other hand, if instead of bounding the number of rounds we bound the message size b, then the best known result is the following: detecting deterministically a triangle requires Ω(n/(e O( √ log n b)) rounds [7]. In [5], the authors consider three variants of the broadcast congested clique model: randomized protocols with public coins, randomized protocols with private coins and deterministic protocols. They showed that this choice affects the message size complexity of some problems.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…On the other hand, if instead of bounding the number of rounds we bound the message size b, then the best known result is the following: detecting deterministically a triangle requires Ω(n/(e O( √ log n b)) rounds [7]. In [5], the authors consider three variants of the broadcast congested clique model: randomized protocols with public coins, randomized protocols with private coins and deterministic protocols. They showed that this choice affects the message size complexity of some problems.…”
Section: Related Workmentioning
confidence: 97%
“…This setting is equivalent to the multi-party, number-inhand computation model, where communication takes place in a shared whiteboard [1,2,3,4,5,7]: writing a message M on the whiteboard is equivalent to broadcasting M.…”
Section: Introductionmentioning
confidence: 99%
“…Claim 1. Let T be a tree satisfying (2). Then, one can chose r ∈ T as the root of T such that Proof of Claim 1.…”
Section: Leaderless Nodes In Large Components: Proof Of Propmentioning
confidence: 99%
“…Then, one can chose r ∈ T as the root of T such that Proof of Claim 1. Let r 0 be an arbitrary node of a tree T which satisfies (2). If (a) is satisfied for r = r 0 , we are done.…”
Section: Leaderless Nodes In Large Components: Proof Of Propmentioning
confidence: 99%
“…In [7] the authors prove that it is impossible to decide whether the input graph G has diameter at most 3 or whether G has a triangle unless the messages sent by the nodes are all of size Ω(n), even if randomness is allowed. Deciding whether the input graph G contains a cycle requires at least one node to write a message of length at least log d − 1, where d is the maximum degree of G [4].…”
Section: Introductionmentioning
confidence: 99%