Section: New Results
Understanding graph representations
Notions of Connectivity in Overlay Networks
Participants : Yuval Emek, Pierre Fraigniaud, Amos Korman, Shay Kutten, David Peleg.
How well connected is the network? This is one of the most fundamental questions one would ask when facing the challenge of designing a communication network. Three major notions of connectivity have been considered in the literature, but in the context of traditional (single-layer) networks, they turn out to be equivalent. The paper [17] , introduces a model for studying the three notions of connectivity in multi-layer networks. Using this model, it is easy to demonstrate that in multi-layer networks the three notions may differ dramatically. Unfortunately, in contrast to the single-layer case, where the values of the three connectivity notions can be computed efficiently, it has been recently shown in the context of WDM networks (results that can be easily translated to our model) that the values of two of these notions of connectivity are hard to compute or even approximate in multi-layer networks. The current paper shed some positive light into the multi-layer connectivity topic: we show that the value of the third connectivity notion can be computed in polynomial time and develop an approximation for the construction of well connected overlay networks.
Connected graph searching
Participants : Lali Barrière, Paola Flocchini, Fedor V. Fomin, Pierre Fraigniaud, Nicolas Nisse, Nicola Santoro, Dimitrios M. Thilikos.
In the graph searching game the opponents are a set of searchers and a fugitive in a graph. The searchers try to capture the fugitive by applying some sequence of moves that include placement, removal, or sliding of a searcher along an edge. The fugitive tries to avoid capture by moving along unguarded paths. The search number of a graph is the minimum number of searchers required to guarantee the capture of the fugitive. In [2] , we initiate the study of this game under the natural restriction of connectivity where we demand that in each step of the search the locations of the graph that are clean (i.e. non-accessible to the fugitive) remain connected. We give evidence that many of the standard mathematical tools used so far in classic graph searching fail under the connectivity requirement. We also settle the question on “the price of connectivity”, that is, how many searchers more are required for searching a graph when the connectivity demand is imposed. We make estimations of the price of connectivity on general graphs and we provide tight bounds for the case of trees. In particular, for an n-vertex graph the ratio between the connected searching number and the non-connected one is while for trees this ratio is always at most 2. We also conjecture that this constant-ratio upper bound for trees holds also for all graphs. Our combinatorial results imply a complete characterization of connected graph searching on trees. It is based on a forbidden-graph characterization of the connected search number. We prove that the connected search game is monotone for trees, i.e. restricting search strategies to only those where the clean territories increase monotonically does not require more searchers. A consequence of our results is that the connected search number can be computed in polynomial time on trees, moreover, we show how to make this algorithm distributed. Finally, we reveal connections of this parameter to other invariants on trees such as the Horton–Strahler number.
Computing with Large Populations Using Interactions
Participants : Olivier Bournez, Pierre Fraigniaud, Xavier Koegler.
We define in [12] , a general model capturing the behavior of a population of anonymous agents
that interact in pairs. This model captures some of the main features of
opportunistic networks, in which nodes (such as the ones of a mobile ad hoc networks)
meet sporadically. For its reminiscence to Population Protocol, we call our model
Large-Population Protocol, or LPP. We are interested in the design of LPPs enforcing,
for every
Collaborative Search on the Plane without Communication
Participants : Ofer Feinerman, Zvi Lotker, Amos Korman, Jean-Sébastien Sereni.
In [19] , we use distributed computing tools to provide a
new perspective on the behavior of cooperative biological ensembles. We
introduce the Ants Nearby Treasure Search (ANTS) problem, a generalization of the classical cow-path problem
which is relevant for collective foraging in animal groups. In the ANTS problem,
Memory Lower Bounds for Randomized Collaborative Search and Implications for Biology
Participants : Ofer Feinerman, Amos Korman.
Initial knowledge regarding group size can be crucial for collective performance.
We study in [18] , this relation in the context of the
Ants Nearby Treasure Search (ANTS) problem, which models natural cooperative foraging
behavior such as that performed by ants around their nest. In this
problem,
From a high level perspective, we illustrate how methods from distributed computing can be useful in generating lower bounds for cooperative biological ensembles. Indeed, if experiments that comply with our setting reveal that the ants' search is time efficient, then our theoretical lower bounds can provide some insight on the memory they use for this task.
What Can be Computed without Communications?
Participants : Heger Arfaoui, Pierre Fraigniaud.
When playing the boolean game
Decidability Classes for Mobile Agents Computing modularity
Participants : Andrzej Pelc, Pierre Fraigniaud.
We establish in [21] , a classification of decision problems that are to be solved by mobile agents operating in unlabeled graphs, using a deterministic protocol. The classification is with respect to the ability of a team of agents to solve the problem, possibly with the aid of additional information. In particular, our focus is on studying differences between the decidability of a decision problem by agents and its verifiability when a certificate for a positive answer is provided to the agents. Our main result shows that there exists a natural complete problem for mobile agent verification. We also show that, for a single agent, three natural oracles yield a strictly increasing chain of relative decidability classes.
Randomized Distributed Decision
Participants : Pierre Fraigniaud, Amos Korman, Merav Parter, David Peleg.
The paper [20] tackles the power of randomization in the context of locality by analyzing the ability to “boost” the success probability of deciding a distributed language. The main outcome of this analysis is that the distributed computing setting contrasts significantly with the sequential one as far as randomization is concerned. Indeed, we prove that in some cases, the ability to increase the success probability for deciding distributed languages is rather limited.
We focus on the notion of a
The Worst Case Behavior of Randomized Gossip
Participants : Hervé Baumann, Pierre Fraigniaud, Hovhannes A. Harutyunyan, Rémi de Verclos.
In [11] we consider the quasi-random rumor spreading model introduced by Doerr, Friedrich, and Sauerwald in [SODA 2008], hereafter referred to as the list-based model. Each node is provided with a cyclic list of all its neighbors, chooses a random position in its list, and from then on calls its neighbors in the order of the list. This model is known to perform asymptotically at least as well as the random phone-call model, for many network classes. Motivated by potential applications of the list-based model to live streaming, we are interested in its worst case behavior.
Our first main result is the design of an
The situation is radically different when one is considering variants of the model in
which nodes are aware of the status of their neighbors, i.e., are aware of whether or
not they have already received the rumor, at any point in time. Indeed, our second main
result states that, unless P=NP , the worst case behavior of the list-based model with
the additional feature that every node is perpetually aware of which of its neighbors
have already received the rumor cannot be approximated in polynomial time within a
Asymptotic modularity
Participants : Fabien de Montgolfier, Mauricio Soto, Laurent Viennot.
Modularity (Newman-Girvan) has been introduced as a quality measure for graph partitioning. It has received considerable attention in several disciplines, especially complex systems. In order to better understand this measure from a graph theoretical point of view, we study the modularity of a variety of graph classes. In [23] , we first consider simple graph classes such as tori and hypercubes. We show that these regular graph families have asymptotic modularity 1 (that is the maximum possible). We extend this result to trees with bounded degree, allowing us to give a lower bound of 2 over average degree for graph classes with low maximum degree (included power law graphs for a sufficiently large exponent).
Modeling social networks
Participants : Nidhi Hegde, Laurent Massoulié, Laurent Viennot.
Social networks offer users new means of accessing information, essentially relying on “social filtering”, i.e. propagation and filtering of information by social contacts. The sheer amount of data flowing in these networks, combined with the limited budget of attention of each user, makes it difficult to ensure that social filtering brings relevant content to the interested users. Our motivation in [26] is to measure to what extent self-organization of the social network results in efficient social filtering. To this end we introduce flow games, a simple abstraction that models network formation under selfish user dynamics, featuring user-specific interests and budget of attention. In the context of homogeneous user interests, we show that selfish dynamics converge to a stable network structure (namely a pure Nash equilibrium) with close-to-optimal information dissemination. We show in contrast, for the more realistic case of heterogeneous interests, that convergence, if it occurs, may lead to information dissemination that can be arbitrarily inefficient, as captured by an unbounded “price of anarchy”. Nevertheless the situation differs when users' interests exhibit a particular structure, captured by a metric space with low doubling dimension. In that case, natural autonomous dynamics converge to a stable configuration. Moreover, users obtain all the information of interest to them in the corresponding dissemination, provided their budget of attention is logarithmic in the size of their interest set.
Additive Spanners and Distance and Routing Labeling Schemes for Hyperbolic Graphs
Participants : Victor Chepoi, Feodor Dragan, Bertrand Estellon, Michel Habib, Yann Vaxès, Yang Xiang.
Constructing a Minimum phylogenetic Network from a Dense triplet Set
Participants : Michel Habib, Thu-Hien To.
For a given set
Algorithms for Some Join Decompositions
Participants : Michel Habib, Antoine Mamcarz, Fabien de Montgolfier.
A homogeneous pair (also known as a 2-module) of a graph is a pair
Detecting 2-joins faster
Participants : Pierre Charbit, Michel Habib, Nicolas Trotignon, Kristina Vušković.
2-joins are edge cutsets that naturally appear in the decomposition
of several classes of graphs closed under taking induced subgraphs, such
as balanced bipartite graphs, even-hole-free graphs, perfect graphs and
claw-free graphs. Their detection is needed in several algorithms, and
is the slowest step for some of them. The classical method to detect
a 2-join takes