-
Deterministic Distributed DFS via Cycle Separators in Planar Graphs
Authors:
Benjamin Jauregui,
Pedro Montealegre,
Ivan Rapaport
Abstract:
One of the most basic techniques in algorithm design consists of breaking a problem into subproblems and then proceeding recursively. In the case of graph algorithms, one way to implement this approach is through separator sets. Given a graph $G=(V,E)$, a subset of nodes $S \subseteq V$ is called a separator set of $G$ if the size of each connected component of $G-S$ is at most $2/3 \cdot |V|$. Th…
▽ More
One of the most basic techniques in algorithm design consists of breaking a problem into subproblems and then proceeding recursively. In the case of graph algorithms, one way to implement this approach is through separator sets. Given a graph $G=(V,E)$, a subset of nodes $S \subseteq V$ is called a separator set of $G$ if the size of each connected component of $G-S$ is at most $2/3 \cdot |V|$. The most useful separator sets are those that satisfy certain restrictions of cardinality or structure. For over 40 years, various efficient algorithms have been developed for computing separators of different kinds, particularly in planar graphs. Separator sets, combined with a divide and conquer approach, have been fundamental in the design of efficient algorithms in various settings.
In this work, we present the first deterministic algorithm in the distributed CONGEST model that recursively computes a cycle separator over planar graphs in $\tilde{O}(D)$ rounds. This result, as in the centralized setting, has significant implications in the area of distributed planar algorithms. In fact, from this result, we can construct a deterministic algorithm that computes a DFS tree in ${\tilde{O}}(D)$ rounds. This matches both the best-known randomized algorithm of Ghaffari and Parter (DISC, 2017) and, up to polylogarithmic factors, the trivial lower bound of $Ω(D)$ rounds.
△ Less
Submitted 30 April, 2025;
originally announced April 2025.
-
Distributed Model Checking in Graphs Classes of Bounded Expansion
Authors:
Fedor V. Fomin,
Pierre Fraigniaud,
Petr A. Golovach,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
We show that for every first-order logic (FO) formula $\varphi$, and every graph class $\mathcal{G}$ of bounded expansion, there exists a distributed (deterministic) algorithm that, for every $n$-node graph $G\in\mathcal{G}$ of diameter $D$, decides whether $G\models \varphi$ in $O(D+\log n)$ rounds under the standard CONGEST model. Graphs of bounded expansion encompass many classes of sparse grap…
▽ More
We show that for every first-order logic (FO) formula $\varphi$, and every graph class $\mathcal{G}$ of bounded expansion, there exists a distributed (deterministic) algorithm that, for every $n$-node graph $G\in\mathcal{G}$ of diameter $D$, decides whether $G\models \varphi$ in $O(D+\log n)$ rounds under the standard CONGEST model. Graphs of bounded expansion encompass many classes of sparse graphs such as planar graphs, bounded-treedepth graphs, bounded-treewidth graphs, bounded-degree graphs, and graphs excluding a fixed graph $H$ as a minor or topological minor. Note that our algorithm is optimal up to a logarithmic additional term, as even a simple FO formula such as "there are two vertices of degree 3" already on trees requires $Ω(D)$ rounds in CONGEST.
Our result extends to solving optimization problems expressed in FO (e.g., $k$-vertex cover of minimum weight), as well as to counting the number of solutions of a problem expressible in a fragment of FO (e.g., counting triangles), still running in $O(D+\log n)$ rounds under the CONGEST model. This exemplifies the contrast between sparse graphs and general graphs as far as CONGEST algorithms are concerned. For instance, Drucker, Kuhn, and Oshman [PODC 2014] showed that the problem of deciding whether a general graph contains a 4-cycle requires $Θ(\sqrt{n}/\log n)$ rounds in CONGEST. For counting triangles, the best known algorithm of Chang, Pettie, and Zhang [SODA 2019] takes $\tilde{O}(\sqrt{n})$ rounds.
Finally, our result extends to distributed certification. We show that, for every FO formula~$\varphi$, and every graph class of bounded expansion, there exists a certification scheme for $\varphi$ using certificates on $O(\log n)$ bits. This significantly generalizes the recent result of Feuilloley, Bousquet, and Pierron [PODC 2022], which held solely for graphs of bounded treedepth.
△ Less
Submitted 22 November, 2024;
originally announced November 2024.
-
Distributed Model Checking on Graphs of Bounded Treedepth
Authors:
Fedor V. Fomin,
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
We establish that every monadic second-order logic (MSO) formula on graphs with bounded treedepth is decidable in a constant number of rounds within the CONGEST model. To our knowledge, this marks the first meta-theorem regarding distributed model-checking. Various optimization problems on graphs are expressible in MSO. Examples include determining whether a graph $G$ has a clique of size $k$, whe…
▽ More
We establish that every monadic second-order logic (MSO) formula on graphs with bounded treedepth is decidable in a constant number of rounds within the CONGEST model. To our knowledge, this marks the first meta-theorem regarding distributed model-checking. Various optimization problems on graphs are expressible in MSO. Examples include determining whether a graph $G$ has a clique of size $k$, whether it admits a coloring with $k$ colors, whether it contains a graph $H$ as a subgraph or minor, or whether terminal vertices in $G$ could be connected via vertex-disjoint paths. Our meta-theorem significantly enhances the work of Bousquet et al. [PODC 2022], which was focused on distributed certification of MSO on graphs with bounded treedepth. Moreover, our results can be extended to solving optimization and counting problems expressible in MSO, in graphs of bounded treedepth.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Recognizing Hereditary Properties in the Presence of Byzantine Nodes
Authors:
David Cifuentes-Núñez,
Pedro Montealegre,
Ivan Rapaport
Abstract:
Augustine et al. [DISC 2022] initiated the study of distributed graph algorithms in the presence of Byzantine nodes in the congested clique model. In this model, there is a set $B$ of Byzantine nodes, where $|B|$ is less than a third of the total number of nodes. These nodes have complete knowledge of the network and the state of other nodes, and they conspire to alter the output of the system. Th…
▽ More
Augustine et al. [DISC 2022] initiated the study of distributed graph algorithms in the presence of Byzantine nodes in the congested clique model. In this model, there is a set $B$ of Byzantine nodes, where $|B|$ is less than a third of the total number of nodes. These nodes have complete knowledge of the network and the state of other nodes, and they conspire to alter the output of the system. The authors addressed the connectivity problem, showing that it is solvable under the promise that either the subgraph induced by the honest nodes is connected, or the graph has $2|B|+1$ connected components.
In the current work, we continue the study of the Byzantine congested clique model by considering the recognition of other graph properties, specifically \emph{hereditary properties}. A graph property is \emph{hereditary} if it is closed under taking induced subgraphs. Examples of hereditary properties include acyclicity, bipartiteness, planarity, and bounded (chromatic, independence) number, etc.
For each class of graphs $\mathcal{G}$ satisfying an hereditary property (an hereditary graph-class), we propose a randomized algorithm which, with high probability, (1) accepts if the input graph $G$ belongs to $\mathcal{G}$, and (2) rejects if $G$ contains at least $|B| + 1$ disjoint subgraphs not belonging to $\mathcal{G}$. The round complexity of our algorithm is $$\mathcal{O}\left(\left(\dfrac{\log \left(\left|\mathcal{G}_n\right|\right)}{n} +|B|\right)\cdot\textrm{polylog}(n)\right),$$ where $\mathcal{G}_n$ is the set of $n$-node graphs in $\mathcal{G}$.
Finally, we obtain an impossibility result that proves that our result is tight. Indeed, we consider the hereditary class of acyclic graphs, and we prove that there is no algorithm that can distinguish between a graph being acyclic and a graph having $|B|$ disjoint cycles.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
The Minimum Clique Routing Problem on Cycles
Authors:
Mariana Escalante,
Martín Matamala,
Iván Rapaport,
Paola Tolomei,
Luis Miguel Torres
Abstract:
In the Minimum Clique Routing Problem on Cycles \textsc{MCRPC} we are given a cycle together with a set of demands (weighted origin-destination pairs) and the goal is to route all the pairs minimizing the maximum weighted clique of the intersection graph induced by the routing. The vertices of this graph are the demands with their corresponding weights and two demands are adjacent when their route…
▽ More
In the Minimum Clique Routing Problem on Cycles \textsc{MCRPC} we are given a cycle together with a set of demands (weighted origin-destination pairs) and the goal is to route all the pairs minimizing the maximum weighted clique of the intersection graph induced by the routing. The vertices of this graph are the demands with their corresponding weights and two demands are adjacent when their routes share at least one arc. In this work we are not only interested in the \textsc{MCRPC} but also in two natural subproblems. First, we consider the situation where the demands are disjoint, in the sense that every two demands do not share any of their corresponding ends. Second, we analyze the subproblem where the weights of the routes are all equal. We first show that the problem is NP-complete even in the subproblem of disjoint demands. For the case of arbitrary weights, we exhibit a simple combinatorial 2-approximation algorithm and a $\frac{3}{2}$-approximation algorithm based on rounding a solution of a relaxation of an integer linear programming formulation of our problem. Finally, we give a Fixed Parameter Tractable algorithm for the case of uniform weights, whose parameter is related to the maximum degree of the intersection graph induced by any routing.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Local Certification of Some Geometric Intersection Graph Classes
Authors:
Benjamín Jauregui,
Pedro Montealegre,
Diego Ramírez-Romero,
Ivan Rapaport
Abstract:
In the context of distributed certification, the recognition of graph classes has started to be intensively studied. For instance, different results related to the recognition of planar, bounded tree-width and $H$-minor free graphs have been recently obtained. The goal of the present work is to design compact certificates for the local recognition of relevant geometric intersection graph classes,…
▽ More
In the context of distributed certification, the recognition of graph classes has started to be intensively studied. For instance, different results related to the recognition of planar, bounded tree-width and $H$-minor free graphs have been recently obtained. The goal of the present work is to design compact certificates for the local recognition of relevant geometric intersection graph classes, namely interval, chordal, circular arc, trapezoid and permutation. More precisely, we give proof labeling schemes recognizing each of these classes with logarithmic-sized certificates. We also provide tight logarithmic lower bounds on the size of the certificates on the proof labeling schemes for the recognition of any of the aforementioned geometric intersection graph classes.
△ Less
Submitted 9 September, 2023;
originally announced September 2023.
-
Distributed Certification for Classes of Dense Graphs
Authors:
Pierre Fraigniaud,
Frédéric Mazoit,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
A proof-labeling scheme (PLS) for a boolean predicate $Π$ on labeled graphs is a mechanism used for certifying the legality with respect to $Π$ of global network states in a distributed manner. In a PLS, a certificate is assigned to each processing node of the network, and the nodes are in charge of checking that the collection of certificates forms a global proof that the system is in a correct s…
▽ More
A proof-labeling scheme (PLS) for a boolean predicate $Π$ on labeled graphs is a mechanism used for certifying the legality with respect to $Π$ of global network states in a distributed manner. In a PLS, a certificate is assigned to each processing node of the network, and the nodes are in charge of checking that the collection of certificates forms a global proof that the system is in a correct state, by exchanging the certificates once, between neighbors only. The main measure of complexity is the size of the certificates. Many PLSs have been designed for certifying specific predicates, including cycle-freeness, minimum-weight spanning tree, planarity, etc.
In 2021, a breakthrough has been obtained, as a meta-theorem stating that a large set of properties have compact PLSs in a large class of networks. Namely, for every $\mathrm{MSO}_2$ property $Π$ on labeled graphs, there exists a PLS for $Π$ with $O(\log n)$-bit certificates for all graphs of bounded tree-depth. This result has been extended to the larger class of graphs with bounded {tree-width}, using certificates on $O(\log^2 n)$ bits.
We extend this result even further, to the larger class of graphs with bounded clique-width, which, as opposed to the other two aforementioned classes, includes dense graphs. We show that, for every $\mathrm{MSO}_1$ property $Π$ on labeled graphs, there exists a PLS for $Π$ with $O(\log^2 n)$ bit certificates for all graphs of bounded clique-width.
△ Less
Submitted 26 July, 2023;
originally announced July 2023.
-
Energy-Efficient Distributed Algorithms for Synchronous Networks
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
We study the design of energy-efficient algorithms for the LOCAL and CONGEST models. Specifically, as a measure of complexity, we consider the maximum, taken over all the edges, or over all the nodes, of the number of rounds at which an edge, or a node, is active in the algorithm. We first show that every Turing-computable problem has a CONGEST algorithm with constant node-activation complexity, a…
▽ More
We study the design of energy-efficient algorithms for the LOCAL and CONGEST models. Specifically, as a measure of complexity, we consider the maximum, taken over all the edges, or over all the nodes, of the number of rounds at which an edge, or a node, is active in the algorithm. We first show that every Turing-computable problem has a CONGEST algorithm with constant node-activation complexity, and therefore constant edge-activation complexity as well. That is, every node (resp., edge) is active in sending (resp., transmitting) messages for only $O(1)$ rounds during the whole execution of the algorithm. In other words, every Turing-computable problem can be solved by an algorithm consuming the least possible energy. In the LOCAL model, the same holds obviously, but with the additional feature that the algorithm runs in $O(\mbox{poly}(n))$ rounds in $n$-node networks. However, we show that insisting on algorithms running in $O(\mbox{poly}(n))$ rounds in the CONGEST model comes with a severe cost in terms of energy. Namely, there are problems requiring $Ω(\mbox{poly}(n))$ edge-activations (and thus $Ω(\mbox{poly}(n))$ node-activations as well) in the CONGEST model whenever solved by algorithms bounded to run in $O(\mbox{poly}(n))$ rounds. Finally, we demonstrate the existence of a sharp separation between the edge-activation complexity and the node-activation complexity in the CONGEST model, for algorithms bounded to run in $O(\mbox{poly}(n))$ rounds. Specifically, under this constraint, there is a problem with $O(1)$ edge-activation complexity but $\tildeΩ(n^{1/4})$ node-activation complexity.
△ Less
Submitted 5 April, 2023; v1 submitted 27 January, 2023;
originally announced January 2023.
-
Computing Power of Hybrid Models in Synchronous Networks
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Pablo Paredes,
Ivan Rapaport,
Martín Ríos-Wilson,
Ioan Todinca
Abstract:
During the last two decades, a small set of distributed computing models for networks have emerged, among which LOCAL, CONGEST, and Broadcast Congested Clique (BCC) play a prominent role. We consider hybrid models resulting from combining these three models. That is, we analyze the computing power of models allowing to, say, perform a constant number of rounds of CONGEST, then a constant number of…
▽ More
During the last two decades, a small set of distributed computing models for networks have emerged, among which LOCAL, CONGEST, and Broadcast Congested Clique (BCC) play a prominent role. We consider hybrid models resulting from combining these three models. That is, we analyze the computing power of models allowing to, say, perform a constant number of rounds of CONGEST, then a constant number of rounds of LOCAL, then a constant number of rounds of BCC, possibly repeating this figure a constant number of times. We specifically focus on 2-round models, and we establish the complete picture of the relative powers of these models. That is, for every pair of such models, we determine whether one is (strictly) stronger than the other, or whether the two models are incomparable. The separation results are obtained by approaching communication complexity through an original angle, which may be of independent interest. The two players are not bounded to compute the value of a binary function, but the combined outputs of the two players are constrained by this value. In particular, we introduce the XOR-Index problem, in which Alice is given a binary vector $x\in\{0,1\}^n$ together with an index $i\in[n]$, Bob is given a binary vector $y\in\{0,1\}^n$ together with an index $j\in[n]$, and, after a single round of 2-way communication, Alice must output a boolean $\textrm{out}_A$, and Bob must output a boolean $\textrm{out}_B$, such that $\mbox{out}_A\land\mbox{out}_B = x_j\oplus y_i$. We show that the communication complexity of XOR-Index is $Ω(n)$ bits.
△ Less
Submitted 4 August, 2022;
originally announced August 2022.
-
Distributed Interactive Proofs for the Recognition of Some Geometric Intersection Graph Classes
Authors:
Benjamin Jauregui,
Pedro Montealegre,
Ivan Rapaport
Abstract:
A graph $G=(V,E)$ is a geometric intersection graph if every node $v \in V$ is identified with a geometric object of some particular type, and two nodes are adjacent if the corresponding objects intersect. Geometric intersection graph classes have been studied from both the theoretical and practical point of view. On the one hand, many hard problems can be efficiently solved or approximated when t…
▽ More
A graph $G=(V,E)$ is a geometric intersection graph if every node $v \in V$ is identified with a geometric object of some particular type, and two nodes are adjacent if the corresponding objects intersect. Geometric intersection graph classes have been studied from both the theoretical and practical point of view. On the one hand, many hard problems can be efficiently solved or approximated when the input graph is restricted to a geometric intersection class of graphs. On the other hand, these graphs appear naturally in many applications such as sensor networks, scheduling problems, and others. Recently, in the context of distributed certification and distributed interactive proofs, the recognition of graph classes has started to be intensively studied. Different results related to the recognition of trees, bipartite graphs, bounded diameter graphs, triangle-free graphs, planar graphs, bounded genus graphs, $H$-minor free graphs, etc., have been obtained.
The goal of the present work is to design efficient distributed protocols for the recognition of relevant geometric intersection graph classes, namely permutation graphs, trapezoid graphs, circle graphs, and polygon-circle graphs. More precisely, for the two first classes, we give proof labeling schemes recognizing them with logarithmic-sized certificates. For the other two classes, we give three-round distributed interactive protocols that use messages and certificates of size $\mathcal{O}(\log n)$. Finally, we provide logarithmic lower-bounds on the size of the certificates on the proof labeling schemes for the recognition of any of the aforementioned geometric intersection graph classes.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
A Meta-Theorem for Distributed Certification
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Ioan Todinca
Abstract:
Distributed certification, whether it be proof-labeling schemes, locally checkable proofs, etc., deals with the issue of certifying the legality of a distributed system with respect to a given boolean predicate. A certificate is assigned to each process in the system by a non-trustable oracle, and the processes are in charge of verifying these certificates, so that two properties are satisfied: co…
▽ More
Distributed certification, whether it be proof-labeling schemes, locally checkable proofs, etc., deals with the issue of certifying the legality of a distributed system with respect to a given boolean predicate. A certificate is assigned to each process in the system by a non-trustable oracle, and the processes are in charge of verifying these certificates, so that two properties are satisfied: completeness, i.e., for every legal instance, there is a certificate assignment leading all processes to accept, and soundness, i.e., for every illegal instance, and for every certificate assignment, at least one process rejects. The verification of the certificates must be fast, and the certificates themselves must be small. A large quantity of results have been produced in this framework, each aiming at designing a distributed certification mechanism for specific boolean predicates. This paper presents a "meta-theorem", applying to many boolean predicates at once. Specifically, we prove that, for every boolean predicate on graphs definable in the monadic second-order (MSO) logic of graphs, there exists a distributed certification mechanism using certificates on $O(\log^2n)$ bits in $n$-node graphs of bounded treewidth, with a verification protocol involving a single round of communication between neighbors.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Compact Distributed Interactive Proofs for the Recognition of Cographs and Distance-Hereditary Graphs
Authors:
Pedro Montealegre,
Diego Ramírez-Romero,
Iván Rapaport
Abstract:
We present compact distributed interactive proofs for the recognition of two important graph classes, well-studied in the context of centralized algorithms, namely complement reducible graphs and distance-hereditary graphs. Complement reducible graphs (also called cographs) are defined as the graphs not containing a four-node path $P_4$ as an induced subgraph. Distance-hereditary graphs are a supe…
▽ More
We present compact distributed interactive proofs for the recognition of two important graph classes, well-studied in the context of centralized algorithms, namely complement reducible graphs and distance-hereditary graphs. Complement reducible graphs (also called cographs) are defined as the graphs not containing a four-node path $P_4$ as an induced subgraph. Distance-hereditary graphs are a super-class of cographs, defined as the graphs where the distance (shortest paths) between any pair of vertices is the same on every induced connected subgraph.
First, we show that there exists a distributed interactive proof for the recognition of cographs with two rounds of interaction. More precisely, we give a $\mathsf{dAM}$ protocol with a proof size of $\mathcal{O}(\log n)$ bits that uses shared randomness and recognizes cographs with high probability. Moreover, our protocol can be adapted to verify any Turing-decidable predicate restricted to cographs in $\mathsf{dAM}$ with certificates of size $\mathcal{O}(\log n)$.
Second, we give a three-round, $\mathsf{dMAM}$ interactive protocol for the recognition of distance-hereditary graphs, still with a proof size of $\mathcal{O}(\log n)$ bits and also using shared randomness.
Finally, we show that any one-round (denoted $\mathsf{dM}$) or two-round, $\mathsf{dMA}$ protocol for the recognition of cographs or distance-hereditary graphs requires certificates of size $Ω(\log n)$ bits. Moreover, we show that any constant-round $\mathsf{dAM}$ protocol using shared randomness requires certificates of size $Ω(\log \log n)$.
△ Less
Submitted 6 December, 2020;
originally announced December 2020.
-
Local Certification of Graphs with Bounded Genus
Authors:
Laurent Feuilloley,
Pierre Fraigniaud,
Pedro Montealegre,
Ivan Rapaport,
Éric Rémila,
Ioan Todinca
Abstract:
Naor, Parter, and Yogev [SODA 2020] recently designed a compiler for automatically translating standard centralized interactive protocols to distributed interactive protocols, as introduced by Kol, Oshman, and Saxena [PODC 2018]. In particular, by using this compiler, every linear-time algorithm for deciding the membership to some fixed graph class can be translated into a…
▽ More
Naor, Parter, and Yogev [SODA 2020] recently designed a compiler for automatically translating standard centralized interactive protocols to distributed interactive protocols, as introduced by Kol, Oshman, and Saxena [PODC 2018]. In particular, by using this compiler, every linear-time algorithm for deciding the membership to some fixed graph class can be translated into a $\mathsf{dMAM}(O(\log n))$ protocol for this class, that is, a distributed interactive protocol with $O(\log n)$-bit proof size in $n$-node graphs, and three interactions between the (centralizer) computationally-unbounded but non-trustable prover Merlin, and the (decentralized) randomized computationally-limited verifier Arthur. As a corollary, there is a $\mathsf{dMAM}(O(\log n))$ protocol for the class of planar graphs, as well as for the class of graphs with bounded genus.
We show that there exists a distributed interactive protocol for the class of graphs with bounded genus performing just a single interaction, from the prover to the verifier, yet preserving proof size of $O(\log n)$ bits. This result also holds for the class of graphs with bounded demi-genus, that is, graphs that can be embedded on a non-orientable surface of bounded genus. The interactive protocols described in this paper are actually proof-labeling schemes, i.e., a subclass of interactive protocols, previously introduced by Korman, Kutten, and Peleg [PODC 2005]. In particular, these schemes do not require any randomization from the verifier, and the proofs may often be computed a priori, at low cost, by the nodes themselves. Our results thus extend the recent proof-labeling scheme for planar graphs by Feuilloley et al. [PODC 2020], to graphs of bounded genus, and to graphs of bounded demigenus.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
Shared vs Private Randomness in Distributed Interactive Proofs
Authors:
Pedro Montealegre,
Diego Ramírez-Romero,
Ivan Rapaport
Abstract:
In distributed interactive proofs, the nodes of a graph G interact with a powerful but untrustable prover who tries to convince them, in a small number of rounds and through short messages, that G satisfies some property. This series of interactions is followed by a phase of distributed verification, which may be either deterministic or randomized, where nodes exchange messages with their neighbor…
▽ More
In distributed interactive proofs, the nodes of a graph G interact with a powerful but untrustable prover who tries to convince them, in a small number of rounds and through short messages, that G satisfies some property. This series of interactions is followed by a phase of distributed verification, which may be either deterministic or randomized, where nodes exchange messages with their neighbors.
The nature of this last verification round defines the two types of interactive protocols. We say that the protocol is of Arthur-Merlin type if the verification round is deterministic. We say that the protocol is of Merlin-Arthur type if, in the verification round, the nodes are allowed to use a fresh set of random bits.
In the original model introduced by Kol, Oshman, and Saxena [PODC 2018], the randomness was private in the sense that each node had only access to an individual source of random coins. Crescenzi, Fraigniaud, and Paz [DISC 2019] initiated the study of the impact of shared randomness (the situation where the coin tosses are visible to all nodes) in the distributed interactive model.
In this work, we continue that research line by showing that the impact of the two forms of randomness is very different depending on whether we are considering Arthur-Merlin protocols or Merlin-Arthur protocols. While private randomness gives more power to the first type of protocols, shared randomness provides more power to the second. Our results also connect shared randomness in distributed interactive proofs with distributed verification, and new lower bounds are obtained.
△ Less
Submitted 29 June, 2020;
originally announced June 2020.
-
Compact Distributed Certification of Planar Graphs
Authors:
Laurent Feuilloley,
Pierre Fraigniaud,
Ivan Rapaport,
Éric Rémila,
Pedro Montealegre,
Ioan Todinca
Abstract:
Naor, Parter, and Yogev (SODA 2020) have recently demonstrated the existence of a \emph{distributed interactive proof} for planarity (i.e., for certifying that a network is planar), using a sophisticated generic technique for constructing distributed IP protocols based on sequential IP protocols. The interactive proof for planarity is based on a distributed certification of the correct execution o…
▽ More
Naor, Parter, and Yogev (SODA 2020) have recently demonstrated the existence of a \emph{distributed interactive proof} for planarity (i.e., for certifying that a network is planar), using a sophisticated generic technique for constructing distributed IP protocols based on sequential IP protocols. The interactive proof for planarity is based on a distributed certification of the correct execution of any given sequential linear-time algorithm for planarity testing. It involves three interactions between the prover and the randomized distributed verifier (i.e., it is a \dMAM\/ protocol), and uses small certificates, on $O(\log n)$ bits in $n$-node networks. We show that a single interaction from the prover suffices, and randomization is unecessary, by providing an explicit description of a \emph{proof-labeling scheme} for planarity, still using certificates on just $O(\log n)$ bits. We also show that there are no proof-labeling schemes -- in fact, even no \emph{locally checkable proofs} -- for planarity using certificates on $o(\log n)$ bits.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
Distributed Subgraph Detection
Authors:
Pierre Fraigniaud,
Pedro Montealegre,
Dennis Olivetti,
Ivan Rapaport,
Ioan Todinca
Abstract:
In the standard CONGEST model for distributed network computing, it is known that "global" tasks such as minimum spanning tree, diameter, and all-pairs shortest paths, consume large bandwidth, for their running-time is $Ω(\mbox{poly}(n))$ rounds in $n$-node networks with constant diameter. Surprisingly, "local" tasks such as detecting the presence of a 4-cycle as a subgraph also requires…
▽ More
In the standard CONGEST model for distributed network computing, it is known that "global" tasks such as minimum spanning tree, diameter, and all-pairs shortest paths, consume large bandwidth, for their running-time is $Ω(\mbox{poly}(n))$ rounds in $n$-node networks with constant diameter. Surprisingly, "local" tasks such as detecting the presence of a 4-cycle as a subgraph also requires $\widetildeΩ(\sqrt{n})$ rounds, even using randomized algorithms, and the best known upper bound for detecting the presence of a 3-cycle is $\widetilde{O}(n^{\frac{2}{3}})$ rounds. The objective of this paper is to better understand the landscape of such subgraph detection tasks. We show that, in contrast to \emph{cycles}, which are hard to detect in the CONGEST model, there exists a deterministic algorithm for detecting the presence of a subgraph isomorphic to $T$ running in a \emph{constant} number of rounds, for every tree $T$. Our algorithm provides a distributed implementation of a combinatorial technique due to Erdős et al. for sparsening the set of partial solutions kept by the nodes at each round. Our result has important consequences to \emph{distributed property-testing}, i.e., to randomized algorithms whose aim is to distinguish between graphs satisfying a property, and graphs far from satisfying that property. In particular, we get that, for every graph pattern $H$ composed of an edge and a tree connected in an arbitrary manner, there exists a distributed testing algorithm for $H$-freeness, performing in a constant number of rounds. Although the class of graph patterns $H$ formed by a tree and an edge connected arbitrarily may look artificial, all previous results of the literature concerning testing $H$-freeness for classical patterns such as cycles and cliques can be viewed as direct consequences of our result, while our algorithm enables testing more complex patterns.
△ Less
Submitted 13 June, 2017;
originally announced June 2017.
-
Graph Reconstruction in the Congested Clique
Authors:
Pedro Montealegre,
Sebastian Perez-Salazar,
Ivan Rapaport,
Ioan Todinca
Abstract:
The congested clique model is a message-passing model of distributed computation where the underlying communication network is the complete graph of $n$ nodes. In this paper we consider the situation where the joint input to the nodes is an $n$-node labeled graph $G$, i.e., the local input received by each node is the indicator function of its neighborhood in $G$. Nodes execute an algorithm, commu…
▽ More
The congested clique model is a message-passing model of distributed computation where the underlying communication network is the complete graph of $n$ nodes. In this paper we consider the situation where the joint input to the nodes is an $n$-node labeled graph $G$, i.e., the local input received by each node is the indicator function of its neighborhood in $G$. Nodes execute an algorithm, communicating with each other in synchronous rounds and their goal is to compute some function that depends on $G$. In every round, each of the $n$ nodes may send up to $n-1$ different $b$-bit messages through each of its $n-1$ communication links. We denote by $R$ the number of rounds of the algorithm. The product $Rb$, that is, the total number of bits received by a node through one link, is the cost of the algorithm.
The most difficult problem we could attempt to solve is the reconstruction problem, where nodes are asked to recover all the edges of the input graph $G$. Formally, given a class of graphs $\mathcal G$, the problem is defined as follows: if $G \notin {\mathcal G}$, then every node must reject; on the other hand, if $G \in {\mathcal G}$, then every node must end up, after the $R$ rounds, knowing all the edges of $G$. It is not difficult to see that the cost $Rb$ of any algorithm that solves this problem (even with public coins) is at least $Ω(\log|\mathcal{G}_n|/n)$, where $\mathcal{G}_n$ is the subclass of all $n$-node labeled graphs in $\mathcal G$. In this paper we prove that previous bound is tight and that it is possible to achieve it with only $R=2$ rounds. More precisely, we exhibit (i) a one-round algorithm that achieves this bound for hereditary graph classes; and (ii) a two-round algorithm that achieves this bound for arbitrary graph classes.
△ Less
Submitted 9 June, 2017;
originally announced June 2017.
-
Distributed Testing of Excluded Subgraphs
Authors:
Pierre Fraigniaud,
Ivan Rapaport,
Ville Salo,
Ioan Todinca
Abstract:
We study property testing in the context of distributed computing, under the classical CONGEST model. It is known that testing whether a graph is triangle-free can be done in a constant number of rounds, where the constant depends on how far the input graph is from being triangle-free. We show that, for every connected 4-node graph H, testing whether a graph is H-free can be done in a constant num…
▽ More
We study property testing in the context of distributed computing, under the classical CONGEST model. It is known that testing whether a graph is triangle-free can be done in a constant number of rounds, where the constant depends on how far the input graph is from being triangle-free. We show that, for every connected 4-node graph H, testing whether a graph is H-free can be done in a constant number of rounds too. The constant also depends on how far the input graph is from being H-free, and the dependence is identical to the one in the case of testing triangles. Hence, in particular, testing whether a graph is K_4-free, and testing whether a graph is C_4-free can be done in a constant number of rounds (where K_k denotes the k-node clique, and C_k denotes the k-node cycle). On the other hand, we show that testing K_k-freeness and C_k-freeness for k>4 appear to be much harder. Specifically, we investigate two natural types of generic algorithms for testing H-freeness, called DFS tester and BFS tester. The latter captures the previously known algorithm to test the presence of triangles, while the former captures our generic algorithm to test the presence of a 4-node graph pattern H. We prove that both DFS and BFS testers fail to test K_k-freeness and C_k-freeness in a constant number of rounds for k>4.
△ Less
Submitted 12 May, 2016;
originally announced May 2016.
-
Strict majority bootstrap percolation in the r-wheel
Authors:
Marcos Kiwi,
Pablo Moisset de Espanés,
Ivan Rapaport,
Sergio Rica,
Guillaume Theyssier
Abstract:
In this paper we study the strict majority bootstrap percolation process on graphs. Vertices may be active or passive. Initially, active vertices are chosen independently with probability p. Each passive vertex becomes active if at least half of its neighbors are active (and thereafter never changes its state). If at the end of the process all vertices become active then we say that the initial se…
▽ More
In this paper we study the strict majority bootstrap percolation process on graphs. Vertices may be active or passive. Initially, active vertices are chosen independently with probability p. Each passive vertex becomes active if at least half of its neighbors are active (and thereafter never changes its state). If at the end of the process all vertices become active then we say that the initial set of active vertices percolates on the graph. We address the problem of finding graphs for which percolation is likely to occur for small values of p. Specifically, we study a graph that we call r-wheel: a ring of n vertices augmented with a universal vertex where each vertex in the ring is connected to its r closest neighbors to the left and to its r closest neighbors to the right. We prove that the critical probability is 1/4. In other words, if p>1/4 then for large values of r percolation occurs with probability arbitrarily close to 1 as n goes to infinity. On the other hand, if p<1/4 then the probability of percolation is bounded away from 1.
△ Less
Submitted 19 November, 2013; v1 submitted 18 August, 2013;
originally announced August 2013.
-
Fixed-points in Random Boolean Networks: The impact of parallelism in the scale-free topology case
Authors:
Pablo Moisset de Espanés,
Axel Osses,
Iván Rapaport
Abstract:
Fixed points are fundamental states in any dynamical system. In the case of gene regulatory networks (GRNs) they correspond to stable genes profiles associated to the various cell types. We use Kauffman's approach to model GRNs with random Boolean networks (RBNs). We start this paper by proving that, if we fix the values of the source nodes (nodes with in-degree 0), the expected number of fixed po…
▽ More
Fixed points are fundamental states in any dynamical system. In the case of gene regulatory networks (GRNs) they correspond to stable genes profiles associated to the various cell types. We use Kauffman's approach to model GRNs with random Boolean networks (RBNs). We start this paper by proving that, if we fix the values of the source nodes (nodes with in-degree 0), the expected number of fixed points of any RBN is one (independently of the topology we choose). For finding such fixed points we use the α-asynchronous dynamics (where every node is updated independently with probability 0 < α < 1). In fact, it is well-known that asynchrony avoids the cycle attractors into which parallel dynamics tends to fall. We perform simulations and we show the remarkable property that, if for a given RBN with scale-free topology and α-asynchronous dynamics an initial configuration reaches a fixed point, then every configuration also reaches a fixed point. By contrast, in the parallel regime, the percentage of initial configurations reaching a fixed point (for the same networks) is dramatically smaller. We contrast the results of the simulations on scale-free networks with the classical Erdos-Renyi model of random networks. Everything indicates that scale-free networks are extremely robust. Finally, we study the mean and maximum time/work needed to reach a fixed point when starting from randomly chosen initial configurations.
△ Less
Submitted 7 March, 2012;
originally announced March 2012.
-
Interconnection network with a shared whiteboard: Impact of (a)synchronicity on computing power
Authors:
Florent Becker,
Adrian Kosowski,
Nicolas Nisse,
Ivan Rapaport,
Karol Suchan
Abstract:
In this work we study the computational power of graph-based models of distributed computing in which each node additionally has access to a global whiteboard. A node can read the contents of the whiteboard and, when activated, can write one message of O(log n) bits on it. When the protocol terminates, each node computes the output based on the final contents of the whiteboard. We consider several…
▽ More
In this work we study the computational power of graph-based models of distributed computing in which each node additionally has access to a global whiteboard. A node can read the contents of the whiteboard and, when activated, can write one message of O(log n) bits on it. When the protocol terminates, each node computes the output based on the final contents of the whiteboard. We consider several scheduling schemes for nodes, providing a strict ordering of their power in terms of the problems which can be solved with exactly one activation per node. The problems used to separate the models are related to Maximal Independent Set, detection of cycles of length 4, and BFS spanning tree constructions.
△ Less
Submitted 29 September, 2011;
originally announced September 2011.
-
Traced communication complexity of cellular automata
Authors:
Eric Goles,
Pierre Guillon,
Ivan Rapaport
Abstract:
We study cellular automata with respect to a new communication complexity problem: each of two players know half of some finite word, and must be able to tell whether the state of the central cell will follow a given evolution, by communicating as little as possible between each other. We present some links with classical dynamical concepts, especially equicontinuity, expansiveness, entropy and gi…
▽ More
We study cellular automata with respect to a new communication complexity problem: each of two players know half of some finite word, and must be able to tell whether the state of the central cell will follow a given evolution, by communicating as little as possible between each other. We present some links with classical dynamical concepts, especially equicontinuity, expansiveness, entropy and give the asymptotic communication complexity of most elementary cellular automata.
△ Less
Submitted 17 February, 2011;
originally announced February 2011.
-
Adding a referee to an interconnection network: What can(not) be computed in one round
Authors:
Florent Becker,
Martín Matamala,
Nicolas Nisse,
Ivan Rapaport,
Karol Suchan,
Ioan Todinca
Abstract:
In this paper we ask which properties of a distributed network can be computed from a little amount of local information provided by its nodes. The distributed model we consider is a restriction of the classical CONGEST (distributed) model and it is close to the simultaneous messages (communication complexity) model defined by Babai, Kimmel and Lokam. More precisely, each of these n nodes -which o…
▽ More
In this paper we ask which properties of a distributed network can be computed from a little amount of local information provided by its nodes. The distributed model we consider is a restriction of the classical CONGEST (distributed) model and it is close to the simultaneous messages (communication complexity) model defined by Babai, Kimmel and Lokam. More precisely, each of these n nodes -which only knows its own ID and the IDs of its neighbors- is allowed to send a message of O(log n) bits to some central entity, called the referee. Is it possible for the referee to decide some basic structural properties of the network topology G? We show that simple questions like, "does G contain a square?", "does G contain a triangle?" or "Is the diameter of G at most 3? cannot be solved in general. On the other hand, the referee can decode the messages in order to have full knowledge of G when G belongs to many graph classes such as planar graphs, bounded treewidth graphs and, more generally, bounded degeneracy graphs. We leave open questions related to the connectivity of arbitrary graphs.
△ Less
Submitted 5 October, 2010; v1 submitted 22 September, 2010;
originally announced September 2010.
-
Communication Complexity and Intrinsic Universality in Cellular Automata
Authors:
Eric Goles Chacc,
Pierre-Etienne Meunier,
Ivan Rapaport,
Guillaume Theyssier
Abstract:
The notions of universality and completeness are central in the theories of computation and computational complexity. However, proving lower bounds and necessary conditions remains hard in most of the cases. In this article, we introduce necessary conditions for a cellular automaton to be "universal", according to a precise notion of simulation, related both to the dynamics of cellular automata an…
▽ More
The notions of universality and completeness are central in the theories of computation and computational complexity. However, proving lower bounds and necessary conditions remains hard in most of the cases. In this article, we introduce necessary conditions for a cellular automaton to be "universal", according to a precise notion of simulation, related both to the dynamics of cellular automata and to their computational power. This notion of simulation relies on simple operations of space-time rescaling and it is intrinsic to the model of cellular automata. Intrinsinc universality, the derived notion, is stronger than Turing universality, but more uniform, and easier to define and study. Our approach builds upon the notion of communication complexity, which was primarily designed to study parallel programs, and thus is, as we show in this article, particulary well suited to the study of cellular automata: it allowed to show, by studying natural problems on the dynamics of cellular automata, that several classes of cellular automata, as well as many natural (elementary) examples, could not be intrinsically universal.
△ Less
Submitted 16 September, 2010; v1 submitted 9 December, 2009;
originally announced December 2009.
-
Communications in cellular automata
Authors:
Eric Goles,
Pierre-Etienne Meunier,
Ivan Rapaport,
Guillaume Theyssier
Abstract:
The goal of this paper is to show why the framework of communication complexity seems suitable for the study of cellular automata. Researchers have tackled different algorithmic problems ranging from the complexity of predicting to the decidability of different dynamical properties of cellular automata. But the difference here is that we look for communication protocols arising in the dynamics i…
▽ More
The goal of this paper is to show why the framework of communication complexity seems suitable for the study of cellular automata. Researchers have tackled different algorithmic problems ranging from the complexity of predicting to the decidability of different dynamical properties of cellular automata. But the difference here is that we look for communication protocols arising in the dynamics itself. Our work is guided by the following idea: if we are able to give a protocol describing a cellular automaton, then we can understand its behavior.
△ Less
Submitted 17 June, 2009;
originally announced June 2009.
-
Domino tilings and related models: space of configurations of domains with holes
Authors:
Sebastien Desreux,
Martin Matamala,
Ivan Rapaport,
Eric Remila
Abstract:
We first prove that the set of domino tilings of a fixed finite figure is a distributive lattice, even in the case when the figure has holes. We then give a geometrical interpretation of the order given by this lattice, using (not necessarily local) transformations called {\em flips}.
This study allows us to formulate an exhaustive generation algorithm and a uniform random sampling algorithm.…
▽ More
We first prove that the set of domino tilings of a fixed finite figure is a distributive lattice, even in the case when the figure has holes. We then give a geometrical interpretation of the order given by this lattice, using (not necessarily local) transformations called {\em flips}.
This study allows us to formulate an exhaustive generation algorithm and a uniform random sampling algorithm.
We finally extend these results to other types of tilings (calisson tilings, tilings with bicolored Wang tiles).
△ Less
Submitted 27 February, 2003;
originally announced February 2003.
-
Cellular automata and communication complexity
Authors:
Christoph Durr,
Ivan Rapaport,
Guillaume Theyssier
Abstract:
The model of cellular automata is fascinating because very simple local rules can generate complex global behaviors. The relationship between local and global function is subject of many studies. We tackle this question by using results on communication complexity theory and, as a by-product, we provide (yet another) classification of cellular automata.
The model of cellular automata is fascinating because very simple local rules can generate complex global behaviors. The relationship between local and global function is subject of many studies. We tackle this question by using results on communication complexity theory and, as a by-product, we provide (yet another) classification of cellular automata.
△ Less
Submitted 11 October, 2002;
originally announced October 2002.
-
Who Wins Domineering on Rectangular Boards?
Authors:
Michael Lachmann,
Cristopher Moore,
Ivan Rapaport
Abstract:
Using mostly elementary considerations, we find out who wins the game of Domineering on all rectangular boards of width 2, 3, 5, and 7. We obtain bounds on other boards as well, and prove the existence of polynomial-time strategies for playing on all boards of width 2, 3, 4, 5, 7, 9, and 11. We also comment briefly on toroidal and cylindrical boards.
Using mostly elementary considerations, we find out who wins the game of Domineering on all rectangular boards of width 2, 3, 5, and 7. We obtain bounds on other boards as well, and prove the existence of polynomial-time strategies for playing on all boards of width 2, 3, 4, 5, 7, 9, and 11. We also comment briefly on toroidal and cylindrical boards.
△ Less
Submitted 4 August, 2000; v1 submitted 8 June, 2000;
originally announced June 2000.
-
Tiling with bars under tomographic constraints
Authors:
Christoph Durr,
Eric Goles,
Ivan Rapaport,
Eric Remila
Abstract:
We wish to tile a rectangle or a torus with only vertical and horizontal bars of a given length, such that the number of bars in every column and row equals given numbers. We present results for particular instances and for a more general problem, while leaving open the initial problem.
We wish to tile a rectangle or a torus with only vertical and horizontal bars of a given length, such that the number of bars in every column and row equals given numbers. We present results for particular instances and for a more general problem, while leaving open the initial problem.
△ Less
Submitted 28 September, 2001; v1 submitted 31 March, 1999;
originally announced March 1999.