scispace - formally typeset
Search or ask a question

Showing papers by "Laurent Viennot published in 2015"


Journal ArticleDOI
TL;DR: This paper provides a method for transforming a non-uniform local algorithm into a uniform one and introduces a new distributed tool called pruning algorithms, which it believes may be of independent interest.
Abstract: Numerous sophisticated local algorithm were suggested in the literature for various fundamental problems. Notable examples are the MIS and $(\Delta+1)$-coloring algorithms by Barenboim and Elkin [6], by Kuhn [22], and by Panconesi and Srinivasan [34], as well as the $O(\Delta 2)$-coloring algorithm by Linial [28]. Unfortunately, most known local algorithms (including, in particular, the aforementioned algorithms) are non-uniform, that is, local algorithms generally use good estimations of one or more global parameters of the network, e.g., the maximum degree $\Delta$ or the number of nodes n. This paper provides a method for transforming a non-uniform local algorithm into a uniform one. Furthermore , the resulting algorithm enjoys the same asymp-totic running time as the original non-uniform algorithm. Our method applies to a wide family of both deterministic and randomized algorithms. Specifically, it applies to almost all state of the art non-uniform algorithms for MIS and Maximal Matching, as well as to many results concerning the coloring problem. (In particular, it applies to all aforementioned algorithms.) To obtain our transformations we introduce a new distributed tool called pruning algorithms, which we believe may be of independent interest.

41 citations


Journal ArticleDOI
TL;DR: This paper introduces flow games, a simple abstraction that models network formation under selfish dynamics, featuring user-specific interests and budget of attention, and shows that selfish dynamics converge to a stable network structure with close-to-optimal information dissemination.

13 citations


02 Jun 2015
TL;DR: In this paper, the authors propose an approach to construire an ensemble representatif d'en-tetes de paquets, and then tester les proprietes desirees sur ces en-tets.
Abstract: Verifier des tables de routage consiste a tester la validite des tables de l'ensemble des routeurs d'un reseau donne. Par exemple, il peut s'agir de tester l'absence de boucle ou de trou noir. Dans cet article, nous proposons une approche en deux etapes : construire un ensemble representatif d'en-tetes de paquets, puis tester les proprietes desirees sur ces en-tetes. Toute la difficulte est de construire un ensemble relativement petit tout en garantissant qu'un paquet avec un en-tete arbitraire va se comporter exactement comme au moins l'un des en-tetes de l'ensemble representatif. A partir d'un modele tres general inspire du paradigme Software Defined Networking (SDN), nous montrons que le probleme de la detection de boucles peut se resoudre en temps polynomial en la taille d'un ensemble representatif. Nous montrons aussi qu'une condition naturelle sur les regles de routage, inspiree des travaux de Boutier et Chroboczek sur le routage par source et destination, permet de construire un ensemble representatif dont la taille est au plus le nombre de regles de routage plus un. Par comparaison, sans cette condition naturelle, la taille de l'ensemble representatif peut dans le pire des cas etre exponentielle en la taille des en-tetes.

1 citations