Low Randomness Rumor Spreading via Hashing He Sun Max Planck Institute for Informatics Joint work with George Giakkoupis, Thomas Sauerwald and Philipp.

Slides:



Advertisements
Similar presentations
Randomness Conductors Expander Graphs Randomness Extractors Condensers Universal Hash Functions
Advertisements

Walk the Walk: On Pseudorandomness, Expansion, and Connectivity Omer Reingold Weizmann Institute Based on join works with Michael Capalbo, Kai-Min Chung,
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
A Combinatorial Construction of Almost-Ramanujan Graphs Using the Zig-Zag product Avraham Ben-Aroya Avraham Ben-Aroya Amnon Ta-Shma Amnon Ta-Shma Tel-Aviv.
Why Simple Hash Functions Work : Exploiting the Entropy in a Data Stream Michael Mitzenmacher Salil Vadhan And improvements with Kai-Min Chung.
The Cover Time of Random Walks Uriel Feige Weizmann Institute.
Benjamin Doerr MPII Saarbrücken joint work with Quasi-Random Rumor Spreading Tobias Friedrich U Berkeley Anna Huber MPII Saarbrücken Thomas Sauerwald U.
Quasirandom Rumor Spreading Tobias Friedrich Max-Planck-Institut für Informatik Saarbrücken.
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Robust Randomness Expansion Upper and Lower Bounds Matthew Coudron, Thomas Vidick, Henry Yuen arXiv:
Precept 6 Hashing & Partitioning 1 Peng Sun. Server Load Balancing Balance load across servers Normal techniques: Round-robin? 2.
Benjamin Doerr Max-Planck-Institut für Informatik Saarbrücken Introduction to Quasirandomness.
Benjamin Doerr Max-Planck-Institut für Informatik Saarbrücken Quasirandomness.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
Randomized Algorithms Kyomin Jung KAIST Applied Algorithm Lab Jan 12, WSAC
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Rumour Spreading in Social Networks Alessandro Panconesi Dipartimento di Informatica Joint work with Flavio Chierichetti and Silvio Lattanzi.
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
LOCALITY IN DISTRIBUTED GRAPH ALGORITHMS Nathan Linial Presented by: Ron Ryvchin.
Analysis of Network Diffusion and Distributed Network Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization.
Ad-Hoc Networks Beyond Unit Disk Graphs
Yi Wu (CMU) Joint work with Parikshit Gopalan (MSR SVC) Ryan O’Donnell (CMU) David Zuckerman (UT Austin) Pseudorandom Generators for Halfspaces TexPoint.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
On Approximating the Average Distance Between Points Kfir Barhum, Oded Goldreich and Adi Shraibman Weizmann Institute of Science.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Constant Degree, Lossless Expanders Omer Reingold AT&T joint work with Michael Capalbo (IAS), Salil Vadhan (Harvard), and Avi Wigderson (Hebrew U., IAS)
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Minimum.
1 Streaming Computation of Combinatorial Objects Ziv Bar-Yossef U.C. Berkeley Omer Reingold AT&T Labs – Research Ronen.
Christian Sohler 1 University of Dortmund Testing Expansion in Bounded Degree Graphs Christian Sohler University of Dortmund (joint work with Artur Czumaj,
Localized Self- healing using Expanders Gopal Pandurangan Nanyang Technological University, Singapore Amitabh Trehan Technion - Israel Institute of Technology,
How To Explore a Fast Changing World (On the Cover Time of Dynamic Graphs) Chen Avin Ben Gurion University Joint work with Michal Koucky & Zvi Lotker (ICALP-08)
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Data Structures Hashing Uri Zwick January 2014.
Distributed Verification and Hardness of Distributed Approximation Atish Das Sarma Stephan Holzer Danupon Nanongkai Gopal Pandurangan David Peleg 1 Weizmann.
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
Spectral Graph Theory and Applications Advanced Course WS2011/2012 Thomas Sauerwald He Sun Max Planck Institute for Informatics.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
RESOURCES, TRADE-OFFS, AND LIMITATIONS Group 5 8/27/2014.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
15-853:Algorithms in the Real World
The Cost of Fault Tolerance in Multi-Party Communication Complexity Binbin Chen Advanced Digital Sciences Center Haifeng Yu National University of Singapore.
Artur Czumaj DIMAP DIMAP (Centre for Discrete Maths and it Applications) Computer Science & Department of Computer Science University of Warwick Testing.
Miniconference on the Mathematics of Computation
1 How to burn a graph Anthony Bonato Ryerson University GRASCan 2015.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
Fast Parallel Algorithms for Edge-Switching to Achieve a Target Visit Rate in Heterogeneous Graphs Maleq Khan September 9, 2014 Joint work with: Hasanuzzaman.
Of 17 Limits of Local Algorithms in Random Graphs Madhu Sudan MSR Joint work with David Gamarnik (MIT) 7/11/2013Local Algorithms on Random Graphs1.
An algorithmic proof of the Lovasz Local Lemma via resampling oracles Jan Vondrak IBM Almaden TexPoint fonts used in EMF. Read the TexPoint manual before.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
BAHIR DAR UNIVERSITY Institute of technology Faculty of Computing Department of information technology Msc program Distributed Database Article Review.
Stochastic Streams: Sample Complexity vs. Space Complexity
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
Michael Langberg: Open University of Israel
Department of Computer Science University of York
On the effect of randomness on planted 3-coloring models
Bharathi-Kempe-Salek Conjecture
Presentation transcript:

Low Randomness Rumor Spreading via Hashing He Sun Max Planck Institute for Informatics Joint work with George Giakkoupis, Thomas Sauerwald and Philipp Woelfel

Rumor One guy would like to visit the Statue of Liberty. Q: I am going to find the free woman. A: No woman is free in U.S.

Rumor Spreading (Push Model) Pittel, 1987, Feige, Peleg, Raghavan, Upfal, 1990

Rumor Spreading (Push Model) One of the fundamental protocols in networks Finishes in rounds on a number of network topologies –Complete Graph Pittel 1987 –Hypercube Feige, Peleg, Raghavan, Upfal, 1990 –Graphs with High Expansion Sauerwald and Stauffer 2011 –Graphs with High Conductance Mosk-Aoyama and Shah 2008, Giakkoupis 2011 –Random Graphs Fountoulakis, Huber, Panagiotou 2010 –Random Regular Graphs Fountoulakis, Panagiotou

Rumor Spreading (Push Model) One of the fundamental protocols in networks Finishes in rounds on a number of network topologies –Complete Graph Pittel 1987 –Hypercube Feige, Peleg, Raghavan, Upfal, 1990 –Graphs with High Expansion Sauerwald and Stauffer 2011 –Graphs with High Conductance Mosk-Aoyama and Shah 2008, Giakkoupis 2011 –Random Graphs Fountoulakis, Huber, Panagiotou 2010 –Random Regular Graphs Fountoulakis, Panagiotou 2010 Needs a lot of randomness + - The lower bound on the number of random bits is.

Quasirandom Rumor Spreading Doerr, Friedrich, Sauerwald,

Every node has an arbitrary list of its neighbors. Informed nodes inform their neighbors in the order of this list, but start at a random position in the list. 2 4

Quasirandom Rumor Spreading One of the aims of quasirandom rumor spreading is to “imitate properties of the classical push model with a much smaller degree of randomness.” Doerr, Friedrich, Sauerwald, 2008 The lower bound for quasirandom protocol is. Can we further reduce the number of random bits? YES

For all graph families considered so far, pseudorandom protocol runs as fast as quasirandom protocol. Compared with both protocols, pseudorandom protocol obtains exponential improvement for the randomness complexity. Graph FamilyRumor Spreading TimeRandom Bits Complete Graphs General Graphs Expanders Results Consider a complete graph with 7, 000, 000, 000 nodes (world population) Every node can be informed within 60 rounds Truly Ran. # of bits: 8, 000, 000, 000, 000 Quasi Ran. # of bits: 230, 000, 000, 000 New protocol. # of bits: 36, 000

Two Techniques Pseudorandom Generators Hashing

Intuition Behind the Algorithms How can I choose them completely randomly? Previous theoretical analyses assume that every neighbor of every vertex is chosen uniformly at random.

Pseudorandom Independent Block Generators G: Polynomial-time deterministic algorithm Truly random seed Sequence that is “close” to uniform distribution

Pseudorandom Independent Block Generators

Construction of PIBGs (contd.)

PIBG-Based Protocol PIBG

ID Distribution

PIBG-Based Protocol PIBG

PIBG-Based Protocol (contd.)

Analysis of a Single Round Truly random seed PIBG

Analysis of a Single Round (contd.) Informed nodesNon-informed nodes

Summary & Open problems A general framework for reducing the randomness complexity in rumor spreading. For a large family of graphs, we obtain an exponential improvement in terms of the number of random bits. Conjecture: For any graph, pseudorandom protocol is asymptotically as fast as truly random protocol. Design better space-bounded pseudorandom generators for distributed algorithms (e.g. load balancing). Thank you