Using Scattered Mobile Agents to Locate a Black Hole in an Un-oriented Ring with Tokens Stefan Dobrev, Nicola Santoro, Wei Shi Mengfei Peng.

Slides:



Advertisements
Similar presentations
Solving problems by searching
Advertisements

Chapter 5: Tree Constructions
Leader Election Breaking the symmetry in a system.
Distributed Constraint Optimization Problems M OHSEN A FSHARCHI.
Markov Decision Process
Lecture 8: Asynchronous Network Algorithms
2/9/06CS 3343 Analysis of Algorithms1 Convex Hull  Given a set of pins on a pinboard  And a rubber band around them  How does the rubber band look when.
Chapter 15 Basic Asynchronous Network Algorithms
Design and Analysis of Algorithms NP-Completeness Haidong Xue Summer 2012, at GSU.
Lecture 7: Synchronous Network Algorithms
Dobrev, S., Flocchini, P., Prencipe, G., & Santoro, N. (2007). Mobile Search for a Black Hole in an Anonymous Ring. Mengfei Peng.
Stéphane Devismes VERIMAG UMR 5104 Univ. Joseph Fourier Grenoble, France Optimal Exploration of Small Rings Talk by Franck Petit, Univ. Pierre et Marie.
Fundamentals of Algorithms MCS - 2 Lecture # 16. Quick Sort.
Footstep Planning Among Obstacles for Biped Robots James Kuffner et al. presented by Jinsung Kwon.
Toy Problem: Missionaries and Cannibals
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
Algorithms. Problems, Algorithms, Programs Problem - a well defined task. –Sort a list of numbers. –Find a particular item in a list. –Find a winning.
Leader Election in Rings
2.4 Solving Equations with Variables on Both Sides
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Genome Rearrangements …and YOU!! Presented by: Kevin Gaittens.
Written by Wei Shi, Joaquin Garcia-Alfaro, Jean-Pierre Corriveau Mengfei Peng Searching for a Black Hole in Interconnected Networks using Mobile Agents.
Matt Schierholtz. Method for solving problems with finite steps Algorithm example: Error Check for problem Solve problem Must terminate.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Franck Petit INRIA, LIP Lab. Univ. / ENS of Lyon France Optimal Probabilistic Ring Exploration by Semi-Synchronous Oblivious Robots Joint work with Stéphane.
3-2 Solving Equations by Using Addition and Subtraction Objective: Students will be able to solve equations by using addition and subtraction.
Chapter 5 Integers. Review a is a factor of b if... m is a multiple of n if... p is a divisor of q if...
Observe and Remain Silent Communication-less agent location discovery MFCS 2012 Speaker: Thomas Gorry (University of Liverpool) Co-authors: Tom Friedetzky.
The Power of Tokens: Rendezvous and Symmetry Detection for two Mobile Agents in a Ring J. Czyzovicz, Stefan Dobrev, E. Kranakis, D. Krizanc.
AVL Trees. AVL Node Structure The AVL node structure follows the same structure as the binary search tree, with the addition of a term to store the.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
KLASING, R., MARKOU, E. & RADZIK, T. (2007). HARDNESS AND APPROXIMATION RESULTS FOR BLACK HOLE SEARCH IN ARBITRARY NETWORKS. THEOR. COMPUT. SCI., 384 (2-3),
Teacher: Chun-Yuan Lin
Subtracting Integers Subtracting Integers CCS: 6.NS.2: Understand subtraction of rational numbers as adding the additive inverse, p – q = p + (–q).
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Lecture #14 Distributed Algorithms (II) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Solving by Elimination Example 1: STEP 2: Look for opposite terms. STEP 1: Write both equations in Standard Form to line up like variables. STEP 5: Solve.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
1 Recursive algorithms Recursive solution: solve a smaller version of the problem and combine the smaller solutions. Example: to find the largest element.
15.082J & 6.855J & ESD.78J September 30, 2010 The Label Correcting Algorithm.
Ch. 4 – Informed Search Supplemental slides for CSE 327 Prof. Jeff Heflin.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Mobile Agent Rendezvous Problem in a Ring Roberta Capuano,Vikas Kumar Jha.
2-4 Solving Equations with Variables on Both Sides.
P, NP, and NP-Complete Problems Section 10.3 The class P consists of all problems that can be solved in polynomial time, O(N k ), by deterministic computers.
Solving problems by searching Chapter 3. Types of agents Reflex agent Consider how the world IS Choose action based on current percept Do not consider.
Data Structures and Algorithm Analysis Lecture 5
Solving problems by searching
Greedy Algorithms.
INTEGERS.
Disappearing Asymptotes
Leader Election Chapter 3 Observations Election in the Ring
Solve for variable 3x = 6 7x = -21
Adding and Subtracting Integers
Lecture 9: Asynchronous Network Algorithms
Parallel and Distributed Algorithms
By group 3(not the ones who made the paper :D)
5.2 Verifying Trigonometric Identities
Disappearing Asymptotes
Lecture 8: Synchronous Network Algorithms
Absolute Value The absolute value of a number is the distance from zero on a number line.
Leader Election Ch. 3, 4.1, 15.1, 15.2 Chien-Liang Fok 4/29/2019
Inequalities and their Graphs
Interesting Integers!.
Chapter 3: Solving Equations
1. How do I Solve Linear Equations
CIS825 Lecture 5 1.
Presentation transcript:

Using Scattered Mobile Agents to Locate a Black Hole in an Un-oriented Ring with Tokens Stefan Dobrev, Nicola Santoro, Wei Shi Mengfei Peng

Assumptions: Agents: identical, asynchronous, scattered,obey the same rule; Identical: all agents are the same Scattered(dispersed): each agent initially start at different node Network: ring (n is known), anonymous, un-oriented, Anonymous: every node is the same. FIFO; Token model Un-oriented Oriented W EEE WW

Shadow Check 1, Upon waking up, an agent becomes a Junior Explorer(JE) 2, agents start to explore the ring using Cautious Walk. H H H H

3, When 2 agents meet, they both become Senior Explorer(SE) H H H H

4, the two met agents(Senior Explorer) will explore the ring in opposite direction. The explored nodes called safe region. BH

5, When two Senior explorers meet, they both become checkers and count the distance of the safe region. BH

6, When two Senior explorer meet, they both become checkers and counter the size of the safe region. If the distance is n-2, the algorithm terminates. 14-2=12=n-2

What happens if the juniors can not meet? H H H H When a SE meet a JE, it will become a checker

What happens if the juniors choose the same direction? H H H H When they meet, both of them will become SE, then explore the ring in opposite direction

What happens if a junior meet a senior? H H H H The JE will become SE to the left This is like everybody getting into a higher level

What is Shadow Check?

Result: we show not only that a black hole can be located in a ring using tokens with scattered agents, but also that the problem is solvable even if the ring is un-oriented. More precisely, first we prove that the black hole search problem can be solved using only three scattered agents. with k (k > 4) scattered agents, the black hole can be located in O(kn + n log n) moves. when k (k > 4) is a constant number, the move cost can be reduced to O(n log n),