Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Covers, Dominations, Independent Sets and Matchings AmirHossein Bayegan Amirkabir University of Technology.
Distributed Computing 1. Lower bound for leader election on a complete graph Shmuel Zaks ©
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Presented by Yuval Shimron Course
NP-Completeness: Reductions
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Approximating the Domatic Number Feige, Halldorsson, Kortsarz, Srinivasan ACM Symp. on Theory of Computing, pages , 2000.
Minimum Spanning Trees
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
Combinatorial Algorithms
Approximation Algorithms for Unique Games Luca Trevisan Slides by Avi Eyal.
Optimization of Pearl’s Method of Conditioning and Greedy-Like Approximation Algorithm for the Vertex Feedback Set Problem Authors: Ann Becker and Dan.
Maurizio Patrignani seminar on the paper on the single-source unsplittable flow problem authored by Yefim Dinitz Naveen Garg Michel X. Goemans FOCS ‘98.
LOCALITY IN DISTRIBUTED GRAPH ALGORITHMS Nathan Linial Presented by: Ron Ryvchin.
Yangjun Chen 1 Bipartite Graphs What is a bipartite graph? Properties of bipartite graphs Matching and maximum matching - alternative paths - augmenting.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Randomized Algorithms and Randomized Rounding Lecture 21: April 13 G n 2 leaves
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
The max flow problem
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
A (nlog(n)) lower bound for leader election in a clique.
Distributed Combinatorial Optimization
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
1 Joint work with Shmuel Safra. 2 Motivation 3 Motivation.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Efficient Gathering of Correlated Data in Sensor Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
Design Techniques for Approximation Algorithms and Approximation Classes.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Approximating the Minimum Degree Spanning Tree to within One from the Optimal Degree R 陳建霖 R 宋彥朋 B 楊鈞羽 R 郭慶徵 R
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
A graph problem: Maximal Independent Set Graph with vertices V = {1,2,…,n} A set S of vertices is independent if no two vertices in S are.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
1/24 Introduction to Graphs. 2/24 Graph Definition Graph : consists of vertices and edges. Each edge must start and end at a vertex. Graph G = (V, E)
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
Graphs Lecture 2. Graphs (1) An undirected graph is a triple (V, E, Y), where V and E are finite sets and Y:E g{X V :| X |=2}. A directed graph or digraph.
1 Fault-Tolerant Consensus. 2 Communication Model Complete graph Synchronous, network.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
1 Distributed Vertex Coloring. 2 Vertex Coloring: each vertex is assigned a color.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Approximation Algorithms based on linear programming.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
Randomized Algorithms for Distributed Agreement Problems Peter Robinson.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
CHAPTER SIX T HE P ROBABILISTIC M ETHOD M1 Zhang Cong 2011/Nov/28.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty ::
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Minimum Spanning Tree 8/7/2018 4:26 AM
Maximal Independent Set
Chapter 5. Optimal Matchings
Leader Election (if we ignore the failure detection part)
Clustering TexPoint fonts used in EMF.
MST GALLAGER HUMBLET SPIRA ALGORITHM
Maximal Independent Set
Introduction Wireless Ad-Hoc Network
MST GALLAGER HUMBLET SPIRA ALGORITHM
Locality In Distributed Graph Algorithms
Presentation transcript:

Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM

Independent Set Given an undirected Graph G = (V,E ) an independent set is a subset U of nodes V, such that no two nodes in U are adjacent. – An independent set is maximal if no node can be added without violating independence. (MIS) – An independent set of maximum cardinality is called maximum. Computing a maximum independent set (MaxIS) is NP-Hard There is a relation between independent sets and node coloring since each color class is an independent set – however, not necessarily a MIS Maximal Independent Set Maximum Independent Set

Slow MIS Require: Node IDs Every node v executes the following code: 1: if all neighbors of v with larger identifiers have decided not to join the MIS then 2: v decides to join the MIS 3: end if THEOREM: Algorithm features a time complexity of O(n) and a message complexity of O(|E|).

Coloring – MIS Relation Starting with a coloring, one can easily derive a MIS algorithm: – First choose all nodes of the first color. – Then, for each additional color add “in parallel" (without conflict) as many nodes as possible. Thus, given a coloring algorithm that needs C colors and runs in time T, we can construct a MIS in time C + T. – A distributed deterministic MIS algorithm for trees with time complexity O (log * n). – What about general graphs?

Randomized MIS Algorithm The algorithm operates in synchronous rounds, grouped into phases. A single phase is as follows: 1) Each node v marks itself with probability 1/2d(v), where d(v) is the current degree of v. 2) If no higher degree neighbor of v is also marked, node v joins the MIS. If a higher degree neighbor of v is marked, node v unmarks itself again. (If the neighbors have the same degree, ties are broken arbitrarily, e.g., by identifier). 3) Delete all nodes that joined the MIS and their neighbors, as they cannot join the MIS anymore. Steps 1 and 2 make sure that if a node v joins the MIS, then v 's neighbors do not join the MIS at the same time. Step 3 makes sure that v's neighbors will never join the MIS. Likewise the algorithm eventually produces a MIS, because the node with the highest degree will mark itself at some point in Step

Analysis - I LEMMA 1: A node v joins the MIS in Step 2 with probability p ≥ 1/4d(v). M: The set of marked nodes in Step 1. H(v): The set of neighbors of v with higher degree, or same degree and higher identifier. P[v is not in MIS|v is marked] = P[There exists a neighbor w in H(v) that is marked] Since node v will be removed in step 3 of the algorithm! v w Since for all w we have d(w) ≥ d(v) and also v has at most d(v) neighbors: P[v is in MIS]=P[v is in MIS|v is marked]P[v is marked]

Analysis - II Directed Auxiliary Graph: Direct each edge towards the higher degree node (if both nodes have the same degree direct it towards the higher identifier) A bad node has outdegree d + (number of edges pointing away from bad node) at least twice its indegree d - (number of edges pointing towards bad node). Otherwise it is called a good node. Good nodes have low probability to mark themselves at step 1. In fact outdegree d + represents |H(v)|. Thus, d + ≥ 2(d(v)-d + ) for bad any node v. Consequently, for good nodes we have d + < 2(d(v)-d + ) that yield d - ≥ 1/3d(v) since d(v)=d + +d -. Denote S=N(v)\H(v). As a result, we have for good nodes that d(v)≥|S|≥1/3d(v). Since for all nodes w in S we have d(w) ≤ d(v), we get: LEMMA 2: For any good node v it holds that

Analysis - III LEMMA 3: A good node will be removed in Step 3 with probability p ≥ 1/36. P[Good node v is removed] ≥ P[There exists any neighbor u that is in MIS] Since we have Using inclusion-exclusion principle, the lower bound can be obtained by: Inclusion-exclusion principle: Case 1: There is a neighbor w with degree d(w) ≤ 2. By Lemma 1, w joins the MIS in step 2 (and v is removed in step 3) with probability at least 1/8. Case 2: All neighbors of v have degree 3 or more. Let S denote S=N(v)\H(v) therefore for all w in S we have 3≤d(w)≤d(v). For good nodes we have d(v)≥|S|≥1/3d(v). sinceFor |S|=2 we get the lower bound.

Analysis - IV LEMMA 4: An edge e = (u,v) is called bad if both u and v are bad; else the edge is called good. At any time at least half of the edges are good. The number of edges directed into bad nodes is at most half the number of edges directed out of bad nodes. This implies that at least half of the edges are directed into good nodes, rendering them good edges. THEOREM: Algorithm terminates in time O(log n) with constant probability. By Lemma 3, a good node (and therefore a good edge!) will be deleted with constant probability. Due to Lemma 4, we know that at least half of the edges are good. Consequently, a constant fraction of the edges is deleted in each phase. After O(log|E|) phases, all edges are deleted. Because |E|≤n 2 and hence, log|E|≤2logn, it follows that the algorithm requires O(log|E|) = O(log n) phases. Finally, each phase consists of a constant number of communication rounds.

Another Randomized MIS Algorithm The algorithm operates in synchronous rounds, grouped into phases. A single phase is as follows: 1)Each node v chooses a random value r(v) in [0,1] and sends it to its neighbors. 2)If r(v) < r(w) for all neighbors, node v enters the MIS and informs its neighbors. 3)If v or a neighbor of v entered the MIS, v terminates (v and all edges adjacent to v are removed from the graph), otherwise v enters the next phase. Steps 1 and 2 make sure that if a node v joins the MIS, then v 's neighbors do not join the MIS at the same time. Step 3 makes sure that v 's neighbors will never join the MIS. Likewise the algorithm eventually produces a MIS, because the node with the globally smallest value will always join the MIS, hence there is progress

Analysis LEMMA 1: In a single phase, we remove at least half of the edges in expectation. Consider an edge (v,w) in G. (v->w): The event that r(v) is smaller than that of all of its neighbors and all of w's neighbors. No other neighbor will remove w! Pr[event (v->w)] ≥ 1/(d(v)+d(w)) (v and w may share some neighbors). Probability of r(v) is the smallest inside its neighborhood: 1/(d(v)+1). Hence, d(v) edges will be removed with this probability. But, if we count like this, we will count some edges twice! How to count edges? For each edge (v,w); we have two events (v->w) and (w->v): Since we have |E| edges, in expectation |E| directed edges will be removed from digraph in a single phase! Lemma holds since we doubled the edge count! Double edges: Replace each undirected edge by the two directed edges X v->w : Random variable that has the value d(w) if event (v->w) occurs, if not it has value 0. v w v w THEOREM 1: Algorithm terminates after at most O(log|E|), i.e. O(logn), phases in expectation.

Matching – Given a graph G=(V,E) a matching is a subset M of edges E, such that no two edges in M are adjacent A matching is maximal if no edge can be added without violating the above constraint. – A matching of maximum cardinality is called maximum. An independent set algorithm is also a matching algorithm – The auxiliary graph G’ is defined as follows For every edge in G there is a node in G’ Two nodes in G’ are connected by an edge if their respective edges in G are adjacent. A (maximal) independent set in G’ is a (maximal) matching in G, and vice versa. Different matchings for the same graph:

General Δ+1 Graph Coloring Given a graph G=(V,E) we virtually build a graph G’ =(V’,E’) as follows: Every node v in V clones itself d(v)+1 times (v 0,…,v d(v) in G’) The edge set E’ of G’ is as follows: All clones are in a clique: (v i,v j ) in E’, for all v in V and all 0 ≤i<j≤ d (v ) All ith clones of neighbors in the original graph G are connected: (u i,v i ) in E’, for all (u,v) in E and all 0 ≤ i ≤ min(d(u),d(v)). Now we simply run (simulate) the MIS Algorithm on G’. If node v i is in the MIS in G’, then node v gets color i v w k l v0v0 v1v1 v2v2 w1w1 w0w0 l0l0 l1l1 k0k0 k1k1 k2k2 v0v0 v1v1 v2v2 w1w1 w0w0 l0l0 l1l1 k0k0 k1k1 k2k2 THEOREM 1: Algorithm terminates after at most O(logn 2 )=O(2logn) phases in expectation. Each clique enters the MIS and chooses the colors in the range 1…Δ+1!

Dominating Sets A dominating set is a subset of the nodes such that each node is in the set or adjacent to a node in the set. – A minimum dominating set is a dominating set containing the least possible number of nodes. Any MIS is a dominating set – if a node was not covered, it could join the independent set. – O(logn) Dominating set = MIS