Euler tour lock-in problem in the rotor-router model: i choose pointers and you choose port numbers

  • Authors:
  • Evangelos Bampas;Leszek Gąsieniec;Nicolas Hanusse;David Ilcinkas;Ralf Klasing;Adrian Kosowski

  • Affiliations:
  • School of Elec. & Comp. Eng., National Technical University of Athens, Greece and LaBRI, CNRS, INRIA, Univ. of Bordeaux, France;Dept of Computer Science, Univ. of Liverpool, UK;LaBRI, CNRS, INRIA, Univ. of Bordeaux, France;LaBRI, CNRS, INRIA, Univ. of Bordeaux, France;LaBRI, CNRS, INRIA, Univ. of Bordeaux, France;LaBRI, CNRS, INRIA, Univ. of Bordeaux, France and Dept of Algorithms and System Modeling, Gdańsk Univ. of Technology, Poland

  • Venue:
  • DISC'09 Proceedings of the 23rd international conference on Distributed computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The rotor-router model, also called the Propp machine, was first considered as a deterministic alternative to the random walk. It is known that the route in an undirected graph G = (V, E), where |V| = n and |E| = m, adopted by an agent controlled by the rotor-router mechanism forms eventually an Euler tour based on arcs obtained via replacing each edge in G by two arcs with opposite direction. The process of ushering the agent to an Euler tour is referred to as the lock-in problem. In recent work [11] Yanovski et al. proved that independently of the initial configuration of the rotor-router mechanism in G the agent locks-in in time bounded by 2mD, where D is the diameter of G. In this paper we examine the dependence of the lock-in time on the initial configuration of the rotor-router mechanism. The case study is performed in the form of a game between a player P intending to lock-in the agent in an Euler tour as quickly as possible and its adversary A with the counter objective. First, we observe that in certain (easy) cases the lock-in can be achieved in time O(m). On the other hand we show that if adversary A is solely responsible for the assignment of ports and pointers, the lock-in time Ω(mċD) can be enforced in any graph with m edges and diameter D. Furthermore, we show that if A provides its own port numbering after the initial setup of pointers by P, the complexity of the lock-in problem is bounded by O(mċmin{log m, D}). We also propose a class of graphs in which the lock-in requires time Ω(m ċ log m). In the remaining two cases we show that the lock-in requires time Ω(m ċ D) in graphs with the worst-case topology. In addition, however, we present non-trivial classes of graphs with a large diameter in which the lock-in time is O(m).