Lower Bounds for Distributed Maximum-Finding Algorithms
Journal of the ACM (JACM)
The analysis of algorithms
Information Processing Letters
Computing on an anonymous ring
Journal of the ACM (JACM)
The bit complexity of randomized leader election on a ring
SIAM Journal on Computing
Better computing on the anonymous ring
Journal of Algorithms
Two lower bounds in asynchronous distributed computation
Journal of Computer and System Sciences
Elections in anonymous networks
Elections in anonymous networks
An O(nlog n) Unidirectional Algorithm for the Circular Extrema Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Local and global properties in networks of processors (Extended Abstract)
STOC '80 Proceedings of the twelfth annual ACM symposium on Theory of computing
The impact of synchronous communication on the problem of electing a leader in a ring
STOC '84 Proceedings of the sixteenth annual ACM symposium on Theory of computing
Optimal Algorithms for Probalistic Solitude Detection On Anomymous Rings
Optimal Algorithms for Probalistic Solitude Detection On Anomymous Rings
Distributed algorithms for election in unidirectional and complete networks (traversal, synchronous, leader, asynchronous, complexity)
Hundreds of impossibility results for distributed computing
Distributed Computing - Papers in celebration of the 20th anniversary of PODC
Hi-index | 0.00 |
A model that captures communication on asynchronous unidirectional rings is formalized. Our model incorporates both probabilistic and nondeterministic features and is strictly more powerful than a purely probabilistic model. Using this model, a collection of tools are developed that facilitate studying lower bounds on the expected communication complexity of Monte Carlo algorithms for language recognition problems on anonymous asynchronous unidirectional rings. The tools are used to establish tight lower bounds on the expected bit complexity of the Solitude Verification problem that asymptotically match upper bounds for this problem. The bounds demonstrate that, for this problem, the expected bit complexity depends subtly on the processors' knowledge of the size of the ring and on whether or not processor-detectable termination is required.