Spreading rumors rapidly despite an adversary

9Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the collect problem (M. Saks, N. Shavit, and H. Woll, in "Proceedings of the 2nd ACM-SIAM Symposium on Discrete Algorithms, 1991), n processors in a shared-memory system must each learn the values of n registers We give a randomized algorithm that solvesthe collect problem in O(n log3 n) total read and write operations with high probability, even if timing is under the control of a content-oblivious adversary (a slight weakening of the usual adaptive adversary). This improves on both the trivial upper bound of O(n2) steps and the best previously known bound of O(n3/2 log n) steps, and is dose to the lower bound of Ω(n log n) steps Furthermore, we show how this algorithm can be used to obtain a multiuse cooperative collect protocol that is O(log3 n)-competitive in the latency model of Ajtai et al. ("Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science," 1994); and O(n1/2 log3/2 n)-competitive in the throughput model of Aspnes and Waarts ("Proceedings of the 28th ACM Symposium on Theory of Computing," 1996). In both cases the competitive ratios are within a polylogarithmic factor of optimal, © 1998 Academic Press.

Cite

CITATION STYLE

APA

Aspnes, J., & Hurwood, W. (1998). Spreading rumors rapidly despite an adversary. Journal of Algorithms, 26(2), 386–411. https://doi.org/10.1006/jagm.1997.0907

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free