Distributed Algorithm Engineering

  • Spirakis P
  • Zaroliagis C
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

When one engineers distributed algorithms, some special characteristicsarise that are different from conventional (sequential or parallel)computing paradigms. These characteristics include: the need for eithera scalable real network environment or a platform supporting asimulated distributed environment; the need to incorporate asynchrony,where arbitrary asynchrony is hard, if not impossible, to implement;and the generation of ``difficult{''} input instances which is aparticular challenge. In this work, we identify some of themethodological issues required to address the above characteristics indistributed algorithm engineering and illustrate certain approaches totackle them via case studies. Our discussion begins by addressing theneed of a simulation environment and how asynchrony is incorporatedwhen experimenting with distributed algorithms. We then proceed bysuggesting two methods for generating difficult input instances fordistributed experiments, namely a game-theoretic one and another basedon simulations of adversarial arguments or lower bound proofs. We giveexamples of the experimental analysis of a pursuit-evasion protocol andof a shared memory problem in order to demonstrate these ideas. We thenaddress a particularly interesting case of conducting experiments withalgorithms for mobile computing and tackle the important issue ofmotion of, processes in this context. We discuss the two-tier principleas well as a concurrent random walks approach on an explicitrepresentation of motions in ad-hoc mobile networks, which allow atleast for average-case, analysis and measurements and may giveworst-case inputs in some cases. Finally, we discuss a useful interplaybetween theory and practice that arise in modeling attack propagationin networks.

Cite

CITATION STYLE

APA

Spirakis, P. G., & Zaroliagis, C. D. (2002). Distributed Algorithm Engineering (pp. 197–228). https://doi.org/10.1007/3-540-36383-1_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free