2019
DOI: 10.1016/j.ic.2018.10.001
|View full text |Cite
|
Sign up to set email alerts
|

Design patterns in beeping algorithms: Examples, emulation, and analysis

Abstract: We consider networks of processes which interact using beeps. In the basic model defined by Cornejo and Kuhn (2010), processes can choose in each round either to beep or to listen. Those who beep are unable to detect simultaneous beeps. Those who listen can only distinguish between silence and the presence of at least one beep. We refer to this model as BL (beep or listen). Stronger models exist where the nodes can detect collision while they are beeping (B cd L), listening (BL cd ), or both (B cd L cd ). Beep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 42 publications
(106 reference statements)
0
11
0
Order By: Relevance
“…In particular, we show how to perform coloring in O(∆ log n + log 2 n) rounds. This follows by emulating a B cd L coloring protocol by [CMRZ19]. Surprisingly, a lower bound of Ω(n log n) for coloring a clique of size n in the BL model is given by [CDT17].…”
Section: Results and Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, we show how to perform coloring in O(∆ log n + log 2 n) rounds. This follows by emulating a B cd L coloring protocol by [CMRZ19]. Surprisingly, a lower bound of Ω(n log n) for coloring a clique of size n in the BL model is given by [CDT17].…”
Section: Results and Techniquesmentioning
confidence: 99%
“…Among these are algorithms for finding an MIS [AAB + 11, AAB + 13, JSX16, HL16, BBDK18, CMRZ19], (node) coloring of the network [CK10, JSX16, CDT17, CMRZ19], leader-election [GH13, FSW14, DBB18, CD19b], selfstabilization and synchronization [GM15], and broadcasting a message [CD19a]. Simulating beeping algorithms with collision-detection (B cd L cd , B cd L, and BL cd ) over beeping networks without collision-detection BL was shown by [CMRZ19]; the simulation incurs an O(log n) factor.…”
Section: Related Workmentioning
confidence: 99%
“…A. Casteigts et al [9] formulate multiple algorithms for degree computation, MIS and coloring, using the design patterns such as: peripheral collision detection, adaptive probability, exclusive beeps and multi-slot phases. They work to improve the complexities of the algorithms and prove their convertibility.…”
Section: State Of the Artmentioning
confidence: 99%
“…This algorithm upgrades the algorithm in Reference 7 by minimizing the number of sent messages and transforming it into a fault-tolerant algorithm. The asynchronous fault-tolerant handshake algorithm (ATH) is more effective compared with other algorithms 13 thanks to its asynchronous aspect. When a network contains some nodes with faults, they will affect just their direct neighbors.…”
Section: State-of-the-artmentioning
confidence: 99%