2012
DOI: 10.1137/110845380
|View full text |Cite
|
Sign up to set email alerts
|

Fast Information Spreading in Graphs with Large Weak Conductance

Abstract: Gathering data from nodes in a network is at the heart of many distributed applications, most notably, while performing a global task. We consider information spreading among n nodes of a network, where each node v has a message m(v) which must be received by all other nodes. The time required for information spreading has been previously upper-bounded with an inverse relationship to the conductance of the underlying communication graph. This implies high running times for graphs with small conductance.The mai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 23 publications
(39 citation statements)
references
References 16 publications
0
39
0
Order By: Relevance
“…Certainly, the most striking aspect of Theorem 1.1 is that it constitutes the first deterministic gossip algorithm for the broadcast setting studied here and in [4,3]. We feel that this is an interesting and surprising result given the general intuition and the results from [7,16,19,15] that at least some randomness is needed to enable an efficient gossip algorithm.…”
Section: Our Resultsmentioning
confidence: 72%
See 3 more Smart Citations
“…Certainly, the most striking aspect of Theorem 1.1 is that it constitutes the first deterministic gossip algorithm for the broadcast setting studied here and in [4,3]. We feel that this is an interesting and surprising result given the general intuition and the results from [7,16,19,15] that at least some randomness is needed to enable an efficient gossip algorithm.…”
Section: Our Resultsmentioning
confidence: 72%
“…We emphasize that our result does not stem from unusual model assumptions. Exactly as in, e.g., [4,3] we only assume that (1) each node only knows the IDs of its neighbors and (2) two nodes involved in a call can exchange all rumors known to them.…”
Section: Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This does not yet conclude the proof, for the following reason. The analysis of the synchronous protocol goes through in this simulation except for one argument [5,Claim 1], which bounds the size of the deterministic list of subset of neighbors that is maintained by a node v. This size is bounded by the number of steps taken by v. On one hand, we need the number of steps taken by v in each O(n log (n)) time slots to be at least one to argue the simulation, but on the other hand, it may be that a node takes a larger number of steps. This would imply that its list is larger than in the corresponding synchronous case.…”
Section: Proof Of Theoremmentioning
confidence: 99%