
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
41st Annual Symposium on Foundations of Computer Science
Randomized rumor spreading
Redondo Beach, California
November 12November 14
ISBN: 0769508502
ASCII Text  x  
R. Karp, C. Schindelhauer, S. Shenker, B. Vocking, "Randomized rumor spreading," 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 565, 41st Annual Symposium on Foundations of Computer Science, 2000.  
BibTex  x  
@article{ 10.1109/SFCS.2000.892324, author = {R. Karp and C. Schindelhauer and S. Shenker and B. Vocking}, title = {Randomized rumor spreading}, journal ={2013 IEEE 54th Annual Symposium on Foundations of Computer Science}, volume = {0}, year = {2000}, issn = {02725428}, pages = {565}, doi = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2000.892324}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  CONF JO  2013 IEEE 54th Annual Symposium on Foundations of Computer Science TI  Randomized rumor spreading SN  02725428 SP EP A1  R. Karp, A1  C. Schindelhauer, A1  S. Shenker, A1  B. Vocking, PY  2000 KW  randomised algorithms; communication complexity; replicated databases; information theory; database theory; randomized rumor spreading; epidemic algorithms; lazy update transmission; distributed database copies; randomized communication mechanism; robustness; parallel rounds; randomly selected communication partner; communication overhead; message transmissions; addressoblivious algorithm; lower bound; time optimality; communication optimality; random telephone calls; commmunication complexity VL  0 JA  2013 IEEE 54th Annual Symposium on Foundations of Computer Science ER   
Investigates the class of epidemic algorithms that are commonly used for the lazy transmission of updates to distributed copies of a database. These algorithms use a simple randomized communication mechanism to ensure robustness. Suppose n players communicate in parallel rounds in each of which every player calls a randomly selected communication partner. In every round, players can generate rumors (updates) that are to be distributed among all players. Whenever communication is established between two players, each one must decide which of the rumors to transmit. The major problem is that players might not know which rumors their partners have already received. For example, a standard algorithm forwarding each rumor form the calling to the called players for /spl Theta/(ln n) rounds needs to transmit the rumor /spl Theta/(n ln n) times in order to ensure that every player finally receives the rumor with high probability. We investigate whether such a large communication overhead is inherent to epidemic algorithms. On the positive side, we show that the communication overhead can be reduced significantly. We give an algorithm using only O(n ln ln n) transmissions and O(ln n) rounds. In addition, we prove the robustness of this algorithm. On the negative side, we show that any addressoblivious algorithm needs to send /spl Omega/(n ln ln n) messages for each rumor, regardless of the number of rounds. Furthermore, we give a general lower bound showing that time and communication optimality cannot be achieved simultaneously using random phone calls, i.e. every algorithm that distributes a rumor in O(ln n) rounds needs /spl omega/(n) transmissions.
Index Terms:
randomised algorithms; communication complexity; replicated databases; information theory; database theory; randomized rumor spreading; epidemic algorithms; lazy update transmission; distributed database copies; randomized communication mechanism; robustness; parallel rounds; randomly selected communication partner; communication overhead; message transmissions; addressoblivious algorithm; lower bound; time optimality; communication optimality; random telephone calls; commmunication complexity
Citation:
R. Karp, C. Schindelhauer, S. Shenker, B. Vocking, "Randomized rumor spreading," focs, pp.565, 41st Annual Symposium on Foundations of Computer Science, 2000
Usage of this product signifies your acceptance of the Terms of Use.