Mutual search

We introduce a search problem called “mutual search” where <italic>k</italic> agents, arbitrarily distributed over <italic>n</italic> sites, are required to locate one another by posing queries of the form “Anybody at site <italic>i</italic>?”. We ask for the least number of queries that is necessary and sufficient. For the case of two agents using deterministic protocols, we obtain the following worst-case results: In an oblivious setting (where all pre-planned queries are executed), there is no savings: <italic>n</italic>−1 queries are required and are sufficient. In a nonoblivious setting, we can exploit the paradigm of “no news is also news” to obtain significant savings: in the synchronous case 0.586<italic>n</italic> queries are required; in the asynchronous case 0.896<italic>n</italic> queries suffice and a fortiori 0.536<italic>n</italic> queries are required; for <inline-equation> <f> o<fen lp="par"><rad><rcd>n</rcd></rad><rp post="par"></fen></f> </inline-equation> agents using a synchronous deterministic protocol less than <?Pub Fmt italic>n<?Pub Fmt /italic> queries suffice; there is a simple randomized protocol for two agents with worst-case expected 0.5<?Pub Fmt italic>n<?Pub Fmt /italic> queries and all radomized protocols require at least 0.25<italic>n</italic> worst-case expected queries. The graph-theoretic framework we formulate for expressing and analyzing algorithms for this problem may be of independent interest.

[1]  Donald E. Knuth,et al.  The art of computer programming: sorting and searching (volume 3) , 1973 .

[2]  B. O. Koopman The Theory of Search , 1957 .

[3]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1983, PODS '83.

[4]  Mamoru Maekawa,et al.  A N algorithm for mutual exclusion in decentralized systems , 1985, TOCS.

[5]  B. O. Koopman The Theory of Search. I. Kinematic Bases , 1956 .

[6]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[7]  B. John Oommen,et al.  On the optimal search problem: the case when the target distribution is unknown , 1997, Proceedings 17th International Conference of the Chilean Computer Science Society.

[8]  Donald E. Knuth,et al.  The art of computer programming, volume 3: (2nd ed.) sorting and searching , 1998 .

[9]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[10]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1985, JACM.

[11]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[12]  Edward A. Billard,et al.  Probabilistic coalition formation in distributed knowledge environments , 1995, IEEE Trans. Syst. Man Cybern..

[13]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[14]  PelegDavid,et al.  Online tracking of mobile users , 1995 .

[15]  MaekawaMamoru A √N algorithm for mutual exclusion in decentralized systems , 1985 .

[16]  Pierre A. Humblet,et al.  A Distributed Algorithm for Minimum-Weight Spanning Trees , 1983, TOPL.

[17]  L. Goddard,et al.  Operations Research (OR) , 2007 .

[18]  S. Louis Hakimi,et al.  Steiner's problem in graphs and its implications , 1971, Networks.

[19]  J M Smith,et al.  Evolution and the theory of games , 1976 .

[20]  Baruch Awerbuch,et al.  Sparse partitions , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[21]  B. O. Koopman The Theory of Search. II. Target Detection , 1956 .