bisimulation and modal logic in distributed computing
play

Bisimulation and Modal Logic in Distributed Computing Tuomo Lempi - PowerPoint PPT Presentation

Bisimulation and Modal Logic in Distributed Computing Tuomo Lempi ainen Distributed Algorithms group, Department of Computer Science, Aalto University (joint work with Lauri Hella, Matti J arvisalo, Antti Kuusisto, Juhana Laurinharju,


  1. Bisimulation and Modal Logic in Distributed Computing Tuomo Lempi¨ ainen Distributed Algorithms group, Department of Computer Science, Aalto University (joint work with Lauri Hella, Matti J¨ arvisalo, Antti Kuusisto, Juhana Laurinharju, Kerkko Luosto, Jukka Suomela and Jonni Virtema) Computational Logic Day 2016 December 8, 2016 @ Aalto University 1 / 15

  2. Publications Brief overview of two papers: Hella, J¨ arvisalo, Kuusisto, Laurinharju, Lempi¨ ainen, Luosto, Suomela and Virtema: Weak models of distributed computing, with connections to modal logic PODC 2012, Distributed Computing 2015 Lempi¨ ainen: Ability to count messages is worth Θ( ∆ ) rounds in distributed computing LICS 2016 2 / 15

  3. The model of computation A simple finite undirected graph, whose each node is a deterministic state machine that runs the same algorithm, can communicate with its neighbours, produces a local output. 3 / 15

  4. The model of computation A simple finite undirected graph, whose each node is a deterministic state machine that runs the same algorithm, can communicate with its neighbours, produces a local output. Anonymous nodes ⇒ a weak model of computation. 3 / 15

  5. Communication in synchronous rounds In every round, each node v sends messages to its neighbours, 1 2 receives messages from its neighbours, ← a b → 3 updates its state. v 4 / 15

  6. Communication in synchronous rounds In every round, each node v sends messages to its neighbours, 1 2 receives messages from its neighbours, c → ← d 3 updates its state. v 4 / 15

  7. Communication in synchronous rounds In every round, each node v sends messages to its neighbours, 1 2 receives messages from its neighbours, 3 updates its state. v 4 / 15

  8. Communication in synchronous rounds In every round, each node v sends messages to its neighbours, 1 2 receives messages from its neighbours, 3 updates its state. v Eventually, each node halts and announces its own local output. 4 / 15

  9. Focus on communication, not computation The running time of an algorithm is the number of communications rounds . The running time may depend on two ∆ = 3 parameters: n = 6 the maximum degree of the graph, ∆, the number of nodes, n . 5 / 15

  10. Graph problems We study graph problems where the problem instance is the communication graph G = ( V , E ), a solution is a mapping S : V → Y from nodes to local outputs. 6 / 15

  11. Graph problems We study graph problems where the problem instance is the communication graph G = ( V , E ), a solution is a mapping S : V → Y from nodes to local outputs. Often the solution is an encoding of a subset of vertices or edges of the graph. One typical example is the minimum Y = { 0 , 1 } vertex cover . 6 / 15

  12. PODC 2012: seven variants of the model Options for sending messages: a port number for each neighbour (V), → Node v sends a vector ( a , c , b ). b ← a c → 3 1 2 v 7 / 15

  13. PODC 2012: seven variants of the model Options for sending messages: a port number for each neighbour (V), broadcast the same message to all neighbours (B). → Node v broadcasts message a . a ← a a → 3 1 2 v 7 / 15

  14. PODC 2012: seven variants of the model Options for sending messages: Options for receiving messages: a port number for each a port number for each neighbour (V), neighbour (V), broadcast the same message to all neighbours (B). a Node v receives a vector ( a , b , a ). ← a → ← b 3 1 2 v 7 / 15

  15. PODC 2012: seven variants of the model Options for sending messages: Options for receiving messages: a port number for each a port number for each neighbour (V), neighbour (V), broadcast the same message to receive a multiset of messages all neighbours (B). (M), a Node v receives a multiset { a , a , b } . ← a → ← b 3 1 2 v 7 / 15

  16. PODC 2012: seven variants of the model Options for sending messages: Options for receiving messages: a port number for each a port number for each neighbour (V), neighbour (V), broadcast the same message to receive a multiset of messages all neighbours (B). (M), receive a set of messages (S). a Node v receives a set { a , b } . ← a → ← b 3 1 2 v 7 / 15

  17. PODC 2012: seven variants of the model Options for sending messages: Options for receiving messages: a port number for each a port number for each neighbour ( V ) , neighbour ( V ) , broadcast the same message to receive a multiset of messages all neighbours (B). (M), receive a set of messages (S). We can require the outgoing and incoming port numbers to be consistent ⇒ the port-numbering model (VV c ). 7 / 15

  18. PODC 2012: a hierarchy of complexity classes VV c VV VB MV MB SV SB 8 / 15

  19. PODC 2012: a hierarchy of complexity classes VV c VV c � = VV VB VV VB = = MV MB MV MB � = = � = SV SB SV SB Theorem SB � MB = VB � SV = MV = VV � VV c . 8 / 15

  20. PODC 2012: connections to modal logic The constant-time variant of each of the seven complexity classes can be characterised by a modal logic such that there is a canonical one-to-one correspondence between algorithms and modal formulas. 9 / 15

  21. PODC 2012: connections to modal logic The constant-time variant of each of the seven complexity classes can be characterised by a modal logic such that there is a canonical one-to-one correspondence between algorithms and modal formulas. Example: graded modal logic (GML), ϕ := q n | ( ϕ ∧ ϕ ) | ¬ ϕ | ♦ ϕ, | ♦ ≥ k ϕ, where q n are proposition symbols and k ∈ N . G , v | = q n iff degree( v ) = n , � ≥ k . � � G , v | = ♦ ≥ k ϕ iff � { w ∈ V : ( v , w ) ∈ E and G , w | = ϕ } 9 / 15

  22. PODC 2012: connections to modal logic The constant-time variant of each of the seven complexity classes can be characterised by a modal logic such that there is a canonical one-to-one correspondence between algorithms and modal formulas. Example: graded modal logic (GML), ϕ := q n | ( ϕ ∧ ϕ ) | ¬ ϕ | ♦ ϕ, | ♦ ≥ k ϕ, where q n are proposition symbols and k ∈ N . G , v | = q n iff degree( v ) = n , � ≥ k . � � G , v | = ♦ ≥ k ϕ iff � { w ∈ V : ( v , w ) ∈ E and G , w | = ϕ } GML corresponds to the complexity class MB (receive a multiset, send by broadcasting). 9 / 15

  23. PODC 2012: connections to modal logic In each variant of modal logic, one can characterise definability by a variant of bisimulation. A nonempty relation Z ⊆ V × V ′ is a graded bisimulation between G = ( V , E , τ ) and G ′ = ( V ′ , E ′ , τ ′ ) if the following conditions hold. 1 If ( v , v ′ ) ∈ Z , then v ∈ τ ( q n ) iff v ′ ∈ τ ′ ( q n ) for each q n . If ( v , v ′ ) ∈ Z and X ⊆ E ( v ), then there is a set X ′ ⊆ E ′ ( v ′ ) such that 2 | X ′ | = | X | and for each w ′ ∈ X ′ there is a w ∈ X with ( w , w ′ ) ∈ Z . If ( v , v ′ ) ∈ Z and X ′ ⊆ E ′ ( v ′ ), then there is a set X ⊆ E ( v ) such that 3 | X | = | X ′ | and for each w ∈ X there is a w ′ ∈ X ′ with ( w , w ′ ) ∈ Z . We use bisimulation to derive the separation results between the complexity classes. 10 / 15

  24. The relationship of MV and SV The simulation results used to show the equivalence of complexity classes do not increase the running time, except for one: Theorem (PODC 2012) Assume that there is an MV -algorithm A that solves a problem Π in time T. Then there is an SV -algorithm B that solves Π in time T + 2∆ − 2 . Is this result tight? 11 / 15

  25. LICS 2016: the simulation overhead is tight Theorem For each ∆ ≥ 2 there is a port-numbered graph G ∆ with nodes u , v , w such that when executing any SV -algorithm A in G ∆ , u receives identical messages from its neighbours v and w in rounds 1 , 2 , . . . , 2∆ − 2 . We can also separate the models by a graph problem: Theorem There is a graph problem Π that can be solved in one round by an MV -algorithm but that requires at least ∆ − 1 rounds for all ∆ ≥ 2 , when solved by an SV -algorithm. 12 / 15

  26. Example: separating SV and MV 3 1 1 2 1 1 1 1 1 2 2 2 2 2 2 3 3 3 1 1 1 1 1 1 3 3 1 2 1 2 u v Output 1 if there is an even number of neighbours of even degree, 0 otherwise. 13 / 15

  27. Generalisation: graph G ∆ (here ∆ = 4) . . . 1 1 1 1 1 1 2 1 1 2 1 1 1 3 1 2 1 2 1 3 1 2 1 2 1 3 1 2 1 2 1 3 1 3 1 2 1 3 4 1 2 4 1 2 3 2 3 4 1 2 4 1 2 3 2 3 4 1 3 4 1 2 3 2 3 4 1 3 4 1 2 4 2 3 4 1 3 4 1 2 4 1 2 3 3 3 3 2 2 4 2 4 1 4 1 4 1 3 1 2 2 3 1 4 The blue nodes are bisimilar up to the distance 2∆ − 2. 14 / 15

  28. Conclusion We defined seven complexity VV c classes and characterised the containment relations. � = Each constant-time class VV VB corresponds to a variant of = = modal logic. Only in one case there is MV MB � = overhead in simulating a stronger = � = model by a weaker one, and that overhead is unavoidable. SV SB 15 / 15

  29. Conclusion We defined seven complexity VV c classes and characterised the containment relations. � = Each constant-time class VV VB corresponds to a variant of = = modal logic. Only in one case there is MV MB � = overhead in simulating a stronger = � = model by a weaker one, and that overhead is unavoidable. SV SB Thanks! Questions? 15 / 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend