Bisimulation and Modal Logic in Distributed Computing Tuomo Lempi - - PowerPoint PPT Presentation

bisimulation and modal logic in distributed computing
SMART_READER_LITE
LIVE PREVIEW

Bisimulation and Modal Logic in Distributed Computing Tuomo Lempi - - PowerPoint PPT Presentation

Bisimulation and Modal Logic in Distributed Computing Tuomo Lempi ainen Distributed Algorithms group, Department of Computer Science, Aalto University (joint work with Lauri Hella, Matti J arvisalo, Antti Kuusisto, Juhana Laurinharju,


slide-1
SLIDE 1

Bisimulation and Modal Logic in Distributed Computing

Tuomo Lempi¨ ainen

Distributed Algorithms group, Department of Computer Science, Aalto University

(joint work with Lauri Hella, Matti J¨ arvisalo, Antti Kuusisto, Juhana Laurinharju, Kerkko Luosto, Jukka Suomela and Jonni Virtema)

Computational Logic Day 2016

December 8, 2016 @ Aalto University

1 / 15

slide-2
SLIDE 2

Publications

Brief overview of two papers: Hella, J¨ arvisalo, Kuusisto, Laurinharju, Lempi¨ ainen, Luosto, Suomela and Virtema: Weak models of distributed computing, with connections to modal logic PODC 2012, Distributed Computing 2015 Lempi¨ ainen: Ability to count messages is worth Θ( ∆ ) rounds in distributed computing LICS 2016

2 / 15

slide-3
SLIDE 3

The model of computation

A simple finite undirected graph, whose each node is a deterministic state machine that runs the same algorithm, can communicate with its neighbours, produces a local output.

3 / 15

slide-4
SLIDE 4

The model of computation

A simple finite undirected graph, whose each node is a deterministic state machine that runs the same algorithm, can communicate with its neighbours, produces a local output. Anonymous nodes ⇒ a weak model

  • f computation.

3 / 15

slide-5
SLIDE 5

Communication in synchronous rounds

v ← a b → In every round, each node v

1

sends messages to its neighbours,

2 receives messages from its

neighbours,

3 updates its state. 4 / 15

slide-6
SLIDE 6

Communication in synchronous rounds

v c → ← d In every round, each node v

1

sends messages to its neighbours,

2 receives messages from its

neighbours,

3 updates its state. 4 / 15

slide-7
SLIDE 7

Communication in synchronous rounds

v In every round, each node v

1

sends messages to its neighbours,

2 receives messages from its

neighbours,

3 updates its state. 4 / 15

slide-8
SLIDE 8

Communication in synchronous rounds

v In every round, each node v

1

sends messages to its neighbours,

2 receives messages from its

neighbours,

3 updates its state.

Eventually, each node halts and announces its own local output.

4 / 15

slide-9
SLIDE 9

Focus on communication, not computation

∆ = 3 n = 6 The running time of an algorithm is the number of communications rounds. The running time may depend on two parameters: the maximum degree of the graph, ∆, the number of nodes, n.

5 / 15

slide-10
SLIDE 10

Graph problems

We study graph problems where the problem instance is the communication graph G = (V , E), a solution is a mapping S : V → Y from nodes to local

  • utputs.

6 / 15

slide-11
SLIDE 11

Graph problems

Y = {0, 1} We study graph problems where the problem instance is the communication graph G = (V , E), a solution is a mapping S : V → Y from nodes to local

  • utputs.

Often the solution is an encoding of a subset of vertices or edges of the graph. One typical example is the minimum vertex cover.

6 / 15

slide-12
SLIDE 12

PODC 2012: seven variants of the model

Options for sending messages: a port number for each neighbour (V), v 1 ← a 3 b → 2 c → Node v sends a vector (a, c, b).

7 / 15

slide-13
SLIDE 13

PODC 2012: seven variants of the model

Options for sending messages: a port number for each neighbour (V), broadcast the same message to all neighbours (B). v 1 ← a 3 a → 2 a → Node v broadcasts message a.

7 / 15

slide-14
SLIDE 14

PODC 2012: seven variants of the model

Options for sending messages: a port number for each neighbour (V), broadcast the same message to all neighbours (B). Options for receiving messages: a port number for each neighbour (V), v 1 a → 3 ← a 2 ← b Node v receives a vector (a, b, a).

7 / 15

slide-15
SLIDE 15

PODC 2012: seven variants of the model

Options for sending messages: a port number for each neighbour (V), broadcast the same message to all neighbours (B). Options for receiving messages: a port number for each neighbour (V), receive a multiset of messages (M), v 1 a → 3 ← a 2 ← b Node v receives a multiset {a, a, b}.

7 / 15

slide-16
SLIDE 16

PODC 2012: seven variants of the model

Options for sending messages: a port number for each neighbour (V), broadcast the same message to all neighbours (B). Options for receiving messages: a port number for each neighbour (V), receive a multiset of messages (M), receive a set of messages (S). v 1 a → 3 ← a 2 ← b Node v receives a set {a, b}.

7 / 15

slide-17
SLIDE 17

PODC 2012: seven variants of the model

Options for sending messages: a port number for each neighbour (V), broadcast the same message to all neighbours (B). Options for receiving messages: a port number for each neighbour (V), receive a multiset of messages (M), receive a set of messages (S). We can require the outgoing and incoming port numbers to be consistent ⇒ the port-numbering model (VVc).

7 / 15

slide-18
SLIDE 18

PODC 2012: a hierarchy of complexity classes

VVc VV MV SV VB MB SB

8 / 15

slide-19
SLIDE 19

PODC 2012: a hierarchy of complexity classes

VVc VV MV SV VB MB SB VVc VV = MV = SV = VB MB = SB = =

Theorem

SB MB = VB SV = MV = VV VVc.

8 / 15

slide-20
SLIDE 20

PODC 2012: connections to modal logic

The constant-time variant of each of the seven complexity classes can be characterised by a modal logic such that there is a canonical one-to-one correspondence between algorithms and modal formulas.

9 / 15

slide-21
SLIDE 21

PODC 2012: connections to modal logic

The constant-time variant of each of the seven complexity classes can be characterised by a modal logic such that there is a canonical one-to-one correspondence between algorithms and modal formulas. Example: graded modal logic (GML), ϕ := qn | (ϕ ∧ ϕ) | ¬ϕ | ♦ϕ, | ♦≥kϕ, where qn are proposition symbols and k ∈ N. G, v | = qn iff degree(v) = n, G, v | = ♦≥kϕ iff

  • {w ∈ V : (v, w) ∈ E and G, w |

= ϕ}

  • ≥ k.

9 / 15

slide-22
SLIDE 22

PODC 2012: connections to modal logic

The constant-time variant of each of the seven complexity classes can be characterised by a modal logic such that there is a canonical one-to-one correspondence between algorithms and modal formulas. Example: graded modal logic (GML), ϕ := qn | (ϕ ∧ ϕ) | ¬ϕ | ♦ϕ, | ♦≥kϕ, where qn are proposition symbols and k ∈ N. G, v | = qn iff degree(v) = n, G, v | = ♦≥kϕ iff

  • {w ∈ V : (v, w) ∈ E and G, w |

= ϕ}

  • ≥ k.

GML corresponds to the complexity class MB (receive a multiset, send by broadcasting).

9 / 15

slide-23
SLIDE 23

PODC 2012: connections to modal logic

In each variant of modal logic, one can characterise definability by a variant

  • f bisimulation.

A nonempty relation Z ⊆ V × V ′ is a graded bisimulation between G = (V , E, τ) and G ′ = (V ′, E ′, τ ′) if the following conditions hold.

1 If (v, v′) ∈ Z, then v ∈ τ(qn) iff v′ ∈ τ ′(qn) for each qn. 2

If (v, v′) ∈ Z and X ⊆ E(v), then there is a set X ′ ⊆ E ′(v′) such that |X ′| = |X| and for each w′ ∈ X ′ there is a w ∈ X with (w, w′) ∈ Z.

3

If (v, v′) ∈ Z and X ′ ⊆ E ′(v′), then there is a set X ⊆ E(v) such that |X| = |X ′| and for each w ∈ X there is a w′ ∈ X ′ with (w, w′) ∈ Z. We use bisimulation to derive the separation results between the complexity classes.

10 / 15

slide-24
SLIDE 24

The relationship of MV and SV

The simulation results used to show the equivalence of complexity classes do not increase the running time, except for one:

Theorem (PODC 2012)

Assume that there is an MV-algorithm A that solves a problem Π in time

  • T. Then there is an SV-algorithm B that solves Π in time T + 2∆ − 2.

Is this result tight?

11 / 15

slide-25
SLIDE 25

LICS 2016: the simulation overhead is tight

Theorem

For each ∆ ≥ 2 there is a port-numbered graph G∆ with nodes u, v, w such that when executing any SV-algorithm A in G∆, u receives identical messages from its neighbours v and w in rounds 1, 2, . . . , 2∆ − 2. We can also separate the models by a graph problem:

Theorem

There is a graph problem Π that can be solved in one round by an MV-algorithm but that requires at least ∆ − 1 rounds for all ∆ ≥ 2, when solved by an SV-algorithm.

12 / 15

slide-26
SLIDE 26

Example: separating SV and MV

u 1 1 1 3 1 2 3 2 1 2 1 2 1 3 1 3 v 1 1 1 3 1 2 2 2 1 2 1 2 1 3 Output 1 if there is an even number of neighbours of even degree, 0

  • therwise.

13 / 15

slide-27
SLIDE 27

Generalisation: graph G∆ (here ∆ = 4)

14 / 15

1 1 2 2 1 1 1 3 3 4 3 3 1 1 1 2 2 4 4 4 1 1 1 2 2 3 1 2 1 2 1 2 1 3 3 4 3 3 1 1 1 2 2 4 4 4 1 1 1 2 2 3 2 3 1 1 1 2 2 3 3 4 2 3 1 1 1 3 2 4 4 4 1 1 1 2 2 3 3 4 1 1 1 2 2 3 3 4 2 2 1 1 1 3 3 4 3 4 1 1 1 2 2 4

. . .

The blue nodes are bisimilar up to the distance 2∆ − 2.

slide-28
SLIDE 28

Conclusion

VVc VV = MV = SV = VB MB = SB = =

We defined seven complexity classes and characterised the containment relations. Each constant-time class corresponds to a variant of modal logic. Only in one case there is

  • verhead in simulating a stronger

model by a weaker one, and that

  • verhead is unavoidable.

15 / 15

slide-29
SLIDE 29

Conclusion

VVc VV = MV = SV = VB MB = SB = =

We defined seven complexity classes and characterised the containment relations. Each constant-time class corresponds to a variant of modal logic. Only in one case there is

  • verhead in simulating a stronger

model by a weaker one, and that

  • verhead is unavoidable.

Thanks! Questions?

15 / 15