the distributed lov sz local lemma
play

The Distributed Lovsz Local Lemma Seth Pettie University of - PowerPoint PPT Presentation

The Distributed Lovsz Local Lemma Seth Pettie University of Michigan R. Moser, G. Tardos. J. ACM 2010. K.-M. Chung, S. Pettie, H.-H. Su, Distributed Computing , 2017. S. Brandt, O. Fischer, J. Hirvonen, B. Keller,


  1. The Distributed Lovász Local Lemma Seth Pettie University of Michigan R. Moser, G. Tardos. J. ACM 2010. K.-M. Chung, S. Pettie, H.-H. Su, Distributed Computing , 2017. S. Brandt, O. Fischer, J. Hirvonen, B. Keller, T.Lampaiänen,J.Rybicki,J.Suomela,J.Uitto, STOC 2016. Y.-J. Chang, T. Kopelowitz, S. Pettie. FOCS 2016. Y.-J. Chang, S. Pettie. FOCS 2017. M. Fischer, M. Ghaffari. DISC 2017. Y.-J. Chang, Q. He, W. Li, S. Pettie, J. Uitto. SODA 2018. M. Ghaffari, D. Harris, F. Kuhn. arxiv 2017.

  2. O(1)-time Randomized Experiments • Max-degree = D ; Palette size = (1+ e ) D . • Each edge picks a color u.a.r.; permanently colors itself if there are no conflicts with adjacent edges. ((*+,) ≈ Δ𝑓 +( . $ – E(new degree) = Δ 1 − $%& ' – E(new palette size) (* ( , , ≈ (Δ + 1) 1 − 𝑓 +( ( . ≈ (Δ + 1) 1 − ,12 (,+ ,12 *)

  3. O(1)-time Randomized Experiments • Max-degree = D ; Palette size = (1+ e ) D . • Each edge picks a color u.a.r., permanently colors itself if there are no conflicts with adjacent edges. – These estimates hold to within 1 + 𝜀 error with probability exp(−𝜀 ( Δ) . – Each event only depends on 𝑃(Δ 9 ) r.v.s • If 𝜀 ( Δ ≫ log 𝑜 , we’re done. What if 𝜀 ( Δ ≫ log Δ ?

  4. The LLL (symmetric, variable version) • X = a set of independent discrete random variables. • V = a set of “bad events”. – 𝑤 ∈ 𝑊 depends on 𝑤𝑐𝑚 𝑤 ⊂ 𝑌. • The dependency graph G=(V,E). – 𝐹 = 𝑣, 𝑤 𝑤𝑐𝑚 𝑣 ∩ 𝑤𝑐𝑚 𝑤 ≠ ∅}. • Parameters: 𝑞 = max Pr 𝑣 , 𝑒 = max degree in G. • Theorem. If ep(d+1) < 1, there exists an assignment to X avoiding all bad events in V.

  5. The LOCAL Model [Linial’92] • A graph G=(V,E) – Vertex = processor – Edge = bidirected communication – Time: synchronized rounds. In each round, each vertex sends a message to each neighbor. – Computation is free . – Message size is unbounded. – “Time” = number of rounds – N = number of vertices. – Δ = maximum degree. • Randomized LOCAL – Can generate an unbounded number of random bits

  6. The Distributed LLL • G = (V,E) is the dependency graph of the LLL instance. • G is also the communications network of the LOCAL model. • Problem: collectively compute an assignment to X that avoids all bad events. • In reality… – H is the LOCAL communications network. – We run an r=O(1)-round randomized “experiment” on H that satisfies an LLL criterion (ep(d+1)<1 or something similar.) – The dependency graph is H 2r . 𝑒 = Δ (U = poly(Δ) – Any LLL algorithm executed on H 2r can be simulated on H with a factor 2r = O(1) slowdown.

  7. � Moser-Tardos [2010] Resampling • Sample an initial assignment to the variables X. • 𝑊 W = 𝑤 ∈ 𝑊 v occurs under current assignment} • While (𝑊 W ≠ ∅) – M = a maximal independent set of G(V’, E). – vbl 𝑁 = ⋃ 𝑤𝑐𝑚(𝑤) [∈\ – Resample all variables in vbl(M). • Theorem. If 𝑓𝑞 𝑒 + 1 1 + 𝜗 < 1, M-T ends after 𝑃 log ,12 𝑜 steps. Time: 𝑃(𝑁𝐽𝑇 a log ,12 𝑜 ).

  8. Moser-Tardos in action

  9. Moser-Tardos in action After the initial assignment to X: Red = bad event that occurs under current assignment

  10. Moser-Tardos in action Red = bad event that occurs under current assignment Blue = MIS of red nodes.

  11. Moser-Tardos in action Red = bad event that occurs under current assignment Blue = MIS of red nodes.

  12. Moser-Tardos in action Red = bad event that occurs under current assignment Blue = MIS of red nodes.

  13. Moser-Tardos in action Red = bad event that occurs under current assignment Blue = MIS of red nodes.

  14. Moser-Tardos in action Red = bad event that occurs under current assignment Blue = MIS of red nodes.

  15. Moser-Tardos in action Red = bad event that occurs under current assignment Blue = MIS of red nodes.

  16. Moser-Tardos in action “Witness tree” : rooted at a resampled node; descendants a function of the resampling transcript in reverse chronological order . A A

  17. Moser-Tardos in action “Witness tree” : rooted at a resampled node; descendants a function of the resampling transcript in reverse chronological order . A B C C A B

  18. Moser-Tardos in action “Witness tree” : rooted at a resampled node; descendants a function of the resampling transcript in reverse chronological order . A E B C C D A B B D E

  19. Moser-Tardos in action “Witness tree” : rooted at a resampled node; descendants a function of the resampling transcript in reverse chronological order . A G E B C F C D A B B D E H H C F G

  20. Moser-Tardos in action Recall the LLL criterion: 𝑓𝑞 𝑒 + 1 1 + 𝜗 < 1 A Pr(seeing this witness tree) ≤ 𝑞 defg B C Number of labeled witness trees with size nodes ℎ B D E ≤ 𝑜(𝑓 𝑒 + 1 ) defg H C F G W.h.p., all witness trees have size 𝑃(log ,12 𝑜)

  21. � Chung-Pettie-Su [2014] Resampling • All vertices/bad events given unique IDs . • Sample an initial assignment to the variables X. • 𝑊 W = 𝑤 ∈ 𝑊 v occurs under current assignment} • While (𝑊 W ≠ ∅) – 𝑉 = 𝑣 ∈ 𝑊 W 𝐽𝐸 𝑣 < 𝐽𝐸 𝑤 , 𝑣, 𝑤 ∈ 𝐹, 𝑤 ∈ 𝑊′} – Resample all variables in ⋃ 𝑤𝑐𝑚(𝑣) . n∈o

  22. • Moser-Tardos-type analysis goes through, using 2- neighborhood in lieu of 1-neighborhood. • Theorem. If 𝑓𝑞𝑒 ( 1 + 𝜗 < 1, 𝑃 log ,12 𝑜 C-P-S resampling steps suffice. Time: 𝑃(log ,12 𝑜 ). Time t: A B B C A A Time t-1:

  23. Lower Bounds Brandt, Fischer, Hirvonen, Keller, Lempaiänen, Rybicki, Suomela, Uitto 2016 Chang, Kopelowitz, Pettie, 2016 further simplified by Chang, He, Li, Pettie, Uitto 2018 • Randomized LLL algorithms take Ω log log 𝑜 time. • Deterministic LLL algorithms take Ω(log 𝑜) time. • New Problem: sinkless orientation . Given Δ -regular undirected graph G=(V,E), find an orientation of each edge s.t. no vertex has out-degree 0. – An LLL instance with: 𝑞 = 2 +* , 𝑒 = Δ.

  24. Lower Bounds on Sinkless Orientation/LLL • Simplifying assumptions: – Processors sit on the edges; two processors can communicate if their edges touch. – The graph is bipartite and 2-vertex colored. – The graph is 2Δ -edge colored. – The graph is an infinite Δ -regular tree. • “Running time” is a vector (𝑢 , , 𝑢 ( , … , 𝑢 (* ) – Edges colored j terminate in 𝑢 t rounds.

  25. Lower Bounds on Sinkless Orientation/LLL • Proof idea: take a randomized algorithm running in time 𝑢 e a 𝑢 − 1 (*+e with error prob. p, transform it into one with time 𝑢 e+, a 𝑢 − 1 (*+(e1,) , error prob. O(p 1/3 ). – Only edges colored i will change their algorithm.

  26. • Fix a specific edge {u 0 ,u 1 } colored i. u 0 u 1 i

  27. • Fix a specific edge {u 0 ,u 1 } colored i. • 𝐹 u ∶ all neighbors of u 0 oriented towards u 0 . u 0 u 1 i

  28. • Fix a specific edge {u 0 ,u 1 } colored i. • 𝐹 u ∶ all neighbors of u 0 oriented towards u 0 . • 𝐹 , ∶ all neighbors of u 1 oriented towards u 1 . u 0 u 1 i

  29. • Fix a specific edge {u 0 ,u 1 } colored i. • 𝐹 u ∶ all neighbors of u 0 oriented towards u 0 . • 𝐹 , ∶ all neighbors of u 1 oriented towards u 1 . • Pr(𝐹 u ∩ 𝐹 , ) ≤ 2𝑞. u 0 u 1 i

  30. • 𝐹 u ∶ all neighbors of u 0 oriented towards u 0 . • 𝐹 , ∶ all neighbors of u 1 oriented towards u 1 . t − 1 u 0 u 1 i ∗ : Pr 𝐹 u 𝑂 z+, (𝑣 u, 𝑣 , )) ≥ 𝑞 ,/9 • 𝐹 u ∗ : Pr 𝐹 , 𝑂 z+, (𝑣 u, 𝑣 , )) ≥ 𝑞 ,/9 • 𝐹 ,

  31. ‚ ∗ ∩ 𝐹 , ∗ ) ≥ p • 𝐃𝐦𝐛𝐣𝐧 . Pr 𝐹 u ∩ 𝐹 , 𝐹 u ƒ . t − 1 t u 0 u 1 i ∗ : Pr 𝐹 u 𝑂 z+, (𝑣 u, 𝑣 , )) ≥ 𝑞 ,/9 • 𝐹 u ∗ : Pr 𝐹 , 𝑂 z+, (𝑣 u, 𝑣 , )) ≥ 𝑞 ,/9 • 𝐹 ,

  32. ‚ ∗ ∩ 𝐹 , ∗ ) ≥ p • 𝐃𝐦𝐛𝐣𝐧 . Pr 𝐹 u ∩ 𝐹 , 𝐹 u ƒ . $ ∗ ∩ 𝐹 , ∗ ) ≤ 2𝑞 à Pr( 𝐹 u ƒ . • The new algorithm: ∗ holds, orient as (u 0 à u 1 ), otherwise, orient (u 1 à u 0 ) • If 𝐹 u • Two ways to fail: ∗ ∩ 𝐹 u : Probability this happens is ≤ p 1/3 . • 𝐹 u ∗ ∩ 𝐹 , : Probability this happens is ≤ 3p 1/3 . • 𝐹 u ∗ ∩ 𝐹 , ∗ ∩ 𝐹 , • 𝐹 u : Probability this happens is ≤ 2p 1/3 . + ∗ ∩ 𝐹 , ∗ ∩ 𝐹 , • 𝐹 u : Probability this happens is ≤ p 1/3 .

  33. Lower Bounds • Transform any time (t,t,…,t) algorithm with error probability p into a time (0,0,...,0) algorithm with error probability 𝑞 ,/9 ‚' . – 0-round algorithms have high probabilities of failure. – If p = 1/poly(n), then 𝑢 = Ω Δ +, log log 𝑜 . – If p = 0, then we need to think about 2 issues. • Impossible to solve for deterministic , anonymous nodes. Need to think about role of unique IDs. • The argument breaks down if the algorithm can see a cycle. Proof works up to t < girth/2. Apply to Δ -regular graphs with girth Ω log * 𝑜 .

  34. Completeness

  35. The LLL is complete for sublogarithmic time • Suppose we have a randomized distributed LLL algorithm for criterion p(ed) c < 1, for any (possibly big) constant c. The algorithm runs in T LLL time. • Suppose algorithm A solves some locally checkable labeling problem runs in sublogarithmic time. Then A can be automatically sped-up to run in O(T LLL ) time.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend