The Distributed Lovsz Local Lemma Seth Pettie University of - - PowerPoint PPT Presentation

the distributed lov sz local lemma
SMART_READER_LITE
LIVE PREVIEW

The Distributed Lovsz Local Lemma Seth Pettie University of - - PowerPoint PPT Presentation

The Distributed Lovsz Local Lemma Seth Pettie University of Michigan R. Moser, G. Tardos. J. ACM 2010. K.-M. Chung, S. Pettie, H.-H. Su, Distributed Computing , 2017. S. Brandt, O. Fischer, J. Hirvonen, B. Keller,


slide-1
SLIDE 1

The Distributed Lovász Local Lemma

Seth Pettie University of Michigan

  • R. Moser, G. Tardos. J. ACM 2010.

K.-M. Chung, S. Pettie, H.-H. Su, Distributed Computing, 2017.

  • S. Brandt, O. Fischer, J. Hirvonen, B. Keller, T.Lampaiänen,J.Rybicki,J.Suomela,J.Uitto, STOC 2016.

Y.-J. Chang, T. Kopelowitz, S. Pettie. FOCS 2016. Y.-J. Chang, S. Pettie. FOCS 2017.

  • M. Fischer, M. Ghaffari. DISC 2017.

Y.-J. Chang, Q. He, W. Li, S. Pettie, J. Uitto. SODA 2018.

  • M. Ghaffari, D. Harris, F. Kuhn. arxiv 2017.
slide-2
SLIDE 2

O(1)-time Randomized Experiments

  • Max-degree = D; Palette size = (1+e)D.
  • Each edge picks a color u.a.r.; permanently colors

itself if there are no conflicts with adjacent edges.

– E(new degree) = Δ 1 −

$ $%& '

((*+,)

≈ Δ𝑓+(. – E(new palette size) ≈ (Δ + 1) 1 −

, ,12 (,+ , ,12 *) (* (

≈ (Δ + 1) 1 − 𝑓+( (.

slide-3
SLIDE 3

O(1)-time Randomized Experiments

  • Max-degree = D; Palette size = (1+e)D.
  • Each edge picks a color u.a.r., permanently colors

itself if there are no conflicts with adjacent edges.

– These estimates hold to within 1 + 𝜀 error with probability exp(−𝜀(Δ). – Each event only depends on 𝑃(Δ9) r.v.s

  • If 𝜀(Δ ≫ log 𝑜, we’re done. What if 𝜀(Δ ≫ log Δ?
slide-4
SLIDE 4

The LLL

(symmetric, variable version)

  • X = a set of independent discrete random variables.
  • V = a set of “bad events”.

– 𝑤 ∈ 𝑊 depends on 𝑤𝑐𝑚 𝑤 ⊂ 𝑌.

  • The dependency graph G=(V,E).

– 𝐹 = 𝑣, 𝑤 𝑤𝑐𝑚 𝑣 ∩ 𝑤𝑐𝑚 𝑤 ≠ ∅}.

  • Parameters: 𝑞 = max Pr 𝑣 , 𝑒 = max degree in G.
  • Theorem. If ep(d+1) < 1, there exists an assignment

to X avoiding all bad events in V.

slide-5
SLIDE 5

The LOCAL Model

[Linial’92]

  • A graph G=(V,E)

– Vertex = processor – Edge = bidirected communication – Time: synchronized rounds. In each round, each vertex sends a message to each neighbor. – Computation is free. – Message size is unbounded. – “Time” = number of rounds – N = number of vertices. – Δ = maximum degree.

  • Randomized LOCAL

– Can generate an unbounded number of random bits

slide-6
SLIDE 6

The Distributed LLL

  • G = (V,E) is the dependency graph of the LLL instance.
  • G is also the communications network of the LOCAL model.
  • Problem: collectively compute an assignment to X that

avoids all bad events.

  • In reality…

– H is the LOCAL communications network. – We run an r=O(1)-round randomized “experiment” on H that satisfies an LLL criterion (ep(d+1)<1 or something similar.) – The dependency graph is H2r. 𝑒 = Δ(U = poly(Δ) – Any LLL algorithm executed on H2r can be simulated on H with a factor 2r = O(1) slowdown.

slide-7
SLIDE 7

Moser-Tardos [2010] Resampling

  • Sample an initial assignment to the variables X.
  • 𝑊W = 𝑤 ∈ 𝑊 v occurs under current assignment}
  • While(𝑊W ≠ ∅)

– M = a maximal independent set of G(V’, E). – vbl 𝑁 = ⋃ 𝑤𝑐𝑚(𝑤)

  • [∈\

– Resample all variables in vbl(M).

  • Theorem. If 𝑓𝑞 𝑒 + 1

1 + 𝜗 < 1, M-T ends after 𝑃 log,12 𝑜 steps. Time: 𝑃(𝑁𝐽𝑇 a log,12 𝑜).

slide-8
SLIDE 8

Moser-Tardos in action

slide-9
SLIDE 9

Moser-Tardos in action

After the initial assignment to X: Red = bad event that occurs under current assignment

slide-10
SLIDE 10

Moser-Tardos in action

Red = bad event that occurs under current assignment Blue = MIS of red nodes.

slide-11
SLIDE 11

Moser-Tardos in action

Red = bad event that occurs under current assignment Blue = MIS of red nodes.

slide-12
SLIDE 12

Moser-Tardos in action

Red = bad event that occurs under current assignment Blue = MIS of red nodes.

slide-13
SLIDE 13

Moser-Tardos in action

Red = bad event that occurs under current assignment Blue = MIS of red nodes.

slide-14
SLIDE 14

Moser-Tardos in action

Red = bad event that occurs under current assignment Blue = MIS of red nodes.

slide-15
SLIDE 15

Moser-Tardos in action

Red = bad event that occurs under current assignment Blue = MIS of red nodes.

slide-16
SLIDE 16

Moser-Tardos in action

“Witness tree” : rooted at a resampled node; descendants a function

  • f the resampling transcript in reverse chronological order.

A

A

slide-17
SLIDE 17

Moser-Tardos in action

“Witness tree” : rooted at a resampled node; descendants a function

  • f the resampling transcript in reverse chronological order.

A

A

B C

B C

slide-18
SLIDE 18

Moser-Tardos in action

“Witness tree” : rooted at a resampled node; descendants a function

  • f the resampling transcript in reverse chronological order.

A

A

B C D E

B C B D E

slide-19
SLIDE 19

Moser-Tardos in action

“Witness tree” : rooted at a resampled node; descendants a function

  • f the resampling transcript in reverse chronological order.

A

A

B C D E

B C

F G

B D E C F G

H

H

slide-20
SLIDE 20

Moser-Tardos in action

Recall the LLL criterion: 𝑓𝑞 𝑒 + 1 1 + 𝜗 < 1

Pr(seeing this witness tree) ≤ 𝑞defg

A B C B D E C F G H

Number of labeled witness trees with size nodes ≤ 𝑜(𝑓 𝑒 + 1 )defg W.h.p., all witness trees have size 𝑃(log,12 𝑜)

slide-21
SLIDE 21

Chung-Pettie-Su [2014] Resampling

  • All vertices/bad events given unique IDs.
  • Sample an initial assignment to the variables X.
  • 𝑊W = 𝑤 ∈ 𝑊 v occurs under current assignment}
  • While(𝑊W ≠ ∅)

– 𝑉 = 𝑣 ∈ 𝑊W 𝐽𝐸 𝑣 < 𝐽𝐸 𝑤 , 𝑣, 𝑤 ∈ 𝐹, 𝑤 ∈ 𝑊′} – Resample all variables in ⋃ 𝑤𝑐𝑚(𝑣)

  • n∈o

.

slide-22
SLIDE 22
  • Moser-Tardos-type analysis goes through, using 2-

neighborhood in lieu of 1-neighborhood.

  • Theorem. If 𝑓𝑞𝑒( 1 + 𝜗 < 1, 𝑃 log,12 𝑜 C-P-S

resampling steps suffice. Time: 𝑃(log,12 𝑜).

A

Time t:

B A

Time t-1:

C B A

slide-23
SLIDE 23

Lower Bounds

Brandt, Fischer, Hirvonen, Keller, Lempaiänen, Rybicki, Suomela, Uitto 2016 Chang, Kopelowitz, Pettie, 2016 further simplified by Chang, He, Li, Pettie, Uitto 2018

  • Randomized LLL algorithms take Ω log log 𝑜 time.
  • Deterministic LLL algorithms take Ω(log 𝑜) time.
  • New Problem: sinkless orientation. Given Δ-regular

undirected graph G=(V,E), find an orientation of each edge s.t. no vertex has out-degree 0.

– An LLL instance with: 𝑞 = 2+*, 𝑒 = Δ.

slide-24
SLIDE 24

Lower Bounds on Sinkless Orientation/LLL

  • Simplifying assumptions:

– Processors sit on the edges; two processors can communicate if their edges touch. – The graph is bipartite and 2-vertex colored. – The graph is 2Δ-edge colored. – The graph is an infinite Δ-regular tree.

  • “Running time” is a vector (𝑢,, 𝑢(, … , 𝑢(*)

– Edges colored j terminate in 𝑢t rounds.

slide-25
SLIDE 25

Lower Bounds on Sinkless Orientation/LLL

  • Proof idea: take a randomized algorithm running in

time 𝑢 e a 𝑢 − 1 (*+e with error prob. p, transform it into one with time 𝑢 e+, a 𝑢 − 1 (*+(e1,), error

  • prob. O(p1/3).

– Only edges colored i will change their algorithm.

slide-26
SLIDE 26
  • Fix a specific edge {u0,u1} colored i.

u0 u1

i

slide-27
SLIDE 27
  • Fix a specific edge {u0,u1} colored i.
  • 𝐹u ∶ all neighbors of u0 oriented towards u0.

u0 u1

i

slide-28
SLIDE 28
  • Fix a specific edge {u0,u1} colored i.
  • 𝐹u ∶ all neighbors of u0 oriented towards u0.
  • 𝐹, ∶ all neighbors of u1 oriented towards u1.

u0 u1

i

slide-29
SLIDE 29
  • Fix a specific edge {u0,u1} colored i.
  • 𝐹u ∶ all neighbors of u0 oriented towards u0.
  • 𝐹, ∶ all neighbors of u1 oriented towards u1.
  • Pr(𝐹u ∩ 𝐹,) ≤ 2𝑞.

u0 u1

i

slide-30
SLIDE 30
  • 𝐹u ∶ all neighbors of u0 oriented towards u0.
  • 𝐹, ∶ all neighbors of u1 oriented towards u1.
  • 𝐹u

∗: Pr 𝐹u 𝑂z+,(𝑣u,𝑣,)) ≥ 𝑞,/9

  • 𝐹,

∗: Pr 𝐹, 𝑂z+,(𝑣u,𝑣,)) ≥ 𝑞,/9

u0 u1

i

t − 1

slide-31
SLIDE 31
  • 𝐃𝐦𝐛𝐣𝐧. Pr 𝐹u ∩ 𝐹, 𝐹u

∗ ∩ 𝐹, ∗) ≥ p

‚ ƒ.

  • 𝐹u

∗: Pr 𝐹u 𝑂z+,(𝑣u,𝑣,)) ≥ 𝑞,/9

  • 𝐹,

∗: Pr 𝐹, 𝑂z+,(𝑣u,𝑣,)) ≥ 𝑞,/9

u0 u1

i

t − 1 t

slide-32
SLIDE 32
  • 𝐃𝐦𝐛𝐣𝐧. Pr 𝐹u ∩ 𝐹, 𝐹u

∗ ∩ 𝐹, ∗) ≥ p

‚ ƒ.

à Pr( 𝐹u

∗ ∩ 𝐹, ∗) ≤ 2𝑞

$ ƒ.

  • The new algorithm:
  • If 𝐹u

∗ holds, orient as (u0àu1), otherwise, orient (u1àu0)

  • Two ways to fail:
  • 𝐹u

∗ ∩ 𝐹u: Probability this happens is ≤ p1/3.

  • 𝐹u

∗ ∩ 𝐹,: Probability this happens is ≤ 3p1/3.

  • 𝐹u

∗ ∩ 𝐹, ∗ ∩ 𝐹,

: Probability this happens is ≤ 2p1/3. +

  • 𝐹u

∗ ∩ 𝐹, ∗ ∩ 𝐹,

: Probability this happens is ≤ p1/3.

slide-33
SLIDE 33

Lower Bounds

  • Transform any time (t,t,…,t) algorithm with error

probability p into a time (0,0,...,0) algorithm with error probability 𝑞,/9‚'.

– 0-round algorithms have high probabilities of failure. – If p = 1/poly(n), then 𝑢 = Ω Δ+, log log 𝑜 . – If p = 0, then we need to think about 2 issues.

  • Impossible to solve for deterministic, anonymous nodes. Need

to think about role of unique IDs.

  • The argument breaks down if the algorithm can see a cycle.

Proof works up to t < girth/2. Apply to Δ-regular graphs with girth Ω log* 𝑜 .

slide-34
SLIDE 34

Completeness

slide-35
SLIDE 35

The LLL is complete for sublogarithmic time

  • Suppose we have a randomized distributed LLL algorithm

for criterion p(ed)c < 1, for any (possibly big) constant c. The algorithm runs in TLLL time.

  • Suppose algorithm A solves some locally checkable labeling

problem runs in sublogarithmic time. Then A can be automatically sped-up to run in O(TLLL) time.

slide-36
SLIDE 36
  • Suppose A solves some LCL problem in sublogarithmic time

with failure probability 1/n.

– For any e>0, can write time as

  • n* = min. value such that:

– Follows that t* = O(C(D)).

every vertex sees a subgraph that is consistent with an n*-vertex graph.

slide-37
SLIDE 37
  • Build the dependency graph:

– Xv = the random bits generated locally at v. – vbl(v) = {Xu | u ∈ Nt*+O(1)(v)} – Ev = the event that v’s neighborhood is incorrectly labeled, when running alg. A with “n” = n*. – H = ({Ev}, {(Eu,Ev) | dist(u,v) ≤ 2t*+O(1) }) – LLL parameters: p = 1/n*, d = D2t*+O(1)

  • Run a distributed LLL algorithm on “H.”

– 1 step in H simulated with O(C(D)) steps in G. – Alg. A can be automatically sped up to O(C(D)·TLLL) time.

slide-38
SLIDE 38

Modern Distributed LLL Algorithms

  • The graph shattering method: [Barenboim, Elkin, Pettie, Schneider 2016]

– Step 1 (Rand.): Reduce a graph problem on n vertices to many disjoint problems on poly(log n) vertices. – Step 2 (Det.): Solve each subproblem using the best available deterministic algorithm.

  • [Fischer-Ghaffari’17] + [Molloy-Reed’98]

– Transform 1 LLL instance with

size n (𝑞, 𝑒) 𝑞 𝑓𝑒 „ < 1

– Into several LLL instances with

size 𝑞𝑝𝑚𝑧 𝑒 log 𝑜 𝑞

  • , d

𝑞

  • 𝑓𝑒 „/( < 1

– In time 𝑃(𝑒( + log∗ 𝑜).

parameters LLL criterion

slide-39
SLIDE 39

Modern Distributed LLL Algorithms

  • The graph shattering method: [Barenboim, Elkin, Pettie, Schneider 2016]

– Step 1 (Rand.): Reduce a graph problem on n vertices to many disjoint problems on poly(log n) vertices. – Step 2 (Det.): Solve each subproblem using the best available deterministic algorithm. – Step 3 Derandomize the algorithm from (Step 1)+(Step 2) and plug it back in as the deterministic algorithm in Step 2.

  • [Ghaffari, Harris, Kuhn’17] LLL instances satisfying 𝑞𝑒ˆ = 𝑃(1)

are solved in time: exp(e) 𝑃 log 𝑒 + log e1, 𝑜

slide-40
SLIDE 40

Graph Shattering via Complex Contagions

[Chang, He, Li, Pettie, Uitto 2018]

  • Consider a partial assignment 𝜚 to the variables X.
  • Event v is called “dangerous” if Pr 𝑤 𝜚) ≥ 𝑞
  • .
  • If 𝑞𝑒Š , < 1, this algorithm terminates in 𝑃 log 𝑜

rounds and shatters the dependency graph into 𝑞𝑝𝑚𝑧 𝑒 log 𝑜-size components.

  • Pick a random total assignment 𝜚.
  • Until there are no dangerous events w.r.t. 𝜚:

– For each dangerous event v, unset all of vbl(v).

slide-41
SLIDE 41

Graph Shattering via Complex Contagions

  • Complex Contagions

– At time 0, every node is infected with prob. p0 = d-O(1). – Any node with > 𝜈 infected neighbors becomesinfected . – A state is stable if it causes no more infection.

  • Stable State Problem. Given 𝑉u infected at time 0,

find a non-trivial stable state 𝑀 ⊃ 𝑉u.

slide-42
SLIDE 42

Graph Shattering via Complex Contagions

  • The Hypochondriac Algorithm:

– 𝑉u = sample each vertex with probability p0. – For i from 1 to 𝜐 = 𝑃(log log 𝑜) :

  • 𝑉e = 𝑉e+, ∪ 𝑤 | 𝑤 has >

“ ( neighbors in 𝑉e+, .

– 𝑀u = 𝑉– – For i from 1 to 𝜐

  • 𝑀e = 𝑉u ∪ 𝑀e+,\ 𝑤 | 𝑤 has ≤ 𝜈 neighbors in 𝑀e+, .

– Return 𝑀–.

slide-43
SLIDE 43

Sublogarithmic LLL Algorithms

  • Theorem. (informal) If the graph is “tree structured”

(𝑈U for some tree 𝑈), then the hypochondriac algorithm finds a non-trivial stable state, w.h.p.

  • Theorem. (informal) [Chang, He, Li, Pettie, Uitto’18]

Any “tree structured” LLL dependency graph can be shattered into 𝑞𝑝𝑚𝑧 𝑒 log 𝑜-size LLL instances in 𝑃(log log 𝑜) time (via the hypochondriac algorithm.)

slide-44
SLIDE 44

The End (is near)

  • Conjecture. [Chang, Pettie 2017] The randomized LOCAL

complexity of the LLL is O(log log n) under some polynomial LLL criterion pdc = O(1).

– If true, we know what the algorithm must look like:

  • Some O(log log n)-time algorithm to shatter the

dependency graph into poly(log n)-size components.

  • Some O(log n)-time deterministic LLL algorithm.
  • Is LLL with criterion pd = O(1) strictly harder than

pdc = O(1)?

slide-45
SLIDE 45

The End