We consider a scenario in which anonymous, finite-state sensing devices are deployed in an ad-hoc communication network of arbitrary size and unknown topology, and explore what properties of the network graph can be stably computed by the devices. We show that they can detect whether the network has degree bounded by a constant d, and, if so, organize a computation that achieves asymptotically optimal linear memory use. We define a model of stabilizing inputs to such devices and show that a large class of predicates of the multiset of final input values are stably computable in any weakly-connected network. We also show that nondeterminism in the transition function does not increase the class of stably computable predicates.
International audienceA distributed algorithm is self-stabilizing if after faults and attacks hit th...
International audienceWe consider snap-stabilizing algorithms in anonymous networks. Self-stabilizin...
A distributed algorithm is self-stabilizing if after faults and attacks hit the system and place it ...
We consider a scenario in which anonymous, finite-state sensing devices are deployed in an ad-hoc c...
We explore the capability of a network of extremely limited computational entities to decide propert...
We work on an extension of the Population Protocol model of Angluin et al. that allows edges of the ...
Abstract-We study the problem of stabilizing a linear system over a wireless network using a simple ...
We study the problem of stabilizing a linear system over a wireless network using a simple in-networ...
Summary. The computational power of networks of small resource-limited mobile agents is explored. Tw...
International audienceA distributed algorithm is self-stabilizing if after faults and attacks hit th...
A distributed algorithm is self-stabilizing if after faults and attacks hit the system and place it ...
We explore the computational power of networks of small resource-limited mobile agents. We define tw...
Self-stabilizing protocols enable distributed systems to recover correct behavior starting from any ...
This article presents a theoretical investigation of computation beyond the Turing barrier from emer...
Abstract We provide effective (i.e., recursive) characterizations of the relations that can be compu...
International audienceA distributed algorithm is self-stabilizing if after faults and attacks hit th...
International audienceWe consider snap-stabilizing algorithms in anonymous networks. Self-stabilizin...
A distributed algorithm is self-stabilizing if after faults and attacks hit the system and place it ...
We consider a scenario in which anonymous, finite-state sensing devices are deployed in an ad-hoc c...
We explore the capability of a network of extremely limited computational entities to decide propert...
We work on an extension of the Population Protocol model of Angluin et al. that allows edges of the ...
Abstract-We study the problem of stabilizing a linear system over a wireless network using a simple ...
We study the problem of stabilizing a linear system over a wireless network using a simple in-networ...
Summary. The computational power of networks of small resource-limited mobile agents is explored. Tw...
International audienceA distributed algorithm is self-stabilizing if after faults and attacks hit th...
A distributed algorithm is self-stabilizing if after faults and attacks hit the system and place it ...
We explore the computational power of networks of small resource-limited mobile agents. We define tw...
Self-stabilizing protocols enable distributed systems to recover correct behavior starting from any ...
This article presents a theoretical investigation of computation beyond the Turing barrier from emer...
Abstract We provide effective (i.e., recursive) characterizations of the relations that can be compu...
International audienceA distributed algorithm is self-stabilizing if after faults and attacks hit th...
International audienceWe consider snap-stabilizing algorithms in anonymous networks. Self-stabilizin...
A distributed algorithm is self-stabilizing if after faults and attacks hit the system and place it ...