Optimal message-passing with noisy beeps

P Davies - Proceedings of the 2023 ACM Symposium on …, 2023 - dl.acm.org
Beeping models are models for networks of weak devices, such as sensor networks or
biological networks. In these networks, nodes are allowed to communicate only via emitting …

Noisy beeps

K Efremenko, G Kol, RR Saxena - … of the 39th Symposium on Principles …, 2020 - dl.acm.org
We study the effect of noise on the n-party beeping model. In this model, in every round,
each party may decide to either'beep'or not. All parties hear a beep if and only if at least one …

Protecting Single-Hop Radio Networks from Message Drops

K Efremenko, G Kol, D Paramonov… - 50th International …, 2023 - drops.dagstuhl.de
Single-hop radio networks (SHRN) are a well studied abstraction of communication over a
wireless channel. In this model, in every round, each of the n participating parties may …

Contention resolution with predictions

S Gilbert, C Newport, N Vaidya, A Weaver - Proceedings of the 2021 …, 2021 - dl.acm.org
In this paper, we consider contention resolution algorithms that are augmented with
predictions about the network. We begin by studying the natural setup in which the algorithm …

Information Exchange is Harder with Noise at Source

M Mukherjee, R Gelles - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
We revisit the fundamental question of information exchange between n parties connected
by a noisy binary broadcast channel, where the noise affects the transmitter (EI-Gamal …

Tight bounds for general computation in noisy broadcast networks

K Efremenko, G Kol, D Paramonov… - 2021 IEEE 62nd …, 2022 - ieeexplore.ieee.org
Let II be a protocol over the n-party broadcast channel, where in each round, a pre-specified
party broadcasts a symbol to all other parties. We wish to design a scheme that takes such a …

Brief Announcement: Content-Oblivious Leader Election on Rings

F Frei, R Gelles, A Ghazy, A Nolin - … of the 43rd ACM Symposium on …, 2024 - dl.acm.org
In content-oblivious computation, n nodes wish to compute a given task over an
asynchronous network that suffers from an extremely harsh type of noise, which corrupts the …

Near-Optimal Resilient Labeling Schemes

K Censor-Hillel, E Huberman - arXiv preprint arXiv:2412.01628, 2024 - arxiv.org
Labeling schemes are a prevalent paradigm in various computing settings. In such
schemes, an oracle is given an input graph and produces a label for each of its nodes …

Beeping Shortest Paths via Hypergraph Bipartite Decomposition

F Dufoulon, Y Emek, R Gelles - arXiv preprint arXiv:2210.06882, 2022 - arxiv.org
Constructing a shortest path between two network nodes is a fundamental task in distributed
computing. This work develops schemes for the construction of shortest paths in randomized …

Improved bounds on the interactive capacity via error pattern analysis

M Aggarwal, M Mukherjee - arXiv preprint arXiv:2401.15355, 2024 - arxiv.org
Any interactive protocol between a pair of parties can be reliably simulated in the presence
of noise with a multiplicative overhead on the number of rounds (Schulman 1996). The …