• Aucun résultat trouvé

Epistemic Gossip Protocols

N/A
N/A
Protected

Academic year: 2022

Partager "Epistemic Gossip Protocols"

Copied!
1
0
0

Texte intégral

(1)

Epistemic Gossip Protocols

Hans van Ditmarsch

LORIA / CNRS - University of Lorraine, Nancy Institute of Mathematical Sciences (IMSc), Chennai

Abstract

A well-studied phenomenon in network theory since the 1970s are opti- mal schedules to distribute information by one-to-one communication between nodes. One can take these communicative actions to be tele- phone calls, and protocols to spread information this way are known as gossip protocols or epidemic protocols. Statistical approaches to gossip have taken a large fight since then, witness for example the survey “Epi- demic Information Dissemination in Distributed Systems” by Eugster et al. (IEEE Computer, 2004). It is typical to assume a global sched- uler who executes a possibly non-deterministic or randomized protocol.

A departure from this methodology is to investigate epistemic gossip protocols, where an agent (node) will call another agent not because it is so instructed by a scheduler, but based on its knowledge or ig- norance of the distribution of secrets over the network and of other agents’ knowledge or ignorance of that. Such protocols are distributed and do not need a central scheduler. This comes at a cost: they may take longer to terminate than non-epistemic, globally scheduled, pro- tocols. A number of works have appeared over the past years (Apt et al., Attamah et al., van Ditmarsch et al., van Eijck & Gatting, Herzig

& Maffre) of which we present a survey, including open problems yet to be solved by the community.

Copyright©by the paper’s authors. Copying permitted for private and academic purposes.

In: T. ˚Agotnes, B. Liao, Y.N. Wang (eds.): Proceedings of the first Chinese Conference on Logic and Argumentation (CLAR 2016), Hangzhou, China, 2-3 April 2016, published at http://ceur-ws.org

1

Références

Documents relatifs

The second protocol uses an optimal complexity of memory space for each thing to achieve the permutation routing with a parallel broadcasting using less number of channels.. We give

This property of having at least two calls between fresh agents cannot be guaranteed by an epistemic symmetric protocol in a synchronous model; agents know how many calls have

Getting an intuitive understanding of the privacy guarantees provided by Theorem 7 is not straightforward, as often the case with differential privacy. Therefore, we illustrate

Chinese hamster ovary (CHO) host cell engineering to increase sialylation of recombinant therapeutic proteins by modulating sialyltransferase expression.. Correlation of DNA

Figure 2 (A) Distribution of AR value frequency for unstocked ( N populations = 42; white bars) and stocked (N populations = 30; dark gray bars) populations; triangles indicate

That the diffusion-controlled cathodic peak current is independent of the proton donor concentration at high buffer concentrations, but still proportional to v 1/2 , allows us to

While dative bonded species were observed to form on isolated clean dimers, surprisingly pyridine did not react with single dangling bonds.. This observation illustrates the ability

duration K. Consequently, we see that increasing the length.. We have indicated the structure of the spread-response precoder and briefly stated some of its