Abstract
We give lower bounds for various natural node- and edge-based local strategies for exploring a graph. We consider this problem both in the setting of an arbitrary graph as well as the abstraction of a geometric exploration of a space by a robot, both of which have been extensively studied. We consider local exploration policies that use time-of-last-visit or alternatively least-frequently-visited local greedy strategies to select the next step in the exploration path. Both of these strategies were previously considered by Cooper et al. (2011) for a scenario in which counters for the last visit or visit frequency are attached to the edges. In this work we consider the case in which the counters are associated with the nodes, which for the case of dual graphs of geometric spaces could be argued to be intuitively more natural and likely more efficient. Surprisingly, these alternate strategies give worst-case superpolynomial/exponential time for exploration, whereas the least-frequently-visited strategy for edges has a polynomially bounded exploration time, as shown by Cooper et al. (2011).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In general, this property holds whenever there are several neighboring nodes with the lowest time stamp. For example, in a star starting from the center we visit all neighboring nodes in arbitrary order until all of them have time stamp 1. At this point we can once again choose an arbitrary order to visit the neighbors anew.
References
Becker, A., Fekete, S.P., Kröller, A., Lee, S.K., McLurkin, J., Schmidt, C.: Triangulating unknown environments using robot swarms. In: Proceedings 29th Annual ACM Symposium Computational Geometry, pp. 345–346 (2013)
Bonato, A., del Río-Chanona, R.M., MacRury, C., Nicolaidis, J., Pérez-Giménez, X., Pralłat, P., Ternovsky, K.: Workshop on algorithms and models for the web graph. In: Gleich, D.F., Komjáthy, J., Litvak, N. (eds.) WAW 2006. LNCS, vol. 4936, pp. 18–23. Springer, Heidelberg (2008)
Cooper, C., Ilcinkas, D., Klasing, R., Kosowski, A.: Derandomizing random walks in undirected graphs using locally fair exploration strategies. Distrib. Comput. 24(2), 91–99 (2011)
Fekete, S.P., Lee, S.K., López-Ortiz, A., Maftuleac, D., McLurkin, J.: Patrolling a region with a structured swarm of robots with limited individual capabilities. In: International Workshop on Robotic Sensor Networks (WRSN) (2014)
Koenig, S., Szymanski, B., Liu, Y.: Efficient and inefficient ant coverage methods. Annals of Math. Artif. Intell. Spec. Issue Ant Rob. 31(1), 41–76 (2001)
Lee, S.K., Becker, A., Fekete, S.P., Kröller, A., McLurkin, J.: Exploration via structured triangulation by a multi-robot system with bearing-only low-resolution sensors. In: IEEE International Conference on Robotics and Automation, ICRA 2014, Hong Kong, China, pp. 2150–2157 (2014)
Maftuleac, D., Lee, S., Fekete, S.P., Akash, A. K., López-Ortiz, A., McLurkin, J.: Local policies for efficiently patrolling a triangulated region by a robot swarm. CoRR, abs/1410.2295 (2014)
Maftuleac, D., Lee, S., Fekete, S.P., Akash, A.K., López-Ortiz, A., McLurkin, J.: Local policies for efficiently patrolling a triangulated region by a robot swarm. In: International Conference on Robotics and Automation (ICRA), pp. 1809–1815 (2015)
Malpani, N., Chen, Y., Vaidya, N.H., Welch, J.L.: Distributed token circulation in mobile ad hoc networks. IEEE Trans. Mobile Comput. 4(2), 154–165 (2005)
Yanovski, V., Wagner, I.A., Bruckstein, A.M.: A distributed ant algorithm for efficiently patrolling a network. Algorithmica 3(37), 165–186 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Akash, A.K., Fekete, S.P., Lee, S.K., López-Ortiz, A., Maftuleac, D., McLurkin, J. (2016). Lower Bounds for Graph Exploration Using Local Policies. In: Kaykobad, M., Petreschi, R. (eds) WALCOM: Algorithms and Computation. WALCOM 2016. Lecture Notes in Computer Science(), vol 9627. Springer, Cham. https://doi.org/10.1007/978-3-319-30139-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-30139-6_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30138-9
Online ISBN: 978-3-319-30139-6
eBook Packages: Computer ScienceComputer Science (R0)