Skip to main content

Lower Bounds for Graph Exploration Using Local Policies

  • Conference paper
WALCOM: Algorithms and Computation (WALCOM 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9627))

Included in the following conference series:

  • 589 Accesses

Abstract

We give lower bounds for various natural node- and edge-based local strategies for exploring a graph. We consider this problem both in the setting of an arbitrary graph as well as the abstraction of a geometric exploration of a space by a robot, both of which have been extensively studied. We consider local exploration policies that use time-of-last-visit or alternatively least-frequently-visited local greedy strategies to select the next step in the exploration path. Both of these strategies were previously considered by Cooper et al. (2011) for a scenario in which counters for the last visit or visit frequency are attached to the edges. In this work we consider the case in which the counters are associated with the nodes, which for the case of dual graphs of geometric spaces could be argued to be intuitively more natural and likely more efficient. Surprisingly, these alternate strategies give worst-case superpolynomial/exponential time for exploration, whereas the least-frequently-visited strategy for edges has a polynomially bounded exploration time, as shown by Cooper et al. (2011).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In general, this property holds whenever there are several neighboring nodes with the lowest time stamp. For example, in a star starting from the center we visit all neighboring nodes in arbitrary order until all of them have time stamp 1. At this point we can once again choose an arbitrary order to visit the neighbors anew.

References

  1. Becker, A., Fekete, S.P., Kröller, A., Lee, S.K., McLurkin, J., Schmidt, C.: Triangulating unknown environments using robot swarms. In: Proceedings 29th Annual ACM Symposium Computational Geometry, pp. 345–346 (2013)

    Google Scholar 

  2. Bonato, A., del Río-Chanona, R.M., MacRury, C., Nicolaidis, J., Pérez-Giménez, X., Pralłat, P., Ternovsky, K.: Workshop on algorithms and models for the web graph. In: Gleich, D.F., Komjáthy, J., Litvak, N. (eds.) WAW 2006. LNCS, vol. 4936, pp. 18–23. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Cooper, C., Ilcinkas, D., Klasing, R., Kosowski, A.: Derandomizing random walks in undirected graphs using locally fair exploration strategies. Distrib. Comput. 24(2), 91–99 (2011)

    Article  MATH  Google Scholar 

  4. Fekete, S.P., Lee, S.K., López-Ortiz, A., Maftuleac, D., McLurkin, J.: Patrolling a region with a structured swarm of robots with limited individual capabilities. In: International Workshop on Robotic Sensor Networks (WRSN) (2014)

    Google Scholar 

  5. Koenig, S., Szymanski, B., Liu, Y.: Efficient and inefficient ant coverage methods. Annals of Math. Artif. Intell. Spec. Issue Ant Rob. 31(1), 41–76 (2001)

    Article  Google Scholar 

  6. Lee, S.K., Becker, A., Fekete, S.P., Kröller, A., McLurkin, J.: Exploration via structured triangulation by a multi-robot system with bearing-only low-resolution sensors. In: IEEE International Conference on Robotics and Automation, ICRA 2014, Hong Kong, China, pp. 2150–2157 (2014)

    Google Scholar 

  7. Maftuleac, D., Lee, S., Fekete, S.P., Akash, A. K., López-Ortiz, A., McLurkin, J.: Local policies for efficiently patrolling a triangulated region by a robot swarm. CoRR, abs/1410.2295 (2014)

    Google Scholar 

  8. Maftuleac, D., Lee, S., Fekete, S.P., Akash, A.K., López-Ortiz, A., McLurkin, J.: Local policies for efficiently patrolling a triangulated region by a robot swarm. In: International Conference on Robotics and Automation (ICRA), pp. 1809–1815 (2015)

    Google Scholar 

  9. Malpani, N., Chen, Y., Vaidya, N.H., Welch, J.L.: Distributed token circulation in mobile ad hoc networks. IEEE Trans. Mobile Comput. 4(2), 154–165 (2005)

    Article  Google Scholar 

  10. Yanovski, V., Wagner, I.A., Bruckstein, A.M.: A distributed ant algorithm for efficiently patrolling a network. Algorithmica 3(37), 165–186 (2003)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniela Maftuleac .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Akash, A.K., Fekete, S.P., Lee, S.K., López-Ortiz, A., Maftuleac, D., McLurkin, J. (2016). Lower Bounds for Graph Exploration Using Local Policies. In: Kaykobad, M., Petreschi, R. (eds) WALCOM: Algorithms and Computation. WALCOM 2016. Lecture Notes in Computer Science(), vol 9627. Springer, Cham. https://doi.org/10.1007/978-3-319-30139-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30139-6_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30138-9

  • Online ISBN: 978-3-319-30139-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics