Skip to main content
Log in

How to meet when you forget: log-space rendezvous in arbitrary graphs

  • Published:
Distributed Computing Aims and scope Submit manuscript

Abstract

Two identical (anonymous) mobile agents start from arbitrary nodes in an a priori unknown graph and move synchronously from node to node with the goal of meeting. This rendezvous problem has been thoroughly studied, both for anonymous and for labeled agents, along with another basic task, that of exploring graphs by mobile agents. The rendezvous problem is known to be not easier than graph exploration. A well-known recent result on exploration, due to Reingold, states that deterministic exploration of arbitrary graphs can be performed in log-space, i.e., using an agent equipped with O(log n) bits of memory, where n is the size of the graph. In this paper we study the size of memory of mobile agents that permits us to solve the rendezvous problem deterministically. Our main result establishes the minimum size of the memory of anonymous agents that guarantees deterministic rendezvous when it is feasible. We show that this minimum size is Θ(log n), where n is the size of the graph, regardless of the delay between the starting times of the agents. More precisely, we construct identical agents equipped with Θ(log n) memory bits that solve the rendezvous problem in all graphs with at most n nodes, if they start with any delay τ, and we prove a matching lower bound Ω(log n) on the number of memory bits needed to accomplish rendezvous, even for simultaneous start. In fact, this lower bound is achieved already on the class of rings. This shows a significant contrast between rendezvous and exploration: e.g., while exploration of rings (without stopping) can be done using constant memory, rendezvous, even with simultaneous start, requires logarithmic memory. As a by-product of our techniques introduced to obtain log-space rendezvous we get the first algorithm to find a quotient graph of a given unlabeled graph in polynomial time, by means of a mobile agent moving around the graph.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alpern S.: The rendezvous search problem. SIAM J. Control Optim. 33, 673–683 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  2. Alpern S.: Rendezvous search on labelled networks. Nav. Res. Logist. 49, 256–274 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  3. Alpern J., Baston V., Essegaier S.: Rendezvous search on a graph. J. Appl. Probab. 36, 223–231 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  4. Alpern, S., Gal, S.: The theory of search games and rendezvous. In: International Series in Operations Research and Management Science. Kluwer Academic Publisher, Dordrecht (2002)

  5. Ambuhl, C., Gasieniec, L., Pelc, A., Radzik, T., Zhang, X.: Tree exploration with logarithmic memory. ACM Trans. Algorithms 7(2), paper no. 17 (2011)

    Google Scholar 

  6. Anderson E., Weber R.: The rendezvous problem on discrete locations. J. Appl. Probab. 28, 839–851 (1990)

    Article  MathSciNet  Google Scholar 

  7. Anderson, E., Fekete, S.: Asymmetric rendezvous on the plane. In: Proceedings of the 14th Annual ACM Symposium on Computational Geometry (1998)

  8. Anderson E., Fekete S.: Two-dimensional rendezvous search. Oper. Res. 49, 107–118 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  9. Angluin, D.: Local and global properties in networks of processors. In: Proceedings of the 12th Symposium on the Theory of Computing (STOC), pp. 82–93 (1980)

  10. Attiya H., Snir M., Warmuth M.: Computing on an anonymous ring. J. ACM 35, 845–875 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  11. Baston V., Gal S.: Rendezvous on the line when the players’ initial distance is given by an unknown probability distribution. SIAM J. Control Optim. 36, 1880–1889 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  12. Baston V., Gal S.: Rendezvous search when marks are left at the starting points. Nav. Res. Logist. 48, 722–731 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  13. Boldi, P., Vigna, S.: Computing anonymously with arbitrary knowledge. In: Proceedings of the 18th ACM Symposium on Principles of Distributed Computing (PODC), pp. 181–188 (1999)

  14. Cook S.A., Rackoff C.: Space lower bounds for maze threadability on restricted machines. SIAM J. Comput. 9, 636–652 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  15. De Marco G., Gargano L., Kranakis E., Krizanc D., Pelc A., Vaccaro U.: Asynchronous deterministic rendezvous in graphs. Theor. Comput. Sci. 355, 315–326 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  16. Dessmark A., Fraigniaud P., Kowalski D., Pelc A.: Deterministic rendezvous in graphs. Algorithmica 46, 69–96 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  17. Diks K., Fraigniaud P., Kranakis E., Pelc A.: Tree exploration with little memory. J. Algorithms 51, 38–63 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  18. Flocchini, P., Kranakis, E., Krizanc, D., Santoro, N., Sawchuk, C.: Multiple mobile agent rendezvous in a ring. In: Proceedings of the 6th Latin American Symposium on Theoretical Informatics (LATIN), pp. 599–608 (2004)

  19. Flocchini P., Prencipe G., Santoro N., Widmayer P.: Gathering of asynchronous oblivious robots with limited visibility. Theor. Comput. Sci. 337(1–3), 147–168 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  20. Fraigniaud, P., Gavoille, C.: Routing in trees. In: Proceedings of the 28th International Colloquium on Automata, Languages and Programming (ICALP), pp. 757–772 (2001)

  21. Fraigniaud, P., Gavoille, C.: A space lower bound for routing in trees. In: Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS), pp. 65–75 (2002)

  22. Fraigniaud, P., Ilcinkas, D.: Digraphs exploration with little memory. In: Proceedings of the 21st Symposium on Theoretical Aspects of Computer Science (STACS), pp. 246–257 (2004)

  23. Fraigniaud, P., Pelc, A.: Deterministic rendezvous in trees with little memory. In: Proceedings of the 22nd International Symposium on Distributed Computing (DISC), pp. 242–256 (2008)

  24. Fraigniaud, P., Pelc, A.: Delays induce an exponential memory gap for rendezvous in trees. In: Proceedings of the 22nd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA) (2010)

  25. Fraigniaud, P., Pelc, A.: Delays induce an exponential memory gap for rendezvous in trees. ArXiv: 1102.0467v1 (2011)

  26. Gal S.: Rendezvous search on the line. Oper. Res. 47, 974–976 (1999)

    Article  MATH  Google Scholar 

  27. Israeli, A., Jalfon, M.: Token management schemes and random walks yield self stabilizing mutual exclusion. In: Proceedings of the 9th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 119–131 (1990)

  28. Kouckỳ M.: Universal traversal sequences with backtracking. J. Comput. Syst. Sci. 65, 717–726 (2002)

    Article  Google Scholar 

  29. Kowalski D., Malinowski A.: How to meet in anonymous network. Theor. Comput. Sci. 399(1–2), 141–156 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  30. Kranakis E., Krizanc D., van der Berg J.: Computing Boolean functions on anonymous networks. Inf. Comput. 114, 214–236 (1994)

    Article  MATH  Google Scholar 

  31. Kranakis, E., Krizanc, D., Morin, P.: Randomized rendez-vous with limited memory. In: Proceedings of the 8th Latin American Theoretical Informatics (LATIN), pp. 605–616 (2008)

  32. Kranakis, E., Krizanc, D., Santoro, N., Sawchuk, C.: Mobile agent rendezvous in a ring. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), pp. 592–599 (2003)

  33. Lim W., Alpern S.: Minimax rendezvous on the line. SIAM J. Control Optim. 34, 1650–1665 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  34. Norris N.: Universal covers of graphs: isomorphism to depth N-1 implies isomorphism to all depths. Discret. Appl. Math. 56, 61–74 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  35. Reingold, O.: Undirected connectivity in log-space. J. ACM 55, 1–24 (2008)

    Google Scholar 

  36. Schelling T.: The Strategy of Conflict. Oxford University Press, Oxford (1960)

    Google Scholar 

  37. Ta-Shma, A., Zwick, U.: Deterministic rendezvous, treasure hunts and strongly universal exploration sequences. In: Proceedings of the 18th ACM-SIAM symposium on Discrete algorithms (SODA), pp. 599–608 (2007)

  38. Thomas L.: Finding your kids when they are lost. J. Oper. Res. Soc. 43, 637–639 (1992)

    MATH  Google Scholar 

  39. Thorup, M., Zwick, U.: Compact routing schemes. In: Proceedings of the 13th ACM Symposium on Parallel Algorithms and Architectures (SPAA), pp. 1–10 (2001)

  40. Yamashita M., Kameda T.: Computing on anonymous networks: part I-characterizing the solvable cases. IEEE Trans. Parallel Distrib. Syst. 7, 69–89 (1996)

    Article  Google Scholar 

  41. Yu, X., Yung, M.: Agent rendezvous: a dynamic symmetry-breaking problem. In: Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), pp. 610–621 (1996)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jurek Czyzowicz.

Additional information

A preliminary version of this paper appeared in the Proc. 29th Annual ACM Symposium on Principles of Distributed Computing (PODC 2010).

J. Czyzowicz was partially supported by NSERC discovery grant. This work was done when A. Kosowski was visiting the Université du Québec en Outaouais. A. Kosowski was also supported by Polish Ministry Grant N206 491738.

A. Pelc was partially supported by NSERC discovery grant and by the Research Chair in Distributed Computing at the Université du Québec en Outaouais.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Czyzowicz, J., Kosowski, A. & Pelc, A. How to meet when you forget: log-space rendezvous in arbitrary graphs. Distrib. Comput. 25, 165–178 (2012). https://doi.org/10.1007/s00446-011-0141-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00446-011-0141-9

Keywords

Navigation