370 likes | 538 Views
Lower Bounds on the Communication of Distributed Graph Algorithms: Progress and Obstacles. Rotem Oshman ADGA 2013. Overview: Network Models. LOCAL. CONGESTED CLIQUE. ASYNC MESSAGE-PASSING. CONGEST / general network. X. Talk Overview. Lower bound techniques
E N D
Lower Bounds on the Communication of Distributed Graph Algorithms: Progress and Obstacles Rotem Oshman ADGA 2013
Overview: Network Models LOCAL CONGESTED CLIQUE ASYNC MESSAGE-PASSING CONGEST / general network X
Talk Overview • Lower bound techniques • CONGEST general networks: reductions from 2-party communication complexity • Asynchronous message passing: reductions from multi-party communication complexity • Obstacles on proving lower bounds for the congested clique
Example: Disjointness Disj : bits needed [Kalyanasundaramand Schnitger, Razborov ’92]
Applying 2-Party Communication Complexity Lower Bounds Textbook reduction: Given algorithm for solving task … Based on • Based on Simulate bits Solution for answer for Disjointness
Example: Spanning Trees • Setting: directed, strongly-connected network • Communication by local broadcast with bandwidth • UIDs • Diameter 2 • Question: how many rounds to find a rooted spanning tree?
New Problem: Partition • Inputs: , with the promise that • Goal: Alice outputs , Bob outputs such that partition.
The Partition Problem • Trivial algorithm: • Alice sends her input to Bob • Alice outputs all tasks in her input • Bob outputs all remaining tasks • Communication complexity: bits • Lower bound?
Reduction from Disj to Partition • Given input for Disj: • Notice: iff • To test whether : • Try to solve Partition on • Ensure • Check if is a partition of : Alice sends Bob hash(), Bob compares it to hash()
From Partition to Spanning Tree • Given a spanning tree algorithm … 1 2 6 3 4 5 a b
From Partition to Spanning Tree • Simulating one round of : 1 2 6 3 4 5 a b Node a’s message Node b’s message
From Partition to Spanning Tree • When outputs a spanning tree: 1 2 6 3 4 5 a b
From Partition to Spanning Tree • If runs for rounds, we use bits • One detail: randomness • Solution: Alice and Bob use public randomness
When Two Players Just Aren’t Enough • No bottlenecks in the network
When Two Players Just Aren’t Enough • Too much information revealed
Multi-Player Communication Complexity • Communication by shared blackboard • Number-on-forehead • Number-in-hand ??
The Message-Passing Model • players • Private channels • Private -bit inputs • Private randomness • Goal: compute • Cost: total communication
The Coordinator Model • players, one coordinator • The coordinator has no input
Prior Work on Message-Passing • For players with -bit inputs… • Phillips, Verbin, Zhang ’12: • for bitwise problems (AND/OR, MAJ, …) • Woodruff, Zhang ‘12, ‘13: • for threshold and graph problems • Braverman, Ellen, O., Pitassi, Vaikuntanathan ‘13: for
Notation • : randomized protocol • Also, the protocol’s transcript • : player ’s view of the transcript • worst-case communication of in the worst case
Entropy and Mutual Information • Entropy: • A lossless encoding of requires bits • Conditional entropy:
Entropy and Mutual Information • Mutual information: • Conditional mutual information:
Information Cost for Two Players [Chakrabarti, Shi, Wirth, Yao ’01], [Bar-Yossef, Jayram, Kumar, Sivakumar ‘04], [Braverman, Rao‘10], … Fix a distribution , • External information cost: • Internal information cost: Extension to the coordinator model:
Why is Info Complexity Nice? • Formalizes a natural notion • Analogous to causality/knowledge • Admits direct sum theorem: “The cost of solving independent copies of problem is times the cost of solving ”
Example (Work in Progress) • Triangle detection in general congested graphs • “Is there a triangle” = ”is a triangle”
Application of DisjLower Bound • Open problem from Woodruff & Zhang ‘13: • Hardness of computing the diameter of a graph • We can show: bits to distinguish diameter 3 from diameter • Reduction from Disj: given , • Notice: disjoint iff
Application of Disj Lower Bound • Diameter • Diameter
Part II: The Power of the Congested Clique CONGESTED CLIQUE
Conversion from Boolean Circuit • Suppose we have a Boolean circuit • Any type of gate, inputs • Fan-in • Depth = , #gates and wires = • Step 1: reduce the fan-out to • Convert large fan-out gates to “copying tree” • Blowup: depth, size • Step 2: convert to a layered circuit
Conversion from Boolean Circuit • Now we have a layered circuit of depth and size = • With fan-in and fan-out • Design a CONGEST protocol: • Fix partition of inputs of size each • Assign each gate to a random CONGEST node • Simulate the circuit layer-by-layer
Simulating a Layer • If node “owns” gate on layer , it sends ’s output to the nodes that need it on layer • Size of layer size of layer • What is the load on edge ? • For each wire from layer to layer , • At most wires in total • By Chernoff, w.h.p. the load is
Conversion from Boolean Circuit • A union-bound finishes the proof • Corollary: explicit lower bounds in the congested clique imply explicit lower bounds on Boolean circuits with polylogarithmic depth and nearly-linear size. • Even worse: • Reasons to believe even bound hard
Conclusion LOCAL CONGESTED CLIQUE ASYNC MESSAGE-PASSING CONGEST / general network X