Ran Gelles’s research while affiliated with Bar Ilan University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (63)


Interactive Coding with Unbounded Noise
  • Preprint

July 2024

·

3 Reads

Eden Fargion

·

Ran Gelles

·

Meghal Gupta

Interactive coding allows two parties to conduct a distributed computation despite noise corrupting a certain fraction of their communication. Dani et al.\@ (Inf.\@ and Comp., 2018) suggested a novel setting in which the amount of noise is unbounded and can significantly exceed the length of the (noise-free) computation. While no solution is possible in the worst case, under the restriction of oblivious noise, Dani et al.\@ designed a coding scheme that succeeds with a polynomially small failure probability. We revisit the question of conducting computations under this harsh type of noise and devise a computationally-efficient coding scheme that guarantees the success of the computation, except with an exponentially small probability. This higher degree of correctness matches the case of coding schemes with a bounded fraction of noise. Our simulation of an N-bit noise-free computation in the presence of T corruptions, communicates an optimal number of O(N+T) bits and succeeds with probability 12Ω(N)1-2^{-\Omega(N)}. We design this coding scheme by introducing an intermediary noise model, where an oblivious adversary can choose the locations of corruptions in a worst-case manner, but the effect of each corruption is random: the noise either flips the transmission with some probability or otherwise erases it. This randomized abstraction turns out to be instrumental in achieving an optimal coding scheme.





Sorting in One and Two Rounds using t-Comparators

May 2024

·

3 Reads

We examine sorting algorithms for n elements whose basic operation is comparing t elements simultaneously (a t-comparator). We focus on algorithms that use only a single round or two rounds -- comparisons performed in the second round depend on the outcomes of the first round comparators. We design deterministic and randomized algorithms. In the deterministic case, we show an interesting relation to design theory (namely, to 2-Steiner systems), which yields a single-round optimal algorithm for n=t2kn=t^{2^k} with any k1k\ge 1 and a variety of possible values of t. For some values of t, however, no algorithm can reach the optimal (information-theoretic) bound on the number of comparators. For this case (and any other n and t), we show an algorithm that uses at most three times as many comparators as the theoretical bound. We also design a randomized Las-Vegas two-rounds sorting algorithm for any n and t. Our algorithm uses an asymptotically optimal number of O(max(n3/2t2,nt))O(\max(\frac{n^{3/2}}{t^2},\frac{n}{t})) comparators, with high probability, i.e., with probability at least 11/n1-1/n. The analysis of this algorithm involves the gradual unveiling of randomness, using a novel technique which we coin the binary tree of deferred randomness.


The CreateMatching Procedure
The evolution of a 2-party algorithm for time steps t=0,1,2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t=0,1,2$$\end{document}. The view of each party at a given time, written next to the respective node, consists of the party’s previous view, the random bit it has achieved in that round, and the views of the other party sent to it in the previous round. In this figure, k0=(⊥,0,(⊥))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k_0 = (\bot ,0,(\bot ))$$\end{document}, k1=(⊥,1,(⊥))\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k_1 = (\bot ,1,(\bot ))$$\end{document}. Each edge is a possible state of the system, whose probability is determined by the specific randomness configuration α∈A\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\alpha \in {\mathcal {A}}$$\end{document} in a given execution. An edge at time t (i.e., a facet of σ∈P(t)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\sigma \in {\mathcal {P}}(t)$$\end{document}) evolves into 4 possible facets (edges) of P(t+1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {P}}(t+1)$$\end{document}. These correspond to the 4 possible values of the random bits obtained by the two parties at time t+1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t+1$$\end{document}
A demonstration of R(0)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {R}}(0)$$\end{document} and R(1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {R}}(1)$$\end{document} in a system with 3 processes. Each facet represents a possible state of the system described via the randomness received by the parties up to that time. The notation (w, b, r) with w,b,r∈{0,1}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w,b,r\in \{0,1\}$$\end{document} describes the randomness of the white, black, and red nodes accordingly, i.e., the simplex {(1,w),(2,b),(3,r)}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\{(1,w), (2,b), (3,r)\}$$\end{document}; ⊥\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\bot $$\end{document} is the empty string
OLE\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}}_{{{\textsf{L}}}{{\textsf{E}}}}$$\end{document} and π(OLE)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\pi ({\mathcal {O}}_{{{\textsf{L}}}{{\textsf{E}}}})$$\end{document}. The facet τ1∈OLE\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\tau _1\in {\mathcal {O}}_{{{\textsf{L}}}{{\textsf{E}}}}$$\end{document} is mapped to the subcomplex π(τ1)⊆π(OLE)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\pi (\tau _1)\subseteq \pi ({\mathcal {O}}_{{{\textsf{L}}}{{\textsf{E}}}})$$\end{document} that contains the edge {(2,0),(3,0)}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\{(2,0),(3,0)\}$$\end{document} and the isolated node {(1,1)}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\{(1,1) \}$$\end{document}
A summary of our topological complexes and the relations between them
The topology of randomized symmetry-breaking distributed computing
  • Article
  • Publisher preview available

November 2023

·

12 Reads

Journal of Applied and Computational Topology

Studying distributed computing through the lens of algebraic topology has been the source of many significant breakthroughs during the last 2 decades, especially in the design of lower bounds or impossibility results. Despite hundred of results considering deterministic algorithms, none apply to randomized algorithms. This paper aims at studying randomized synchronous distributed computing through the lens of algebraic topology. We do so by studying the wide class of (input-free) symmetry-breaking tasks, e.g., leader election, in synchronous fault-free anonymous systems. We design a topological framework, which allows analyzing such tasks and determining their solvability. The pivotal technical observation is that, unlike in deterministic algorithm, where solvability means that the topological complex describing the protocol can be globally mapped into an output protocol, in our framework the solvability is determined “locally”, i.e., for each simplex of the protocol complex individually, without requiring any global consistency. As an interesting application, we derive necessary and sufficient conditions for solving leader election in shared-memory and message-passing models in which there might be correlations between the randomness provided to the nodes. We find that solvability of leader election relates to the number of parties that possess correlated randomness, either directly or via their greatest common divisor, depending on the specific communication model.

View access options


a A 2-edge-connected graph G with a Robbins orientation and b the resulting Robbins cycle with multiple occurrences per node. The arrows denote the clockwise direction of the cycle
The segments of the rotation of C that starts with the token segment, as seen by a specific node u. The token resides in one of the node-occurrences or links of the token segment
Constructing a simple cycle by Algorithm 4(a) and extending an ear by Algorithm 4(b)
Distributed computations in fully-defective networks

June 2023

·

16 Reads

·

1 Citation

Distributed Computing

We address fully-defective asynchronous networks, in which all links are subject to an unlimited number of alteration errors, implying that all messages in the network may be completely corrupted. Despite the possible intuition that such a setting is too harsh for any reliable communication, we show how to simulate any algorithm for a noiseless setting over any fully-defective setting, given that the network is 2-edge connected. We prove that if the network is not 2-edge connected, no non-trivial computation in the fully-defective setting is possible. The key structural property of 2-edge-connected graphs that we leverage is the existence of an oriented (non-simple) cycle that goes through all nodes (Robbins, Am. Math. Mon., 1939). The core of our technical contribution is presenting a construction of such a Robbins cycle in fully-defective networks, and showing how to communicate over it despite total message corruption. These are obtained in a content-oblivious manner, since nodes must ignore the content of received messages.


Beeping Shortest Paths via Hypergraph Bipartite Decomposition

October 2022

·

21 Reads

Constructing a shortest path between two network nodes is a fundamental task in distributed computing. This work develops schemes for the construction of shortest paths in randomized beeping networks between a predetermined source node and an arbitrary set of destination nodes. Our first scheme constructs a (single) shortest path to an arbitrary destination in O(Dloglogn+log3n)O (D \log\log n + \log^3 n) rounds with high probability. Our second scheme constructs multiple shortest paths, one per each destination, in O(Dlog2n+log3n)O (D \log^2 n + \log^3 n) rounds with high probability. The key technique behind the aforementioned schemes is a novel decomposition of hypergraphs into bipartite hypergraphs. Namely, we show how to partition the hyperedge set of a hypergraph H=(VH,EH)H = (V_H, E_H) into k=Θ(log2n)k = \Theta (\log^2 n) disjoint subsets F1Fk=EHF_1 \cup \cdots \cup F_k = E_H such that the (sub-)hypergraph (VH,Fi)(V_H, F_i) is bipartite in the sense that there exists a vertex subset UVU \subseteq V such that Ue=1|U \cap e| = 1 for every eFie \in F_i. This decomposition turns out to be instrumental in speeding up shortest path constructions under the beeping model.


Optimal Short-Circuit Resilient Formulas

August 2022

·

4 Reads

·

1 Citation

Journal of the ACM

We consider fault-tolerant boolean formulas in which the output of a faulty gate is short-circuited to one of the gate’s inputs. A recent result by Kalai et al. [FOCS 2012] converts any boolean formula into a resilient formula of polynomial size that works correctly if less than 1/6 of the gates (on every input-to-output path) are faulty. We improve the result of Kalai et al., and show how to efficiently fortify any boolean formula against a fraction of 1/5 of short-circuit gates per path, with only a polynomial blowup in size. We additionally show that it is impossible to obtain formulas with higher resilience and sub-exponential growth in size. Towards our results, we consider interactive coding schemes when noiseless feedback is present; these produce resilient boolean formulas via a Karchmer-Wigderson relation. We develop a coding scheme that resists corruptions in up to a fraction of 1/5 of the transmissions in each direction of the interactive channel . We further show that such a level of noise is maximal for coding schemes whose communication blowup is sub-exponential. Our coding scheme has taken a surprising inspiration from Blockchain technology.


Citations (35)


... In this work, we consider the case of channel noise within asynchronous distributed networks, where messages communicated between nodes are subject to corruption. When dealing with channel noise, some restrictions must A preliminary version of this work appeared in PODC'22 [7]. Bar-Ilan University, Ramat-Gan, Israel be imposed on its power. ...

Reference:

Distributed computations in fully-defective networks
Distributed Computations in Fully-Defective Networks
  • Citing Conference Paper
  • July 2022

... Models like IIS are sometimes called oblivious [5] and are known to induce compact topologies, where indeed protocols and simplicial maps are the same. Round-structured models with compact topology have been extensively studied in the literature, and different techniques have been developed for them (e.g., [4,7,9,12]). ...

The Topology of Randomized Symmetry-Breaking Distributed Computing
  • Citing Conference Paper
  • July 2021

... with the objective of minimizing the number k of clusters. 4 We subsequently encode a solution for the HBD problem on H = (V H , E H ) by means of a function c : E H → [k] that assigns a color c(e) to each hyperedge e ∈ E H and a function cs : V H → 2 [k] that assigns a (possibly empty) color set cs(v) to each vertex v ∈ V H . The functions c(·) and cs(·) are subject to the constraint that for each hyperedge e ∈ E H , there exists exactly one incident vertex v ∈ e such that c(e) ∈ cs(v). ...

Brief Announcement: Noisy Beeping Networks
  • Citing Conference Paper
  • July 2020

... Clearly, if noise can affect channels arbitrarily without any restrictions, then it could, for instance, delete all the communication and prevent any nontrivial computation over the network. Previous work either limited the number of channels that may suffer (arbitrary) noise [11,22,23,32,39,40] or the total amount of corruptions (usually, alterations) the channels are allowed to make altogether [2,8,18,24]. ...

Efficient Multiparty Interactive Coding for Insertions, Deletions, and Substitutions
  • Citing Conference Paper
  • July 2019

... Interactive coding was initiated by the seminal work of Schulman [35,43,44], see [15] for a recent survey on this field. In this setting, communication channels either suffer from stochastic noise [3,6,17,19,35] or from some bounded amount of adversarial noise. E.g., if limiting the overhead of the coding scheme to be linear, [18,19,24,25,28] develop schemes resilient to up to a fraction O(1/|E|) of the total communication. ...

Constant-Rate Interactive Coding Is Impossible, Even In Constant-Degree Networks
  • Citing Article
  • March 2019

IEEE Transactions on Information Theory

... This follows by noting that given any pair (p qr+1 , r + 1), the number of pairs (p qr , r) that lie in its history is upper bounded by n 1 n 2 + 1. 13 Thus, by union bound over the total number of historical paths that terminate at (p q , 2RC(π) + 1), and by (5), the probability that p q outputs the wrong transcript is upper bounded by (n 1 n 2 + 1) 2RC(π) 2 2RC(π)+1 ζ 1 16 RC(π) ≤ (n 1 n 2 + 1) 2RC(π) (n 1 n 2 ) ...

Explicit Capacity Approaching Coding for Interactive Communication
  • Citing Article
  • April 2018

IEEE Transactions on Information Theory

Ran Gelles

·

Bernhard Haeupler

·

·

[...]

·

Avi Wigderson

... Braverman studied additional aspects of interactive coding theory in many subsequent works. For example, Braverman and Efremenko studied list decoding for interactive communication [8], and Braverman, Efremenko, Gelles, and Haeupler proved that constant-rate coding for multiparty interactive communication is impossible [9]. ...

Constant-Rate Coding for Multiparty Interactive Communication Is Impossible
  • Citing Article
  • December 2017

Journal of the ACM

... Before proving this, let us informally describe the strategy Eve uses to achieve this bound. This strategy is essentially identical to what has appeared in previous literature such as [Gel17]. For most of the protocol, she simply chooses the smaller (fewer elements) of the two sets given by Bob. ...

Coding for Interactive Communication: A Survey
  • Citing Article
  • January 2017

Foundations and Trends® in Theoretical Computer Science

... This was later improved to 5 39 in [EKS20], and finally to 1 6 in the work of [GZ21]. 1 6 is known to be optimal. This problem was also considered in the case of adversarial erasures instead of adversarial bit flip errors [FGOS15,EGH16,GH17,GZ21]. The work of [FGOS15] originally constructed such a scheme over a large alphabet with erasure resilience 1 2 , which translates to a resilience of 1 4 over the binary erasure channel by encoding each original letter with a binary error correcting code. ...

Capacity of Interactive Communication over Erasure Channels and Channels with Feedback
  • Citing Article
  • January 2017

SIAM Journal on Computing