Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing最新文献

筛选
英文 中文
Population Protocols for Exact Plurality Consensus: How a small chance of failure helps to eliminate insignificant opinions 精确多数共识的人口协议:小的失败机会如何有助于消除无关紧要的意见
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538447
Gregor Bankhamer, P. Berenbrink, Felix Biermeier, Robert Elsässer, Hamed Hosseinpour, Dominik Kaaser, Peter Kling
{"title":"Population Protocols for Exact Plurality Consensus: How a small chance of failure helps to eliminate insignificant opinions","authors":"Gregor Bankhamer, P. Berenbrink, Felix Biermeier, Robert Elsässer, Hamed Hosseinpour, Dominik Kaaser, Peter Kling","doi":"10.1145/3519270.3538447","DOIUrl":"https://doi.org/10.1145/3519270.3538447","url":null,"abstract":"We consider the plurality consensus problem for population protocols. Here, n anonymous agents start each with one of k opinions. Their goal is to agree on the initially most frequent opinion (the plurality opinion) via random, pairwise interactions. Exact plurality consensus refers to the requirement that the plurality opinion must be identified even if the bias (difference between the most and second most frequent opinion) is only 1. The case of k = 2 opinions is known as the majority problem. Recent breakthroughs led to an always correct, exact majority population protocol that is both time- and space-optimal, needing O(logn) states per agent and, with high probability, O(logn) time [Doty, Eftekhari, Gasieniec, Severson, Uznanski, and Stachowiak; 2021]. Meanwhile, results for general plurality consensus are rare and far from optimal. We know that any always correct protocol requires Ω(k2) states, while the currently best protocol needs O(k11) states [Natale and Ramezani; 2019]. For ordered opinions, this can be improved to O(k6) [Gasieniec, Hamilton, Martin, Spirakis, and Stachowiak; 2016].","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Brief Announcement: Fault Tolerant Coloring of the Asynchronous Cycle 简要公告:异步循环的容错着色
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538456
P. Fraigniaud, Patrick Lambein-Monette, M. Rabie
{"title":"Brief Announcement: Fault Tolerant Coloring of the Asynchronous Cycle","authors":"P. Fraigniaud, Patrick Lambein-Monette, M. Rabie","doi":"10.1145/3519270.3538456","DOIUrl":"https://doi.org/10.1145/3519270.3538456","url":null,"abstract":"We present a wait-free algorithm for proper coloring the n ≥ 3 nodes of the asynchronous cycle Cn, where each crash-prone node starts with its (unique) identifier as input. The algorithm is independent of n and uses up to five colors, and each node terminates upon completing at most O(log*n) write-read-compute steps. Coloring the asynchronous 3-nodes cycle C3 coincides with renaming a 3-processes system using an immediate snapshot object, which cannot be solved with less than five names in a wait-free manner. Moreover, in the synchronous and failure-free LOCAL model, graph coloring has a known round complexity of Θ(log* n). Thus, no algorithm can color all asynchronous cycles using fewer colors, or with an symptotically smaller step complexity.","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brief Announcement: The Weakest Failure Detector for Genuine Atomic Multicast 简短声明:最弱的故障检测器用于真正的原子组播
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538467
P. Sutra
{"title":"Brief Announcement: The Weakest Failure Detector for Genuine Atomic Multicast","authors":"P. Sutra","doi":"10.1145/3519270.3538467","DOIUrl":"https://doi.org/10.1145/3519270.3538467","url":null,"abstract":"Atomic broadcast is a group communication primitive to order messages across a set of distributed processes. Atomic multicast is its natural generalization where each message m is addressed to dst (m), a subset of the processes called its destination group. A solution to atomic multicast is genuine when a process takes steps only if a message is addressed to it. Genuine solutions are the ones used in practice because they have better performance.","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Revisiting the Power of Non-Equivocation in Distributed Protocols 重新审视分布式协议中无歧义性的力量
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538427
N. Ben-David, Benjamin Y. Chan, Elaine Shi
{"title":"Revisiting the Power of Non-Equivocation in Distributed Protocols","authors":"N. Ben-David, Benjamin Y. Chan, Elaine Shi","doi":"10.1145/3519270.3538427","DOIUrl":"https://doi.org/10.1145/3519270.3538427","url":null,"abstract":"Trusted hardware and new computing platforms such as RDMA naturally provide a non-equivocation abstraction. Previous works have shown that non-equivocation allows us to achieve tasks that otherwise would not have been possible in the plain model. In this paper, we are interested in understanding whether we can use non-equivocation to compile any asynchronous crash-fault protocol into one that tolerates the same number of Byzantine faults. Furthermore, we consider protocols with security and privacy guarantees that we must preserve under the compilation. Previous works have aimed to achieve a similar goal. However, we explain why the previous results in this area were incomplete. We then present a new compiler that achieves security and privacy, and does so while introducing only polynomial overhead over the underlying protocol (as compared to exponential overhead in previous results).","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Brief Announcement: Computability and Anonymous Storage-Efficient Consensus with an Abstract MAC Layer 简要公告:具有抽象MAC层的可计算性和匿名存储效率共识
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538462
Lewis Tseng, Qinzi Zhang
{"title":"Brief Announcement: Computability and Anonymous Storage-Efficient Consensus with an Abstract MAC Layer","authors":"Lewis Tseng, Qinzi Zhang","doi":"10.1145/3519270.3538462","DOIUrl":"https://doi.org/10.1145/3519270.3538462","url":null,"abstract":"This paper explores fault-tolerant algorithms in the abstract MAC layer [7] in a single-hop network. The model captures the basic properties of modern wireless MAC protocols. Newport [11] proves that it is impossible to achieve deterministic fault-tolerant consensus, and Newport and Robinson [10] present randomized crash-tolerant consensus algorithms. We are not aware of any study on the computability in this model. This paper presents a straightforward construction of the store-collect object, which then allows us to apply prior algorithms to solve many well-known distributed problems, such as multi-writer atomic registers, counters, atomic snapshot objects, and approximate and randomized consensus. Our construction does not require a priori information on the participating nodes. Our insight also leads to anonymous approximate consensus and randomized consensus algorithms that use a constant number of variables (or values). All of the algorithms are wait-free.","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121656645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Space Complexity of Consensus from Swap 交换共识的空间复杂度
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538420
Sean Ovens
{"title":"The Space Complexity of Consensus from Swap","authors":"Sean Ovens","doi":"10.1145/3519270.3538420","DOIUrl":"https://doi.org/10.1145/3519270.3538420","url":null,"abstract":"Nearly thirty years ago, it was shown that Ω(√n ) read/write registers are needed to solve obstruction-free consensus among n processes. This lower bound was improved to n registers in 2018, which exactly matches the best upper bound. The Ømega (√n) space complexity lower bound actually applies to a class of objects called historyless objects, which includes read/write registers, test-and-set objects, and readable swap objects. However, every known n-process obstruction-free consensus algorithm from historyless objects uses Ω(n) objects. In this paper, we give the first Ω(n) space complexity lower bounds for two kinds of historyless objects. First, we show that any obstruction-free consensus algorithm from swap objects uses at least n-1 objects. We also present an obstruction-free consensus algorithm from n-1 swap objects, exactly matching our lower bound. To our knowledge, this is the first consensus algorithm from swap objects that do not also support the Read operation. Second, we show that any obstruction-free binary consensus algorithm from readable binary swap objects uses at least n - 2 objects. The best known obstruction-free binary consensus algorithm from readable binary swap objects uses 2n-1 objects, which shows that our lower bound is asymptotically tight. Since any historyless object can be simulated by a readable swap object with the same domain, our results imply that any obstruction-free consensus algorithm from binary historyless objects uses at least n - 2 objects.","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Combinatorial Topology Approach to Arrow's Impossibility Theorem 阿罗不可能定理的一种分布式组合拓扑方法
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538433
S. Rajsbaum, A. Raventós-Pujol
{"title":"A Distributed Combinatorial Topology Approach to Arrow's Impossibility Theorem","authors":"S. Rajsbaum, A. Raventós-Pujol","doi":"10.1145/3519270.3538433","DOIUrl":"https://doi.org/10.1145/3519270.3538433","url":null,"abstract":"Baryshnikov presented a remarkable algebraic topology proof of Arrow's impossibility theorem trying to understand the underlying reason behind the numerous proofs of this fundamental result of social choice theory. We present here a novel combinatorial topology approach that does not use advanced mathematics, while giving a geometric intuition of the impossibility. This exposes a remarkable connection with distributed computing techniques. We study in detail the case of two voters, n=2, and three alternatives, |X|=3, and show that Arrow's impossibility is closely related to the index lemma. Also, we study the domain restrictions that avoid the impossibility. Finally, we explain why the case of n=2 and |X|=3 is where this interesting geometry happens, by giving a simple proof that this case implies Arrow's impossibility for any |X| ≥ 3 and any finite n ≥ 2.","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123094268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How Should We Think about Persistent Data Structures? 我们应该如何看待持久数据结构?
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538455
M. Scott
{"title":"How Should We Think about Persistent Data Structures?","authors":"M. Scott","doi":"10.1145/3519270.3538455","DOIUrl":"https://doi.org/10.1145/3519270.3538455","url":null,"abstract":"For machines with nonvolatile memory (NVM) but volatile caches, most work on persistent data structures has assumed that every operation must be guaranteed to survive any crash that occurs after returning to the caller. Most programmers, however, don't want to persist existing transient structures: they want to avoid serializing and deserializing structures traditionally kept in block-structured files and databases. For these, programmers are accustomed to buffered semantics, which allow persistence to be delayed-either for a brief period of time or until the execution of an explicit sync operation. Experiments with Rochester's Montage system confirm that buffered persistence can approach the performance of non-persistent structures placed in NVM-arguably the best one could hope for, and dramatically faster than systems with stricter semantics. As NVM proliferates, there will be more and more opportunities to soften the traditional boundary between (transient, byte-addressable) memory and (persistent, block-structured) storage. As we seek to formalize the development of persistent data structures, the PODC/DISC community will want to con-sider not only alternative correctness criteria, but also evolving hardware characteristics. Issues to be considered include the choice between evicting and non-evicting write-back, the introduction of nonvolatile caches, and the possibility that NVM bandwidth and latency may vary greatly with access granularity, locality, and concurrent DRAM activity.","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brief Announcement: Broadcasting Time in Dynamic Rooted Trees is Linear 简短公告:动态根树的广播时间是线性的
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538460
Antoine El-Hayek, M. Henzinger, Stefan Schmid
{"title":"Brief Announcement: Broadcasting Time in Dynamic Rooted Trees is Linear","authors":"Antoine El-Hayek, M. Henzinger, Stefan Schmid","doi":"10.1145/3519270.3538460","DOIUrl":"https://doi.org/10.1145/3519270.3538460","url":null,"abstract":"We study the broadcast problem on dynamic networks with n processes. The processes communicate in synchronous rounds along an arbitrary rooted tree. The sequence of trees is given by an adversary whose goal is to maximize the number of rounds until at least one process reaches all other processes. Previous research has shown a ⌈(3n-1)/(2)⌉-2 lower bound and an O(n log log n) upper bound. We show the first linear upper bound for this problem, namely ⌈(1 + √2) n-1⌉ ~2.4n. Our result follows from a detailed analysis of the evolution of the adjacency matrix of the network over time.","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130282900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Brief Announcement: Deterministic Massively Parallel Algorithms for Ruling Sets 简要公告:统治集的确定性大规模并行算法
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing Pub Date : 2022-07-20 DOI: 10.1145/3519270.3538472
Shreyas Pai, S. Pemmaraju
{"title":"Brief Announcement: Deterministic Massively Parallel Algorithms for Ruling Sets","authors":"Shreyas Pai, S. Pemmaraju","doi":"10.1145/3519270.3538472","DOIUrl":"https://doi.org/10.1145/3519270.3538472","url":null,"abstract":"In this paper we present a deterministic O(log log n)-round algorithm for the 2-ruling set problem in the Massively Parallel Computation model with Õ(n) memory; this algorithm also runs in O(log log n) rounds in the Congested Clique model. This is exponentially faster than the fastest known deterministic 2-ruling set algorithm for these models, which is simply the O(log Δ)-round deterministic Maximal Independent Set algorithm due to Czumaj, Davies, and Parter (SPAA 2020). Our result is obtained by derandomizing the 2-ruling set algorithm of Kothapalli and Pemmaraju (FSTTCS 2012).","PeriodicalId":182444,"journal":{"name":"Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121973005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信