{"title":"Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks","authors":"A. Datta, L. Larmore, T. Masuzawa","doi":"10.1145/2684464.2684466","DOIUrl":"https://doi.org/10.1145/2684464.2684466","url":null,"abstract":"It is known that there is no self-stabilizing silent distributed algorithm for finding the center (or centers) of an anonymous tree network that uses less than O(log diam) space per process, where diam is the diameter of the tree. In this paper, a self-stabilizing, but non-silent, distributed algorithm, STC, for this problem is given, which takes O(diam) rounds under the unfair daemon and uses O(1) space per process. The method is to first construct a silent O(1)-space algorithm for the problem that works under the synchronous daemon, provided it has a clean start. A transformer is then constructed, which transforms any tree algorithm which is silent under the synchronous algorithm given a clean start into an equivalent non-silent self-stabilizing algorithm with the same asymptotic space complexity. The desired center finding algorithm, CSTC, is then obtained by applying the transformer to STC.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Sreejith, K. Anupama, L. Gudino, R. Suriyadeepan
{"title":"Partition Discovery and Connectivity Restoration in WSN using Mobile Relays","authors":"V. Sreejith, K. Anupama, L. Gudino, R. Suriyadeepan","doi":"10.1145/2684464.2684487","DOIUrl":"https://doi.org/10.1145/2684464.2684487","url":null,"abstract":"Connectivity restoration in Wireless Sensor Network (WSN) is a common problem and several solutions has been proposed in the literature. Reasons for partition include initial random deployment, node failure due to low battery life, hardware malfunction etc. This paper focuses on partition discovery and hence restoring connectivity in a segmented network using Mobile Relay (MR) nodes. We propose a hybrid of frontier-based and random-direction exploration approaches for detecting partitions in a given area. An approximation algorithm for Steiner point based minimum spanning tree is adopted to determine the topology for connecting the discovered partition. Optimal assignment of mobile relays in this topology is visualized as a Bottleneck Assignment Problem (BAP). Our approach guarantees use of minimum number of MR nodes to be placed in minimum time. Experimental results indicate that the proposed approach can be effectively used for connectivity restoration in a partitioned network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Performance of Delegation over Cache-Coherent Shared Memory","authors":"Darko Petrovic, Thomas Ropars, A. Schiper","doi":"10.1145/2684464.2684476","DOIUrl":"https://doi.org/10.1145/2684464.2684476","url":null,"abstract":"Delegation is a thread synchronization technique where access to shared data is performed through a dedicated server thread. When a client thread requires shared data access, it makes a request to a server and waits for a response. This paper studies delegation implementation over cache-coherent shared memory, with the goal of optimizing it for high throughput. Whereas client-server communication naturally fits message-passing systems, efficient implementation over cache-coherent shared memory requires careful optimization. We demonstrate optimizations that significantly improve delegation performance on two modern x86 processors (the Intel Xeon Westmere and the AMD Opteron Magny-Cours), enabling us to come up with counter, stack and queue implementations that outperform the best known alternatives in a large number of cases. Our optimized delegation solution achieves 1.4x (resp. 2x) higher throughput compared to the most efficient state-of-the-art delegation solution on the Intel Xeon (resp. AMD Opteron).","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122205899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabienne Carrier, A. Datta, Stéphane Devismes, L. Larmore
{"title":"Self-Stabilizing ℓ-Exclusion Revisited","authors":"Fabienne Carrier, A. Datta, Stéphane Devismes, L. Larmore","doi":"10.1145/2684464.2684465","DOIUrl":"https://doi.org/10.1145/2684464.2684465","url":null,"abstract":"We consider the (deterministic) ℓ-exclusion problem, a generalization of the mutual exclusion problem which allows use of 1 ≤ ℓ < n identical copies of a non-sharable reusable resource among n processes, instead of only one, as standard mutual exclusion. This problem is defined using three properties: safety, fairness, and avoidance of ℓ-deadlock. We first show that any algorithm satisfying the three aforementioned properties has a waiting time of Ω(n − ℓ) rounds. Thus, when n is large, the gain (in terms of waiting time) of having ℓ copies of a resource, instead of one, becomes negligible. We propose to reformulate the problem by replacing the avoidance of ℓ-deadlock property by a new property, which we call fast waiting time, which requires waiting time of O(n/ℓ) rounds, which is asymptotically optimal. We call this new version of the problem fast waiting time ℓ-exclusion. We give two self-stabilizing solutions for this new problem. Our first solution works in oriented rooted ring networks. Our second solution is a generalization of the first, and works in every connected identified network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114832088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Reducing False Conflicts in Distributed Transactional Data Structures","authors":"A. Dhoke, R. Palmieri, B. Ravindran","doi":"10.1145/2684464.2684467","DOIUrl":"https://doi.org/10.1145/2684464.2684467","url":null,"abstract":"We present techniques for reducing false conflicts in distributed transactional data structure (DDS). The open nesting transactional model is the common solution because it allows nested transactions to commit independently of their parent transaction, thereby objects in the transaction read-set and write-set are released early, minimizing aborts due to false conflicts and improving concurrency. We present three protocols for avoiding false conflicts in DDS. Our first protocol, QR-ON, incorporates open nesting into the QR protocol that manages concurrency control for distributed transactional memory systems using quorum-based replication. We then introduce Optimistic Open Nesting, QR-OON, in which open-nested transactions commit asynchronously so that subsequent transactions can proceed without waiting for the commit of previous transactions. Finally, we propose an early release methodology, QR-ER, in which objects that do not affect the final state of the shared data are dropped from transaction's read-set, which avoids false conflicts and reduces communication costs. Our implementation and experimental studies revealed that QR-OON outperforms QR-ON by up to 43%, and that QR-ER outperforms QR-ON and QR-OON by up to 10X.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Splitting and Renaming with a Majority of Faulty Processes","authors":"David Bonnin, Corentin Travers","doi":"10.1145/2684464.2684471","DOIUrl":"https://doi.org/10.1145/2684464.2684471","url":null,"abstract":"Splitters are simple objects, implementable with read/write registers, that return directions in {right, down, stop}. Not every process that accesses the object obtains the same direction, and in addition at most one obtains stop. Both in their one-shot and long-lived form, splitters are basic building block of elegant renaming algorithms in shared memory. In a message passing system when less than half of the processes may fail, splitter can be implemented by first simulating shared registers. This is no longer the case if half or more of the processes may fail. We define and implement one-shot and long-lived splitters suited to the majority of failures environment. Our generalized splitters retain most properties of the original splitters, except that they only guarantee that at most ⌊ n/n − f) ⌋ processes return stop, where n is the number of processes and f < n an upper bound on the number of failures. We then adapt Moir and Anderson grid of splitters to solve one-shot and long-lived variant of renaming in which at most ⌊ n/n − f) ⌋ processes may obtain the same name. One of the main challenge consists in composing long-lived generalized splitters.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"22 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134421642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Poonam Goyal, S. Kumari, Dhruv Kumar, S. Balasubramaniam, Navneet Goyal, Saiyedul Islam, Jagat Sesh Challa
{"title":"Parallelizing OPTICS for Commodity Clusters","authors":"Poonam Goyal, S. Kumari, Dhruv Kumar, S. Balasubramaniam, Navneet Goyal, Saiyedul Islam, Jagat Sesh Challa","doi":"10.1145/2684464.2684477","DOIUrl":"https://doi.org/10.1145/2684464.2684477","url":null,"abstract":"In this paper, we propose an algorithm, DOPTICS, a parallelized version of a popular density based cluster-ordering algorithm OPTICS. Parallelizing OPTICS is challenging because of its strong sequential data access behavior. To achieve high parallelism, a data parallel approach that exploits the underlying indexing structure is proposed. We implement the proposed algorithm for processor nodes in a commodity cluster as well as across cores in a processor. Moreover, the clusters obtained by our algorithm are exactly same as that of classical OPTICS unlike the only existing implementation of the parallel OPTICS. We demonstrate the performance of the proposed algorithm on a commodity cluster which is typically a combination of distributed and shared memory systems. Experimental results on several large real and synthetic data sets with varying dimensions are presented to show speed up and scalability achieved. The speed up obtained is remarkable and is found to scale well with increasing number of processing elements. Performance improvements of the proposed DOPTICS algorithm are due to algorithmic optimizations and parallelization strategy.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123397014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Necessary and Sufficient Conditions on Partial Orders for Modeling Concurrent Computations","authors":"Himanshu Chauhan, V. Garg","doi":"10.1145/2684464.2684478","DOIUrl":"https://doi.org/10.1145/2684464.2684478","url":null,"abstract":"Partial orders are used extensively for modeling and analyzing concurrent computations. In this paper, we define two properties of partially ordered sets: width-extensibility and interleaving-consistency, and show that a partial order can be a valid state based model: (1) of some synchronous concurrent computation iff it is width-extensible, and (2) of some asynchronous concurrent computation iff it is width-extensible and interleaving-consistent. We also show a duality between the event based and state based models of concurrent computations, and give algorithms to convert models between the two domains. When applied to the problem of checkpointing, our theory leads to a better understanding of some existing results and algorithms in the field. It also leads to efficient detection algorithms for predicates whose evaluation requires knowledge of states from all the processes in the system.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133842131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Maximum Matching in Bounded Degree Graphs","authors":"G. Even, Moti Medina, D. Ron","doi":"10.1145/2684464.2684469","DOIUrl":"https://doi.org/10.1145/2684464.2684469","url":null,"abstract":"We present deterministic distributed algorithms for computing approximate maximum cardinality matchings and approximate maximum weight matchings. Our algorithm for the unweighted case computes a matching whose size is at least (1−ε) times the optimal in Δ O(1/ε) + O(1/ε2) · log* (n) rounds where n is the number of vertices in the graph and Δ is the maximum degree. Our algorithm for the edge-weighted case computes a matching whose weight is at least (1 − ε) times the optimal in log(min{1/ωmin, n/ε})O(1/ε). (Δ O(1/ε) + log*(n)) rounds for edge-weights in [wmin, 1]. The best previous algorithms for both the unweighted case and the weighted case are by Lotker, Patt-Shamir, and Pettie (SPAA 2008). For the unweighted case they give a randomized (1 − ε)-approximation algorithm that runs in O((log(n))ε3) rounds. For the weighted case they give a randomized (1/2 − ε)-approximation algorithm that runs in O(log(ε−1) · log(n)) rounds. Hence, our results improve on the previous ones when the parameters Δ, ε and wmin are constants (where we reduce the number of runs from O(log(n)) to O(log*(n))), and more generally when Δ, 1/ε and 1/wmin are sufficiently slowly increasing functions of n. Moreover, our algorithms are deterministic rather than randomized.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differentially Private Distributed Optimization","authors":"Zhenqi Huang, S. Mitra, N. Vaidya","doi":"10.1145/2684464.2684480","DOIUrl":"https://doi.org/10.1145/2684464.2684480","url":null,"abstract":"In distributed optimization and iterative consensus literature, a standard problem is for N agents to minimize a function f over a subset of Euclidean space, where the cost function is expressed as a sum Σ fi. In this paper, we study the private distributed optimization problem (PDOP) with the additional requirement that the cost function of the individual agents should remain differentially private. The adversary attempts to infer information about the private cost functions from the messages that the agents exchange. Achieving differential privacy requires that any change of an individual's cost function only results in unsubstantial changes in the statistics of the messages. We propose a class of iterative algorithms for solving PDOP, which achieves differential privacy and convergence to a common value. Our analysis reveals the dependence of the achieved accuracy and the privacy levels on the the parameters of the algorithm. We observe that to achieve ε-differential privacy the accuracy of the algorithm has the order of O(1/ε2).","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128246202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}