Proceedings of the 16th International Conference on Distributed Computing and Networking最新文献

筛选
英文 中文
Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks 匿名树网络的常空间自稳定中心查找
A. Datta, L. Larmore, T. Masuzawa
{"title":"Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks","authors":"A. Datta, L. Larmore, T. Masuzawa","doi":"10.1145/2684464.2684466","DOIUrl":"https://doi.org/10.1145/2684464.2684466","url":null,"abstract":"It is known that there is no self-stabilizing silent distributed algorithm for finding the center (or centers) of an anonymous tree network that uses less than O(log diam) space per process, where diam is the diameter of the tree. In this paper, a self-stabilizing, but non-silent, distributed algorithm, STC, for this problem is given, which takes O(diam) rounds under the unfair daemon and uses O(1) space per process. The method is to first construct a silent O(1)-space algorithm for the problem that works under the synchronous daemon, provided it has a clean start. A transformer is then constructed, which transforms any tree algorithm which is silent under the synchronous algorithm given a clean start into an equivalent non-silent self-stabilizing algorithm with the same asymptotic space complexity. The desired center finding algorithm, CSTC, is then obtained by applying the transformer to STC.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Partition Discovery and Connectivity Restoration in WSN using Mobile Relays 基于移动中继的WSN分区发现与连通性恢复
V. Sreejith, K. Anupama, L. Gudino, R. Suriyadeepan
{"title":"Partition Discovery and Connectivity Restoration in WSN using Mobile Relays","authors":"V. Sreejith, K. Anupama, L. Gudino, R. Suriyadeepan","doi":"10.1145/2684464.2684487","DOIUrl":"https://doi.org/10.1145/2684464.2684487","url":null,"abstract":"Connectivity restoration in Wireless Sensor Network (WSN) is a common problem and several solutions has been proposed in the literature. Reasons for partition include initial random deployment, node failure due to low battery life, hardware malfunction etc. This paper focuses on partition discovery and hence restoring connectivity in a segmented network using Mobile Relay (MR) nodes. We propose a hybrid of frontier-based and random-direction exploration approaches for detecting partitions in a given area. An approximation algorithm for Steiner point based minimum spanning tree is adopted to determine the topology for connecting the discovered partition. Optimal assignment of mobile relays in this topology is visualized as a Bottleneck Assignment Problem (BAP). Our approach guarantees use of minimum number of MR nodes to be placed in minimum time. Experimental results indicate that the proposed approach can be effectively used for connectivity restoration in a partitioned network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Performance of Delegation over Cache-Coherent Shared Memory 基于缓存一致共享内存的委托性能研究
Darko Petrovic, Thomas Ropars, A. Schiper
{"title":"On the Performance of Delegation over Cache-Coherent Shared Memory","authors":"Darko Petrovic, Thomas Ropars, A. Schiper","doi":"10.1145/2684464.2684476","DOIUrl":"https://doi.org/10.1145/2684464.2684476","url":null,"abstract":"Delegation is a thread synchronization technique where access to shared data is performed through a dedicated server thread. When a client thread requires shared data access, it makes a request to a server and waits for a response. This paper studies delegation implementation over cache-coherent shared memory, with the goal of optimizing it for high throughput. Whereas client-server communication naturally fits message-passing systems, efficient implementation over cache-coherent shared memory requires careful optimization. We demonstrate optimizations that significantly improve delegation performance on two modern x86 processors (the Intel Xeon Westmere and the AMD Opteron Magny-Cours), enabling us to come up with counter, stack and queue implementations that outperform the best known alternatives in a large number of cases. Our optimized delegation solution achieves 1.4x (resp. 2x) higher throughput compared to the most efficient state-of-the-art delegation solution on the Intel Xeon (resp. AMD Opteron).","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122205899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Self-Stabilizing ℓ-Exclusion Revisited 自稳定的不相容
Fabienne Carrier, A. Datta, Stéphane Devismes, L. Larmore
{"title":"Self-Stabilizing ℓ-Exclusion Revisited","authors":"Fabienne Carrier, A. Datta, Stéphane Devismes, L. Larmore","doi":"10.1145/2684464.2684465","DOIUrl":"https://doi.org/10.1145/2684464.2684465","url":null,"abstract":"We consider the (deterministic) ℓ-exclusion problem, a generalization of the mutual exclusion problem which allows use of 1 ≤ ℓ < n identical copies of a non-sharable reusable resource among n processes, instead of only one, as standard mutual exclusion. This problem is defined using three properties: safety, fairness, and avoidance of ℓ-deadlock. We first show that any algorithm satisfying the three aforementioned properties has a waiting time of Ω(n − ℓ) rounds. Thus, when n is large, the gain (in terms of waiting time) of having ℓ copies of a resource, instead of one, becomes negligible. We propose to reformulate the problem by replacing the avoidance of ℓ-deadlock property by a new property, which we call fast waiting time, which requires waiting time of O(n/ℓ) rounds, which is asymptotically optimal. We call this new version of the problem fast waiting time ℓ-exclusion. We give two self-stabilizing solutions for this new problem. Our first solution works in oriented rooted ring networks. Our second solution is a generalization of the first, and works in every connected identified network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114832088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Reducing False Conflicts in Distributed Transactional Data Structures 分布式事务数据结构中虚假冲突的减少
A. Dhoke, R. Palmieri, B. Ravindran
{"title":"On Reducing False Conflicts in Distributed Transactional Data Structures","authors":"A. Dhoke, R. Palmieri, B. Ravindran","doi":"10.1145/2684464.2684467","DOIUrl":"https://doi.org/10.1145/2684464.2684467","url":null,"abstract":"We present techniques for reducing false conflicts in distributed transactional data structure (DDS). The open nesting transactional model is the common solution because it allows nested transactions to commit independently of their parent transaction, thereby objects in the transaction read-set and write-set are released early, minimizing aborts due to false conflicts and improving concurrency. We present three protocols for avoiding false conflicts in DDS. Our first protocol, QR-ON, incorporates open nesting into the QR protocol that manages concurrency control for distributed transactional memory systems using quorum-based replication. We then introduce Optimistic Open Nesting, QR-OON, in which open-nested transactions commit asynchronously so that subsequent transactions can proceed without waiting for the commit of previous transactions. Finally, we propose an early release methodology, QR-ER, in which objects that do not affect the final state of the shared data are dropped from transaction's read-set, which avoids false conflicts and reduces communication costs. Our implementation and experimental studies revealed that QR-OON outperforms QR-ON by up to 43%, and that QR-ER outperforms QR-ON and QR-OON by up to 10X.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Splitting and Renaming with a Majority of Faulty Processes 拆分和重命名大多数错误进程
David Bonnin, Corentin Travers
{"title":"Splitting and Renaming with a Majority of Faulty Processes","authors":"David Bonnin, Corentin Travers","doi":"10.1145/2684464.2684471","DOIUrl":"https://doi.org/10.1145/2684464.2684471","url":null,"abstract":"Splitters are simple objects, implementable with read/write registers, that return directions in {right, down, stop}. Not every process that accesses the object obtains the same direction, and in addition at most one obtains stop. Both in their one-shot and long-lived form, splitters are basic building block of elegant renaming algorithms in shared memory. In a message passing system when less than half of the processes may fail, splitter can be implemented by first simulating shared registers. This is no longer the case if half or more of the processes may fail. We define and implement one-shot and long-lived splitters suited to the majority of failures environment. Our generalized splitters retain most properties of the original splitters, except that they only guarantee that at most ⌊ n/n − f) ⌋ processes return stop, where n is the number of processes and f < n an upper bound on the number of failures. We then adapt Moir and Anderson grid of splitters to solve one-shot and long-lived variant of renaming in which at most ⌊ n/n − f) ⌋ processes may obtain the same name. One of the main challenge consists in composing long-lived generalized splitters.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"22 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134421642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallelizing OPTICS for Commodity Clusters 商品集群的并行光学
Poonam Goyal, S. Kumari, Dhruv Kumar, S. Balasubramaniam, Navneet Goyal, Saiyedul Islam, Jagat Sesh Challa
{"title":"Parallelizing OPTICS for Commodity Clusters","authors":"Poonam Goyal, S. Kumari, Dhruv Kumar, S. Balasubramaniam, Navneet Goyal, Saiyedul Islam, Jagat Sesh Challa","doi":"10.1145/2684464.2684477","DOIUrl":"https://doi.org/10.1145/2684464.2684477","url":null,"abstract":"In this paper, we propose an algorithm, DOPTICS, a parallelized version of a popular density based cluster-ordering algorithm OPTICS. Parallelizing OPTICS is challenging because of its strong sequential data access behavior. To achieve high parallelism, a data parallel approach that exploits the underlying indexing structure is proposed. We implement the proposed algorithm for processor nodes in a commodity cluster as well as across cores in a processor. Moreover, the clusters obtained by our algorithm are exactly same as that of classical OPTICS unlike the only existing implementation of the parallel OPTICS. We demonstrate the performance of the proposed algorithm on a commodity cluster which is typically a combination of distributed and shared memory systems. Experimental results on several large real and synthetic data sets with varying dimensions are presented to show speed up and scalability achieved. The speed up obtained is remarkable and is found to scale well with increasing number of processing elements. Performance improvements of the proposed DOPTICS algorithm are due to algorithmic optimizations and parallelization strategy.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123397014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Necessary and Sufficient Conditions on Partial Orders for Modeling Concurrent Computations 并行计算偏阶建模的充分必要条件
Himanshu Chauhan, V. Garg
{"title":"Necessary and Sufficient Conditions on Partial Orders for Modeling Concurrent Computations","authors":"Himanshu Chauhan, V. Garg","doi":"10.1145/2684464.2684478","DOIUrl":"https://doi.org/10.1145/2684464.2684478","url":null,"abstract":"Partial orders are used extensively for modeling and analyzing concurrent computations. In this paper, we define two properties of partially ordered sets: width-extensibility and interleaving-consistency, and show that a partial order can be a valid state based model: (1) of some synchronous concurrent computation iff it is width-extensible, and (2) of some asynchronous concurrent computation iff it is width-extensible and interleaving-consistent. We also show a duality between the event based and state based models of concurrent computations, and give algorithms to convert models between the two domains. When applied to the problem of checkpointing, our theory leads to a better understanding of some existing results and algorithms in the field. It also leads to efficient detection algorithms for predicates whose evaluation requires knowledge of states from all the processes in the system.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133842131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Maximum Matching in Bounded Degree Graphs 有界度图中的分布最大匹配
G. Even, Moti Medina, D. Ron
{"title":"Distributed Maximum Matching in Bounded Degree Graphs","authors":"G. Even, Moti Medina, D. Ron","doi":"10.1145/2684464.2684469","DOIUrl":"https://doi.org/10.1145/2684464.2684469","url":null,"abstract":"We present deterministic distributed algorithms for computing approximate maximum cardinality matchings and approximate maximum weight matchings. Our algorithm for the unweighted case computes a matching whose size is at least (1−ε) times the optimal in Δ O(1/ε) + O(1/ε2) · log* (n) rounds where n is the number of vertices in the graph and Δ is the maximum degree. Our algorithm for the edge-weighted case computes a matching whose weight is at least (1 − ε) times the optimal in log(min{1/ωmin, n/ε})O(1/ε). (Δ O(1/ε) + log*(n)) rounds for edge-weights in [wmin, 1]. The best previous algorithms for both the unweighted case and the weighted case are by Lotker, Patt-Shamir, and Pettie (SPAA 2008). For the unweighted case they give a randomized (1 − ε)-approximation algorithm that runs in O((log(n))ε3) rounds. For the weighted case they give a randomized (1/2 − ε)-approximation algorithm that runs in O(log(ε−1) · log(n)) rounds. Hence, our results improve on the previous ones when the parameters Δ, ε and wmin are constants (where we reduce the number of runs from O(log(n)) to O(log*(n))), and more generally when Δ, 1/ε and 1/wmin are sufficiently slowly increasing functions of n. Moreover, our algorithms are deterministic rather than randomized.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Differentially Private Distributed Optimization 差分私有分布式优化
Zhenqi Huang, S. Mitra, N. Vaidya
{"title":"Differentially Private Distributed Optimization","authors":"Zhenqi Huang, S. Mitra, N. Vaidya","doi":"10.1145/2684464.2684480","DOIUrl":"https://doi.org/10.1145/2684464.2684480","url":null,"abstract":"In distributed optimization and iterative consensus literature, a standard problem is for N agents to minimize a function f over a subset of Euclidean space, where the cost function is expressed as a sum Σ fi. In this paper, we study the private distributed optimization problem (PDOP) with the additional requirement that the cost function of the individual agents should remain differentially private. The adversary attempts to infer information about the private cost functions from the messages that the agents exchange. Achieving differential privacy requires that any change of an individual's cost function only results in unsubstantial changes in the statistics of the messages. We propose a class of iterative algorithms for solving PDOP, which achieves differential privacy and convergence to a common value. Our analysis reveals the dependence of the achieved accuracy and the privacy levels on the the parameters of the algorithm. We observe that to achieve ε-differential privacy the accuracy of the algorithm has the order of O(1/ε2).","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128246202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信