{"title":"Communication Costs in a Geometric Communication Network","authors":"Sima Hajiaghaei Shanjani, Valerie King","doi":"10.1145/3427796.3427800","DOIUrl":"https://doi.org/10.1145/3427796.3427800","url":null,"abstract":"A communication network is a graph in which each node has only local information about the graph and nodes communicate by passing messages along its edges. Here, we consider the geometric communication network where the nodes also occupy points in space and the distance between points is the Euclidean distance. Our goal is to understand the communication cost needed to solve several fundamental geometry problems, including Convex Hull, Diameter, Closest Pair, and approximations of these problems, in the asynchronous CONGEST KT1 model. This extends the 2011 result of Rajsbaum and Urrutia for finding a convex hull of a planar geometric communication network to networks of arbitrary topology.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mikael Gordani Shahri, A. Erlandsson, Dimitris Palyvos-Giannas, Vincenzo Gulisano
{"title":"Poster: Twins, a Middleware for Adaptive Streaming Provenance at the Edge","authors":"Mikael Gordani Shahri, A. Erlandsson, Dimitris Palyvos-Giannas, Vincenzo Gulisano","doi":"10.1145/3427796.3433931","DOIUrl":"https://doi.org/10.1145/3427796.3433931","url":null,"abstract":"Data streaming applications process continuous flows of data to detect unusual/critical events. When it is beneficial to further analyze the source data leading to such events, fine-grained streaming provenance can be used to link each event back to its contributing data. Existing provenance tools, though, (i) can be computationally heavy, especially for applications deployed on resource-constrained devices at the edge of Cyber-Physical Systems, and (ii) cannot activate/deactivate provenance recording based on user-defined rules. To cover such gaps, we present Twins, a new adaptive provenance tool that leverages APIs found in state-of-the-art streaming frameworks to allow for custom conditions to activate/deactivate provenance recording. Our preliminary results, based on an implementation on top of Apache Flink and GeneaLog show that Twins can match, during the periods in which provenance is inactive, the performance of queries that do not record provenance at all.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MILP-Based Charging and Route Selection of Electric Vehicles in Smart Grid","authors":"A. Yadav, J. Mukherjee","doi":"10.1145/3427796.3427820","DOIUrl":"https://doi.org/10.1145/3427796.3427820","url":null,"abstract":"Widely accepted as an eco-friendly alternative to conventional vehicles, electric vehicles (EVs), however, have a limitation, such as a charging schedule is necessary for its journey since overloading at a charging station may cause grid failure. Also, despite the current advancement in technology, the battery capacity of EVs is still limited, which affects the cruise range of the vehicles, and it can be solved by en route charging of EVs. However, the charging rate may vary across different public charging stations. This may motivate electric vehicle owners to follow a route that is different from the traditional shortest route. In this paper, we consider a joint charging and route optimization problem, where a transport operator has a number of EVs at a warehouse, and he/she is supposed to deliver certain goods or services to different delivery locations. We have proposed two mixed-integer linear programming (MILP) models, where the delivery locations are first distributed among the EVs, and second, routes for the EVs are determined that minimizes the total travel time, while charging on the route. We prove that the problem is NP-complete. Detailed simulation has been carried out on a realistic dataset [4][19], and solved using the commercial solver CPLEX, and IBM’s drop-solved platform. The results show that an even distribution of delivery locations among EVs along with their partial charging at different charging stations en route proves to be a useful model for fast delivery of services/goods while minimizing their total travel time.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new Reconfigurable Filtered-OFDM Based L-Band Digital Aeronautical Communication System for Next Generation Air to Ground Communication","authors":"N. Agrawal","doi":"10.1145/3427796.3430004","DOIUrl":"https://doi.org/10.1145/3427796.3430004","url":null,"abstract":"To meet the spectrum demand of ever-increasing air traffic, OFDM based L-band (960-1164MHz) Digital Aeronautical Communication System (LDACS) was proposed for air to ground. The drawbacks linked with the existing OFDM based LDACS transceivers leads to the need of new flexible and efficient LDACS protocol. To fulfil the above mentioned requirements of this revised LDACS protocol, we have proposed a reconfigurable filtered OFDM (Ref-OFDM) based LLDACS. The proposed Ref-OFDM waveform enables transceivers to dynamically adapt the transmission bandwidth (uptp 732K) has the similar architecture as existing OFDM based LDACS fulfils the above mentioned requirements of the improved protocol. We support our claims via simulation comparison results for various realistic channel conditions.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"703 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126677412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrei-Alexandru Agape, Madalin Claudiu Danceanu, René Rydhof Hansen, S. Schmid
{"title":"P4Fuzz: Compiler Fuzzer forDependable Programmable Dataplanes","authors":"Andrei-Alexandru Agape, Madalin Claudiu Danceanu, René Rydhof Hansen, S. Schmid","doi":"10.1145/3427796.3427798","DOIUrl":"https://doi.org/10.1145/3427796.3427798","url":null,"abstract":"Emerging software-defined networks and programmable dataplanes promise to render communication networks more dependable, overcoming today’s manual and error-prone approach to operate networks. Indeed, programmable dataplanes such as P4 provide great opportunities for improving network performance and developing innovative security features, by allowing programmers to reconfigure and tailor switches towards their needs. However, extending programmability to the dataplane also introduces new threat models. In this paper, using a systematic security analysis, we identify a particularly worrisome vulnerability: the automated program compilers which lie at the core of programmable dataplanes. The dataplane compilers introduce a risk of persistent threats which are covert and hard to detect, and may be exploited for large-scale attacks, affecting many devices. Our main contribution is P4Fuzz, a compiler fuzzer to find bugs and vulnerabilities in P4 compilers, in an efficient and automated manner. We discuss the challenges involved in designing such a compiler fuzzer for P4, present our fuzzing and taming algorithms, and report on experiments with our prototype implementation, considering the standard compilers of BMv2, eBPF, and NetFPGA. Our experiments confirm that P4Fuzz is able to generate and test the validity of dozens of P4 programs per minute. Using P4Fuzz, we also successfully found several bugs which have been acknowledged and fixed by the community.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","authors":"","doi":"10.1145/3427796","DOIUrl":"https://doi.org/10.1145/3427796","url":null,"abstract":"","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116656478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Serafino Cicerone, A. D. Fonso, G. Stefano, A. Navarra
{"title":"Arbitrary Pattern Formation on Infinite Regular Tessellation Graphs","authors":"Serafino Cicerone, A. D. Fonso, G. Stefano, A. Navarra","doi":"10.1145/3427796.3427833","DOIUrl":"https://doi.org/10.1145/3427796.3427833","url":null,"abstract":"Given a set R of robots, each one located at a different vertex of an infinite regular tessellation graph, we aim to explore the Arbitrary Pattern Formation (APF) problem. Given a multiset F of grid vertices such that |R| = |F|, APF asks for a distributed algorithm that moves robots so as to reach a configuration similar to F. Similarity means that robots must be disposed as F regardless of translations, rotations, reflections. So far, as possible discretization of the Euclidean plane only the standard square grid has been considered in the context of the classical Look-Compute-Move model. However, it is natural to consider the other regular tessellation graphs, that are triangular and hexagonal grids. For any regular tessellation graph, we provide a resolution algorithm for APF when the initial configuration is asymmetric.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prashansa Agrawal, Parwat Singh Anjana, Sathya Peri
{"title":"DeHiDe: Deep Learning-based Hybrid Model to Detect Fake News using Blockchain✱","authors":"Prashansa Agrawal, Parwat Singh Anjana, Sathya Peri","doi":"10.1145/3427796.3430003","DOIUrl":"https://doi.org/10.1145/3427796.3430003","url":null,"abstract":"The surge in the spread of immensely powerful deep-fakes, pseudo-news, misleading information, lies, propaganda, and false facts, frequently known as fake news, raised questions concerning social media’s influence in today’s fast-moving society. It is challenging to overcome fake news in traditional centralized systems. Blockchain technology can help in contending with such problems. A novel idea of DeHiDe: Deep Learning-based Hybrid Model to Detect Fake News using Blockchain is presented in this paper. DeHiDe is a blockchain-based framework for legitimate news sharing by filtering out the fake news. It combines the benefit of blockchain with an intelligent deep learning model to reinforce robustness and accuracy in combating fake news’s hurdle.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127655971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Stabilizing Indulgent Zero-degrading Binary Consensus","authors":"Oskar Lundström, M. Raynal, E. Schiller","doi":"10.1145/3427796.3427836","DOIUrl":"https://doi.org/10.1145/3427796.3427836","url":null,"abstract":"Guerraoui proposed an indulgent solution for the binary consensus problem. Namely, he showed that an arbitrary behavior of the failure detector never violates safety requirements even if it compromises liveness. Consensus implementations are often used in a repeated manner. Dutta and Guerraoui proposed a zero-degrading solution, i.e., during system runs in which the failure detector behaves perfectly, a node failure during one consensus instance has no impact on the performance of future instances. Our study, which focuses on indulgent zero-degrading binary consensus, aims at the design of an even more robust communication abstraction. We do so through the lenses of self-stabilization—a very strong notion of fault-tolerance. In addition to node and communication failures, self-stabilizing algorithms can recover after the occurrence of arbitrary transient faults; these faults represent any violation of the assumptions according to which the system was designed to operate (as long as the algorithm code stays intact). This work proposes the first, to the best of our knowledge, self-stabilizing algorithm for indulgent zero-degrading binary consensus for time-free message-passing systems prone to detectable process failures. The proposed algorithm has an stabilization time (in terms of asynchronous cycles) from arbitrary transient faults. Since the proposed solution uses an Ω failure detector, we also present the first, to the best of our knowledge, self-stabilizing asynchronous Ω failure detector, which is a variation on the one by Mostéfaoui, Mourgaya, and Raynal.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Flexible Paxos: Relaxing Quorum Intersection for Fast Paxos","authors":"H. Howard, Aleksey Charapko, R. Mortier","doi":"10.1145/3427796.3427815","DOIUrl":"https://doi.org/10.1145/3427796.3427815","url":null,"abstract":"Paxos, the de facto standard approach to solving distributed consensus, operates in two phases, each of which requires an intersecting quorum of nodes. Multi-Paxos reduces this to one phase by electing a leader but this leader is also a performance bottleneck. Fast Paxos bypasses the leader but has stronger quorum intersection requirements. In this paper we observe that Fast Paxos’ intersection requirements can be safely relaxed, reducing to just one additional intersection requirement between phase-1 quorums and any pair of fast round phase-2 quorums. We thus find that the quorums used with Fast Paxos are larger than necessary, allowing alternative quorum systems to obtain new tradeoffs between performance and fault-tolerance.","PeriodicalId":335477,"journal":{"name":"Proceedings of the 22nd International Conference on Distributed Computing and Networking","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}