K. Matsuo, Keisuke Goto, A. Kanzaki, T. Hara, S. Nishio
{"title":"A Study on Efficient Event Monitoring in Dense Mobile Wireless Sensor Networks","authors":"K. Matsuo, Keisuke Goto, A. Kanzaki, T. Hara, S. Nishio","doi":"10.1109/SRDS.2014.65","DOIUrl":"https://doi.org/10.1109/SRDS.2014.65","url":null,"abstract":"In dense mobile wireless sensor networks, it is desirable to reduce traffic for data gathering as much as possible while satisfying an application requirement. In this paper, focusing on an application which monitors the time-variant shape of events, we discuss an approach to achieve an efficient monitoring with small traffic in dense mobile wireless sensor networks.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"23 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123100910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Redundant Data Allocation Using Unused Blocks for Improving Access Efficiency in Dependable Storage Systems","authors":"Ta Hong Viet","doi":"10.1109/SRDS.2014.68","DOIUrl":"https://doi.org/10.1109/SRDS.2014.68","url":null,"abstract":"This paper has presented a data allocation method with erasure correction coding to design dependable storage system. This adaptive data allocation can reduce the number of access to unavailable storage elements, moreover it also improve the reliability of the system. We proposed variable information word length method which can reduce the number of blocking accesses, and two ideas are presented to reduce the allocation map size and update cost.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125784759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Throughput of Wireless LAN by Tuning Carrier Sense Threshold of Access Points Based on Node Positions Detected by a Visible Light Tag System","authors":"Kodai Murakami, Tatsuya Ito, S. Ishihara","doi":"10.1109/SRDS.2014.60","DOIUrl":"https://doi.org/10.1109/SRDS.2014.60","url":null,"abstract":"The IEEE 802.11 Distributed Coordination Function (DCF) is based on the Carrier Sense Multiple Access (CSMA) algorithm for avoiding collisions of frames. In CSMA, spatial reuse can be improved by suitably changing the carrier sense threshold (CST). If the increased CST does not incur collisions and helps concurrent transmissions from multiple devices, this improves the throughput of the wireless LAN. For example, when there are two APs and multiple devices exist near each of them, each AP can transmit a frame simultaneously without causing collisions of frames since each device can receive a frame from its associated AP with a high signal power and the interference from another AP is small. In this paper, we propose a system which improves the throughput in CSMA/CA based wireless LANs by controlling the CST values of APs according to positions of mobile hosts. In the system, the CST values of multiple APs are dynamically configured by a controller which has a camera for obtaining the current positions of mobile hosts. The proposed system improves the throughput in WLAN 58% in comparison with basic DCF in a LAN where two APs are arranged at an interval of 50 m and two devices exist within 10 m from each AP.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130355347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Encoded Processing","authors":"Dmitrii Kuvaiskii, C. Fetzer","doi":"10.1109/SRDS.2014.62","DOIUrl":"https://doi.org/10.1109/SRDS.2014.62","url":null,"abstract":"Embedded distributed systems are becoming increasingly complex and interconnected. Some of the challenges in building such systems are safety, i.e., the ability to operate correctly even in the face of arbitrary hardware errors, and security, i.e., the ability to withstand hacker attacks. In this paper, an approach to improve both safety and security for embedded distributed systems with low performance overhead is proposed. Preliminary results indicate that applications hardened using the proposed technique have less than 2x performance overhead and fault coverage of 99.9% (assuming no control flow faults).","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126252978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chained Signatures for Secure Program Execution","authors":"Sergei Arnautov, C. Fetzer","doi":"10.1109/SRDS.2014.59","DOIUrl":"https://doi.org/10.1109/SRDS.2014.59","url":null,"abstract":"Every somewhat complex computer system contains bugs. As it is nearly impossible to fix all bugs in the software stack, the only alternative remains is to make the system secure accepting the fact that software is vulnerable. In this work, a hardware monitor is proposed that checks the correctness of program execution using chained signatures.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"11 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks","authors":"Yao-Tung Tsou, Yung-Li Hu, Yennun Huang, S. Kuo","doi":"10.1109/SRDS.2014.27","DOIUrl":"https://doi.org/10.1109/SRDS.2014.27","url":null,"abstract":"This paper proposes an efficient mechanism, called PCTopk, for functional top-k query with a combination of multiple conditions/dimensions in two-tiered sensor networks to simultaneously preserve data privacy and correctness (i.e., authenticity and integrity). PCTopk constructs a layered authentication tree, cooperated with an order-preserving symmetric encryption technique, for only permitting storage nodes to systematically process inquired data over encryption domain and enabling querists to efficiently verify the authentic and complete query results. To the best of our knowledge, this is the first research work on the issue of secure functional top-k query with a combination of multiple conditions in two-tiered sensor networks. The performance evaluation results show that PCTopk takes significantly less energy consumption and storage space than prior arts while preserving data privacy and correctness.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131016044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rivalino Matias, A. Andrzejak, F. Machida, Diego Elias, Kishor S. Trivedi
{"title":"A Systematic Differential Analysis for Fast and Robust Detection of Software Aging","authors":"Rivalino Matias, A. Andrzejak, F. Machida, Diego Elias, Kishor S. Trivedi","doi":"10.1109/SRDS.2014.38","DOIUrl":"https://doi.org/10.1109/SRDS.2014.38","url":null,"abstract":"Software systems running continuously for a long time often confront software aging, which is the phenomenon of progressive degradation of execution environment caused by latent software faults. Removal of such faults in software development process is a crucial issue for system reliability. A known major obstacle is typically the large latency to discover the existence of software aging. We propose a systematic approach to detect software aging which has in a shorter test time and higher accuracy compared to traditional aging detection via stress testing and trend detection with high confidence. The approach is based on a comparative differential analysis where a software version under test is compared with against a previous robust version by observing in terms of behavioral (signal) changes during system tests of resource metrics. A key instrument adopted is a divergence chart, which expresses time-dependent differences between two signals, allowing us to detect changes in the system metrics' values which indicate the existence of software aging. In our experimental study, we focuses on memory-leak detection and the and evaluates divergence charts are computed using various multiple statistical techniques combined paired with different application-level memory related metrics (RSS and Heap Usage). The experimental results show that the statistical process control techniques used in our approach proposed method achieves good performance for memory-leak detection, when compared with other in comparison to techniques widely adopted in previous works (e.g., linear regression, moving average and median).","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128325340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transaction Management Using Causal Snapshot Isolation in Partially Replicated Databases","authors":"Vinit Padhye, Gowtham Rajappan, A. Tripathi","doi":"10.1109/SRDS.2014.30","DOIUrl":"https://doi.org/10.1109/SRDS.2014.30","url":null,"abstract":"We present here a transaction management protocol using causal snapshot isolation in partially replicated multi-version databases. We consider here replicated databases consisting of multiple disjoint data partitions. A partition is not required to be replicated at all database sites, and a site may contain replicas for any number of partitions. Transactions can execute at any site and read or write data from any subset of the partitions, and its updates are propagated asynchronously to other sites. The protocol ensures that the snapshot observed by a transaction contains data versions that are causally consistent. The protocol requires propagating updates only to the sites replicating the updated items. In developing this protocol, we address the issues that are unique in supporting transactions with causal consistency together with the snapshot isolation model in partially replicated databases. Through experimental evaluations, we demonstrate the scalability of this model and its performance benefits over full replication models.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121441449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fábio Coelho, F. Cruz, R. Vilaça, J. Pereira, R. Oliveira
{"title":"pH1: A Transactional Middleware for NoSQL","authors":"Fábio Coelho, F. Cruz, R. Vilaça, J. Pereira, R. Oliveira","doi":"10.1109/SRDS.2014.23","DOIUrl":"https://doi.org/10.1109/SRDS.2014.23","url":null,"abstract":"NoSQL databases opt not to offer important abstractions traditionally found in relational databases in order to achieve high levels of scalability and availability: transactional guarantees and strong data consistency. In this work we propose pH1, a generic middleware layer over NoSQL databases that offers transactional guarantees with Snapshot Isolation. This is achieved in a non-intrusive manner, requiring no modifications to servers and no native support for multiple versions. Instead, the transactional context is achieved by means of a multiversion distributed cache and an external transaction certifier, exposed by extending the client's interface with transaction bracketing primitives. We validate and evaluate pH1 with Apache Cassandra and Hyperdex. First, using the YCSB benchmark, we show that the cost of providing ACID guarantees to these NoSQL databases amounts to 11% decrease in throughput. Moreover, using the transaction intensive TPC-C workload, pH1 presented an impact of 22% decrease in throughput. This contrasts with OMID, a previous proposal that takes advantage of HBase's support for multiple versions, with a throughput penalty of 76% in the same conditions.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133101833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maciej Kokociński, Tadeusz Kobus, P. Wojciechowski
{"title":"Make the Leader Work: Executive Deferred Update Replication","authors":"Maciej Kokociński, Tadeusz Kobus, P. Wojciechowski","doi":"10.1109/SRDS.2014.42","DOIUrl":"https://doi.org/10.1109/SRDS.2014.42","url":null,"abstract":"In this paper we propose executive deferred update replication (EDUR), a novel algorithm for multi-primary replication of transactional memory and databases. EDUR streamlines transaction certification (i.e., checking for conflicts between concurrent transactions) with the broadcast protocol, which improves overall performance and scalability compared to deferred update replication based on total order broadcast (TOB). EDUR uses executive order broadcast (EOB), a novel protocol that can be seen as a generalization of TOB. Compared to TOB, EOB features new primitives and properties that enable the application to delegate some work to a leader -- a process inherently present in many TOB algorithms that is responsible for coordination of message dissemination. The results of experimental evaluation show significant performance gains when using our approach.","PeriodicalId":440331,"journal":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116716247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}