首页 > 最新文献

13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)最新文献

英文 中文
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise 一个有效的客户端到客户端密码认证密钥交换弹性服务器妥协
Hongfeng Zhu, Tianhua Liu, Jie Liu, G. Chang
With rapid changes in the modern communication environment such as ad hoc networks and ubiquitous computing, it is necessary to construct a secure end-to-end channel between clients. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. This paper presents a new password authentication and key-exchange protocol suitable for client-to-client without a server public key in different realms to agree on a common session key using different passwords over an untrusted network. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.
随着自组织网络和普适计算等现代通信环境的快速变化,在客户端之间构建安全的端到端通道是必要的。PAKE的基本安全目标是防止字典攻击。基于验证器的PAKE协议还需要确保安全,防止服务器泄露。本文提出了一种新的密码认证和密钥交换协议,适用于客户端到客户端,在不可信网络中使用不同的密码,在不同的领域使用不同的服务器公钥来商定共同的会话密钥。所提出的协议的安全性、简单性和速度使其成为需要安全密码身份验证的广泛现实应用程序的理想选择。
{"title":"An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise","authors":"Hongfeng Zhu, Tianhua Liu, Jie Liu, G. Chang","doi":"10.1109/PRDC.2007.32","DOIUrl":"https://doi.org/10.1109/PRDC.2007.32","url":null,"abstract":"With rapid changes in the modern communication environment such as ad hoc networks and ubiquitous computing, it is necessary to construct a secure end-to-end channel between clients. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. This paper presents a new password authentication and key-exchange protocol suitable for client-to-client without a server public key in different realms to agree on a common session key using different passwords over an untrusted network. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126787806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting Defective Software Components from Code Complexity Measures 从代码复杂度度量预测有缺陷的软件组件
Hongyu Zhang, Xiuzhen Zhang, Ming Gu
The ability to predict defective modules can help us allocate limited quality assurance resources effectively and efficiently. In this paper, we propose a complexity- based method for predicting defect-prone components. Our method takes three code-level complexity measures as input, namely Lines of Code, McCabe's Cyclomatic Complexity and Halstead's Volume, and classifies components as either defective or non-defective. We perform an extensive study of twelve classification models using the public NASA datasets. Cross-validation results show that our method can achieve good prediction accuracy. This study confirms that static code complexity measures can be useful indicators of component quality.
预测缺陷模块的能力可以帮助我们有效地分配有限的质量保证资源。在本文中,我们提出了一种基于复杂性的方法来预测容易出现缺陷的部件。我们的方法以三个代码级复杂性度量作为输入,即代码行数、McCabe的圈复杂度和Halstead的体积,并将组件分为缺陷和非缺陷。我们使用NASA的公共数据集对12个分类模型进行了广泛的研究。交叉验证结果表明,该方法具有较好的预测精度。这项研究证实了静态代码复杂性度量可以作为组件质量的有用指示器。
{"title":"Predicting Defective Software Components from Code Complexity Measures","authors":"Hongyu Zhang, Xiuzhen Zhang, Ming Gu","doi":"10.1109/PRDC.2007.28","DOIUrl":"https://doi.org/10.1109/PRDC.2007.28","url":null,"abstract":"The ability to predict defective modules can help us allocate limited quality assurance resources effectively and efficiently. In this paper, we propose a complexity- based method for predicting defect-prone components. Our method takes three code-level complexity measures as input, namely Lines of Code, McCabe's Cyclomatic Complexity and Halstead's Volume, and classifies components as either defective or non-defective. We perform an extensive study of twelve classification models using the public NASA datasets. Cross-validation results show that our method can achieve good prediction accuracy. This study confirms that static code complexity measures can be useful indicators of component quality.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks 无线传感器网络中传输范围可调的容错拓扑控制
Chiu-Wen Chen, K. Ssu, H. C. Jiau
A topology control algorithm can be applied to wireless sensor networks to construct a virtual backbone for maintaining network connectivity. For handling node failure, previous algorithms typically prefer to have redundant nodes so the power efficiency was compromised. This paper describes a Power-CDS (P-CDS) mechanism that schedules active and backup sensor nodes in the backbone for tolerating failures. When node failure is detected, both active and backup nodes will adjust their transmission ranges to maintain connectivity. Simulation results show that P-CDS forms a smaller connected dominating set than the other fault- tolerant topology control algorithm. P-CDS also provides efficient broadcast with relatively low energy consumption.
在无线传感器网络中,可以应用拓扑控制算法来构建虚拟骨干网,以保持网络的连通性。对于处理节点故障,以前的算法通常倾向于使用冗余节点,从而降低了功率效率。本文描述了一种Power-CDS (P-CDS)机制,该机制调度主干网中的主动和备用传感器节点以容忍故障。当检测到节点故障时,主节点和备份节点都将调整各自的传输范围以保持连通性。仿真结果表明,与其他容错拓扑控制算法相比,P-CDS算法能形成更小的连通控制集。P-CDS还能以相对较低的能耗提供高效的广播。
{"title":"Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks","authors":"Chiu-Wen Chen, K. Ssu, H. C. Jiau","doi":"10.1109/PRDC.2007.47","DOIUrl":"https://doi.org/10.1109/PRDC.2007.47","url":null,"abstract":"A topology control algorithm can be applied to wireless sensor networks to construct a virtual backbone for maintaining network connectivity. For handling node failure, previous algorithms typically prefer to have redundant nodes so the power efficiency was compromised. This paper describes a Power-CDS (P-CDS) mechanism that schedules active and backup sensor nodes in the backbone for tolerating failures. When node failure is detected, both active and backup nodes will adjust their transmission ranges to maintain connectivity. Simulation results show that P-CDS forms a smaller connected dominating set than the other fault- tolerant topology control algorithm. P-CDS also provides efficient broadcast with relatively low energy consumption.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Path Diversity Metric for End-to-End Network 端到端网络的路径分集度量
Song Huang, Yong Xu, Ling Zhang
Path diversity is an important index of the dependability and fault tolerance capability of networks. Most path diversity metrics are designed under an implicit hypothesis that all candidate paths for a divergence node are always equally chosen. This may not be true due to the effect of routing policy with consideration of cost or other factors. A new simple metric is proposed in this paper for path diversity measurement of end-to-end networks. An end-to-end network is firstly transformed into a sequence of cascading segments. With the assumption that only one of all available branches is chosen each time, a probability based metric is calculated for each segment, and the joint entropy is calculated as path diversity measurement for the overall end-to-end network. The metric is fitful for both single-hop and multi-hop topologies. A comparison between the new metric and other ones is given at the end.
路径分集是衡量网络可靠性和容错能力的重要指标。大多数路径多样性指标都是在一个隐式假设下设计的,即发散节点的所有候选路径总是被平等地选择。由于考虑成本或其他因素的路由策略的影响,这可能不是真的。提出了一种新的简单的端到端网络路径分集度量方法。端到端网络首先被转换成一系列的级联网段。在假设每次只选择一个可用分支的情况下,计算每个分支的概率度量,并计算联合熵作为整个端到端网络的路径多样性度量。该度量对于单跳和多跳拓扑都是断断续续的。最后给出了新度量与其他度量的比较。
{"title":"A Path Diversity Metric for End-to-End Network","authors":"Song Huang, Yong Xu, Ling Zhang","doi":"10.1109/PRDC.2007.15","DOIUrl":"https://doi.org/10.1109/PRDC.2007.15","url":null,"abstract":"Path diversity is an important index of the dependability and fault tolerance capability of networks. Most path diversity metrics are designed under an implicit hypothesis that all candidate paths for a divergence node are always equally chosen. This may not be true due to the effect of routing policy with consideration of cost or other factors. A new simple metric is proposed in this paper for path diversity measurement of end-to-end networks. An end-to-end network is firstly transformed into a sequence of cascading segments. With the assumption that only one of all available branches is chosen each time, a probability based metric is calculated for each segment, and the joint entropy is calculated as path diversity measurement for the overall end-to-end network. The metric is fitful for both single-hop and multi-hop topologies. A comparison between the new metric and other ones is given at the end.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fault Tolerance for Super-Peers of P2P Systems P2P系统的超级对等体容错
Jenn-Wei Lin, M. Yang, Jichiang Tsai
This paper presents an efficient fault-tolerant approach for the super-peers of peer-to-peer (P2P) file sharing systems. In the super-peer based P2P file sharing system, peers are organized into multiple groups. In each group, it has a special peer called super peer to serve the regular peers within the group. In this hierarchical architecture, if the super peer departs (fails), any file queries to its serving regular peers cannot be delivered. In the proposed approach, we propose a multiple publication technique to make each regular peer logically connect with two or more super peers in other groups. If a regular peer finds that its serving super peer cannot work, one of its other connected super peers will be selected as its new serving super peer to continuously process the file queries. To examine the effectiveness of the proposed approach, comprehensive simulations are performed to quantify the performance and overhead of the proposed approach.
针对P2P文件共享系统中的超级节点,提出了一种高效的容错方法。在基于超级对等体的P2P文件共享系统中,对等体被组织成多个组。在每个组中,它都有一个称为超级节点的特殊节点来为组内的常规节点服务。在这种分层体系结构中,如果超级对等点离开(失败),则无法向其服务的常规对等点发送任何文件查询。在该方法中,我们提出了一种多重发布技术,使每个常规对等点与其他组中的两个或多个超级对等点在逻辑上连接。如果一个常规对等体发现它的服务超级对等体不能工作,它的另一个连接的超级对等体将被选中作为它的新服务超级对等体继续处理文件查询。为了检验所提出方法的有效性,进行了全面的仿真,以量化所提出方法的性能和开销。
{"title":"Fault Tolerance for Super-Peers of P2P Systems","authors":"Jenn-Wei Lin, M. Yang, Jichiang Tsai","doi":"10.1109/PRDC.2007.5","DOIUrl":"https://doi.org/10.1109/PRDC.2007.5","url":null,"abstract":"This paper presents an efficient fault-tolerant approach for the super-peers of peer-to-peer (P2P) file sharing systems. In the super-peer based P2P file sharing system, peers are organized into multiple groups. In each group, it has a special peer called super peer to serve the regular peers within the group. In this hierarchical architecture, if the super peer departs (fails), any file queries to its serving regular peers cannot be delivered. In the proposed approach, we propose a multiple publication technique to make each regular peer logically connect with two or more super peers in other groups. If a regular peer finds that its serving super peer cannot work, one of its other connected super peers will be selected as its new serving super peer to continuously process the file queries. To examine the effectiveness of the proposed approach, comprehensive simulations are performed to quantify the performance and overhead of the proposed approach.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126417584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation 无线环境中的入侵容忍:一种实验评估
Henrique Moniz, N. Neves, M. Correia, A. Casimiro, P. Veríssimo
This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also within the context of a car platooning application for distributed cruise control. The experimental evaluation reveals how performance is affected by the various environmental parameters such as the wireless standard, group size, and network topology. The distributed cruise control application demonstrates the practicability of such protocols, even when subjected to malicious faults.
本文对无线局域网中容忍入侵协议的性能进行了研究。这些协议在几种不同的环境设置中进行了评估,并在分布式巡航控制的汽车队列应用程序中进行了评估。实验评估揭示了性能如何受到各种环境参数(如无线标准、组大小和网络拓扑)的影响。分布式巡航控制应用程序证明了这种协议的实用性,即使在遭受恶意故障时也是如此。
{"title":"Intrusion Tolerance in Wireless Environments: An Experimental Evaluation","authors":"Henrique Moniz, N. Neves, M. Correia, A. Casimiro, P. Veríssimo","doi":"10.1109/PRDC.2007.33","DOIUrl":"https://doi.org/10.1109/PRDC.2007.33","url":null,"abstract":"This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also within the context of a car platooning application for distributed cruise control. The experimental evaluation reveals how performance is affected by the various environmental parameters such as the wireless standard, group size, and network topology. The distributed cruise control application demonstrates the practicability of such protocols, even when subjected to malicious faults.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133262721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Model Based Development of Safety-Critical Systems Using Template Based Code Generation 基于模板代码生成的安全关键系统模型开发
M. Regensburger, C. Buckl, A. Knoll, G. Schrott
Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists a huge heterogeneity of used platforms, it is obvious that it is impossible to design a code generator that supports a priori all required platforms. Instead a code generator architecture is needed that is suited for an easy extensibility of the code generation ability. One possible solution is the use of template-based approaches. In this paper, we describe an approach1 to develop safety-critical realtime systems by using open architecture ware, a modular MDA/MDD generator framework. We will present the tool-chain and discuss two lab applications.
基于模型的开发是软件工程中最先进的技术,因为它具有自动代码合成的潜力。然而,对于嵌入式系统来说,使用的平台存在巨大的异质性,很明显,不可能设计一个先验地支持所有所需平台的代码生成器。相反,需要一个适合于代码生成能力易于扩展的代码生成器体系结构。一种可能的解决方案是使用基于模板的方法。在本文中,我们描述了一种使用开放式体系结构软件(一个模块化的MDA/MDD生成器框架)来开发安全关键型实时系统的方法。我们将介绍工具链并讨论两个实验室应用。
{"title":"Model Based Development of Safety-Critical Systems Using Template Based Code Generation","authors":"M. Regensburger, C. Buckl, A. Knoll, G. Schrott","doi":"10.1109/PRDC.2007.25","DOIUrl":"https://doi.org/10.1109/PRDC.2007.25","url":null,"abstract":"Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists a huge heterogeneity of used platforms, it is obvious that it is impossible to design a code generator that supports a priori all required platforms. Instead a code generator architecture is needed that is suited for an easy extensibility of the code generation ability. One possible solution is the use of template-based approaches. In this paper, we describe an approach1 to develop safety-critical realtime systems by using open architecture ware, a modular MDA/MDD generator framework. We will present the tool-chain and discuss two lab applications.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Byzantine Fault Tolerance in Many-Core Computing Platforms 多核计算平台拜占庭容错研究
C. M. Jeffery, R. Figueiredo
This paper presents a flexible technique that can be applied to many-core architectures to exploit idle resources and ensure reliable system operation. A dynamic fault tolerance layer is interposed between the hardware and OS through the use of a hypervisor. The introduction of a single point of failure is avoided by incorporating the hypervisor into the sphere of replication. This approach simplifies implementation over specialized hardware- or OS-based techniques while offering flexibility in the level of protection provided ranging from duplex to Byzantine protection. The feasibility of the approach is considered for both near- and long-term computing platforms.
本文提出了一种灵活的技术,可应用于多核体系结构,以充分利用空闲资源,保证系统可靠运行。通过使用管理程序,在硬件和操作系统之间插入了一个动态容错层。通过将管理程序合并到复制范围中,可以避免引入单点故障。这种方法简化了专用硬件或基于操作系统的技术的实现,同时提供了从双工到拜占庭保护的保护级别的灵活性。考虑了该方法在近期和长期计算平台上的可行性。
{"title":"Towards Byzantine Fault Tolerance in Many-Core Computing Platforms","authors":"C. M. Jeffery, R. Figueiredo","doi":"10.1109/PRDC.2007.40","DOIUrl":"https://doi.org/10.1109/PRDC.2007.40","url":null,"abstract":"This paper presents a flexible technique that can be applied to many-core architectures to exploit idle resources and ensure reliable system operation. A dynamic fault tolerance layer is interposed between the hardware and OS through the use of a hypervisor. The introduction of a single point of failure is avoided by incorporating the hypervisor into the sphere of replication. This approach simplifies implementation over specialized hardware- or OS-based techniques while offering flexibility in the level of protection provided ranging from duplex to Byzantine protection. The feasibility of the approach is considered for both near- and long-term computing platforms.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improving Email Reliability by Sender Retransmission 通过发件人重传提高电子邮件的可靠性
T. Moors, P. Chu
While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of e-mail, which passes responsibility for delivering email from one mail server to another, but in doing so exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to email unreliability than others, and seek tools with which they can detect and recover from email failures. This paper describes tools that allow email sending software to automatically respond to reports of undeliverability by persisting with retransmission or retransmitting to alternate recipients.
虽然电子邮件相当可靠,但信息确实会丢失。这可能是由于电子邮件的存储和转发特性,它将将电子邮件从一个邮件服务器传递到另一个邮件服务器的责任,但如果服务器没有履行其责任,那么这样做会导致消息丢失。一些终端用户对电子邮件的不可靠性比其他人更敏感,他们会寻找能够检测和恢复电子邮件故障的工具。本文描述了一些工具,这些工具允许电子邮件发送软件通过坚持重新传输或重新传输到备用收件人来自动响应无法交付的报告。
{"title":"Improving Email Reliability by Sender Retransmission","authors":"T. Moors, P. Chu","doi":"10.1109/PRDC.2007.38","DOIUrl":"https://doi.org/10.1109/PRDC.2007.38","url":null,"abstract":"While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of e-mail, which passes responsibility for delivering email from one mail server to another, but in doing so exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to email unreliability than others, and seek tools with which they can detect and recover from email failures. This paper describes tools that allow email sending software to automatically respond to reports of undeliverability by persisting with retransmission or retransmitting to alternate recipients.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Eventual Leadership in Dynamic Mobile Networking Environments 动态移动网络环境的最终领导地位
Jiannong Cao, M. Raynal, Corentin Travers, Weigang Wu
Eventual leadership has been identified as a basic building block to solve synchronization or coordination problems in distributed computing systems. However, it is a challenging task to implement the eventual leadership facility, especially in dynamic distributed systems, where the global system structure is unknown to the processes and can vary over time. This paper studies the implementation of a leadership facility in infrastructured mobile networks, where an unbounded set of mobile hosts arbitrarily move in the area covered by fixed mobile support stations. Mobile hosts can crash and suffer from disconnections. We develop an eventual leadership protocol based on a time-free approach. The mobile support stations exchange queries and responses on behalf of mobile hosts. With assumptions on the message exchange flow, a correct mobile host is eventually elected as the unique leader. Since no time property is assumed on the communication channels, the proposed protocol is especially effective and efficient in mobile environments, where time-based properties are difficult to satisfy due to the dynamics of the network.
最终领导已被确定为解决分布式计算系统中同步或协调问题的基本构建块。然而,实现最终的领导设施是一项具有挑战性的任务,特别是在动态分布式系统中,其中全局系统结构对于过程是未知的,并且可能随着时间而变化。本文研究了一种基于基础设施移动网络的领导设施的实现,其中一组无界的移动主机在固定移动支持站覆盖的区域内任意移动。移动主机可能会崩溃并遭受连接中断的痛苦。我们根据无时间限制的方法制定了最终的领导协议。移动支持站代表移动主机交换查询和响应。通过对消息交换流的假设,最终选出一个正确的移动主机作为唯一的leader。由于在通信信道上不假设时间属性,因此所提出的协议在移动环境中特别有效,在移动环境中,由于网络的动态性,难以满足基于时间的属性。
{"title":"The Eventual Leadership in Dynamic Mobile Networking Environments","authors":"Jiannong Cao, M. Raynal, Corentin Travers, Weigang Wu","doi":"10.1109/PRDC.2007.27","DOIUrl":"https://doi.org/10.1109/PRDC.2007.27","url":null,"abstract":"Eventual leadership has been identified as a basic building block to solve synchronization or coordination problems in distributed computing systems. However, it is a challenging task to implement the eventual leadership facility, especially in dynamic distributed systems, where the global system structure is unknown to the processes and can vary over time. This paper studies the implementation of a leadership facility in infrastructured mobile networks, where an unbounded set of mobile hosts arbitrarily move in the area covered by fixed mobile support stations. Mobile hosts can crash and suffer from disconnections. We develop an eventual leadership protocol based on a time-free approach. The mobile support stations exchange queries and responses on behalf of mobile hosts. With assumptions on the message exchange flow, a correct mobile host is eventually elected as the unique leader. Since no time property is assumed on the communication channels, the proposed protocol is especially effective and efficient in mobile environments, where time-based properties are difficult to satisfy due to the dynamics of the network.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1