首页 > 最新文献

Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing最新文献

英文 中文
Session details: Session 1A: Persistent Memory 会话详细信息:会话1A: Persistent Memory
I. Keidar
{"title":"Session details: Session 1A: Persistent Memory","authors":"I. Keidar","doi":"10.1145/3258695","DOIUrl":"https://doi.org/10.1145/3258695","url":null,"abstract":"","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brief Announcement: Graph Exploration Using Constant-Size Memory and Storage 简短公告:图形探索使用恒定大小的内存和存储
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212780
Naoki Kitamura, Kazuki Kakizawa, Yuya Kawabata, Taisuke Izumi
We consider the exploration problem in undirected graphs without node labels, which requires that a mobile agent initially placed at an arbitrary node visits all nodes and terminates. We assume that both of the agent and nodes are equipped with little memory, and the algorithm cannot use any initial knowledge on the topology of the graph. In this paper, we propose a new deterministic polynomial-time exploration (more precisely, depth-first search) algorithm which can be implemented using only O(1)-bit memory of the agent and O(1)-bit storage for each node. To the best of our knowledge, this is the first polynomial-time exploration algorithm achieving both sublogarithmic memory and sublogarithmic storage. The technical ingredient of our algorithm consists of the idea from the recent progress on small-space DFS algorithms by Asano et al. [ISAAC2014] and Elmasry et al. [STACS2015], and a new distributed backtrack algorithm for DFS paths. The algorithm also includes a new compact (i.e., using O(1)-bit storage) s-t path maintenance mechanism, which may be of independent interest.
我们考虑无向图中无节点标签的探索问题,该问题要求初始放置在任意节点的移动代理访问所有节点并终止。我们假设agent和节点都只有很少的内存,并且算法不能使用任何关于图拓扑的初始知识。在本文中,我们提出了一种新的确定性多项式时间探索(更准确地说,深度优先搜索)算法,该算法可以仅使用智能体的O(1)位内存和每个节点的O(1)位存储来实现。据我们所知,这是第一个实现次对数记忆和次对数存储的多项式时间探索算法。我们算法的技术成分包括Asano等人[ISAAC2014]和Elmasry等人[STACS2015]在小空间DFS算法上的最新进展,以及一种新的DFS路径分布式回溯算法。该算法还包括一个新的紧凑(即使用O(1)位存储)s-t路径维护机制,这可能是一个独立的兴趣。
{"title":"Brief Announcement: Graph Exploration Using Constant-Size Memory and Storage","authors":"Naoki Kitamura, Kazuki Kakizawa, Yuya Kawabata, Taisuke Izumi","doi":"10.1145/3212734.3212780","DOIUrl":"https://doi.org/10.1145/3212734.3212780","url":null,"abstract":"We consider the exploration problem in undirected graphs without node labels, which requires that a mobile agent initially placed at an arbitrary node visits all nodes and terminates. We assume that both of the agent and nodes are equipped with little memory, and the algorithm cannot use any initial knowledge on the topology of the graph. In this paper, we propose a new deterministic polynomial-time exploration (more precisely, depth-first search) algorithm which can be implemented using only O(1)-bit memory of the agent and O(1)-bit storage for each node. To the best of our knowledge, this is the first polynomial-time exploration algorithm achieving both sublogarithmic memory and sublogarithmic storage. The technical ingredient of our algorithm consists of the idea from the recent progress on small-space DFS algorithms by Asano et al. [ISAAC2014] and Elmasry et al. [STACS2015], and a new distributed backtrack algorithm for DFS paths. The algorithm also includes a new compact (i.e., using O(1)-bit storage) s-t path maintenance mechanism, which may be of independent interest.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1C: Wireless Networks 会议详情:会议1C:无线网络
J. Burman
{"title":"Session details: Session 1C: Wireless Networks","authors":"J. Burman","doi":"10.1145/3258697","DOIUrl":"https://doi.org/10.1145/3258697","url":null,"abstract":"","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129428059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 2C: Security, Blockchains, and Replication 会话详细信息:会话2C:安全性,区块链和复制
G. Chockler
{"title":"Session details: Session 2C: Security, Blockchains, and Replication","authors":"G. Chockler","doi":"10.1145/3258701","DOIUrl":"https://doi.org/10.1145/3258701","url":null,"abstract":"","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124647414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1D: Graph Algorithms 会话详细信息:会话1D: Graph Algorithms
Peter Robinson
{"title":"Session details: Session 1D: Graph Algorithms","authors":"Peter Robinson","doi":"10.1145/3258698","DOIUrl":"https://doi.org/10.1145/3258698","url":null,"abstract":"","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relaxed Schedulers Can Efficiently Parallelize Iterative Algorithms 放松调度可以有效地并行化迭代算法
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212756
Dan Alistarh, Trevor Brown, Justin Kopinsky, Giorgi Nadiradze
There has been significant progress in understanding the parallelism inherent to iterative sequential algorithms: for many classic algorithms, the depth of the dependence structure is now well understood, and scheduling techniques have been developed to exploit this shallow dependence structure for efficient parallel implementations. A related, applied research strand has studied methods by which certain iterative task-based algorithms can be efficiently parallelized via relaxed concurrent priority schedulers. These allow for high concurrency when inserting and removing tasks, at the cost of executing superfluous work due to the relaxed semantics of the scheduler. In this work, we take a step towards unifying these two research directions, by showing that there exists a family of relaxed priority schedulers that can efficiently and deterministically execute classic iterative algorithms such as greedy maximal independent set (MIS) and matching. Our primary result shows that, given a randomized scheduler with an expected relaxation factor of k in terms of the maximum allowed priority inversions on a task, and any graph on n vertices, the scheduler is able to execute greedy MIS with only an additive factor of poly(k) expected additional iterations compared to an exact (but not scalable) scheduler. This counter-intuitive result demonstrates that the overhead of relaxation when computing MIS is not dependent on the input size or structure of the input graph. Experimental results show that this overhead can be clearly offset by the gain in performance due to the highly scalable scheduler. In sum, we present an efficient method to deterministically parallelize iterative sequential algorithms, with provable runtime guarantees in terms of the number of executed tasks to completion.
在理解迭代顺序算法固有的并行性方面已经取得了重大进展:对于许多经典算法,现在已经很好地理解了依赖结构的深度,并且已经开发了调度技术来利用这种浅层依赖结构来实现高效的并行。一个相关的应用研究链研究了一些基于迭代任务的算法可以通过放松的并发优先级调度来有效地并行化的方法。这允许在插入和删除任务时实现高并发性,但代价是由于调度器的宽松语义而导致执行多余的工作。在这项工作中,我们向统一这两个研究方向迈出了一步,通过证明存在一组放松优先级调度程序,它们可以有效地和确定性地执行经典的迭代算法,如贪婪最大独立集(MIS)和匹配。我们的主要结果表明,给定一个随机调度器,其预期松弛因子为k(就任务上允许的最大优先级反转而言),以及n个顶点上的任何图,与精确(但不可伸缩)调度器相比,该调度器能够执行贪婪MIS,其附加因子为poly(k),预期额外迭代。这个反直觉的结果表明,计算MIS时的松弛开销不依赖于输入图的大小或结构。实验结果表明,由于高度可伸缩的调度器,这种开销可以明显地被性能增益所抵消。总之,我们提出了一种有效的方法来确定并行化迭代顺序算法,在执行任务完成的数量方面具有可证明的运行时间保证。
{"title":"Relaxed Schedulers Can Efficiently Parallelize Iterative Algorithms","authors":"Dan Alistarh, Trevor Brown, Justin Kopinsky, Giorgi Nadiradze","doi":"10.1145/3212734.3212756","DOIUrl":"https://doi.org/10.1145/3212734.3212756","url":null,"abstract":"There has been significant progress in understanding the parallelism inherent to iterative sequential algorithms: for many classic algorithms, the depth of the dependence structure is now well understood, and scheduling techniques have been developed to exploit this shallow dependence structure for efficient parallel implementations. A related, applied research strand has studied methods by which certain iterative task-based algorithms can be efficiently parallelized via relaxed concurrent priority schedulers. These allow for high concurrency when inserting and removing tasks, at the cost of executing superfluous work due to the relaxed semantics of the scheduler. In this work, we take a step towards unifying these two research directions, by showing that there exists a family of relaxed priority schedulers that can efficiently and deterministically execute classic iterative algorithms such as greedy maximal independent set (MIS) and matching. Our primary result shows that, given a randomized scheduler with an expected relaxation factor of k in terms of the maximum allowed priority inversions on a task, and any graph on n vertices, the scheduler is able to execute greedy MIS with only an additive factor of poly(k) expected additional iterations compared to an exact (but not scalable) scheduler. This counter-intuitive result demonstrates that the overhead of relaxation when computing MIS is not dependent on the input size or structure of the input graph. Experimental results show that this overhead can be clearly offset by the gain in performance due to the highly scalable scheduler. In sum, we present an efficient method to deterministically parallelize iterative sequential algorithms, with provable runtime guarantees in terms of the number of executed tasks to completion.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Brief Announcement: Performance Prediction for Coarse-Grained Locking 简要公告:粗粒度锁的性能预测
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212785
V. Aksenov, Dan Alistarh, P. Kuznetsov
A standard design pattern found in many concurrent data structures, such as hash tables or ordered containers, is an alternation of parallelizable sections that incur no data conflicts and critical sections that must run sequentially and are protected with locks. A lock can be viewed as a queue that arbitrates the order in which the critical sections are executed, and a natural question is whether we can use stochastic analysis to predict the resulting throughput. As a preliminary evidence to the affirmative, we describe a simple model that can be used to predict the throughput of coarse-grained lock-based algorithms. We show that our model works well for CLH lock, and we expect it to work for other popular lock designs such as TTAS, MCS, etc.
在许多并发数据结构(如哈希表或有序容器)中发现的一个标准设计模式是,交替使用不会产生数据冲突的可并行区和必须按顺序运行并受锁保护的临界区。锁可以被看作是一个队列,它决定了执行临界区的顺序,一个自然的问题是我们是否可以使用随机分析来预测结果吞吐量。作为肯定的初步证据,我们描述了一个简单的模型,可用于预测粗粒度基于锁的算法的吞吐量。我们表明,我们的模型适用于CLH锁,我们希望它适用于其他流行的锁设计,如TTAS, MCS等。
{"title":"Brief Announcement: Performance Prediction for Coarse-Grained Locking","authors":"V. Aksenov, Dan Alistarh, P. Kuznetsov","doi":"10.1145/3212734.3212785","DOIUrl":"https://doi.org/10.1145/3212734.3212785","url":null,"abstract":"A standard design pattern found in many concurrent data structures, such as hash tables or ordered containers, is an alternation of parallelizable sections that incur no data conflicts and critical sections that must run sequentially and are protected with locks. A lock can be viewed as a queue that arbitrates the order in which the critical sections are executed, and a natural question is whether we can use stochastic analysis to predict the resulting throughput. As a preliminary evidence to the affirmative, we describe a simple model that can be used to predict the throughput of coarse-grained lock-based algorithms. We show that our model works well for CLH lock, and we expect it to work for other popular lock designs such as TTAS, MCS, etc.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Session details: Session 3D: Graphs and Population 会议详情:会议3D:图表和人口
Michael Elkin
{"title":"Session details: Session 3D: Graphs and Population","authors":"Michael Elkin","doi":"10.1145/3258705","DOIUrl":"https://doi.org/10.1145/3258705","url":null,"abstract":"","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Self-Stabilization to Self-Optimization: Principles of Distributed Network Design 从自稳定到自优化:分布式网络设计原理
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212801
S. Schmid
The tutorial provides an overview of the principles and "pearls'' of constructing, maintaining and optimizing network topologies, such as peer-to-peer overlays or datacenter interconnects. The tutorial consists of two parts: Self-stabilization: In the first part, we start simple by discussing basic mechanisms to reconfigure networks while maintaining connectivity. You will then learn how to design and analyze self-stabilizing algorithms for line topologies as well as more sophisticated networks such as hypercubes. A self-stabilizing algorithm guarantees that the network will automatically reconfigure to a "good topology" from an arbitrary initial state. Self-optimization: After we have learned how to design self-stabilizing networks, we will consider algorithms to design self-adjusting resp. "self-optimizing" networks: networks which not only "repair" themselves but also optimize themselves towards the demand. The study of such self-adjusting networks is motivated by emerging technologies in the context of datacenters and wide-area networks, allowing to reconfigure networks at runtime.
本教程概述了构建、维护和优化网络拓扑(如点对点覆盖或数据中心互连)的原则和“要点”。本教程由两个部分组成:自稳定:在第一部分中,我们从简单的开始,讨论在保持连接的同时重新配置网络的基本机制。然后,您将学习如何设计和分析线拓扑以及更复杂的网络(如超立方体)的自稳定算法。自稳定算法保证网络将从任意初始状态自动重新配置为“良好拓扑”。自优化:在学习了如何设计自稳定网络之后,我们将考虑设计自调整响应的算法。“自优化”网络:既能“修复”自身,又能根据需求进行自我优化的网络。这种自我调整网络的研究是由数据中心和广域网背景下的新兴技术推动的,允许在运行时重新配置网络。
{"title":"From Self-Stabilization to Self-Optimization: Principles of Distributed Network Design","authors":"S. Schmid","doi":"10.1145/3212734.3212801","DOIUrl":"https://doi.org/10.1145/3212734.3212801","url":null,"abstract":"The tutorial provides an overview of the principles and \"pearls'' of constructing, maintaining and optimizing network topologies, such as peer-to-peer overlays or datacenter interconnects. The tutorial consists of two parts: Self-stabilization: In the first part, we start simple by discussing basic mechanisms to reconfigure networks while maintaining connectivity. You will then learn how to design and analyze self-stabilizing algorithms for line topologies as well as more sophisticated networks such as hypercubes. A self-stabilizing algorithm guarantees that the network will automatically reconfigure to a \"good topology\" from an arbitrary initial state. Self-optimization: After we have learned how to design self-stabilizing networks, we will consider algorithms to design self-adjusting resp. \"self-optimizing\" networks: networks which not only \"repair\" themselves but also optimize themselves towards the demand. The study of such self-adjusting networks is motivated by emerging technologies in the context of datacenters and wide-area networks, allowing to reconfigure networks at runtime.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131459447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Brief Announcement: MUSIC: Multi-Site Entry Consistencyfor Geo-Distributed Services 简要公告:MUSIC:地理分布式服务的多站点输入一致性
Pub Date : 2018-07-23 DOI: 10.1145/3212734.3212782
Bharath Balasubramanian, R. Schlichting, P. Zave
Geo-distributed services that are executed across multiple sites at a global scale are increasingly prevalent, and are at the core of the control plane tasked with managing the Virtual Network Functions (VNFs) of next-generation network infrastructure. A key building block of any replicated service of this type is logically shared state, an abstraction that is often implemented by having multiple copies of each data element and using one of any number of distributed protocols to enforce consistency with guarantees ranging from eventual to causal to sequential consistency. These solutions fail to meet the real needs of geo-distributed services found in a VNF control plane (and elsewhere), which are to provide guarantees strong enough to be useful, yet still efficiently implementable in a global network with larger latencies and a wider range of failure modes. Here, we propose a new solution to state consistency based on extending entry consistency, a paradigm originally developed for failure-free multi-processor systems, for use in geo-distributed services with failures. We outline the challenges associated with state consistency in such services, and describe a data-store called MUSIC (MUlti-SIte entry Consistency) that combines an eventually consistent key-value store with locking primitives to implement entry-consistent semantics.
在全球范围内跨多个站点执行的地理分布式服务越来越普遍,并且处于负责管理下一代网络基础设施的虚拟网络功能(VNFs)的控制平面的核心。任何这种类型的复制服务的关键构建块都是逻辑共享状态,这是一种抽象,通常通过拥有每个数据元素的多个副本并使用任意数量的分布式协议中的一种来实现一致性,保证范围从最终一致性到因果一致性到顺序一致性。这些解决方案无法满足在VNF控制平面(和其他地方)中发现的地理分布式服务的实际需求,这些服务需要提供足够强大的保证以使其有用,但仍然可以在具有更大延迟和更广泛故障模式的全球网络中有效实现。在这里,我们提出了一种基于扩展入口一致性的状态一致性的新解决方案,这是一种最初为无故障多处理器系统开发的范例,用于具有故障的地理分布式服务。我们概述了这类服务中与状态一致性相关的挑战,并描述了一个名为MUSIC (MUlti-SIte entry consistency)的数据存储,它将最终一致的键值存储与锁定原语相结合,以实现入口一致性语义。
{"title":"Brief Announcement: MUSIC: Multi-Site Entry Consistencyfor Geo-Distributed Services","authors":"Bharath Balasubramanian, R. Schlichting, P. Zave","doi":"10.1145/3212734.3212782","DOIUrl":"https://doi.org/10.1145/3212734.3212782","url":null,"abstract":"Geo-distributed services that are executed across multiple sites at a global scale are increasingly prevalent, and are at the core of the control plane tasked with managing the Virtual Network Functions (VNFs) of next-generation network infrastructure. A key building block of any replicated service of this type is logically shared state, an abstraction that is often implemented by having multiple copies of each data element and using one of any number of distributed protocols to enforce consistency with guarantees ranging from eventual to causal to sequential consistency. These solutions fail to meet the real needs of geo-distributed services found in a VNF control plane (and elsewhere), which are to provide guarantees strong enough to be useful, yet still efficiently implementable in a global network with larger latencies and a wider range of failure modes. Here, we propose a new solution to state consistency based on extending entry consistency, a paradigm originally developed for failure-free multi-processor systems, for use in geo-distributed services with failures. We outline the challenges associated with state consistency in such services, and describe a data-store called MUSIC (MUlti-SIte entry Consistency) that combines an eventually consistent key-value store with locking primitives to implement entry-consistent semantics.","PeriodicalId":198284,"journal":{"name":"Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1