首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
Sublinear-time mutual visibility for fat oblivious robots 肥胖遗忘机器人的亚线性时间互可见性
Pavan Poudel, Gokarna Sharma, Aisha Aljohani
We consider a system of N autonomous mobile robots that operate following the classic oblivious robots model. In particular, we consider fat robots abstracted as unit discs operating on an infinite grid graph G (embedded on the Euclidean plane), and study the fundamental problem, where starting from an arbitrary initial configuration, N autonomous robots reposition themselves on the nodes of G to reach a configuration where each robot is visible to all others (the Complete Visibility problem). We provide the first [MATH HERE]-time algorithm for this problem under a centralized scheduler. We also show that the algorithm is asymptotically tight, i.e., even under a centralized scheduler, any algorithm needs [MATH HERE] time for this problem. We then provide the first [MATH HERE]-time algorithm for this problem under a distributed scheduler for a special initial configuration. To the best of our knowledge, these are the first sublinear-time results for the visibility of fat oblivious robots.
我们考虑一个由N个自主移动机器人组成的系统,它们遵循经典的遗忘机器人模型。特别是,我们将肥胖机器人抽象为在无限网格图G(嵌入欧几里德平面)上操作的单位圆盘,并研究基本问题,其中从任意初始配置开始,N个自主机器人在G的节点上重新定位自己,以达到每个机器人对所有其他机器人可见的配置(完全可见性问题)。我们在集中式调度程序下为这个问题提供了第一个[MATH HERE]时间算法。我们还证明了该算法是渐近紧密的,即,即使在集中式调度程序下,任何算法都需要[MATH HERE]时间来解决这个问题。然后,我们在一个特殊初始配置的分布式调度程序下为这个问题提供了第一个[MATH HERE]时间算法。据我们所知,这是第一个关于肥胖机器人可见性的亚线性时间结果。
{"title":"Sublinear-time mutual visibility for fat oblivious robots","authors":"Pavan Poudel, Gokarna Sharma, Aisha Aljohani","doi":"10.1145/3288599.3288602","DOIUrl":"https://doi.org/10.1145/3288599.3288602","url":null,"abstract":"We consider a system of N autonomous mobile robots that operate following the classic oblivious robots model. In particular, we consider fat robots abstracted as unit discs operating on an infinite grid graph G (embedded on the Euclidean plane), and study the fundamental problem, where starting from an arbitrary initial configuration, N autonomous robots reposition themselves on the nodes of G to reach a configuration where each robot is visible to all others (the Complete Visibility problem). We provide the first [MATH HERE]-time algorithm for this problem under a centralized scheduler. We also show that the algorithm is asymptotically tight, i.e., even under a centralized scheduler, any algorithm needs [MATH HERE] time for this problem. We then provide the first [MATH HERE]-time algorithm for this problem under a distributed scheduler for a special initial configuration. To the best of our knowledge, these are the first sublinear-time results for the visibility of fat oblivious robots.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reconfigurable dataflow graphs for processing-in-memory 用于内存处理的可重构数据流图
C. Shelor, K. Kavi
In order to meet the ever-increasing speed differences between processor clocks and memory access times, there has been an interest in moving computation closer to memory. The near data processing or processing-in-memory is particularly suited for very high bandwidth memories such as the 3D-DRAMs. There are different ideas proposed for PIMs, including simple in-order processors, GPUs, specialized ASICs and reconfigurable designs. In our case, we use Coarse-Grained Reconfigurable Logic to build dataflow graphs for computational kernels as the PIM. We show that our approach can achieve significant speedups and save energy consumed by computations. We evaluated our designs using several processing technologies for building the coarse-gained logic units. The DFPIM concept showed good performance improvement and excellent energy efficiency for the streaming benchmarks that were analyzed. The DFPIM in a 28 nm process with an implementation in each of 16 vaults of a 3D-DRAM logic layer showed an average speed-up of 7.2 over that using 32 cores of an Intel Xeon server system. The server processor required 368 times more energy to execute the benchmarks than the DFPIM implementation.
为了满足处理器时钟和内存访问时间之间不断增长的速度差异,人们对将计算移到更靠近内存的地方很感兴趣。近数据处理或内存处理特别适合于非常高带宽的存储器,如3d - dram。针对pim提出了不同的想法,包括简单的顺序处理器、gpu、专用asic和可重构设计。在我们的示例中,我们使用粗粒度可重构逻辑为计算内核构建数据流图作为PIM。我们表明,我们的方法可以实现显着的加速和节省能源消耗的计算。我们使用几种处理技术来评估我们的设计,以构建粗获得的逻辑单元。DFPIM概念在分析的流基准测试中显示出良好的性能改进和卓越的能源效率。在3D-DRAM逻辑层的16个vault中实现的28 nm工艺中的DFPIM比使用32核英特尔至强服务器系统的平均速度提高了7.2。服务器处理器执行基准测试所需的能量是DFPIM实现的368倍。
{"title":"Reconfigurable dataflow graphs for processing-in-memory","authors":"C. Shelor, K. Kavi","doi":"10.1145/3288599.3288605","DOIUrl":"https://doi.org/10.1145/3288599.3288605","url":null,"abstract":"In order to meet the ever-increasing speed differences between processor clocks and memory access times, there has been an interest in moving computation closer to memory. The near data processing or processing-in-memory is particularly suited for very high bandwidth memories such as the 3D-DRAMs. There are different ideas proposed for PIMs, including simple in-order processors, GPUs, specialized ASICs and reconfigurable designs. In our case, we use Coarse-Grained Reconfigurable Logic to build dataflow graphs for computational kernels as the PIM. We show that our approach can achieve significant speedups and save energy consumed by computations. We evaluated our designs using several processing technologies for building the coarse-gained logic units. The DFPIM concept showed good performance improvement and excellent energy efficiency for the streaming benchmarks that were analyzed. The DFPIM in a 28 nm process with an implementation in each of 16 vaults of a 3D-DRAM logic layer showed an average speed-up of 7.2 over that using 32 cores of an Intel Xeon server system. The server processor required 368 times more energy to execute the benchmarks than the DFPIM implementation.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
To protect ecological system from electromagnetic radiation of mobile communication 保护生态系统免受移动通信的电磁辐射
Avirup Das, Srabani Kundu
The ever-increasing use of mobile phones, IoT, and the related infrastructures like wireless access points and mobile base stations is becoming a prominent source of non-ionizing electromagnetic field (EMF) having some harmful effects on our ecology. In this work, the effect of the non-ionizing electromagnetic radiation of BTS (Base Transceiver Station) and the Wi-Fi access points on our ecological system has been investigated over frequency band 900 MHz to 2500 MHz. A testbed is designed utilizing sensors to measure the EMF strength over a given region, and a heat map is generated. Using the standard safe limit of specific absorption rate (SAR) this heat map may enable us to issue alerts whenever the measured EMF exceeds the SAR limit. The stream of data from these sensors may be uploaded on a cloud to implement an adaptive transmitter power control mechanism to reduce the signal strength dynamically to maintain the safe limit of SAR. A modular design is proposed to implement a cloud-based transmission power control mechanism that can be applied for BTS as well as Wi-Fi routers in cellular networks.
移动电话、物联网以及无线接入点和移动基站等相关基础设施的使用日益增加,正成为非电离电磁场(EMF)的主要来源,对我们的生态产生了一些有害影响。在这项工作中,研究了900 MHz至2500 MHz频段上BTS (Base Transceiver Station)和Wi-Fi接入点的非电离电磁辐射对我们生态系统的影响。设计了一个试验台,利用传感器测量给定区域的电动势强度,并生成热图。使用特定吸收率(SAR)的标准安全限值,该热图可使我们在测量的EMF超过SAR限值时发出警报。这些传感器的数据流可以上传到云端,实现自适应的发射功率控制机制,动态降低信号强度,以保持SAR的安全极限。提出了一种模块化设计,实现基于云的发射功率控制机制,可应用于蜂窝网络中的BTS和Wi-Fi路由器。
{"title":"To protect ecological system from electromagnetic radiation of mobile communication","authors":"Avirup Das, Srabani Kundu","doi":"10.1145/3288599.3295595","DOIUrl":"https://doi.org/10.1145/3288599.3295595","url":null,"abstract":"The ever-increasing use of mobile phones, IoT, and the related infrastructures like wireless access points and mobile base stations is becoming a prominent source of non-ionizing electromagnetic field (EMF) having some harmful effects on our ecology. In this work, the effect of the non-ionizing electromagnetic radiation of BTS (Base Transceiver Station) and the Wi-Fi access points on our ecological system has been investigated over frequency band 900 MHz to 2500 MHz. A testbed is designed utilizing sensors to measure the EMF strength over a given region, and a heat map is generated. Using the standard safe limit of specific absorption rate (SAR) this heat map may enable us to issue alerts whenever the measured EMF exceeds the SAR limit. The stream of data from these sensors may be uploaded on a cloud to implement an adaptive transmitter power control mechanism to reduce the signal strength dynamically to maintain the safe limit of SAR. A modular design is proposed to implement a cloud-based transmission power control mechanism that can be applied for BTS as well as Wi-Fi routers in cellular networks.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129222388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-tenant mobile offloading systems for real-time computer vision applications 用于实时计算机视觉应用的多租户移动卸载系统
Zhou Fang, Jeng-Hau Lin, M. Srivastava, Rajesh K. Gupta
Offloading techniques enable many emerging computer vision applications on mobile platforms by executing compute-intensive tasks on resource-rich servers. Although there have been a significant amount of research efforts devoted in optimizing mobile offloading frameworks, most previous works are evaluated in a single-tenant setting, that is, a server is assigned to a single client. However, in a practical scenario that servers must handle tasks from many clients running diverse applications, contention on shared server resources may degrade application performance. In this work, we study scheduling techniques to improve serving performance in multi-tenant mobile offloading systems, for computer vision algorithms running on CPUs and deep neural networks (DNNs) running on GPUs. For CPU workloads, we present methods to mitigate resource contention and to improve delay using a Plan-Schedule approach. The planning phase predicts future workloads from all clients, estimates contention, and adjusts future task start times to remove or reduce contention. The scheduling phase dispatches arriving offloaded tasks to the server that minimizes contention. For DNN workloads running on GPUs, we propose adaptive batching algorithms using information of batch size, model complexity and system load to achieve the best Quality of Service (QoS), which are measured from accuracy and delay of DNN tasks. We demonstrate the improvement of serving performance using several real-world applications with different server deployments.
卸载技术通过在资源丰富的服务器上执行计算密集型任务,使许多新兴的计算机视觉应用程序能够在移动平台上运行。尽管在优化移动卸载框架方面已经进行了大量的研究工作,但大多数先前的工作都是在单租户设置中进行评估的,即将服务器分配给单个客户端。但是,在服务器必须处理来自运行不同应用程序的许多客户机的任务的实际场景中,对共享服务器资源的争用可能会降低应用程序的性能。在这项工作中,我们研究了调度技术,以提高多租户移动卸载系统中运行在cpu上的计算机视觉算法和运行在gpu上的深度神经网络(dnn)的服务性能。对于CPU工作负载,我们提出了使用计划-调度方法来减轻资源争用和改善延迟的方法。规划阶段预测来自所有客户机的未来工作负载,估计争用,并调整未来的任务启动时间以消除或减少争用。调度阶段将到达的卸载任务分派给最大限度减少争用的服务器。对于在gpu上运行的DNN工作负载,我们提出了自适应批处理算法,利用批处理大小、模型复杂性和系统负载的信息来实现最佳的服务质量(QoS),这是从DNN任务的准确性和延迟来衡量的。我们使用几个具有不同服务器部署的实际应用程序来演示服务性能的改进。
{"title":"Multi-tenant mobile offloading systems for real-time computer vision applications","authors":"Zhou Fang, Jeng-Hau Lin, M. Srivastava, Rajesh K. Gupta","doi":"10.1145/3288599.3288634","DOIUrl":"https://doi.org/10.1145/3288599.3288634","url":null,"abstract":"Offloading techniques enable many emerging computer vision applications on mobile platforms by executing compute-intensive tasks on resource-rich servers. Although there have been a significant amount of research efforts devoted in optimizing mobile offloading frameworks, most previous works are evaluated in a single-tenant setting, that is, a server is assigned to a single client. However, in a practical scenario that servers must handle tasks from many clients running diverse applications, contention on shared server resources may degrade application performance. In this work, we study scheduling techniques to improve serving performance in multi-tenant mobile offloading systems, for computer vision algorithms running on CPUs and deep neural networks (DNNs) running on GPUs. For CPU workloads, we present methods to mitigate resource contention and to improve delay using a Plan-Schedule approach. The planning phase predicts future workloads from all clients, estimates contention, and adjusts future task start times to remove or reduce contention. The scheduling phase dispatches arriving offloaded tasks to the server that minimizes contention. For DNN workloads running on GPUs, we propose adaptive batching algorithms using information of batch size, model complexity and system load to achieve the best Quality of Service (QoS), which are measured from accuracy and delay of DNN tasks. We demonstrate the improvement of serving performance using several real-world applications with different server deployments.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scheduling virtual wifi interfaces for high bandwidth video upstreaming using multipath TCP 调度虚拟wifi接口,使用多路径TCP实现高带宽视频上行
Shobhi Maheshwari, Philip Lundrigan, S. Kasera
Live video upstreaming refers to the flow of live data in the upstream direction from mobile devices to other entities across the Internet and has found use in many modern applications such as remote driving, the recent social media trend of live video broadcasting along with the traditional applications of video calling/conferencing. Combined with the high definition video capturing capabilities of modern mobile devices, live video upstreaming is creating more upstream data traffic then what present day cellular networks are equipped to support, often resulting in sub-optimal video experience, especially in remote or crowded areas with low cellular connectivity and no WiFi. We propose that instead of using its single cellular connection, a mobile device connects to multiple nearby mobile devices and splits the live video data over the cellular bandwidth of these devices using Multipath TCP protocol. The use of MPTCP, for upstreaming live video data, has largely remained unexplored especially for scenarios where WiFi connectivity is not available. We use wireless interface virtualization, offered by Linux, to enable Multipath TCP to scale and connect to a large number of cellular devices. We design and build a system that is able to assess the instantaneous bandwidth of all the connected cellular devices/hotspots and uses the set of the most capable cellular devices for splitting and forwarding the live video data. We test our system in various settings and our experiments show that our system greatly increases the bandwidth and reliability of TCP connections in most cases and in cases where there is a significant difference in the throughput across cellular hotspots, our solution is able to recognize and isolate the better performing cellular hotspots to provide a stable throughput.
视频直播是指实时数据在互联网上从移动设备向其他实体的上游方向流动,在许多现代应用中都有应用,例如远程驾驶、最近的社交媒体趋势视频直播以及视频通话/会议等传统应用。结合现代移动设备的高清视频捕捉功能,实时视频上行流产生的上游数据流量比目前的蜂窝网络所能支持的要多,这通常会导致视频体验不佳,特别是在蜂窝网络连接低且没有WiFi的偏远或拥挤地区。我们建议,移动设备不使用单个蜂窝连接,而是连接到附近的多个移动设备,并使用多路径TCP协议在这些设备的蜂窝带宽上分割实时视频数据。MPTCP用于上行直播视频数据的使用在很大程度上仍未被探索,特别是在没有WiFi连接的情况下。我们使用Linux提供的无线接口虚拟化,使Multipath TCP能够扩展并连接到大量的蜂窝设备。我们设计并构建了一个系统,该系统能够评估所有连接的蜂窝设备/热点的瞬时带宽,并使用一组最强大的蜂窝设备来分割和转发实时视频数据。我们在各种设置中测试了我们的系统,我们的实验表明,我们的系统在大多数情况下大大增加了TCP连接的带宽和可靠性,并且在蜂窝热点之间的吞吐量存在显着差异的情况下,我们的解决方案能够识别和隔离性能较好的蜂窝热点,以提供稳定的吞吐量。
{"title":"Scheduling virtual wifi interfaces for high bandwidth video upstreaming using multipath TCP","authors":"Shobhi Maheshwari, Philip Lundrigan, S. Kasera","doi":"10.1145/3288599.3288620","DOIUrl":"https://doi.org/10.1145/3288599.3288620","url":null,"abstract":"Live video upstreaming refers to the flow of live data in the upstream direction from mobile devices to other entities across the Internet and has found use in many modern applications such as remote driving, the recent social media trend of live video broadcasting along with the traditional applications of video calling/conferencing. Combined with the high definition video capturing capabilities of modern mobile devices, live video upstreaming is creating more upstream data traffic then what present day cellular networks are equipped to support, often resulting in sub-optimal video experience, especially in remote or crowded areas with low cellular connectivity and no WiFi. We propose that instead of using its single cellular connection, a mobile device connects to multiple nearby mobile devices and splits the live video data over the cellular bandwidth of these devices using Multipath TCP protocol. The use of MPTCP, for upstreaming live video data, has largely remained unexplored especially for scenarios where WiFi connectivity is not available. We use wireless interface virtualization, offered by Linux, to enable Multipath TCP to scale and connect to a large number of cellular devices. We design and build a system that is able to assess the instantaneous bandwidth of all the connected cellular devices/hotspots and uses the set of the most capable cellular devices for splitting and forwarding the live video data. We test our system in various settings and our experiments show that our system greatly increases the bandwidth and reliability of TCP connections in most cases and in cases where there is a significant difference in the throughput across cellular hotspots, our solution is able to recognize and isolate the better performing cellular hotspots to provide a stable throughput.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving efficacy of concurrent internal binary search trees using local recovery 利用局部恢复提高并发内部二叉搜索树的效率
Arunmoezhi Ramachandran, N. Mittal
Binary Search Tree (BST) is an important data structure for managing ordered data. Many algorithms have been proposed for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations based on both external and internal representations of a search tree. An important step in executing an operation on a tree is to traverse the tree from top-to-down in order to locate the operation's window. A process may need to perform this traversal several times to handle failures occurring due to other processes performing concurrent updates on the tree. Most concurrent algorithms that have been proposed so far use a naïve approach and simply restart the traversal from the root of the tree. In this work, we present a new approach to recover from such failures more efficiently for certain types of concurrent binary search tree algorithms using local recovery by restarting the traversal from the "middle" of the tree in order to locate an operation's window (tree section of interest). Our approach is sufficiently general in the sense that it can be applied to most of the existing concurrent binary search trees using internal representation based on both blocking as well as non-blocking approaches. Using experimental evaluation, we demonstrate that our local recovery approach can significantly improve the performance of a concurrent internal BST by up to 124.7% when the contention is high.
二叉搜索树(BST)是管理有序数据的重要数据结构。对于异步共享内存系统中二叉搜索树的并发操作,已经提出了许多算法,这些算法支持基于搜索树的外部和内部表示进行搜索、插入和删除操作。在树上执行操作的一个重要步骤是自上而下遍历树,以便定位操作的窗口。一个进程可能需要多次执行这种遍历来处理由于其他进程在树上执行并发更新而导致的故障。到目前为止提出的大多数并发算法都使用naïve方法,只是从树的根重新开始遍历。在这项工作中,我们提出了一种新的方法,可以更有效地从某些类型的并发二叉搜索树算法中恢复,使用本地恢复,从树的“中间”重新开始遍历,以定位操作的窗口(感兴趣的树部分)。我们的方法在某种意义上是足够通用的,它可以应用于大多数现有的并发二叉搜索树,使用基于阻塞和非阻塞方法的内部表示。通过实验评估,我们证明了我们的本地恢复方法可以显着提高并发内部BST的性能,当争用高时,性能可提高124.7%。
{"title":"Improving efficacy of concurrent internal binary search trees using local recovery","authors":"Arunmoezhi Ramachandran, N. Mittal","doi":"10.1145/3288599.3288615","DOIUrl":"https://doi.org/10.1145/3288599.3288615","url":null,"abstract":"Binary Search Tree (BST) is an important data structure for managing ordered data. Many algorithms have been proposed for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations based on both external and internal representations of a search tree. An important step in executing an operation on a tree is to traverse the tree from top-to-down in order to locate the operation's window. A process may need to perform this traversal several times to handle failures occurring due to other processes performing concurrent updates on the tree. Most concurrent algorithms that have been proposed so far use a naïve approach and simply restart the traversal from the root of the tree. In this work, we present a new approach to recover from such failures more efficiently for certain types of concurrent binary search tree algorithms using local recovery by restarting the traversal from the \"middle\" of the tree in order to locate an operation's window (tree section of interest). Our approach is sufficiently general in the sense that it can be applied to most of the existing concurrent binary search trees using internal representation based on both blocking as well as non-blocking approaches. Using experimental evaluation, we demonstrate that our local recovery approach can significantly improve the performance of a concurrent internal BST by up to 124.7% when the contention is high.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"63 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Majority vote and monopolies in social networks 多数投票和垄断社交网络
C. Avin, Zvi Lotker, Assaf Mizrachi, D. Peleg
Occasionaly, every society needs to reach a decision among its members. For this, it may use a voting mechanism, i.e., collect the votes of the group members and output a decision that best expresses the group's will. To make up their minds, individuals often discuss the issue with friends before taking their votes, thus mutually affecting each other's votes. Individuals are also, to some extent, influenced by the opinions of key figures in their culture, such as politicians, publicists, etc., commonly considered as the "elite" of the society. This work studies the "power of the elite": to what extent can the elite of a social network influence the rest of society to accept its opinion, and thus become a monopoly. We present an empirical study of local majority voting in social networks, where the elite forms a coalition against all other (common) nodes. The results, obtained on several social networks, indicate that an elite of size [MATH HERE] (where m is the number of connections) has disproportionate power, relative to its size, with respect to the rest of society: it wins the majority voting and remains stable over time.
偶尔,每个社会都需要在其成员之间做出决定。为此,它可以使用投票机制,即收集小组成员的投票并输出最能表达小组意愿的决策。为了做出决定,个人通常会在投票前与朋友讨论这个问题,从而相互影响彼此的投票。个人也在一定程度上受到其文化中关键人物的意见的影响,例如政治家、公关人员等,他们通常被认为是社会的“精英”。这部作品研究了“精英的权力”:一个社会网络的精英在多大程度上可以影响社会的其他部分,让他们接受自己的意见,从而成为垄断。我们对社会网络中的本地多数投票进行了实证研究,其中精英形成了一个反对所有其他(共同)节点的联盟。在几个社交网络上获得的结果表明,相对于其规模,相对于社会其他部分,规模较大的精英(m是连接数)拥有不成比例的权力:它赢得了多数投票,并随着时间的推移保持稳定。
{"title":"Majority vote and monopolies in social networks","authors":"C. Avin, Zvi Lotker, Assaf Mizrachi, D. Peleg","doi":"10.1145/3288599.3288633","DOIUrl":"https://doi.org/10.1145/3288599.3288633","url":null,"abstract":"Occasionaly, every society needs to reach a decision among its members. For this, it may use a voting mechanism, i.e., collect the votes of the group members and output a decision that best expresses the group's will. To make up their minds, individuals often discuss the issue with friends before taking their votes, thus mutually affecting each other's votes. Individuals are also, to some extent, influenced by the opinions of key figures in their culture, such as politicians, publicists, etc., commonly considered as the \"elite\" of the society. This work studies the \"power of the elite\": to what extent can the elite of a social network influence the rest of society to accept its opinion, and thus become a monopoly. We present an empirical study of local majority voting in social networks, where the elite forms a coalition against all other (common) nodes. The results, obtained on several social networks, indicate that an elite of size [MATH HERE] (where m is the number of connections) has disproportionate power, relative to its size, with respect to the rest of society: it wins the majority voting and remains stable over time.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132561216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval framework 一种高效的用户隐私保护多服务器隐私信息检索:一种高效的隐私保护信息存储与检索框架
Radhakrishna Bhat, N. Sunitha
The thirst of acquiring and sharing the knowledge has been increased exponentially in these days due to the availability of the Internet at the finger tips. As a consequence, the need of privacy at various levels and various contexts has been comprehensively studied by various cryptographers. One of the user privacy preserving concepts called Private Information Retrieval (PIR) also provides user privacy at various levels. Several years of efforts on PIR have succeeded to provide almost practical communication efficient privacy preserving solutions.
由于互联网触手可及,获取和分享知识的渴望在这些日子里呈指数级增长。因此,各种密码学家对不同层次和不同背景下的隐私需求进行了全面的研究。私有信息检索(Private Information Retrieval, PIR)是保护用户隐私的概念之一,它也在不同层次上提供用户隐私。多年来在PIR方面的努力已经成功地提供了几乎实用的通信高效隐私保护解决方案。
{"title":"An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval framework","authors":"Radhakrishna Bhat, N. Sunitha","doi":"10.1145/3288599.3299724","DOIUrl":"https://doi.org/10.1145/3288599.3299724","url":null,"abstract":"The thirst of acquiring and sharing the knowledge has been increased exponentially in these days due to the availability of the Internet at the finger tips. As a consequence, the need of privacy at various levels and various contexts has been comprehensively studied by various cryptographers. One of the user privacy preserving concepts called Private Information Retrieval (PIR) also provides user privacy at various levels. Several years of efforts on PIR have succeeded to provide almost practical communication efficient privacy preserving solutions.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132167818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flocking along line by autonomous oblivious mobile robots 自主遗忘移动机器人沿直线聚集
S. Chaudhuri
Swarm robot is a collection of tiny identical autonomous mobile robots who collaboratively perform a given task. One of the main objectives of swarm robots is to place themselves on a geographic region forming a particular geometric pattern in order to execute some jobs in cooperation, e.g., covering or guarding a region, moving a big object. This paper proposes a deterministic distributed algorithm for a set of tiny disc shaped swarm robots (also known as fat robots) to form a straight line and then moving this line by coordinating the motion of the robots. This phenomenon of moving of robots while maintaining the straight line formation, is known as Flocking of robots. The robots are homogeneous, autonomous, anonymous. They need very less computational power. They sense their surrounding, compute destinations to move to and move there. They do not have any explicit message sending or receiving capability. They forget their past sensed and computed data. The robots do not agree on any global coordinate system or origin. The robots are not aware of the total number of robots in the system. All these disabilities of the robots make them less expensive in cost as well as simple in software and hardware requirements. The algorithm presented in this paper assures collision free movements of the robots.
蜂群机器人是一组微型相同的自主移动机器人,它们协同执行给定的任务。群机器人的主要目标之一是将自身放置在一个地理区域上,形成特定的几何图案,以便协同执行一些任务,例如覆盖或守卫一个区域,移动一个大物体。本文提出了一种确定性分布式算法,使一组微小的圆盘形群体机器人(又称胖机器人)形成一条直线,然后通过协调机器人的运动来移动这条直线。这种机器人在保持直线队形的同时移动的现象,被称为机器人的群集。机器人是同质的、自主的、匿名的。它们只需要很少的计算能力。它们感知周围的环境,计算要移动的目的地,然后移动到那里。它们没有任何显式的消息发送或接收功能。他们忘记了过去的感知和计算数据。机器人不同意任何全球坐标系或原点。机器人不知道系统中机器人的总数。机器人的所有这些缺陷使得它们在成本上更便宜,在软件和硬件要求上也更简单。本文提出的算法保证了机器人的无碰撞运动。
{"title":"Flocking along line by autonomous oblivious mobile robots","authors":"S. Chaudhuri","doi":"10.1145/3288599.3295583","DOIUrl":"https://doi.org/10.1145/3288599.3295583","url":null,"abstract":"Swarm robot is a collection of tiny identical autonomous mobile robots who collaboratively perform a given task. One of the main objectives of swarm robots is to place themselves on a geographic region forming a particular geometric pattern in order to execute some jobs in cooperation, e.g., covering or guarding a region, moving a big object. This paper proposes a deterministic distributed algorithm for a set of tiny disc shaped swarm robots (also known as fat robots) to form a straight line and then moving this line by coordinating the motion of the robots. This phenomenon of moving of robots while maintaining the straight line formation, is known as Flocking of robots. The robots are homogeneous, autonomous, anonymous. They need very less computational power. They sense their surrounding, compute destinations to move to and move there. They do not have any explicit message sending or receiving capability. They forget their past sensed and computed data. The robots do not agree on any global coordinate system or origin. The robots are not aware of the total number of robots in the system. All these disabilities of the robots make them less expensive in cost as well as simple in software and hardware requirements. The algorithm presented in this paper assures collision free movements of the robots.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133236426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Perfectly secure message transmission over partially synchronous networks 在部分同步网络上完全安全的消息传输
R. Kishore, Anupriya Inumella, K. Srinathan
In a distributed network, we consider two special nodes called the sender S and the receiver R that are connected by n node-disjoint (except for S and R) bi-directional wires. Out of these n wires, the adversary can control at most t wires (of its choice) in Byzantine fashion. In this setting, our goal is to design a message transmission protocol Π that assures the following two conditions hold: (1) by the end of the protocol Π, R gets the correct message m transmitted by S without any error (perfect reliability), and (2) the adversary learns no information about m, whatsoever, in information theoretic sense (perfect secrecy). Protocols that satisfy these two conditions are known as the Perfectly Secure Message Transmission (PSMT) protocols. However, out of the n wires that exist, if some number of wires say ns, fortunately, happen to be synchronous (serendipitous synchrony) then we ask under what conditions do PSMT protocols tolerating t-Byzantine faults exist. In the literature, it is known that, if either ns > 2t or n > 3t then PSMT protocols trivially exist. Therefore, we consider the case where we have at most 2t synchronous wires (i.e., ns ≤ 2t) and at most 3t wires overall (i.e., n ≤ 3t). Interestingly, we prove that in this case, no PSMT protocol exists. This concludes that, in designing PSMT protocols (tolerating the given fixed number of faults), either (serendipitous) synchronous wires alone are sufficient or we get absolutely no extra advantage of a wire being synchronous over asynchronous.
在分布式网络中,我们考虑两个特殊的节点,称为发送方S和接收方R,它们由n个节点不相交的(除了S和R)双向导线连接。在这n条线中,对手可以以拜占庭式的方式控制最多t条线(其选择)。在此设置中,我们的目标是设计一个消息传输协议Π,该协议确保以下两个条件成立:(1)在协议Π结束时,R获得由S传输的正确消息m,没有任何错误(完全可靠),以及(2)对手不了解关于m的任何信息,在信息论意义上(完全保密)。满足这两个条件的协议称为完全安全消息传输(PSMT)协议。然而,在存在的n条线路中,如果一些线路说n条,幸运的是,碰巧是同步的(意外同步),那么我们问在什么条件下PSMT协议容忍t-Byzantine错误存在。在文献中,已知如果ns > 2t或n > 3t,则PSMT协议平凡存在。因此,我们考虑最多有2t条同步线(即ns≤2t)和最多3t条总线(即n≤3t)的情况。有趣的是,我们证明在这种情况下,不存在PSMT协议。由此得出的结论是,在设计PSMT协议(容忍给定的固定数量的故障)时,要么(偶然的)单独的同步连接就足够了,要么我们绝对没有获得同步连接优于异步连接的额外优势。
{"title":"Perfectly secure message transmission over partially synchronous networks","authors":"R. Kishore, Anupriya Inumella, K. Srinathan","doi":"10.1145/3288599.3288612","DOIUrl":"https://doi.org/10.1145/3288599.3288612","url":null,"abstract":"In a distributed network, we consider two special nodes called the sender S and the receiver R that are connected by n node-disjoint (except for S and R) bi-directional wires. Out of these n wires, the adversary can control at most t wires (of its choice) in Byzantine fashion. In this setting, our goal is to design a message transmission protocol Π that assures the following two conditions hold: (1) by the end of the protocol Π, R gets the correct message m transmitted by S without any error (perfect reliability), and (2) the adversary learns no information about m, whatsoever, in information theoretic sense (perfect secrecy). Protocols that satisfy these two conditions are known as the Perfectly Secure Message Transmission (PSMT) protocols. However, out of the n wires that exist, if some number of wires say ns, fortunately, happen to be synchronous (serendipitous synchrony) then we ask under what conditions do PSMT protocols tolerating t-Byzantine faults exist. In the literature, it is known that, if either ns > 2t or n > 3t then PSMT protocols trivially exist. Therefore, we consider the case where we have at most 2t synchronous wires (i.e., ns ≤ 2t) and at most 3t wires overall (i.e., n ≤ 3t). Interestingly, we prove that in this case, no PSMT protocol exists. This concludes that, in designing PSMT protocols (tolerating the given fixed number of faults), either (serendipitous) synchronous wires alone are sufficient or we get absolutely no extra advantage of a wire being synchronous over asynchronous.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1