首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
A cost-aware algorithm for placement of enterprise applications in federated cloud data center 用于在联邦云数据中心中放置企业应用程序的成本感知算法
Moustafa Najm, V. Tamarapalli
Nowadays, many enterprise applications with a global coverage, huge volume and dense communication are deployed in the cloud. Federated data center (DC), where multiple cloud providers (CPs) share their resources, presents a scalable platform to serve such applications [1]. The main goal CPs is minimizing the operating cost. Energy consumption contributes a major fraction of operating cost; up to 50% [2]. Further, enterprise applications contain a large number of virtual machines (VMs) with huge data exchange up to 500 TB per day [3]. Subsequently, energy and bandwidth must be considered during VM placement to minimize the operating cost.
如今,许多覆盖全球、体量巨大、通信密集的企业应用都部署在云中。联邦数据中心(DC)是多个云提供商(CPs)共享其资源的地方,它提供了一个可扩展的平台来为此类应用提供服务[1]。CPs的主要目标是最小化运营成本。能源消耗占运营成本的很大一部分;高达50%[2]。此外,企业应用包含大量虚拟机(vm),每天的数据交换量高达500tb[3]。随后,在虚拟机放置期间必须考虑能量和带宽,以最大限度地降低运营成本。
{"title":"A cost-aware algorithm for placement of enterprise applications in federated cloud data center","authors":"Moustafa Najm, V. Tamarapalli","doi":"10.1145/3288599.3299725","DOIUrl":"https://doi.org/10.1145/3288599.3299725","url":null,"abstract":"Nowadays, many enterprise applications with a global coverage, huge volume and dense communication are deployed in the cloud. Federated data center (DC), where multiple cloud providers (CPs) share their resources, presents a scalable platform to serve such applications [1]. The main goal CPs is minimizing the operating cost. Energy consumption contributes a major fraction of operating cost; up to 50% [2]. Further, enterprise applications contain a large number of virtual machines (VMs) with huge data exchange up to 500 TB per day [3]. Subsequently, energy and bandwidth must be considered during VM placement to minimize the operating cost.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Perfectly secure message transmission over partially synchronous networks 在部分同步网络上完全安全的消息传输
R. Kishore, Anupriya Inumella, K. Srinathan
In a distributed network, we consider two special nodes called the sender S and the receiver R that are connected by n node-disjoint (except for S and R) bi-directional wires. Out of these n wires, the adversary can control at most t wires (of its choice) in Byzantine fashion. In this setting, our goal is to design a message transmission protocol Π that assures the following two conditions hold: (1) by the end of the protocol Π, R gets the correct message m transmitted by S without any error (perfect reliability), and (2) the adversary learns no information about m, whatsoever, in information theoretic sense (perfect secrecy). Protocols that satisfy these two conditions are known as the Perfectly Secure Message Transmission (PSMT) protocols. However, out of the n wires that exist, if some number of wires say ns, fortunately, happen to be synchronous (serendipitous synchrony) then we ask under what conditions do PSMT protocols tolerating t-Byzantine faults exist. In the literature, it is known that, if either ns > 2t or n > 3t then PSMT protocols trivially exist. Therefore, we consider the case where we have at most 2t synchronous wires (i.e., ns ≤ 2t) and at most 3t wires overall (i.e., n ≤ 3t). Interestingly, we prove that in this case, no PSMT protocol exists. This concludes that, in designing PSMT protocols (tolerating the given fixed number of faults), either (serendipitous) synchronous wires alone are sufficient or we get absolutely no extra advantage of a wire being synchronous over asynchronous.
在分布式网络中,我们考虑两个特殊的节点,称为发送方S和接收方R,它们由n个节点不相交的(除了S和R)双向导线连接。在这n条线中,对手可以以拜占庭式的方式控制最多t条线(其选择)。在此设置中,我们的目标是设计一个消息传输协议Π,该协议确保以下两个条件成立:(1)在协议Π结束时,R获得由S传输的正确消息m,没有任何错误(完全可靠),以及(2)对手不了解关于m的任何信息,在信息论意义上(完全保密)。满足这两个条件的协议称为完全安全消息传输(PSMT)协议。然而,在存在的n条线路中,如果一些线路说n条,幸运的是,碰巧是同步的(意外同步),那么我们问在什么条件下PSMT协议容忍t-Byzantine错误存在。在文献中,已知如果ns > 2t或n > 3t,则PSMT协议平凡存在。因此,我们考虑最多有2t条同步线(即ns≤2t)和最多3t条总线(即n≤3t)的情况。有趣的是,我们证明在这种情况下,不存在PSMT协议。由此得出的结论是,在设计PSMT协议(容忍给定的固定数量的故障)时,要么(偶然的)单独的同步连接就足够了,要么我们绝对没有获得同步连接优于异步连接的额外优势。
{"title":"Perfectly secure message transmission over partially synchronous networks","authors":"R. Kishore, Anupriya Inumella, K. Srinathan","doi":"10.1145/3288599.3288612","DOIUrl":"https://doi.org/10.1145/3288599.3288612","url":null,"abstract":"In a distributed network, we consider two special nodes called the sender S and the receiver R that are connected by n node-disjoint (except for S and R) bi-directional wires. Out of these n wires, the adversary can control at most t wires (of its choice) in Byzantine fashion. In this setting, our goal is to design a message transmission protocol Π that assures the following two conditions hold: (1) by the end of the protocol Π, R gets the correct message m transmitted by S without any error (perfect reliability), and (2) the adversary learns no information about m, whatsoever, in information theoretic sense (perfect secrecy). Protocols that satisfy these two conditions are known as the Perfectly Secure Message Transmission (PSMT) protocols. However, out of the n wires that exist, if some number of wires say ns, fortunately, happen to be synchronous (serendipitous synchrony) then we ask under what conditions do PSMT protocols tolerating t-Byzantine faults exist. In the literature, it is known that, if either ns > 2t or n > 3t then PSMT protocols trivially exist. Therefore, we consider the case where we have at most 2t synchronous wires (i.e., ns ≤ 2t) and at most 3t wires overall (i.e., n ≤ 3t). Interestingly, we prove that in this case, no PSMT protocol exists. This concludes that, in designing PSMT protocols (tolerating the given fixed number of faults), either (serendipitous) synchronous wires alone are sufficient or we get absolutely no extra advantage of a wire being synchronous over asynchronous.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A simple 2(1-1/l) factor distributed approximation algorithm for steiner tree in the CONGEST model 一个简单的2(1-1/l)因子分布近似算法的斯坦纳树在CONGEST模型
Parikshit Saikia, S. Karmakar
The Steiner tree problem is a classical and fundamental problem in combinatorial optimization. The best known deterministic distributed algorithm for the Steiner tree problem in the CONGEST model was proposed by Lenzen and Patt-Shamir [25] that constructs a Steiner tree whose cost is optimal upto a factor of 2 and the round complexity is [MATH HERE] for a graph of n nodes and t terminals, where S is the shortest path diameter of the graph. Note here that the Õ (·) notation hides polylogarithmic factors in n. In this paper we present a simple deterministic distributed algorithm for constructing a Steiner tree in the CONGEST model with an approximation factor [MATH HERE] of the optimal where ℓ is the number of terminal leaf nodes in the optimal Steiner tree. The round complexity of our algorithm is [MATH HERE] and the message complexity is O(Δ(n − t)S + n3/2, where Δ is the maximum degree of a vertex in the graph. Our algorithm is based on the computation of a sub-graph called the shortest path forest for which we present a separate deterministic distributed algorithm with round and message complexities of O(S) and O(Δ(n - t)S) respectively.
斯坦纳树问题是组合优化中的一个经典而基本的问题。对于CONGEST模型中Steiner树问题,最著名的确定性分布式算法是由Lenzen和pat - shamir[25]提出的,该算法为n个节点和t个终端的图构建了一棵代价最优的Steiner树,其圆复杂度为[MATH HERE],其中S为图的最短路径直径。请注意,Õ(·)符号隐藏了n中的多对数因子。在本文中,我们提出了一个简单的确定性分布式算法,用于在CONGEST模型中构造Steiner树,其中最优Steiner树的近似因子[MATH here]是最优Steiner树的终端叶节点数。我们算法的轮复杂度为[MATH HERE],消息复杂度为O(Δ(n−t)S + n3/2,其中Δ为图中顶点的最大度。我们的算法基于称为最短路径森林的子图的计算,为此我们提出了一个单独的确定性分布式算法,其圆形和消息复杂性分别为O(S)和O(Δ(n - t)S)。
{"title":"A simple 2(1-1/l) factor distributed approximation algorithm for steiner tree in the CONGEST model","authors":"Parikshit Saikia, S. Karmakar","doi":"10.1145/3288599.3288629","DOIUrl":"https://doi.org/10.1145/3288599.3288629","url":null,"abstract":"The Steiner tree problem is a classical and fundamental problem in combinatorial optimization. The best known deterministic distributed algorithm for the Steiner tree problem in the CONGEST model was proposed by Lenzen and Patt-Shamir [25] that constructs a Steiner tree whose cost is optimal upto a factor of 2 and the round complexity is [MATH HERE] for a graph of n nodes and t terminals, where S is the shortest path diameter of the graph. Note here that the Õ (·) notation hides polylogarithmic factors in n. In this paper we present a simple deterministic distributed algorithm for constructing a Steiner tree in the CONGEST model with an approximation factor [MATH HERE] of the optimal where ℓ is the number of terminal leaf nodes in the optimal Steiner tree. The round complexity of our algorithm is [MATH HERE] and the message complexity is O(Δ(n − t)S + n3/2, where Δ is the maximum degree of a vertex in the graph. Our algorithm is based on the computation of a sub-graph called the shortest path forest for which we present a separate deterministic distributed algorithm with round and message complexities of O(S) and O(Δ(n - t)S) respectively.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Majority vote and monopolies in social networks 多数投票和垄断社交网络
C. Avin, Zvi Lotker, Assaf Mizrachi, D. Peleg
Occasionaly, every society needs to reach a decision among its members. For this, it may use a voting mechanism, i.e., collect the votes of the group members and output a decision that best expresses the group's will. To make up their minds, individuals often discuss the issue with friends before taking their votes, thus mutually affecting each other's votes. Individuals are also, to some extent, influenced by the opinions of key figures in their culture, such as politicians, publicists, etc., commonly considered as the "elite" of the society. This work studies the "power of the elite": to what extent can the elite of a social network influence the rest of society to accept its opinion, and thus become a monopoly. We present an empirical study of local majority voting in social networks, where the elite forms a coalition against all other (common) nodes. The results, obtained on several social networks, indicate that an elite of size [MATH HERE] (where m is the number of connections) has disproportionate power, relative to its size, with respect to the rest of society: it wins the majority voting and remains stable over time.
偶尔,每个社会都需要在其成员之间做出决定。为此,它可以使用投票机制,即收集小组成员的投票并输出最能表达小组意愿的决策。为了做出决定,个人通常会在投票前与朋友讨论这个问题,从而相互影响彼此的投票。个人也在一定程度上受到其文化中关键人物的意见的影响,例如政治家、公关人员等,他们通常被认为是社会的“精英”。这部作品研究了“精英的权力”:一个社会网络的精英在多大程度上可以影响社会的其他部分,让他们接受自己的意见,从而成为垄断。我们对社会网络中的本地多数投票进行了实证研究,其中精英形成了一个反对所有其他(共同)节点的联盟。在几个社交网络上获得的结果表明,相对于其规模,相对于社会其他部分,规模较大的精英(m是连接数)拥有不成比例的权力:它赢得了多数投票,并随着时间的推移保持稳定。
{"title":"Majority vote and monopolies in social networks","authors":"C. Avin, Zvi Lotker, Assaf Mizrachi, D. Peleg","doi":"10.1145/3288599.3288633","DOIUrl":"https://doi.org/10.1145/3288599.3288633","url":null,"abstract":"Occasionaly, every society needs to reach a decision among its members. For this, it may use a voting mechanism, i.e., collect the votes of the group members and output a decision that best expresses the group's will. To make up their minds, individuals often discuss the issue with friends before taking their votes, thus mutually affecting each other's votes. Individuals are also, to some extent, influenced by the opinions of key figures in their culture, such as politicians, publicists, etc., commonly considered as the \"elite\" of the society. This work studies the \"power of the elite\": to what extent can the elite of a social network influence the rest of society to accept its opinion, and thus become a monopoly. We present an empirical study of local majority voting in social networks, where the elite forms a coalition against all other (common) nodes. The results, obtained on several social networks, indicate that an elite of size [MATH HERE] (where m is the number of connections) has disproportionate power, relative to its size, with respect to the rest of society: it wins the majority voting and remains stable over time.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132561216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Advanced urban public transportation system for Indian scenarios 印度场景的先进城市公共交通系统
Pruthvish Rajput, Manish Chaturvedi, Pankesh Patel
This article presents a part of the work being carried out under the Department of Science & Technology (DST)-funded project, titled Advanced Urban Public Transportation System. The solutions designed for real-time tracking of metro buses in urban areas of India, detecting bus-stops automatically, and predicting the arrival time of buses accurately are elaborated. The proposed system addresses the challenges related to GPS outage, unknown schedule and stoppages of buses, and unavailability of real time traffic information along the bus-route. The system is evaluated using multiple-trip data collected over a 32 kilometer long route during the peak and off-peak hour traffic conditions. The bus-stop detection accuracy of 75% (6 out of 8 bus-stops are accurately detected) could be achieved using an arbitrary set of trips conducted over the route. The arrival time prediction error of 7% (5 minutes) has been reported. The scalability assessment of the system shows that it can support the transit of more than ten thousand buses and over one million subscribers/commuters.
本文介绍了在科技部(DST)资助的项目“先进城市公共交通系统”下正在进行的部分工作。详细阐述了印度城市地铁公交实时跟踪、自动检测公交站点、准确预测公交到达时间的解决方案。所提出的系统解决了GPS中断、公交车时刻表和停运未知以及公交路线上的实时交通信息不可用等问题。该系统使用高峰和非高峰时段交通状况下在32公里长的路线上收集的多次行程数据进行评估。通过在路线上进行任意一组行程,可以实现75%的公交站点检测精度(8个公交站点中有6个被准确检测到)。有报道称到达时间预测误差为7%(5分钟)。系统的可扩展性评估表明,该系统可支持1万多辆公交车和超过100万的用户/通勤者。
{"title":"Advanced urban public transportation system for Indian scenarios","authors":"Pruthvish Rajput, Manish Chaturvedi, Pankesh Patel","doi":"10.1145/3288599.3288624","DOIUrl":"https://doi.org/10.1145/3288599.3288624","url":null,"abstract":"This article presents a part of the work being carried out under the Department of Science & Technology (DST)-funded project, titled Advanced Urban Public Transportation System. The solutions designed for real-time tracking of metro buses in urban areas of India, detecting bus-stops automatically, and predicting the arrival time of buses accurately are elaborated. The proposed system addresses the challenges related to GPS outage, unknown schedule and stoppages of buses, and unavailability of real time traffic information along the bus-route. The system is evaluated using multiple-trip data collected over a 32 kilometer long route during the peak and off-peak hour traffic conditions. The bus-stop detection accuracy of 75% (6 out of 8 bus-stops are accurately detected) could be achieved using an arbitrary set of trips conducted over the route. The arrival time prediction error of 7% (5 minutes) has been reported. The scalability assessment of the system shows that it can support the transit of more than ten thousand buses and over one million subscribers/commuters.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1997 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128217159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Flocking along line by autonomous oblivious mobile robots 自主遗忘移动机器人沿直线聚集
S. Chaudhuri
Swarm robot is a collection of tiny identical autonomous mobile robots who collaboratively perform a given task. One of the main objectives of swarm robots is to place themselves on a geographic region forming a particular geometric pattern in order to execute some jobs in cooperation, e.g., covering or guarding a region, moving a big object. This paper proposes a deterministic distributed algorithm for a set of tiny disc shaped swarm robots (also known as fat robots) to form a straight line and then moving this line by coordinating the motion of the robots. This phenomenon of moving of robots while maintaining the straight line formation, is known as Flocking of robots. The robots are homogeneous, autonomous, anonymous. They need very less computational power. They sense their surrounding, compute destinations to move to and move there. They do not have any explicit message sending or receiving capability. They forget their past sensed and computed data. The robots do not agree on any global coordinate system or origin. The robots are not aware of the total number of robots in the system. All these disabilities of the robots make them less expensive in cost as well as simple in software and hardware requirements. The algorithm presented in this paper assures collision free movements of the robots.
蜂群机器人是一组微型相同的自主移动机器人,它们协同执行给定的任务。群机器人的主要目标之一是将自身放置在一个地理区域上,形成特定的几何图案,以便协同执行一些任务,例如覆盖或守卫一个区域,移动一个大物体。本文提出了一种确定性分布式算法,使一组微小的圆盘形群体机器人(又称胖机器人)形成一条直线,然后通过协调机器人的运动来移动这条直线。这种机器人在保持直线队形的同时移动的现象,被称为机器人的群集。机器人是同质的、自主的、匿名的。它们只需要很少的计算能力。它们感知周围的环境,计算要移动的目的地,然后移动到那里。它们没有任何显式的消息发送或接收功能。他们忘记了过去的感知和计算数据。机器人不同意任何全球坐标系或原点。机器人不知道系统中机器人的总数。机器人的所有这些缺陷使得它们在成本上更便宜,在软件和硬件要求上也更简单。本文提出的算法保证了机器人的无碰撞运动。
{"title":"Flocking along line by autonomous oblivious mobile robots","authors":"S. Chaudhuri","doi":"10.1145/3288599.3295583","DOIUrl":"https://doi.org/10.1145/3288599.3295583","url":null,"abstract":"Swarm robot is a collection of tiny identical autonomous mobile robots who collaboratively perform a given task. One of the main objectives of swarm robots is to place themselves on a geographic region forming a particular geometric pattern in order to execute some jobs in cooperation, e.g., covering or guarding a region, moving a big object. This paper proposes a deterministic distributed algorithm for a set of tiny disc shaped swarm robots (also known as fat robots) to form a straight line and then moving this line by coordinating the motion of the robots. This phenomenon of moving of robots while maintaining the straight line formation, is known as Flocking of robots. The robots are homogeneous, autonomous, anonymous. They need very less computational power. They sense their surrounding, compute destinations to move to and move there. They do not have any explicit message sending or receiving capability. They forget their past sensed and computed data. The robots do not agree on any global coordinate system or origin. The robots are not aware of the total number of robots in the system. All these disabilities of the robots make them less expensive in cost as well as simple in software and hardware requirements. The algorithm presented in this paper assures collision free movements of the robots.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133236426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval framework 一种高效的用户隐私保护多服务器隐私信息检索:一种高效的隐私保护信息存储与检索框架
Radhakrishna Bhat, N. Sunitha
The thirst of acquiring and sharing the knowledge has been increased exponentially in these days due to the availability of the Internet at the finger tips. As a consequence, the need of privacy at various levels and various contexts has been comprehensively studied by various cryptographers. One of the user privacy preserving concepts called Private Information Retrieval (PIR) also provides user privacy at various levels. Several years of efforts on PIR have succeeded to provide almost practical communication efficient privacy preserving solutions.
由于互联网触手可及,获取和分享知识的渴望在这些日子里呈指数级增长。因此,各种密码学家对不同层次和不同背景下的隐私需求进行了全面的研究。私有信息检索(Private Information Retrieval, PIR)是保护用户隐私的概念之一,它也在不同层次上提供用户隐私。多年来在PIR方面的努力已经成功地提供了几乎实用的通信高效隐私保护解决方案。
{"title":"An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval framework","authors":"Radhakrishna Bhat, N. Sunitha","doi":"10.1145/3288599.3299724","DOIUrl":"https://doi.org/10.1145/3288599.3299724","url":null,"abstract":"The thirst of acquiring and sharing the knowledge has been increased exponentially in these days due to the availability of the Internet at the finger tips. As a consequence, the need of privacy at various levels and various contexts has been comprehensively studied by various cryptographers. One of the user privacy preserving concepts called Private Information Retrieval (PIR) also provides user privacy at various levels. Several years of efforts on PIR have succeeded to provide almost practical communication efficient privacy preserving solutions.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132167818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A simple and practical concurrent non-blocking unbounded graph with linearizable reachability queries 具有线性可达查询的简单实用的并发非阻塞无界图
Bapi Chatterjee, Sathya Peri, Muktikanta Sa, N. Singhal
Graph algorithms applied in many applications, including social networks, communication networks, VLSI design, graphics, and several others, require dynamic modifications - addition and removal of vertices and/or edges - in the graph. This paper presents a novel concurrent non-blocking algorithm to implement a dynamic unbounded directed graph in a shared-memory machine. The addition and removal operations of vertices and edges are lock-free. For a finite sized graph, the lookup operations are wait-free. Most significant component of the presented algorithm is the reachability query in a concurrent graph. The reachability queries in our algorithm are obstruction-free and thus impose minimal additional synchronization cost over other operations. We prove that each of the data structure operations are linearizable. We extensively evaluate a sample C/C++ implementation of the algorithm through a number of micro-benchmarks. The experimental results show that the proposed algorithm scales well with the number of threads and on an average provides 5 to 7x performance improvement over a concurrent graph implementation using coarse-grained locking.
图算法应用于许多应用,包括社交网络、通信网络、VLSI设计、图形和其他一些应用,需要动态修改——在图中添加和删除顶点和/或边。提出了一种在共享内存机器上实现动态无界有向图的并行无阻塞算法。顶点和边的添加和删除操作是无锁的。对于有限大小的图,查找操作是无等待的。该算法最重要的组成部分是并发图中的可达性查询。我们算法中的可达性查询是无阻碍的,因此比其他操作施加的额外同步成本最小。我们证明了每个数据结构操作都是线性化的。我们通过一些微基准测试广泛地评估了该算法的样例C/ c++实现。实验结果表明,所提出的算法可以很好地随线程数扩展,并且与使用粗粒度锁定的并发图实现相比,平均提供5到7倍的性能提升。
{"title":"A simple and practical concurrent non-blocking unbounded graph with linearizable reachability queries","authors":"Bapi Chatterjee, Sathya Peri, Muktikanta Sa, N. Singhal","doi":"10.1145/3288599.3288617","DOIUrl":"https://doi.org/10.1145/3288599.3288617","url":null,"abstract":"Graph algorithms applied in many applications, including social networks, communication networks, VLSI design, graphics, and several others, require dynamic modifications - addition and removal of vertices and/or edges - in the graph. This paper presents a novel concurrent non-blocking algorithm to implement a dynamic unbounded directed graph in a shared-memory machine. The addition and removal operations of vertices and edges are lock-free. For a finite sized graph, the lookup operations are wait-free. Most significant component of the presented algorithm is the reachability query in a concurrent graph. The reachability queries in our algorithm are obstruction-free and thus impose minimal additional synchronization cost over other operations. We prove that each of the data structure operations are linearizable. We extensively evaluate a sample C/C++ implementation of the algorithm through a number of micro-benchmarks. The experimental results show that the proposed algorithm scales well with the number of threads and on an average provides 5 to 7x performance improvement over a concurrent graph implementation using coarse-grained locking.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
pDCell: an end-to-end transport protocol for mobile edge computing architectures pDCell:用于移动边缘计算架构的端到端传输协议
Claudio Fiandrino, A. D. Oliva, J. Widmer, Kirill Kogan
To deal with increasingly demanding services and the rapid growth in number of devices and traffic, 5G and beyond mobile networks need to provide extreme capacity and peak data rates at very low latencies. Consequently, applications and services need to move closer to the users into so-called edge data centers. At the same time, there is a trend to virtualize core and radio access network functionalities and bring them to edge data centers as well. However, as is known from conventional data centers, legacy transport protocols such as TCP are vastly suboptimal in such a setting. In this work, we present pDCell, a transport design for mobile edge computing architectures that extends data center transport approaches to the mobile network domain. Specifically, pDCell ensures that data traffic from application servers arrives at virtual radio functions (i.e., C-RAN Central Units) timely to (i) minimize queuing delays and (ii) to maximize cellular network utilization. We show that pDCell significantly improves flow completion times compared to conventional transport protocols like TCP and data center transport solutions, and is thus an essential component for future mobile networks.
为了应对日益苛刻的业务需求以及设备数量和流量的快速增长,5G及以后的移动网络需要在极低的延迟下提供极高的容量和峰值数据速率。因此,应用程序和服务需要更靠近用户,进入所谓的边缘数据中心。与此同时,有一种趋势是将核心和无线接入网络功能虚拟化,并将它们带到边缘数据中心。然而,正如我们从传统数据中心了解到的那样,传统的传输协议(如TCP)在这种设置中远远不是最优的。在这项工作中,我们提出了pDCell,一种用于移动边缘计算架构的传输设计,将数据中心传输方法扩展到移动网络领域。具体来说,pDCell确保来自应用服务器的数据流量及时到达虚拟无线电功能(即C-RAN中央单元),以(i)最小化排队延迟和(ii)最大化蜂窝网络利用率。我们表明,与TCP和数据中心传输解决方案等传统传输协议相比,pDCell显著提高了流完成时间,因此是未来移动网络的重要组成部分。
{"title":"pDCell: an end-to-end transport protocol for mobile edge computing architectures","authors":"Claudio Fiandrino, A. D. Oliva, J. Widmer, Kirill Kogan","doi":"10.1145/3288599.3288636","DOIUrl":"https://doi.org/10.1145/3288599.3288636","url":null,"abstract":"To deal with increasingly demanding services and the rapid growth in number of devices and traffic, 5G and beyond mobile networks need to provide extreme capacity and peak data rates at very low latencies. Consequently, applications and services need to move closer to the users into so-called edge data centers. At the same time, there is a trend to virtualize core and radio access network functionalities and bring them to edge data centers as well. However, as is known from conventional data centers, legacy transport protocols such as TCP are vastly suboptimal in such a setting. In this work, we present pDCell, a transport design for mobile edge computing architectures that extends data center transport approaches to the mobile network domain. Specifically, pDCell ensures that data traffic from application servers arrives at virtual radio functions (i.e., C-RAN Central Units) timely to (i) minimize queuing delays and (ii) to maximize cellular network utilization. We show that pDCell significantly improves flow completion times compared to conventional transport protocols like TCP and data center transport solutions, and is thus an essential component for future mobile networks.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"3 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125995174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing infrastructure-less disaster networks by leveraging the AllJoyn framework
Srikant Manas Kala, V. Sathya, Suhel Sajjan Magdum, Tulja Vamshi Kiran Buyakar, Hatim Lokhandwala, T. B. Reddy
AllJoyn is an open-source framework which has the potential to be the platform for next-generation proximity centric disaster network (DiNet) applications. However, its development is still in nascent stages, and one of the primary challenges is the design of efficient routing algorithms, which can ensure seamless and uninterrupted communication in an unfavorable environment. In this work, we implement a DiNet prototype using AllJoyn to highlight the challenges of multi-hop routing and propose the concept of extended proximity (e-proximity) in AllJoyn. As a first step towards solving this challenge, we carry out field experiments by implementing an AllJoyn file-transfer application on a trivial DiNet prototype. We then evaluate the performance of the AllJoyn based disaster network and demonstrate that AllJoyn can support robust and reliable DiNet applications.
AllJoyn是一个开源框架,有潜力成为下一代以邻近为中心的灾难网络(DiNet)应用程序的平台。然而,它的发展仍处于初级阶段,主要的挑战之一是设计有效的路由算法,以确保在不利的环境下进行无缝和不间断的通信。在这项工作中,我们使用AllJoyn实现了一个DiNet原型,以突出多跳路由的挑战,并提出了AllJoyn中扩展邻近(e-邻近)的概念。作为解决这一挑战的第一步,我们通过在一个普通的DiNet原型上实现AllJoyn文件传输应用程序来进行现场实验。然后,我们评估了基于AllJoyn的灾难网络的性能,并证明AllJoyn可以支持健壮可靠的DiNet应用程序。
{"title":"Designing infrastructure-less disaster networks by leveraging the AllJoyn framework","authors":"Srikant Manas Kala, V. Sathya, Suhel Sajjan Magdum, Tulja Vamshi Kiran Buyakar, Hatim Lokhandwala, T. B. Reddy","doi":"10.1145/3288599.3295596","DOIUrl":"https://doi.org/10.1145/3288599.3295596","url":null,"abstract":"AllJoyn is an open-source framework which has the potential to be the platform for next-generation proximity centric disaster network (DiNet) applications. However, its development is still in nascent stages, and one of the primary challenges is the design of efficient routing algorithms, which can ensure seamless and uninterrupted communication in an unfavorable environment. In this work, we implement a DiNet prototype using AllJoyn to highlight the challenges of multi-hop routing and propose the concept of extended proximity (e-proximity) in AllJoyn. As a first step towards solving this challenge, we carry out field experiments by implementing an AllJoyn file-transfer application on a trivial DiNet prototype. We then evaluate the performance of the AllJoyn based disaster network and demonstrate that AllJoyn can support robust and reliable DiNet applications.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1