{"title":"Context-aware Community Detection in the Russia-Ukraine Conflict Network","authors":"Amartya Chakraborty, Deepamoy Pal, Nandini Mukherjee","doi":"10.1145/3631461.3632089","DOIUrl":"https://doi.org/10.1145/3631461.3632089","url":null,"abstract":"","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"29 2","pages":"328-333"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workload Prediction for Edge Computing","authors":"Kavish Shah, Ayush Gandhi, K. Gandhi, Minal Bhise","doi":"10.1145/3631461.3632522","DOIUrl":"https://doi.org/10.1145/3631461.3632522","url":null,"abstract":"","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"28 s84","pages":"286-291"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post Quantum Communication Over the Internet Infrastructure","authors":"S. Dolev","doi":"10.1145/3631461.3632514","DOIUrl":"https://doi.org/10.1145/3631461.3632514","url":null,"abstract":"","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"99 8","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Allocation Optimization in Local and Wide Area Networks through Social Network Integration","authors":"S. Shrivastava, Rahul Thakur","doi":"10.1145/3631461.3632508","DOIUrl":"https://doi.org/10.1145/3631461.3632508","url":null,"abstract":"","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"98 7","pages":"254-255"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cost-effective Framework for Privacy Preserving Federated Learning","authors":"Rojalini Tripathy, P. Bera","doi":"10.1145/3631461.3631955","DOIUrl":"https://doi.org/10.1145/3631461.3631955","url":null,"abstract":"","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"87 5","pages":"298-303"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jakub Sliwinski, Quentin M. Kniep, R. Wattenhofer, Fabian Schaich
Solana is a blockchain protocol that has gained significant attention in the cryptocurrency community. This work examines Solana’s consensus protocol and its reference implementation. In this paper we try to get an understanding of the Solana protocol. However, this is not so easy because the publicly available resources are insufficient to specify the details of the protocol. More-over, the implementation has deviated in undocumented ways from the available protocol design description. Thus the consensus rules and their implied security properties remain unclear. We evaluate a number of experimental scenarios in a local Solana testnet. These tests seem to confirm our basic understanding that Solana does not fully achieve consensus. In this paper we show how a single malicious validator, once elected as leader, might be able to halt the Solana blockchain. We also observe some inconsistent behavior, which is not readily explained by any of the consensus rules we are aware of.
{"title":"Halting the Solana Blockchain with Epsilon Stake","authors":"Jakub Sliwinski, Quentin M. Kniep, R. Wattenhofer, Fabian Schaich","doi":"10.1145/3631461.3631553","DOIUrl":"https://doi.org/10.1145/3631461.3631553","url":null,"abstract":"Solana is a blockchain protocol that has gained significant attention in the cryptocurrency community. This work examines Solana’s consensus protocol and its reference implementation. In this paper we try to get an understanding of the Solana protocol. However, this is not so easy because the publicly available resources are insufficient to specify the details of the protocol. More-over, the implementation has deviated in undocumented ways from the available protocol design description. Thus the consensus rules and their implied security properties remain unclear. We evaluate a number of experimental scenarios in a local Solana testnet. These tests seem to confirm our basic understanding that Solana does not fully achieve consensus. In this paper we show how a single malicious validator, once elected as leader, might be able to halt the Solana blockchain. We also observe some inconsistent behavior, which is not readily explained by any of the consensus rules we are aware of.","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"113 11","pages":"45-54"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OEAD: An Online Ensemble-based Anomaly Detection technique for RPL network","authors":"Sumitra Budania, Meetha V. Shenoy","doi":"10.1145/3631461.3631958","DOIUrl":"https://doi.org/10.1145/3631461.3631958","url":null,"abstract":"","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"99 4","pages":"316-321"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Connectivity in UAV-Assisted Cellular Networks: A Dynamic Approach to User Association and Resource Allocation","authors":"K. C. Gouda, Rahul Thakur","doi":"10.1145/3631461.3632506","DOIUrl":"https://doi.org/10.1145/3631461.3632506","url":null,"abstract":"","PeriodicalId":368371,"journal":{"name":"International Conference of Distributed Computing and Networking","volume":"91 8","pages":"250-251"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139630512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}