首页 > 最新文献

2009 29th IEEE International Conference on Distributed Computing Systems最新文献

英文 中文
Distributed Key Generation for the Internet 互联网的分布式密钥生成
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.21
Aniket Kate, I. Goldberg
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG architecture for use over the Internet. We propose a practical system model and define an efficient verifiable secret sharing scheme in it. We observe the necessity of Byzantine agreement for asynchronous DKG and analyze the difficulty of using a randomized protocol for it. Using our verifiable secret sharing scheme and a leader-based agreement protocol, we then design a DKG protocol for public-key cryptography. Finally, along with traditional proactive security, we also introduce group modification primitives in our system.
尽管分布式密钥生成(DKG)已经研究了一段时间,但它从未在同步设置之外进行过研究。我们提出了第一个在Internet上使用的实际DKG体系结构。提出了一个实用的系统模型,并在其中定义了一个高效的可验证秘密共享方案。我们观察了异步DKG的拜占庭协议的必要性,并分析了使用随机协议的难度。利用我们的可验证秘密共享方案和基于领导者的协议协议,我们设计了一个用于公钥加密的DKG协议。最后,除了传统的主动安全之外,我们还在系统中引入了组修改原语。
{"title":"Distributed Key Generation for the Internet","authors":"Aniket Kate, I. Goldberg","doi":"10.1109/ICDCS.2009.21","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.21","url":null,"abstract":"Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG architecture for use over the Internet. We propose a practical system model and define an efficient verifiable secret sharing scheme in it. We observe the necessity of Byzantine agreement for asynchronous DKG and analyze the difficulty of using a randomized protocol for it. Using our verifiable secret sharing scheme and a leader-based agreement protocol, we then design a DKG protocol for public-key cryptography. Finally, along with traditional proactive security, we also introduce group modification primitives in our system.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122498834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
On the Impossibility of Maximal Scheduling for Strong Fairness with Interleaving 具有交错的强公平性的最大调度的不可能性
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.59
Matthew Lang, P. Sivilotti
A strongly fair schedule is one in which tasks that are enabled infinitely often are also executed infinitely often. When tasks execute atomically, a strongly fair scheduler can be implemented in a maximal manner. That is, an algorithm exists that, for any valid schedule, is capable of generating that schedule. We show that this assumption of atomicity is necessary. That is, when task execution can be interleaved with other tasks, no algorithm is capable of generating all valid schedules. In other words,  any algorithm that correctly generates some strongly fair schedules must also be incapable of generating some other valid schedules.  This impossibility result is the first example of an implementable UNITY specification for which no maximal solution exists.
在强公平调度中,无限频繁启用的任务也会无限频繁地执行。当任务自动执行时,可以以最大的方式实现强公平调度器。也就是说,存在一种算法,对于任何有效的调度,都能够生成该调度。我们证明这种原子性假设是必要的。也就是说,当任务执行可以与其他任务交错时,没有任何算法能够生成所有有效的调度。换句话说,任何正确生成某些强公平调度的算法也必须不能生成其他一些有效调度。这个不可能的结果是一个可实现的UNITY规范的第一个例子,没有最大的解决方案存在。
{"title":"On the Impossibility of Maximal Scheduling for Strong Fairness with Interleaving","authors":"Matthew Lang, P. Sivilotti","doi":"10.1109/ICDCS.2009.59","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.59","url":null,"abstract":"A strongly fair schedule is one in which tasks that are enabled infinitely often are also executed infinitely often. When tasks execute atomically, a strongly fair scheduler can be implemented in a maximal manner. That is, an algorithm exists that, for any valid schedule, is capable of generating that schedule. We show that this assumption of atomicity is necessary. That is, when task execution can be interleaved with other tasks, no algorithm is capable of generating all valid schedules. In other words,  any algorithm that correctly generates some strongly fair schedules must also be incapable of generating some other valid schedules.  This impossibility result is the first example of an implementable UNITY specification for which no maximal solution exists.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122800197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Case for Spam-Aware High Performance Mail Server Architecture 可识别垃圾邮件的高性能邮件服务器体系结构的案例
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.74
Abhinav Pathak, Syed Ali, Raza Jafri, Y. C. Hu
The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The steep rise in the amount of unsolicited emails, i.e. spam, in the past decade, however, has permanently disrupted this tranquility of largely steady email volume and turned mail server performance into an increasingly important issue. In this paper, we point out that modern mail servers were not originally designed with email spam in mind, and as such, as the "common case'' workload for mail servers has shifted from legitimate emails to spam emails, we argue it is time to revisit mail server architecture design in following the system design principle of optimizing the common case. In particular, we show how to optimize the performance of three major components of modern mail servers, the concurrency architecture, the disk I/O, and DNSBL lookups, by exploiting the new "common case" workload. An evaluation of our prototype implementation of the enhanced postfix architecture shows that the optimizations significantly reduce the CPU, disk, and network resource consumptions, and improves the throughput of the mail server by 18% under a university departmental mail server workload and by 40% under a spam sinkhole workload.
在过去的几十年里,每个邮箱的电子邮件数量基本上保持在很低的水平,并且没有变化,因此邮件服务器的性能在很大程度上仍然是次要问题。然而,在过去十年中,未经请求的电子邮件(即垃圾邮件)数量的急剧增加,永久性地破坏了电子邮件数量基本稳定的宁静,并使邮件服务器性能成为一个日益重要的问题。在本文中,我们指出现代邮件服务器最初设计时并没有考虑到垃圾邮件,因此,随着邮件服务器的“常见情况”工作负载从合法电子邮件转移到垃圾邮件,我们认为是时候按照优化常见情况的系统设计原则重新审视邮件服务器架构设计了。特别是,我们将展示如何通过利用新的“常见情况”工作负载来优化现代邮件服务器的三个主要组件的性能:并发架构、磁盘I/O和DNSBL查找。对我们的增强后缀架构原型实现的评估表明,优化显著降低了CPU、磁盘和网络资源消耗,并在大学部门邮件服务器工作负载下将邮件服务器的吞吐量提高了18%,在垃圾邮件天坑工作负载下将邮件服务器的吞吐量提高了40%。
{"title":"The Case for Spam-Aware High Performance Mail Server Architecture","authors":"Abhinav Pathak, Syed Ali, Raza Jafri, Y. C. Hu","doi":"10.1109/ICDCS.2009.74","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.74","url":null,"abstract":"The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The steep rise in the amount of unsolicited emails, i.e. spam, in the past decade, however, has permanently disrupted this tranquility of largely steady email volume and turned mail server performance into an increasingly important issue. In this paper, we point out that modern mail servers were not originally designed with email spam in mind, and as such, as the \"common case'' workload for mail servers has shifted from legitimate emails to spam emails, we argue it is time to revisit mail server architecture design in following the system design principle of optimizing the common case. In particular, we show how to optimize the performance of three major components of modern mail servers, the concurrency architecture, the disk I/O, and DNSBL lookups, by exploiting the new \"common case\" workload. An evaluation of our prototype implementation of the enhanced postfix architecture shows that the optimizations significantly reduce the CPU, disk, and network resource consumptions, and improves the throughput of the mail server by 18% under a university departmental mail server workload and by 40% under a spam sinkhole workload.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134176510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Optimal Concurrency Control for Optimistic Replication 乐观复制的最优并发控制
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.71
Weihan Wang, C. Amza
Concurrency control is a core component in optimistic replication systems. To detect concurrent updates, the system associates each replicated object with metadata, such as, version vectors or causal graphs exchanged on synchronization opportunities. However, the size of such metadata increases at least linearly with the number of active sites. With recent trends in cloud computing, multi-regional collaboration, and mobile networks, the number of sites within a single replication system becomes very large. This imposes substantial overhead in communication and computation on every site. In this paper, we first present three version vector implementations that significantly reduce the cost of vector exchange by incrementally transferring vector elements. Basic rotating vectors (BRV) support systems providing no conflict reconciliation, whereas conflict rotating vectors (CRV) extend BRV to overcome this limitation. Skip rotating vectors (SRV) based on CRV further reduce data transmission. We show that both BRV and SRV are optimal implementations of version vectors, which, in turn, have minimal storage complexity among all known concurrency control schemes for state-transfer systems. We then present a causal graph exchange algorithm for operation-transfer systems with optimal communication overhead. All these algorithms adopt network pipelining to reduce running time.
并发控制是乐观复制系统的核心组成部分。为了检测并发更新,系统将每个复制对象与元数据相关联,例如版本向量或在同步机会上交换的因果图。但是,此类元数据的大小至少与活动站点的数量呈线性增长。随着云计算、多区域协作和移动网络的最新趋势,单个复制系统中的站点数量变得非常大。这给每个站点带来了大量的通信和计算开销。在本文中,我们首先提出了三个版本向量实现,它们通过增量传输向量元素显著降低了向量交换的成本。基本旋转向量(BRV)支持系统不提供冲突调和,而冲突旋转向量(CRV)扩展了BRV以克服这一局限性。基于CRV的跳过旋转矢量(SRV)进一步减少了数据传输。我们证明了BRV和SRV都是版本向量的最佳实现,而版本向量在所有已知的状态转移系统并发控制方案中具有最小的存储复杂度。然后,我们提出了具有最优通信开销的操作转移系统的因果图交换算法。这些算法都采用了网络流水线,减少了运行时间。
{"title":"On Optimal Concurrency Control for Optimistic Replication","authors":"Weihan Wang, C. Amza","doi":"10.1109/ICDCS.2009.71","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.71","url":null,"abstract":"Concurrency control is a core component in optimistic replication systems. To detect concurrent updates, the system associates each replicated object with metadata, such as, version vectors or causal graphs exchanged on synchronization opportunities. However, the size of such metadata increases at least linearly with the number of active sites. With recent trends in cloud computing, multi-regional collaboration, and mobile networks, the number of sites within a single replication system becomes very large. This imposes substantial overhead in communication and computation on every site. In this paper, we first present three version vector implementations that significantly reduce the cost of vector exchange by incrementally transferring vector elements. Basic rotating vectors (BRV) support systems providing no conflict reconciliation, whereas conflict rotating vectors (CRV) extend BRV to overcome this limitation. Skip rotating vectors (SRV) based on CRV further reduce data transmission. We show that both BRV and SRV are optimal implementations of version vectors, which, in turn, have minimal storage complexity among all known concurrency control schemes for state-transfer systems. We then present a causal graph exchange algorithm for operation-transfer systems with optimal communication overhead. All these algorithms adopt network pipelining to reduce running time.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134628005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sampling Based (epsilon, delta)-Approximate Aggregation Algorithm in Sensor Networks 传感器网络中基于采样的(epsilon, delta)-近似聚合算法
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.8
Siyao Cheng, Jianzhong Li
Aggregation operations are important for users to get summarization information in WSN applications. As large numbers of applications only require approximate aggregation results rather than the exact ones, some approximate aggregation algorithms are proposed to save energy. However, the error bounds of these algorithms are fixed and it is impossible to adjust their error bounds automatically. Therefore, these algorithms cannot reach arbitrary precision requirement given by user. This paper proposes a sampling based approximate aggregation algorithm to satisfy the requirement of arbitrary precision. Besides, two sample data adaptive algorithms are also provided. One is to adapt the sample with the varying of precision requirement. The other is to adapt the sample with the varying of the sensed data in networks. The theoretical analysis and experiment results show that the proposed algorithms have high performance in terms of accuracy and energy cost.
在WSN应用中,聚合操作对于用户获取摘要信息非常重要。由于大量应用只需要近似的聚合结果,而不需要精确的聚合结果,为了节省能量,提出了一些近似的聚合算法。然而,这些算法的误差范围是固定的,不可能自动调整它们的误差范围。因此,这些算法不能达到用户给出的任意精度要求。为了满足任意精度的要求,提出了一种基于采样的近似聚合算法。此外,还提供了两种样本数据自适应算法。一是根据精度要求的变化来适应样品。二是根据网络中传感数据的变化对样本进行自适应。理论分析和实验结果表明,该算法在精度和能量消耗方面具有较高的性能。
{"title":"Sampling Based (epsilon, delta)-Approximate Aggregation Algorithm in Sensor Networks","authors":"Siyao Cheng, Jianzhong Li","doi":"10.1109/ICDCS.2009.8","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.8","url":null,"abstract":"Aggregation operations are important for users to get summarization information in WSN applications. As large numbers of applications only require approximate aggregation results rather than the exact ones, some approximate aggregation algorithms are proposed to save energy. However, the error bounds of these algorithms are fixed and it is impossible to adjust their error bounds automatically. Therefore, these algorithms cannot reach arbitrary precision requirement given by user. This paper proposes a sampling based approximate aggregation algorithm to satisfy the requirement of arbitrary precision. Besides, two sample data adaptive algorithms are also provided. One is to adapt the sample with the varying of precision requirement. The other is to adapt the sample with the varying of the sensed data in networks. The theoretical analysis and experiment results show that the proposed algorithms have high performance in terms of accuracy and energy cost.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114479560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
TDMA-ASAP: Sensor Network TDMA Scheduling with Adaptive Slot-Stealing and Parallelism TDMA- asap:具有自适应偷槽和并行性的传感器网络TDMA调度
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.80
Sameh Gobriel, D. Mossé, Robert Cleric
TDMA has been proposed as a MAC protocol for wireless sensor networks (WSNs) due to its efficiency in high WSN load. However, TDMA is plagued with shortcomings; we present modifications to TDMA that will allow for the same efficiency of TDMA, while allowing the network to conserve energy during times of low load (when there is no activity being detected). Recognizing that aggregation plays an essential role in WSNs, TDMA-ASAP adds to TDMA: (a) transmission parallelism based on a level-by-level localized graph-coloring, (b) appropriate sleeping between transmissions ("napping"), (c) judicious and controlled TDMA slot stealing to avoid empty slots to be unused and (d) intelligent scheduling/ordering transmissions. Our results show that TDMA-ASAP's unique combination of TDMA, slot-stealing, napping, and message aggregation significantly outperforms other hybrid WSN MAC algorithms and has a performance that is close to optimal in terms of energy consumption and overall delay.
TDMA由于其在无线传感器网络高负载下的有效性而被提出作为无线传感器网络的MAC协议。然而,TDMA也有很多缺点;我们对TDMA进行了修改,使其具有与TDMA相同的效率,同时允许网络在低负载时(当没有检测到活动时)节省能量。认识到聚合在wsn中起着至关重要的作用,TDMA- asap为TDMA增加了:(a)基于逐级本地化图染色的传输并行性,(b)在传输之间适当的休眠(“小睡”),(c)明智和可控的TDMA插槽窃取以避免空闲插槽被使用,以及(d)智能调度/排序传输。我们的研究结果表明,TDMA- asap独特的TDMA、时隙窃取、休眠和消息聚合的组合显著优于其他混合WSN MAC算法,并且在能耗和总体延迟方面具有接近最佳的性能。
{"title":"TDMA-ASAP: Sensor Network TDMA Scheduling with Adaptive Slot-Stealing and Parallelism","authors":"Sameh Gobriel, D. Mossé, Robert Cleric","doi":"10.1109/ICDCS.2009.80","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.80","url":null,"abstract":"TDMA has been proposed as a MAC protocol for wireless sensor networks (WSNs) due to its efficiency in high WSN load. However, TDMA is plagued with shortcomings; we present modifications to TDMA that will allow for the same efficiency of TDMA, while allowing the network to conserve energy during times of low load (when there is no activity being detected). Recognizing that aggregation plays an essential role in WSNs, TDMA-ASAP adds to TDMA: (a) transmission parallelism based on a level-by-level localized graph-coloring, (b) appropriate sleeping between transmissions (\"napping\"), (c) judicious and controlled TDMA slot stealing to avoid empty slots to be unused and (d) intelligent scheduling/ordering transmissions. Our results show that TDMA-ASAP's unique combination of TDMA, slot-stealing, napping, and message aggregation significantly outperforms other hybrid WSN MAC algorithms and has a performance that is close to optimal in terms of energy consumption and overall delay.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
A Note on Distributed Stable Matching 关于分布式稳定匹配的一个注记
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.69
Alexander Kipnis, B. Patt-Shamir
We consider the distributed complexity of the stable marriage problem. In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable marriage problem requires Omega(sqrt(n/(B log n))) communication rounds in the worst case, even for graphs of diameter Theta (log n), where n is the number of nodes in the graph.  Furthermore, the lower bound holds even if we allow the output to contain O(sqrt(n)) blocking pairs. We also consider epsilon-stability, where a pair is called epsilon-blocking if they can improve the quality of their match by more than an epsilon fraction, for some 0
我们考虑稳定婚姻问题的分布复杂性。在这个问题中,通信图是无向的二部图,每个节点对其邻居进行排序。给定节点的匹配,如果一对节点更喜欢对方而不是分配给它们的匹配,则称为阻塞。如果匹配不产生任何阻塞对,则称为稳定匹配。在分布式模型中,节点在通信链路上每轮交换消息,直到找到稳定的匹配。我们表明,如果每个消息最多包含B位,那么在最坏的情况下,任何解决稳定婚姻问题的分布式算法都需要Omega(sqrt(n/(B log n))))轮通信,即使对于直径为Theta (log n)的图也是如此,其中n是图中的节点数。此外,即使我们允许输出包含O(sqrt(n))个阻塞对,下界仍然成立。我们还考虑了ε -稳定性,其中一对如果能够将匹配的质量提高超过ε分数,则称为ε -阻塞,对于某些0
{"title":"A Note on Distributed Stable Matching","authors":"Alexander Kipnis, B. Patt-Shamir","doi":"10.1109/ICDCS.2009.69","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.69","url":null,"abstract":"We consider the distributed complexity of the stable marriage problem. In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable marriage problem requires Omega(sqrt(n/(B log n))) communication rounds in the worst case, even for graphs of diameter Theta (log n), where n is the number of nodes in the graph.  Furthermore, the lower bound holds even if we allow the output to contain O(sqrt(n)) blocking pairs. We also consider epsilon-stability, where a pair is called epsilon-blocking if they can improve the quality of their match by more than an epsilon fraction, for some 0","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130472351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Implementing a Register in a Dynamic Distributed System 动态分布式系统中寄存器的实现
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.46
R. Baldoni, Silvia Bonomi, Anne-Marie Kermarrec, M. Raynal
Providing distributed processes with concurrent objects is a fundamental service that has to be offered by any distributed system. The classical shared read/write register is one of the most basic ones. Several protocols have been proposed that build an atomic register on top of an asyn- chronous message-passing system prone to process crashes. In the same spirit, this paper addresses the implementation of a regular register (a weakened form of an atomic register) in an asynchronous dynamic message-passing system. The aim is here to cope with the net effect of the adversaries that are asynchrony and dynamicity (the fact that processes can enter and leave the system). The paper focuses on the class of dynamic systems the churn rate c of which is constant. It presents two protocols, one applicable to synchronous dynamic message passing systems, the other one to even- tually synchronous dynamic systems. Both protocols rely on an appropriate broadcast communication service (similar to a reliable broadcast). Each requires a specific constraint on the churn rate c. Both protocols are first presented in an as intuitive as possible way, and are then proved correct.
为分布式进程提供并发对象是任何分布式系统都必须提供的基本服务。经典的共享读/写寄存器是最基本的寄存器之一。已经提出了几个协议,在易于进程崩溃的异步消息传递系统之上构建原子寄存器。本着同样的精神,本文讨论了异步动态消息传递系统中常规寄存器(原子寄存器的弱化形式)的实现。这里的目标是处理异步和动态性(进程可以进入和离开系统的事实)的对手的净影响。研究一类流失率c为常数的动态系统。提出了两种协议,一种适用于同步动态消息传递系统,另一种适用于均匀同步动态消息传递系统。两种协议都依赖于适当的广播通信服务(类似于可靠的广播)。每个协议都需要对流失率c进行特定的约束。这两个协议首先以尽可能直观的方式呈现,然后被证明是正确的。
{"title":"Implementing a Register in a Dynamic Distributed System","authors":"R. Baldoni, Silvia Bonomi, Anne-Marie Kermarrec, M. Raynal","doi":"10.1109/ICDCS.2009.46","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.46","url":null,"abstract":"Providing distributed processes with concurrent objects is a fundamental service that has to be offered by any distributed system. The classical shared read/write register is one of the most basic ones. Several protocols have been proposed that build an atomic register on top of an asyn- chronous message-passing system prone to process crashes. In the same spirit, this paper addresses the implementation of a regular register (a weakened form of an atomic register) in an asynchronous dynamic message-passing system. The aim is here to cope with the net effect of the adversaries that are asynchrony and dynamicity (the fact that processes can enter and leave the system). The paper focuses on the class of dynamic systems the churn rate c of which is constant. It presents two protocols, one applicable to synchronous dynamic message passing systems, the other one to even- tually synchronous dynamic systems. Both protocols rely on an appropriate broadcast communication service (similar to a reliable broadcast). Each requires a specific constraint on the churn rate c. Both protocols are first presented in an as intuitive as possible way, and are then proved correct.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Information Value-Driven Near Real-Time Decision Support Systems 信息价值驱动的近实时决策支持系统
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.17
Ying Yan, Wen-Syan Li, Jian Xu
In this paper, we focus on challenges of supporting a decision support system (DSS) based on a hybrid approach (i.e. a federation system with data placement) for agile business intelligence applications. A DSS needs to be designed to handle a workload of potentially complex queries for important decision-making processes. The response time requirement (and a realistic goal) for such a DSS is near real time. The users of a DSS care about not only the response time but also the time stamp of the business operation report since both of them introduce uncertainty and risks to business decision-making. In our proposed DSS, each report is assigned with a business value; denoting its importance to business decision-making. An Information Value (IV) is a business value of a report discounted by time to reflex the uncertainty and risks associated with the computational latency and synchronization latency. We propose a novel Information Value-driven Query Processing (IVQP) framework specific for near real time DSS applications. The framework enables dynamic query plan selection by taking into account of information value and adaptation for online-arrival ad hoc queries. The framework works with single query as well as a workload of queries. The experimental results based on synthetic data and TPC-H show the effectiveness of our approach in achieving optimal information values for the workloads.
在本文中,我们重点讨论了为敏捷商业智能应用程序支持基于混合方法(即具有数据放置的联邦系统)的决策支持系统(DSS)所面临的挑战。需要设计DSS来处理重要决策过程中潜在复杂查询的工作负载。这种DSS的响应时间要求(和现实目标)是接近实时的。决策支持系统的用户不仅关心响应时间,还关心业务操作报告的时间戳,因为它们都给业务决策带来了不确定性和风险。在我们建议的DSS中,每个报告都被分配了一个业务价值;表示其对商业决策的重要性。信息价值(IV)是按时间贴现的报告的业务价值,以反映与计算延迟和同步延迟相关的不确定性和风险。我们提出了一种新的信息价值驱动查询处理(IVQP)框架,专门用于近实时的决策支持系统应用。该框架通过考虑在线到达的特别查询的信息价值和适应性,支持动态查询计划选择。该框架可用于单个查询以及查询工作负载。基于合成数据和TPC-H的实验结果表明,我们的方法在实现工作负载的最佳信息值方面是有效的。
{"title":"Information Value-Driven Near Real-Time Decision Support Systems","authors":"Ying Yan, Wen-Syan Li, Jian Xu","doi":"10.1109/ICDCS.2009.17","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.17","url":null,"abstract":"In this paper, we focus on challenges of supporting a decision support system (DSS) based on a hybrid approach (i.e. a federation system with data placement) for agile business intelligence applications. A DSS needs to be designed to handle a workload of potentially complex queries for important decision-making processes. The response time requirement (and a realistic goal) for such a DSS is near real time. The users of a DSS care about not only the response time but also the time stamp of the business operation report since both of them introduce uncertainty and risks to business decision-making. In our proposed DSS, each report is assigned with a business value; denoting its importance to business decision-making. An Information Value (IV) is a business value of a report discounted by time to reflex the uncertainty and risks associated with the computational latency and synchronization latency. We propose a novel Information Value-driven Query Processing (IVQP) framework specific for near real time DSS applications. The framework enables dynamic query plan selection by taking into account of information value and adaptation for online-arrival ad hoc queries. The framework works with single query as well as a workload of queries. The experimental results based on synthetic data and TPC-H show the effectiveness of our approach in achieving optimal information values for the workloads.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Case Study of Traffic Locality in Internet P2P Live Streaming Systems 互联网P2P直播系统中流量局部性的案例研究
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.50
Yao Liu, Lei Guo, Fei Li, Songqing Chen
With the ever-increasing P2P Internet traffic, recently much attention has been paid to the topology mismatch between the P2P overlay and the underlying network due to the large amount of cross-ISP traffic.  Mainly focusing on BitTorrent-like file sharing systems, several recent studies have demonstrated how to efficiently bridge the overlay and the underlying network by leveraging the existing infrastructure, such as CDN services or developing new application-ISP interfaces, such as P4P. However, so far the traffic locality in existing P2P live streaming systems has not been well studied. In this work, taking PPLive as an example, we examine traffic locality in Internet P2P streaming systems. Our measurement results on both popular and unpopular channels from various locations show that current PPLive traffic is highly localized at the ISP level. In particular, we find: (1) a PPLive peer mainly obtains peer lists referred by its connected neighbors (rather than tracker servers) and up to 90% of listed peers are from the same ISP as the requesting peer; (2) the major portion of the streaming traffic received by a requesting peer (up to 88% in popular channels) is served by peers in the same ISP as the requestor; (3) the top 10% of the connected peers provide most (about 70%) of the requested streaming data and these top peers have smaller RTT to the requesting peer.  Our study reveals that without using any topology information or demanding any infrastructure support, PPLive achieves such high ISP level traffic locality spontaneously with its decentralized, latency based, neighbor referral peer selection strategy. These findings provide some new insights for better understanding and optimizing the network- and user-level performance in practical P2P live streaming systems.
随着P2P网络流量的不断增加,由于大量的跨isp流量,P2P覆盖层与底层网络的拓扑不匹配成为近年来人们关注的问题。最近的一些研究主要集中在类似bittorrent的文件共享系统上,展示了如何通过利用现有的基础设施(如CDN服务)或开发新的应用程序- isp接口(如P4P)来有效地桥接覆盖层和底层网络。然而,目前对P2P直播系统中流量局部性的研究还不够深入。本文以PPLive为例,研究了互联网P2P流媒体系统中的流量局部性。我们对来自不同地点的流行和不流行渠道的测量结果表明,当前的PPLive流量在ISP级别高度本地化。特别是,我们发现:(1)PPLive对等体主要获得由其连接的邻居(而不是跟踪服务器)引用的对等体列表,并且多达90%的列出的对等体来自与请求对等体相同的ISP;(2)请求端接收的大部分流媒体流量(在流行频道中高达88%)由与请求端位于同一ISP的对等端提供;(3)前10%的连接对等体提供了大部分(约70%)请求的流数据,并且这些顶级对等体对请求对等体具有较小的RTT。我们的研究表明,在不使用任何拓扑信息或要求任何基础设施支持的情况下,PPLive通过其分散的、基于延迟的邻居推荐对等选择策略自发地实现了如此高的ISP级流量局部性。这些发现为更好地理解和优化实际P2P直播系统中的网络和用户级性能提供了一些新的见解。
{"title":"A Case Study of Traffic Locality in Internet P2P Live Streaming Systems","authors":"Yao Liu, Lei Guo, Fei Li, Songqing Chen","doi":"10.1109/ICDCS.2009.50","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.50","url":null,"abstract":"With the ever-increasing P2P Internet traffic, recently much attention has been paid to the topology mismatch between the P2P overlay and the underlying network due to the large amount of cross-ISP traffic.  Mainly focusing on BitTorrent-like file sharing systems, several recent studies have demonstrated how to efficiently bridge the overlay and the underlying network by leveraging the existing infrastructure, such as CDN services or developing new application-ISP interfaces, such as P4P. However, so far the traffic locality in existing P2P live streaming systems has not been well studied. In this work, taking PPLive as an example, we examine traffic locality in Internet P2P streaming systems. Our measurement results on both popular and unpopular channels from various locations show that current PPLive traffic is highly localized at the ISP level. In particular, we find: (1) a PPLive peer mainly obtains peer lists referred by its connected neighbors (rather than tracker servers) and up to 90% of listed peers are from the same ISP as the requesting peer; (2) the major portion of the streaming traffic received by a requesting peer (up to 88% in popular channels) is served by peers in the same ISP as the requestor; (3) the top 10% of the connected peers provide most (about 70%) of the requested streaming data and these top peers have smaller RTT to the requesting peer.  Our study reveals that without using any topology information or demanding any infrastructure support, PPLive achieves such high ISP level traffic locality spontaneously with its decentralized, latency based, neighbor referral peer selection strategy. These findings provide some new insights for better understanding and optimizing the network- and user-level performance in practical P2P live streaming systems.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115531493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
期刊
2009 29th IEEE International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1