首页 > 最新文献

Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing最新文献

英文 中文
Rapid randomized pruning for fast greedy distributed algorithms 快速贪婪分布式算法的快速随机剪枝
Saurav Pandit, S. Pemmaraju
We start by defining a pruning process involving sellers on one side and buyers on the other. The goal is to quickly select a subset of the sellers so that the products that these sellers bring to the market has small cost ratio, i.e., the ratio of the total cost of the selected sellers' products to amount that interested buyers are willing to pay. As modeled here, the pruning process can be used to speed up distributed implementations of greedy algorithms (e.g., for minimum dominating set, facility location, etc). We present a randomized instance of the pruning process that, for any positive k, runs in O(k) communication rounds with O(log N)-sized messages, yielding a cost ratio of O(Nc/k). Here N is the product of the number of sellers and number of buyers and c is a small constant. Using this O(k)-round pruning algorithm as the basis, we derive several simple, greedy, O(k)-round distributed approximation algorithms for MDS and facility location (both metric and non-metric versions). Our algorithms achieve optimal approximation ratios in polylogarithmic rounds and shave a "logarithmic factor" off the best, known, approximation factor, typically achieved using LP-rounding techniques.
我们首先定义一个涉及卖方和买方的修剪过程。目标是快速选择卖家的一个子集,使这些卖家带入市场的产品具有较小的成本比,即所选卖家产品的总成本与感兴趣的买家愿意支付的金额之比。正如这里所建模的那样,修剪过程可以用来加速贪婪算法的分布式实现(例如,对于最小支配集,设施位置等)。我们给出了一个随机修剪过程的实例,对于任意正k,在O(k)个通信轮中运行O(log N)个大小的消息,产生O(Nc/k)的代价比。这里N是卖家数量和买家数量的乘积c是一个很小的常数。以这种O(k)轮剪枝算法为基础,我们推导了几种简单、贪婪、O(k)轮的MDS和设施位置分布近似算法(包括度量版本和非度量版本)。我们的算法在多对数轮中实现最佳近似比率,并从最佳已知近似因子中剔除“对数因子”,通常使用lp四舍五入技术实现。
{"title":"Rapid randomized pruning for fast greedy distributed algorithms","authors":"Saurav Pandit, S. Pemmaraju","doi":"10.1145/1835698.1835777","DOIUrl":"https://doi.org/10.1145/1835698.1835777","url":null,"abstract":"We start by defining a pruning process involving sellers on one side and buyers on the other. The goal is to quickly select a subset of the sellers so that the products that these sellers bring to the market has small cost ratio, i.e., the ratio of the total cost of the selected sellers' products to amount that interested buyers are willing to pay. As modeled here, the pruning process can be used to speed up distributed implementations of greedy algorithms (e.g., for minimum dominating set, facility location, etc). We present a randomized instance of the pruning process that, for any positive k, runs in O(k) communication rounds with O(log N)-sized messages, yielding a cost ratio of O(Nc/k). Here N is the product of the number of sellers and number of buyers and c is a small constant. Using this O(k)-round pruning algorithm as the basis, we derive several simple, greedy, O(k)-round distributed approximation algorithms for MDS and facility location (both metric and non-metric versions). Our algorithms achieve optimal approximation ratios in polylogarithmic rounds and shave a \"logarithmic factor\" off the best, known, approximation factor, typically achieved using LP-rounding techniques.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Brief announcement: distributed trust management and revocation 简短公告:分布式信任管理和撤销
Dmitriy Kuptsov, A. Gurtov, Óscar García-Morchón, Klaus Wehrle
Fair node and network operation is a key to ensure the correct system operation. The problem arises when some nodes become compromised or faulty endangering the overall system. This is especially challenging in sensor networks because they are often deployed in hostile environments and have to endure both passive and active attacks. Therefore, a node should only communicate with trusted nodes, while non-trusted nodes should be removed from the system to prevent them from further disrupting its normal operation. To address such threats, we introduce the Efficient Cooperative Security (ECoSec) - a distributed and adaptive protocol that allows a network to control the admission and revocation of nodes in a cooperative and democratic way during two voting rounds. Whereas the contributions of the protocol to the family of cooperative security protocols are two fold. First, it introduces the use of polynomial-based votes showing that its operation, and in general, operation of cooperative security protocols, can endure up to 33% of misbehaving nodes. Second, the protocol applies correlated keying material structures to verify the node admission and node revocation voting procedures reducing the overall communication overhead.
公平的节点和网络运行是保证系统正确运行的关键。当某些节点受到损害或出现故障,危及整个系统时,就会出现问题。这在传感器网络中尤其具有挑战性,因为它们通常部署在敌对环境中,并且必须承受被动和主动攻击。因此,一个节点应该只与受信任的节点通信,而不受信任的节点应该从系统中移除,以防止它们进一步破坏系统的正常运行。为了解决这些威胁,我们引入了高效合作安全(ECoSec)——一种分布式和自适应协议,允许网络在两轮投票中以合作和民主的方式控制节点的接纳和撤销。然而,该协议对合作安全协议家族的贡献是双重的。首先,它引入了基于多项式的投票的使用,表明它的操作,以及一般的合作安全协议的操作,可以忍受多达33%的行为不端的节点。其次,该协议采用相关的密钥材料结构来验证节点准入和节点撤销投票过程,降低了整体通信开销。
{"title":"Brief announcement: distributed trust management and revocation","authors":"Dmitriy Kuptsov, A. Gurtov, Óscar García-Morchón, Klaus Wehrle","doi":"10.1145/1835698.1835751","DOIUrl":"https://doi.org/10.1145/1835698.1835751","url":null,"abstract":"Fair node and network operation is a key to ensure the correct system operation. The problem arises when some nodes become compromised or faulty endangering the overall system. This is especially challenging in sensor networks because they are often deployed in hostile environments and have to endure both passive and active attacks. Therefore, a node should only communicate with trusted nodes, while non-trusted nodes should be removed from the system to prevent them from further disrupting its normal operation. To address such threats, we introduce the Efficient Cooperative Security (ECoSec) - a distributed and adaptive protocol that allows a network to control the admission and revocation of nodes in a cooperative and democratic way during two voting rounds. Whereas the contributions of the protocol to the family of cooperative security protocols are two fold. First, it introduces the use of polynomial-based votes showing that its operation, and in general, operation of cooperative security protocols, can endure up to 33% of misbehaving nodes. Second, the protocol applies correlated keying material structures to verify the node admission and node revocation voting procedures reducing the overall communication overhead.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Brief announcement: sources of instability in data center multicast 简短公告:数据中心多播不稳定的来源
Dmitry Basin, K. Birman, I. Keidar, Ymir Vigfusson
Data centers, and particularly the massive ones that support cloud computing, e-commerce, social networking and other large-scale functionality, necessarily replicate data. Our basic premise is that since updates to replicated data can be thought of as reliable multicasts, data center multicast is a potentially important technology. Nonetheless, a series of recent keynote speeches at major conferences makes it clear that data center multicast is a troubled area [4, 2]. One might expect such technologies to use IP multicast hardware, but in fact this is rare. Only TCP is really trusted today (because it backs down when loss occurs), and indeed, TCP is the overwhelming favorite among data center transport protocols [3]. Using TCP to get reliable multicast with high throughput produces an implicit TCP overlay tree.
数据中心,特别是支持云计算、电子商务、社交网络和其他大规模功能的大型数据中心,必须复制数据。我们的基本前提是,由于对复制数据的更新可以被认为是可靠的组播,因此数据中心组播是一项潜在的重要技术。尽管如此,最近在主要会议上的一系列主题演讲清楚地表明,数据中心多播是一个麻烦的领域[4,2]。人们可能期望这种技术使用IP多播硬件,但实际上这种情况很少。今天只有TCP是真正可信的(因为当发生丢失时它会退出),事实上,TCP是数据中心传输协议中最受欢迎的协议[3]。利用TCP实现可靠的高吞吐量组播,生成了一个隐式的TCP覆盖树。
{"title":"Brief announcement: sources of instability in data center multicast","authors":"Dmitry Basin, K. Birman, I. Keidar, Ymir Vigfusson","doi":"10.1145/1835698.1835732","DOIUrl":"https://doi.org/10.1145/1835698.1835732","url":null,"abstract":"Data centers, and particularly the massive ones that support cloud computing, e-commerce, social networking and other large-scale functionality, necessarily replicate data. Our basic premise is that since updates to replicated data can be thought of as reliable multicasts, data center multicast is a potentially important technology. Nonetheless, a series of recent keynote speeches at major conferences makes it clear that data center multicast is a troubled area [4, 2]. One might expect such technologies to use IP multicast hardware, but in fact this is rare. Only TCP is really trusted today (because it backs down when loss occurs), and indeed, TCP is the overwhelming favorite among data center transport protocols [3]. Using TCP to get reliable multicast with high throughput produces an implicit TCP overlay tree.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114960224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Brief announcement: decentralized construction of multicast trees embedded into P2P overlay networks based on virtual geometric coordinates 简要公告:基于虚拟几何坐标的多播树嵌入P2P覆盖网络的分散构造
M. Andreica, Andrei Dragus, A. Sambotin, N. Tapus
In this paper we consider the problem of efficiently constructing in a fully distributed manner multicast trees which are embedded into P2P overlays using virtual geometric node coordinates. We consider two objectives: to minimize the number of messages required for constructing a multicast tree by using the geometric properties of the P2P overlay, and to construct stable multicast trees when the lifetime durations of the peers are known.
本文研究了利用虚拟几何节点坐标,以完全分布式的方式高效构造嵌入到P2P覆盖层中的组播树的问题。我们考虑了两个目标:利用P2P覆盖的几何特性来最小化构建组播树所需的消息数量,以及在对等体的生存时间已知的情况下构建稳定的组播树。
{"title":"Brief announcement: decentralized construction of multicast trees embedded into P2P overlay networks based on virtual geometric coordinates","authors":"M. Andreica, Andrei Dragus, A. Sambotin, N. Tapus","doi":"10.1145/1835698.1835766","DOIUrl":"https://doi.org/10.1145/1835698.1835766","url":null,"abstract":"In this paper we consider the problem of efficiently constructing in a fully distributed manner multicast trees which are embedded into P2P overlays using virtual geometric node coordinates. We consider two objectives: to minimize the number of messages required for constructing a multicast tree by using the geometric properties of the P2P overlay, and to construct stable multicast trees when the lifetime durations of the peers are known.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Brief announcement: single-version permissive STM 简短声明:单版本允许的STM
H. Attiya, Eshcar Hillel
We present a single-version STM that satisfies a practical notion of permissiveness: it never aborts read-only transactions, and it only aborts an update transaction due to another conflicting update transaction, thereby avoiding many spurious aborts. It avoids unnecessary contention on the memory, being strictly disjoint-access parallel.
我们提出了一个满足实际的许可概念的单版本STM:它永远不会中止只读事务,它只会由于另一个冲突的更新事务而中止更新事务,从而避免了许多虚假的中止。它避免了不必要的内存争用,是严格的分离访问并行。
{"title":"Brief announcement: single-version permissive STM","authors":"H. Attiya, Eshcar Hillel","doi":"10.1145/1835698.1835712","DOIUrl":"https://doi.org/10.1145/1835698.1835712","url":null,"abstract":"We present a single-version STM that satisfies a practical notion of permissiveness: it never aborts read-only transactions, and it only aborts an update transaction due to another conflicting update transaction, thereby avoiding many spurious aborts. It avoids unnecessary contention on the memory, being strictly disjoint-access parallel.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121691624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the theoretical gap between synchronous and asynchronous MPC protocols 论同步与异步MPC协议的理论差异
Zuzana Beerliová-Trubíniová, M. Hirt, J. Nielsen
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if t < n/2, when the channels are synchronous, and t < n/3, when the channels are asynchronous, respectively. In this work we analyze the gap between these bounds, and show that in the cryptographic setting (with setup), the sole reason for it is the distribution of inputs: given an oracle for input distribution, cryptographically-secure asynchronous MPC is possible with the very same condition as synchronous MPC, namely t < n/2. We do not know whether the gaps in other security models (perfect, statistical) have the same cause. We stress that all previous asynchronous MPC protocols inherently require t < n/3, even once inputs are distributed. In particular, all published asynchronous multiplication sub-protocols inherently require t < n/3 and cannot be used in our setting. Furthermore, we show that such an input-distribution oracle can be reduced to an oracle that allows each party to synchronously broadcast one single message. This means that when one single round of synchronous broadcast is available, then asynchronous MPC is possible at the same condition as synchronous MPC, namely t < n/2. If such a round cannot be used, then MPC (and even Byzantine agreement) requires t < n/3.
当且仅当通道为同步时t < n/2,当通道为异步时t < n/3时,已知存在针对t个活动故障的n方多方计算(MPC)协议。在这项工作中,我们分析了这些界限之间的差距,并表明在加密设置(设置)中,它的唯一原因是输入的分布:给定输入分布的oracle,加密安全异步MPC与同步MPC具有相同的条件,即t < n/2。我们不知道其他安全模型(完美的、统计的)中的漏洞是否有同样的原因。我们强调,所有以前的异步MPC协议本质上都要求t < n/3,即使输入是分布式的。特别是,所有发布的异步乘法子协议本质上都要求t < n/3,并且不能在我们的设置中使用。此外,我们证明了这样的输入分布预言可以简化为允许每一方同步广播一条消息的预言。这意味着当单轮同步广播可用时,异步MPC在与同步MPC相同的条件下是可能的,即t < n/2。如果不能使用这样的一轮,那么MPC(甚至拜占庭协议)要求t < n/3。
{"title":"On the theoretical gap between synchronous and asynchronous MPC protocols","authors":"Zuzana Beerliová-Trubíniová, M. Hirt, J. Nielsen","doi":"10.1145/1835698.1835746","DOIUrl":"https://doi.org/10.1145/1835698.1835746","url":null,"abstract":"Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if t < n/2, when the channels are synchronous, and t < n/3, when the channels are asynchronous, respectively. In this work we analyze the gap between these bounds, and show that in the cryptographic setting (with setup), the sole reason for it is the distribution of inputs: given an oracle for input distribution, cryptographically-secure asynchronous MPC is possible with the very same condition as synchronous MPC, namely t < n/2. We do not know whether the gaps in other security models (perfect, statistical) have the same cause. We stress that all previous asynchronous MPC protocols inherently require t < n/3, even once inputs are distributed. In particular, all published asynchronous multiplication sub-protocols inherently require t < n/3 and cannot be used in our setting. Furthermore, we show that such an input-distribution oracle can be reduced to an oracle that allows each party to synchronously broadcast one single message. This means that when one single round of synchronous broadcast is available, then asynchronous MPC is possible at the same condition as synchronous MPC, namely t < n/2. If such a round cannot be used, then MPC (and even Byzantine agreement) requires t < n/3.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122060005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Adaptive randomized mutual exclusion in sub-logarithmic expected time 次对数期望时间下的自适应随机互斥
Danny Hendler, Philipp Woelfel
Mutual exclusion is a fundamental distributed coordination problem. Shared-memory mutual exclusion research focuses on local-spin algorithms and uses the remote memory references (RMRs) metric. A mutual exclusion algorithm is adaptive to point contention, if its RMR complexity is a function of the maximum number of processes concurrently executing their entry, critical, or exit section. In the best prior art deterministic adaptive mutual exclusion algorithm, presented by Kim and Anderson [22], a process performs O(min(k,log N)) RMRs as it enters and exits its critical section, where k is point contention and N is the number of processes in the system. Kim and Anderson also proved that a deterministic algorithm with o(k) RMR complexity does not exist [21]. However, they describe a randomized mutual exclusion algorithm that has O(log k) expected RMR complexity against an oblivious adversary. All these results apply for algorithms that use only atomic read and write operations. We present a randomized adaptive mutual exclusion algorithms with O(log k/loglog k) expected amortized RMR complexity, even against a strong adversary, for the cache-coherent shared memory read/write model. Using techniques similar to those used in [17], our algorithm can be adapted for the distributed shared memory read/write model. This establishes that sub-logarithmic adaptive mutual exclusion, using reads and writes only, is possible.
互斥是一个基本的分布式协调问题。共享内存互斥研究侧重于局部自旋算法,并使用远程内存引用(RMRs)度量。如果互斥算法的RMR复杂度是并发执行其入口段、临界段或退出段的最大进程数的函数,则互斥算法自适应于点争用。在Kim和Anderson[22]提出的最佳现有技术确定性自适应互排算法中,进程在进入和退出其临界区域时执行O(min(k,log N)) rmr,其中k为点争用,N为系统中的进程数。Kim和Anderson也证明了不存在复杂度为0 (k) RMR的确定性算法[21]。然而,他们描述了一种随机互斥算法,该算法具有O(log k)的预期RMR复杂度,以对抗无意识对手。所有这些结果都适用于只使用原子读写操作的算法。我们提出了一种随机自适应互斥算法,其期望平摊RMR复杂度为O(log k/loglog k),即使面对强大的对手,也可以用于缓存一致共享内存读/写模型。使用类似于[17]中使用的技术,我们的算法可以适用于分布式共享内存读/写模型。这表明,只使用读和写的次对数自适应互斥是可能的。
{"title":"Adaptive randomized mutual exclusion in sub-logarithmic expected time","authors":"Danny Hendler, Philipp Woelfel","doi":"10.1145/1835698.1835737","DOIUrl":"https://doi.org/10.1145/1835698.1835737","url":null,"abstract":"Mutual exclusion is a fundamental distributed coordination problem. Shared-memory mutual exclusion research focuses on local-spin algorithms and uses the remote memory references (RMRs) metric. A mutual exclusion algorithm is adaptive to point contention, if its RMR complexity is a function of the maximum number of processes concurrently executing their entry, critical, or exit section. In the best prior art deterministic adaptive mutual exclusion algorithm, presented by Kim and Anderson [22], a process performs O(min(k,log N)) RMRs as it enters and exits its critical section, where k is point contention and N is the number of processes in the system. Kim and Anderson also proved that a deterministic algorithm with o(k) RMR complexity does not exist [21]. However, they describe a randomized mutual exclusion algorithm that has O(log k) expected RMR complexity against an oblivious adversary. All these results apply for algorithms that use only atomic read and write operations. We present a randomized adaptive mutual exclusion algorithms with O(log k/loglog k) expected amortized RMR complexity, even against a strong adversary, for the cache-coherent shared memory read/write model. Using techniques similar to those used in [17], our algorithm can be adapted for the distributed shared memory read/write model. This establishes that sub-logarithmic adaptive mutual exclusion, using reads and writes only, is possible.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121459923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Brief announcement: a framework for building self-stabilizing overlay networks 简要公告:构建自稳定覆盖网络的框架
Andrew Berns, Sukumar Ghosh, S. Pemmaraju
We describe a simple framework, called the transitive closure framework (TCF), for the self-stabilizing construction of any overlay network. The TCF is easy to reason about and algorithms derived from it stabilize within O(log n) more rounds than the optimal. As evidence of the power of this framework, we derive from the TCF a simple, self-stabilizing protocol for constructing Skip + graphs in O(log n) rounds.
我们描述了一个简单的框架,称为传递闭包框架(TCF),用于任何覆盖网络的自稳定构造。TCF很容易推理,由它导出的算法比最优算法在O(log n)轮内稳定。为了证明这个框架的强大功能,我们从TCF中导出了一个简单的、自稳定的协议,用于在O(log n)轮中构造Skip +图。
{"title":"Brief announcement: a framework for building self-stabilizing overlay networks","authors":"Andrew Berns, Sukumar Ghosh, S. Pemmaraju","doi":"10.1145/1835698.1835790","DOIUrl":"https://doi.org/10.1145/1835698.1835790","url":null,"abstract":"We describe a simple framework, called the transitive closure framework (TCF), for the self-stabilizing construction of any overlay network. The TCF is easy to reason about and algorithms derived from it stabilize within O(log n) more rounds than the optimal. As evidence of the power of this framework, we derive from the TCF a simple, self-stabilizing protocol for constructing Skip + graphs in O(log n) rounds.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Session details: Regular papers 会议细节:常规论文
E. Rupert
{"title":"Session details: Regular papers","authors":"E. Rupert","doi":"10.1145/3258207","DOIUrl":"https://doi.org/10.1145/3258207","url":null,"abstract":"","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121865079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying linearizability with hindsight 事后验证线性化
P. O'Hearn, N. Rinetzky, Martin T. Vechev, Eran Yahav, G. Yorsh
We present a proof of safety and linearizability of a highly-concurrent optimistic set algorithm. The key step in our proof is the Hindsight Lemma, which allows a thread to infer the existence of a global state in which its operation can be linearized based on limited local atomic observations about the shared state. The Hindsight Lemma allows us to avoid one of the most complex and non-intuitive steps in reasoning about highly concurrent algorithms: considering the linearization point of an operation to be in a different thread than the one executing it. The Hindsight Lemma assumes that the algorithm maintains certain simple invariants which are resilient to interference, and which can themselves be verified using purely thread-local proofs. As a consequence, the lemma allows us to unlock a perhaps-surprising intuition: a high degree of interference makes non-trivial highly-concurrent algorithms in some cases much easier to verify than less concurrent ones.
给出了一种高度并发乐观集算法的安全性和线性化证明。我们证明的关键步骤是后见引理,它允许线程推断全局状态的存在,在这种状态下,线程的操作可以基于有限的局部原子对共享状态的观察而线性化。后见之明引理允许我们避免在对高度并发算法进行推理时最复杂和最不直观的步骤之一:将操作的线性化点考虑在与执行该操作的线程不同的线程中。后见引理假设算法保持某些简单的不变量,这些不变量对干扰具有弹性,并且可以使用纯粹的线程局部证明来验证它们。因此,引理允许我们解开一个可能令人惊讶的直觉:在某些情况下,高度的干扰使得非平凡的高并发算法比低并发算法更容易验证。
{"title":"Verifying linearizability with hindsight","authors":"P. O'Hearn, N. Rinetzky, Martin T. Vechev, Eran Yahav, G. Yorsh","doi":"10.1145/1835698.1835722","DOIUrl":"https://doi.org/10.1145/1835698.1835722","url":null,"abstract":"We present a proof of safety and linearizability of a highly-concurrent optimistic set algorithm. The key step in our proof is the Hindsight Lemma, which allows a thread to infer the existence of a global state in which its operation can be linearized based on limited local atomic observations about the shared state. The Hindsight Lemma allows us to avoid one of the most complex and non-intuitive steps in reasoning about highly concurrent algorithms: considering the linearization point of an operation to be in a different thread than the one executing it. The Hindsight Lemma assumes that the algorithm maintains certain simple invariants which are resilient to interference, and which can themselves be verified using purely thread-local proofs. As a consequence, the lemma allows us to unlock a perhaps-surprising intuition: a high degree of interference makes non-trivial highly-concurrent algorithms in some cases much easier to verify than less concurrent ones.","PeriodicalId":447863,"journal":{"name":"Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125206847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
期刊
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1