2,611 research outputs found
Self-Stabilizing Repeated Balls-into-Bins
We study the following synchronous process that we call "repeated
balls-into-bins". The process is started by assigning balls to bins in
an arbitrary way. In every subsequent round, from each non-empty bin one ball
is chosen according to some fixed strategy (random, FIFO, etc), and re-assigned
to one of the bins uniformly at random.
We define a configuration "legitimate" if its maximum load is
. We prove that, starting from any configuration, the
process will converge to a legitimate configuration in linear time and then it
will only take on legitimate configurations over a period of length bounded by
any polynomial in , with high probability (w.h.p.). This implies that the
process is self-stabilizing and that every ball traverses all bins in
rounds, w.h.p
Load Balancing via Random Local Search in Closed and Open systems
In this paper, we analyze the performance of random load resampling and
migration strategies in parallel server systems. Clients initially attach to an
arbitrary server, but may switch server independently at random instants of
time in an attempt to improve their service rate. This approach to load
balancing contrasts with traditional approaches where clients make smart server
selections upon arrival (e.g., Join-the-Shortest-Queue policy and variants
thereof). Load resampling is particularly relevant in scenarios where clients
cannot predict the load of a server before being actually attached to it. An
important example is in wireless spectrum sharing where clients try to share a
set of frequency bands in a distributed manner.Comment: Accepted to Sigmetrics 201
A Policy Switching Approach to Consolidating Load Shedding and Islanding Protection Schemes
In recent years there have been many improvements in the reliability of
critical infrastructure systems. Despite these improvements, the power systems
industry has seen relatively small advances in this regard. For instance, power
quality deficiencies, a high number of localized contingencies, and large
cascading outages are still too widespread. Though progress has been made in
improving generation, transmission, and distribution infrastructure, remedial
action schemes (RAS) remain non-standardized and are often not uniformly
implemented across different utilities, ISOs, and RTOs. Traditionally, load
shedding and islanding have been successful protection measures in restraining
propagation of contingencies and large cascading outages. This paper proposes a
novel, algorithmic approach to selecting RAS policies to optimize the operation
of the power network during and after a contingency. Specifically, we use
policy-switching to consolidate traditional load shedding and islanding
schemes. In order to model and simulate the functionality of the proposed power
systems protection algorithm, we conduct Monte-Carlo, time-domain simulations
using Siemens PSS/E. The algorithm is tested via experiments on the IEEE-39
topology to demonstrate that the proposed approach achieves optimal power
system performance during emergency situations, given a specific set of RAS
policies.Comment: Full Paper Accepted to PSCC 2014 - IEEE Co-Sponsored Conference. 7
Pages, 2 Figures, 2 Table
Measuring and mitigating AS-level adversaries against Tor
The popularity of Tor as an anonymity system has made it a popular target for
a variety of attacks. We focus on traffic correlation attacks, which are no
longer solely in the realm of academic research with recent revelations about
the NSA and GCHQ actively working to implement them in practice.
Our first contribution is an empirical study that allows us to gain a high
fidelity snapshot of the threat of traffic correlation attacks in the wild. We
find that up to 40% of all circuits created by Tor are vulnerable to attacks by
traffic correlation from Autonomous System (AS)-level adversaries, 42% from
colluding AS-level adversaries, and 85% from state-level adversaries. In
addition, we find that in some regions (notably, China and Iran) there exist
many cases where over 95% of all possible circuits are vulnerable to
correlation attacks, emphasizing the need for AS-aware relay-selection.
To mitigate the threat of such attacks, we build Astoria--an AS-aware Tor
client. Astoria leverages recent developments in network measurement to perform
path-prediction and intelligent relay selection. Astoria reduces the number of
vulnerable circuits to 2% against AS-level adversaries, under 5% against
colluding AS-level adversaries, and 25% against state-level adversaries. In
addition, Astoria load balances across the Tor network so as to not overload
any set of relays.Comment: Appearing at NDSS 201
- …