824 research outputs found
An Optimal Self-Stabilizing Firing Squad
Consider a fully connected network where up to processes may crash, and
all processes start in an arbitrary memory state. The self-stabilizing firing
squad problem consists of eventually guaranteeing simultaneous response to an
external input. This is modeled by requiring that the non-crashed processes
"fire" simultaneously if some correct process received an external "GO" input,
and that they only fire as a response to some process receiving such an input.
This paper presents FireAlg, the first self-stabilizing firing squad algorithm.
The FireAlg algorithm is optimal in two respects: (a) Once the algorithm is
in a safe state, it fires in response to a GO input as fast as any other
algorithm does, and (b) Starting from an arbitrary state, it converges to a
safe state as fast as any other algorithm does.Comment: Shorter version to appear in SSS0
Security Awareness for Public Bus Transportation: Case Studies of Attacks Against the Israeli Public Bus System, Research Report 11-07
This report presents 16 case studies of attacks planned or carried out against Israeli bus targets, along with statistical data on the number, frequency, and lethality of attacks against bus targets that have taken place in Israel since 1970 and during the Second Intifada, which occurred between September 2000 and the end of 2006. The statistical data come from MTI’s Database on Terrorist and Serious Criminal Attacks Against Public Surface Transportation. The report also includes an analysis of the effectiveness of different improvised explosive devices and methods of delivering them and raises questions for future discussion. The case studies of bus attacks were selected not because they are statistically representative, but because they provide a variety of interesting observations. They include both lethal and nonlethal attacks, attacks in which security measures were effective or were not followed or were ineffective, and attacks in which the attackers’ tactics and/or devices were lethal or failed or reduced the lethality of the attack. It is hoped that the cases presented in this report and the accompanying analysis will increase understanding of what can happen and of what can deter, prevent, and/or mitigate the occurrence of terrorist attacks against public bus systems
Tight Bounds for MIS in Multichannel Radio Networks
Daum et al. [PODC'13] presented an algorithm that computes a maximal
independent set (MIS) within
rounds in an -node multichannel radio network with communication
channels. The paper uses a multichannel variant of the standard graph-based
radio network model without collision detection and it assumes that the network
graph is a polynomially bounded independence graph (BIG), a natural
combinatorial generalization of well-known geographic families. The upper bound
of that paper is known to be optimal up to a polyloglog factor.
In this paper, we adapt algorithm and analysis to improve the result in two
ways. Mainly, we get rid of the polyloglog factor in the runtime and we thus
obtain an asymptotically optimal multichannel radio network MIS algorithm. In
addition, our new analysis allows to generalize the class of graphs from those
with polynomially bounded local independence to graphs where the local
independence is bounded by an arbitrary function of the neighborhood radius.Comment: 37 pages, to be published in DISC 201
Self-stabilization Overhead: an Experimental Case Study on Coded Atomic Storage
Shared memory emulation can be used as a fault-tolerant and highly available
distributed storage solution or as a low-level synchronization primitive.
Attiya, Bar-Noy, and Dolev were the first to propose a single-writer,
multi-reader linearizable register emulation where the register is replicated
to all servers. Recently, Cadambe et al. proposed the Coded Atomic Storage
(CAS) algorithm, which uses erasure coding for achieving data redundancy with
much lower communication cost than previous algorithmic solutions.
Although CAS can tolerate server crashes, it was not designed to recover from
unexpected, transient faults, without the need of external (human)
intervention. In this respect, Dolev, Petig, and Schiller have recently
developed a self-stabilizing version of CAS, which we call CASSS. As one would
expect, self-stabilization does not come as a free lunch; it introduces,
mainly, communication overhead for detecting inconsistencies and stale
information. So, one would wonder whether the overhead introduced by
self-stabilization would nullify the gain of erasure coding.
To answer this question, we have implemented and experimentally evaluated the
CASSS algorithm on PlanetLab; a planetary scale distributed infrastructure. The
evaluation shows that our implementation of CASSS scales very well in terms of
the number of servers, the number of concurrent clients, as well as the size of
the replicated object. More importantly, it shows (a) to have only a constant
overhead compared to the traditional CAS algorithm (which we also implement)
and (b) the recovery period (after the last occurrence of a transient fault) is
as fast as a few client (read/write) operations. Our results suggest that CASSS
does not significantly impact efficiency while dealing with automatic recovery
from transient faults and bounded size of needed resources
On the Tomography of Networks and Multicast Trees
In this paper we model the tomography of scale free networks by studying the
structure of layers around an arbitrary network node. We find, both
analytically and empirically, that the distance distribution of all nodes from
a specific network node consists of two regimes. The first is characterized by
rapid growth, and the second decays exponentially. We also show that the nodes
degree distribution at each layer is a power law with an exponential cut-off.
We obtain similar results for the layers surrounding the root of multicast
trees cut from such networks, as well as the Internet. All of our results were
obtained both analytically and on empirical Interenet data
Measurement of filling factor 5/2 quasiparticle interference: observation of charge e/4 and e/2 period oscillations
A standing problem in low dimensional electron systems is the nature of the
5/2 fractional quantum Hall state: its elementary excitations are a focus for
both elucidating the state's properties and as candidates in methods to perform
topological quantum computation. Interferometric devices may be employed to
manipulate and measure quantum Hall edge excitations. Here we use a small area
edge state interferometer designed to observe quasiparticle interference
effects. Oscillations consistent in detail with the Aharanov-Bohm effect are
observed for integer and fractional quantum Hall states (filling factors 2,
5/3, and 7/3) with periods corresponding to their respective charges and
magnetic field positions. With these as charge calibrations, at 5/2 filling
factor and at lowest temperatures periodic transmission through the device
consistent with quasiparticle charge e/4 is observed. The principal finding of
this work is that in addtion to these e/4 oscillations, periodic structures
corresponding to e/2 are also observed at 5/2 and at lowest temperatures.
Properties of the e/4 and e/2 oscillations are examined with the device
sensitivity sufficient to observe temperature evolution of the 5/2
quasiparticle interference. In the model of quasiparticle interference, this
presence of an effective e/2 period may empirically reflect an e/2
quasiparticle charge, or may reflect multiple passes of the e/4 quasiparticle
around the interferometer. These results are discussed within a picture of e/4
quasiparticle excitations potentially possessing non-Abelian statistics. These
studies demonstrate the capacity to perform interferometry on 5/2 excitations
and reveal properties important for understanding this state and its
excitations.Comment: version 3 contains additional data beyond version 2, 26 pages, 8
figures PNAS 081259910
Lessons from the Congested Clique Applied to MapReduce
The main results of this paper are (I) a simulation algorithm which, under
quite general constraints, transforms algorithms running on the Congested
Clique into algorithms running in the MapReduce model, and (II) a distributed
-coloring algorithm running on the Congested Clique which has an
expected running time of (i) rounds, if ;
and (ii) rounds otherwise. Applying the simulation theorem to
the Congested-Clique -coloring algorithm yields an -round
-coloring algorithm in the MapReduce model.
Our simulation algorithm illustrates a natural correspondence between
per-node bandwidth in the Congested Clique model and memory per machine in the
MapReduce model. In the Congested Clique (and more generally, any network in
the model), the major impediment to constructing fast
algorithms is the restriction on message sizes. Similarly, in the
MapReduce model, the combined restrictions on memory per machine and total
system memory have a dominant effect on algorithm design. In showing a fairly
general simulation algorithm, we highlight the similarities and differences
between these models.Comment: 15 page
On the Design of Cryptographic Primitives
The main objective of this work is twofold. On the one hand, it gives a brief
overview of the area of two-party cryptographic protocols. On the other hand,
it proposes new schemes and guidelines for improving the practice of robust
protocol design. In order to achieve such a double goal, a tour through the
descriptions of the two main cryptographic primitives is carried out. Within
this survey, some of the most representative algorithms based on the Theory of
Finite Fields are provided and new general schemes and specific algorithms
based on Graph Theory are proposed
Search in Complex Networks : a New Method of Naming
We suggest a method for routing when the source does not posses full
information about the shortest path to the destination. The method is
particularly useful for scale-free networks, and exploits its unique
characteristics. By assigning new (short) names to nodes (aka labelling) we are
able to reduce significantly the memory requirement at the routers, yet we
succeed in routing with high probability through paths very close in distance
to the shortest ones.Comment: 5 pages, 4 figure
- …