824 research outputs found

    An Optimal Self-Stabilizing Firing Squad

    Full text link
    Consider a fully connected network where up to tt processes may crash, and all processes start in an arbitrary memory state. The self-stabilizing firing squad problem consists of eventually guaranteeing simultaneous response to an external input. This is modeled by requiring that the non-crashed processes "fire" simultaneously if some correct process received an external "GO" input, and that they only fire as a response to some process receiving such an input. This paper presents FireAlg, the first self-stabilizing firing squad algorithm. The FireAlg algorithm is optimal in two respects: (a) Once the algorithm is in a safe state, it fires in response to a GO input as fast as any other algorithm does, and (b) Starting from an arbitrary state, it converges to a safe state as fast as any other algorithm does.Comment: Shorter version to appear in SSS0

    Security Awareness for Public Bus Transportation: Case Studies of Attacks Against the Israeli Public Bus System, Research Report 11-07

    Get PDF
    This report presents 16 case studies of attacks planned or carried out against Israeli bus targets, along with statistical data on the number, frequency, and lethality of attacks against bus targets that have taken place in Israel since 1970 and during the Second Intifada, which occurred between September 2000 and the end of 2006. The statistical data come from MTI’s Database on Terrorist and Serious Criminal Attacks Against Public Surface Transportation. The report also includes an analysis of the effectiveness of different improvised explosive devices and methods of delivering them and raises questions for future discussion. The case studies of bus attacks were selected not because they are statistically representative, but because they provide a variety of interesting observations. They include both lethal and nonlethal attacks, attacks in which security measures were effective or were not followed or were ineffective, and attacks in which the attackers’ tactics and/or devices were lethal or failed or reduced the lethality of the attack. It is hoped that the cases presented in this report and the accompanying analysis will increase understanding of what can happen and of what can deter, prevent, and/or mitigate the occurrence of terrorist attacks against public bus systems

    Tight Bounds for MIS in Multichannel Radio Networks

    Full text link
    Daum et al. [PODC'13] presented an algorithm that computes a maximal independent set (MIS) within O(log2n/F+lognpolyloglogn)O(\log^2 n/F+\log n \mathrm{polyloglog} n) rounds in an nn-node multichannel radio network with FF communication channels. The paper uses a multichannel variant of the standard graph-based radio network model without collision detection and it assumes that the network graph is a polynomially bounded independence graph (BIG), a natural combinatorial generalization of well-known geographic families. The upper bound of that paper is known to be optimal up to a polyloglog factor. In this paper, we adapt algorithm and analysis to improve the result in two ways. Mainly, we get rid of the polyloglog factor in the runtime and we thus obtain an asymptotically optimal multichannel radio network MIS algorithm. In addition, our new analysis allows to generalize the class of graphs from those with polynomially bounded local independence to graphs where the local independence is bounded by an arbitrary function of the neighborhood radius.Comment: 37 pages, to be published in DISC 201

    Self-stabilization Overhead: an Experimental Case Study on Coded Atomic Storage

    Full text link
    Shared memory emulation can be used as a fault-tolerant and highly available distributed storage solution or as a low-level synchronization primitive. Attiya, Bar-Noy, and Dolev were the first to propose a single-writer, multi-reader linearizable register emulation where the register is replicated to all servers. Recently, Cadambe et al. proposed the Coded Atomic Storage (CAS) algorithm, which uses erasure coding for achieving data redundancy with much lower communication cost than previous algorithmic solutions. Although CAS can tolerate server crashes, it was not designed to recover from unexpected, transient faults, without the need of external (human) intervention. In this respect, Dolev, Petig, and Schiller have recently developed a self-stabilizing version of CAS, which we call CASSS. As one would expect, self-stabilization does not come as a free lunch; it introduces, mainly, communication overhead for detecting inconsistencies and stale information. So, one would wonder whether the overhead introduced by self-stabilization would nullify the gain of erasure coding. To answer this question, we have implemented and experimentally evaluated the CASSS algorithm on PlanetLab; a planetary scale distributed infrastructure. The evaluation shows that our implementation of CASSS scales very well in terms of the number of servers, the number of concurrent clients, as well as the size of the replicated object. More importantly, it shows (a) to have only a constant overhead compared to the traditional CAS algorithm (which we also implement) and (b) the recovery period (after the last occurrence of a transient fault) is as fast as a few client (read/write) operations. Our results suggest that CASSS does not significantly impact efficiency while dealing with automatic recovery from transient faults and bounded size of needed resources

    On the Tomography of Networks and Multicast Trees

    Full text link
    In this paper we model the tomography of scale free networks by studying the structure of layers around an arbitrary network node. We find, both analytically and empirically, that the distance distribution of all nodes from a specific network node consists of two regimes. The first is characterized by rapid growth, and the second decays exponentially. We also show that the nodes degree distribution at each layer is a power law with an exponential cut-off. We obtain similar results for the layers surrounding the root of multicast trees cut from such networks, as well as the Internet. All of our results were obtained both analytically and on empirical Interenet data

    Measurement of filling factor 5/2 quasiparticle interference: observation of charge e/4 and e/2 period oscillations

    Full text link
    A standing problem in low dimensional electron systems is the nature of the 5/2 fractional quantum Hall state: its elementary excitations are a focus for both elucidating the state's properties and as candidates in methods to perform topological quantum computation. Interferometric devices may be employed to manipulate and measure quantum Hall edge excitations. Here we use a small area edge state interferometer designed to observe quasiparticle interference effects. Oscillations consistent in detail with the Aharanov-Bohm effect are observed for integer and fractional quantum Hall states (filling factors 2, 5/3, and 7/3) with periods corresponding to their respective charges and magnetic field positions. With these as charge calibrations, at 5/2 filling factor and at lowest temperatures periodic transmission through the device consistent with quasiparticle charge e/4 is observed. The principal finding of this work is that in addtion to these e/4 oscillations, periodic structures corresponding to e/2 are also observed at 5/2 and at lowest temperatures. Properties of the e/4 and e/2 oscillations are examined with the device sensitivity sufficient to observe temperature evolution of the 5/2 quasiparticle interference. In the model of quasiparticle interference, this presence of an effective e/2 period may empirically reflect an e/2 quasiparticle charge, or may reflect multiple passes of the e/4 quasiparticle around the interferometer. These results are discussed within a picture of e/4 quasiparticle excitations potentially possessing non-Abelian statistics. These studies demonstrate the capacity to perform interferometry on 5/2 excitations and reveal properties important for understanding this state and its excitations.Comment: version 3 contains additional data beyond version 2, 26 pages, 8 figures PNAS 081259910

    Lessons from the Congested Clique Applied to MapReduce

    Full text link
    The main results of this paper are (I) a simulation algorithm which, under quite general constraints, transforms algorithms running on the Congested Clique into algorithms running in the MapReduce model, and (II) a distributed O(Δ)O(\Delta)-coloring algorithm running on the Congested Clique which has an expected running time of (i) O(1)O(1) rounds, if ΔΘ(log4n)\Delta \geq \Theta(\log^4 n); and (ii) O(loglogn)O(\log \log n) rounds otherwise. Applying the simulation theorem to the Congested-Clique O(Δ)O(\Delta)-coloring algorithm yields an O(1)O(1)-round O(Δ)O(\Delta)-coloring algorithm in the MapReduce model. Our simulation algorithm illustrates a natural correspondence between per-node bandwidth in the Congested Clique model and memory per machine in the MapReduce model. In the Congested Clique (and more generally, any network in the CONGEST\mathcal{CONGEST} model), the major impediment to constructing fast algorithms is the O(logn)O(\log n) restriction on message sizes. Similarly, in the MapReduce model, the combined restrictions on memory per machine and total system memory have a dominant effect on algorithm design. In showing a fairly general simulation algorithm, we highlight the similarities and differences between these models.Comment: 15 page

    On the Design of Cryptographic Primitives

    Full text link
    The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design. In order to achieve such a double goal, a tour through the descriptions of the two main cryptographic primitives is carried out. Within this survey, some of the most representative algorithms based on the Theory of Finite Fields are provided and new general schemes and specific algorithms based on Graph Theory are proposed

    Search in Complex Networks : a New Method of Naming

    Full text link
    We suggest a method for routing when the source does not posses full information about the shortest path to the destination. The method is particularly useful for scale-free networks, and exploits its unique characteristics. By assigning new (short) names to nodes (aka labelling) we are able to reduce significantly the memory requirement at the routers, yet we succeed in routing with high probability through paths very close in distance to the shortest ones.Comment: 5 pages, 4 figure
    corecore