Catálogo de publicaciones - libros

Compartir en
redes sociales


Stabilization, Safety, and Security of Distributed Systems: 8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings

Ajoy K. Datta ; Maria Gradinariu (eds.)

En conferencia: 8º Symposium on Self-Stabilizing Systems (SSS) . Dallas, TX, USA . November 17, 2006 - November 19, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Artificial Intelligence (incl. Robotics); Computer Communication Networks; Special Purpose and Application-Based Systems; Computation by Abstract Devices; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-49018-0

ISBN electrónico

978-3-540-49823-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Brief Announcement: Exploration and Mitigation of Deafness Problems in Directional Antennas Based Wireless Ad-Hoc Networks

Kai Chen; Fan Jiang; Zongyao Tang

A switched antenna system can provide transmission or reception in any desired direction by an array of directional antennas. Directional antennas have tremendous potential for improving the performance of wireless ad hoc networks[1]. While offering higher spatial reuse and larger transmission range, they also pose new challenges. Deafness is one of such problems, which arises when a transmitter fails to communicate to its intended receiver either because the receiver is beamforming towards a different direction[2]. As we have identified, generally, there might be three kinds of deafness problems. First, deafness-I happens when the intended receiver is a transmitter or receiver engaged in an ongoing transmission. Second, deafness-II occurs when the intended receiver lies in the area covered by an ongoing transmission and hence becomes deaf to the transmitter. Third, unlike the former two kinds of deafness which occur because RTSs cannot be heard by the intended receivers, deafness-III arises when the receiver has actually received RTS but cannot reply CTS, because it is aware of that this CTS will interfere with an ongoing transmission nearby. If left unaddressed, deafness problems not only severely degrade the performance at MAC layer but also considerably influence the upper-layer protocols, which would probably offset the benefits of directional antennas.

- Brief Announcement | Pp. 568-569

Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET

Pan Dong; Pei-dong Zhu; Xi-cheng Lu

We introduce a new MANET structure model – party model – for the large scale MANET environment. For the party model MANET, we propose a new synthetic public key management scheme which applies web-of-trust and hierarchical trust simultaneously. The web-of-trust is used to design high efficient authentication between two nodes from the same party, and the frequent cooperation and communication inside a party can help to improve the security of authentication. In order to prevent falsification attack in remote authentication, we apply the hierarchical trust to establish CA in each party and use CA’s certificate as the trust intermediary. In the whole, our scheme can get a good tradeoff among security, overhead and flexibility.

- Brief Announcement | Pp. 570-571

Brief Announcement: Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures

Felix C. Freiling; Matthias Majuntke; Neeraj Mittal

In practice, it cannot easily be detected whether a computation running in a distributed system has terminated or not. Thus, suitable observing algorithms are required to solve this problem of .

- Brief Announcement | Pp. 572-573

Brief Announcement: Self-stabilizing Spanning Tree Algorithm for Large Scale Systems

Thomas Herault; Pierre Lemarinier; Olivier Peres; Laurence Pilard; Joffroy Beauquier

We introduce a self-stabilizing algorithm that builds and maintains a spanning tree topology on any large scale system. We assume that the existing topology is a complete graph and that nodes may arrive or leave at any time. To cope with the large number of processes of a grid or a peer to peer system, we limit the memory usage of each process to a small constant number of variables, combining this with previous results concerning failure detectors and resource discovery.

- Brief Announcement | Pp. 574-575

Brief Announcement: Chasing the Weakest System Model for Implementing and Consensus

Martin Hutle; Dahlia Malkhi; Ulrich Schmid; Lidong Zhou

The chase for the weakest system model that allows to solve consensus has long been an active branch of research in distributed algorithms. To circumvent the FLP impossibility in asynchronous systems, many models in between synchrony and asynchrony have been proposed over the years. Of specific interest is the chase for the weakest system model that allows the implementation of an eventual leader oracle Ω, and thus also enables consensus to be solved.

- Brief Announcement | Pp. 576-577

Brief Announcement: Wait-Free Dining for Eventual Weak Exclusion

Scott M. Pike; Yantao Song; Kaustav Ghoshal

We present the first wait-free solution to dining philosophers under eventual weak exclusion in partially synchronous environments subject to crash faults. Potential applications include distributed daemon refinement for self-stabilizing algorithms.

- Brief Announcement | Pp. 578-579

Brief Announcement: An Efficient and Self-stabilizing Link Formation Algorithm

Jun Kiniwa; Kensaku Kikuta

We propose a self-stabilizing link formation algorithm based on a cooperative network formation game. An underlying network = (,) consists of processors represented by nodes = {1,2,...,}, and communication links represented by edges = { | , ∈ }. An agent network = (,), where = and ⊆, is defined on . Let be a benefit that agent provides others, and a cost of linking with that agent incurs. We assume a , a fair , and a for formation/severance of links.

- Brief Announcement | Pp. 580-581

Brief Announcement: Analyzing the Interactions of Self-propagating Codes in Multi-hop Networks

Sapon Tanachaiwiwat; Ahmed Helmy

”War of the worms” is a war between opposing computer worms, creating complex worm interactions. We propose a new Worm Interaction Model focusing on random-scan worm interactions. We validate our worm interaction model using extensive ns-2 simulations. This study provides the first work to characterize and investigate multiple worm interactions of random-scan worms in multi-hop networks. The main finding of this study is that maximum number of infected hosts can be drastically affected by the type of interaction.

- Brief Announcement | Pp. 582-583

Brief Announcement: Towards Modular Verification of Stabilisation in Self-adaptive Embedded Systems

Ina Schaefer; Arnd Poetzsch-Heffter

We introduce a formal semantic-based modelling framework to model, specify and verify the functional and adaptive behaviour of synchronous adaptive systems.

- Brief Announcement | Pp. 584-585

Brief Announcement: An Adaptive Randomised Searching Protocol in Peer-to-Peer Systems Based on Probabilistic Weak Quorum System

Yu Wu; Taisuke Izumi; Fukuhito Ooshita; Hirotsugu Kakugawa; Toshimitsu Masuzawa

Searching problem, which is to identify the peer that has some target resource, is an important and unique problem in Peer-to-Peer (P2P) file sharing systems. Since P2P file sharing systems maintain large and dynamic set of peers, the searching protocol is desired to be scalable and adaptive. To achieve such requirements, many kinds of search protocols are proposed. As one of those protocols, the searching protocol based on Probabilistic Weak Quorum System (PWQS) is recently proposed [1]. The principle of this protocol is as follows: In advance, a number of indices (location informations of an object) of each object are disseminated to randomly selected peers. When searching, the searcher sends a number of queries to randomly selected peers. If a query reaches a peer holding the index of the target object, search succeeds. It is shown that the protocol has advantages in the point of scalability, load balance and fault-tolerance.

- Brief Announcement | Pp. 586-587