Increasing the Accuracy of Cost and Availability Predictions of Quorum Protocols

Size: px
Start display at page:

Download "Increasing the Accuracy of Cost and Availability Predictions of Quorum Protocols"

Transcription

1 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing Increasing the Accuracy of Cost and Availability Predictions of Quorum Protocols Robert Schadek and Oliver Theel Carl von Ossietzky University of Oldenburg, Germany Department of Computer Science Abstract Highly available services can be implemented by means of so-called quorum protocols. Unfortunately, applying quorum protocols in real-world physical networks turns out to be difficult since efficient quorum protocols often depend on a particular graph structure imposed on the replicas managed by it. In this paper, we show that the cost and availability predictions of the operations provided by quorum protocols are often not accurate when they are executed in a real-world physical network. We present the mapping approach, the mapping approach increases the accuracy of the cost and availability predictions of most quorum protocols on real-world networks. Additionally, we use this mapping approach to analyze the resulting operation availability of two commonly known quorum protocols when applied to a physical network. Keywords Distributed Systems, Fault Tolerance, Data Replication, Quorum Protocols, Operation Availability Prediction, Physical Network Topologies I. INTRODUCTION Highly available access to a data object is a core problem in the field of computer science. Relying on a single replica of a data object greatly limits the availability of this data. Therefore, the consequence is to increase the number of replicas storing the data object. This increases the availability of the data object as it can be accessed using different replicas. Replicating the data object introduces the need for synchronization. Let the data object be replicated on five replicas, as shown in Figure 1. If the data object located on replica 0 is updated with a new Figure 1: Five replicas of a data object. value, then reading the data object from replica 4 does not yield the new value. Obviously, that is not the intended behavior. An additional problem is that two concurrent write operations can be executed on different replicas on the same data object at the same time. For example, value a is written to the data object on replica 2 and value b is written to the data object on replica 3. This raises the following question: Which value is the correct one? Both examples show that simply creating multiple replicas of a data object does not necessarily lead to the expected results. Usually, the goal is that all operations behave as they would do on a non-replicated data object. More formally, this non-replicated behavior can be achieved by a control protocol that guarantees the one-copy serializability (1SR) property [1]. In general, quorum protocols (QPs) provide highly available access to data by means of replication and at the same time maintain this 1SR property. In most cases, QPs provide a read and a write operation to read and write data. These QPs use read quorums (RQs) and write quorums (WQs) to execute the desired operation. Quorums are specific subsets of replicas of the set of all replicas. Commonly, a read operations reads the data of all replicas of a RQ and identifies an up-to-date replica. Write operations, on the other hand, use an atomic commit protocol, like the Two-Phase commit Protocol [1], to write the new data to all replicas of a WQ. QPs can be classified into unstructured quorum protocols (UQPs) and structured quorum protocols (SQPs). SQPs arrange the individual replicas in a graph structure (GS), and use this GS to formulate rules how to construct quorums. UQPs specify no such GS. In order for read and write operations to work, the data of the operations needs to be communicated to and from the replicas of the quorum used. Implicitly, most UQP and SQP rely on a completely connected GS as a communication medium between its replicas. We call this completely connected GS a logical network topology (LNT). A physical network topology (PNT) is a GS that actually arranges and connects the replicas in the real-world. QPs have no influence on the PNT. In this paper, we show that the PNT used as a communication medium between the replicas, has to be considered in the cost and availability analyses of a QP to improve the prediction accuracy of those analysis. This paper is structured as follows. Section II discusses the system model used as a basis for the analysis. For completeness and ease of understanding, the Majority Consensus Protocol (MCS) [2] and the Triangular Lattice Protocol (TLP) [3] are presented in Section III-A and Section III-B respectively. In Section IV, we present the Mapping Approach. This approach allows to analyze the read and write availability and the read and write costs of any QP on any PNT. The Mapping Approach is then used in Section V to exemplary evaluate the TLP and the MCS on a PNT. It is shown that the cost and availability predictions differ when considering the PNT in comparison to the original analysis. Section VI concludes the paper. It discusses the results of this paper and gives ideas to further increase the prediction accuracy of the cost and availability measurements of QPs when applied to PNTs. II. SYSTEM MODEL In order to analyze QPs, their characteristics, and their use on PNTs, we first need to define a coherent model /17 $ IEEE DOI /PRDC

2 A. Graph Structure A graph structure GS = (V,E) is a two-tuple of a set of vertices V and a set of edges E. Edges connect vertices. V (GS) gives the set of vertices of a GS. E(GS) gives the set of edges of a GS. A vertex v V is a tuple v =(i, c x,c y ), where i N is the ID of the vertex and c x and c y are the coordinates (i.e. its position/location) of the vertex in the corresponding dimensions. The shorthand notation v i gives a vertex with ID i. N = V (GS) represents the number of vertices in a GS. An edge e i,j E is defined as e i,j := (v i,v j ), where v i,v j V. A path v 0,v 1,...,v n between v 0 and v n exists in GS, iff: i, 0 i n : v i V (GS) and (1) i, 0 i<n: e =(v i,v i+1 ) E(GS) (2) If a path exists, then the two nodes v 0 and v n are called connected. V( v 0,v 1,...,v n ) denotes the set of vertices of a path such that: V( v 0,v 1,...,v n ):={v 0,v 1,...,v n }. (3) E( v 0,v 1,...,v n ) denotes the set of the edges of a path such that: E( v 0,v 1,...,v n ):={e 0,1...,e n 1,n }. (4) Each vertex is assumed to be hosting exactly one node which, in turn, is assumed to be hosting one replica of the replicated data object. The terms node and replica will be used synonymously throughout this paper. B. Consistency Criteria In this paper, we discuss QPs that guarantee the 1SR property. Informally, 1SR states that read and write operations on replicated data object have the same observable effect as they would have on non-replicated data [1]. QPs use (b) A GS used by the Triangular (a) A random GS. Lattice Protocol. Figure 2 quorums to execute their operations. Usually, QPs provide a read operation, executed on a RQ, and a write operation, executed on a WQ. Let Q be a QP providing a read and a write operation that upholds the 1SR property. When 1) every RQ of Q intersects 1 with every WQ of Q, 2) all WQ of Q intersect with each other, and 3) replicas of Q can be locked exclusively for reading operations or a writing operation. Q upholds the 1 Two quorums a and b intersect, if a b. 1SR property, because only a single write operation can write all replicas of its WQ or one or more read operations can read their RQs. This quorum intersection approach is used by many QPs to provide the 1SR property. All the QPs discussed in this paper do so as well. C. Fault Model Nodes hosting a replica are assumed exhibit a fail-silent behavior. All failures are independent of each other. The availability of a node is described by p, where 0 p 1. Ap value of 1 means that the node is available with a probability of 100%. Ap value of 0 means that the node is available with a probability of 0%. All nodes are assumed to have the same p value. This simplification gives way to a feasible analysis. Communication channels aka. edges are always available between two available nodes. In other words, if one of the nodes connected by an edge is not available then the edge is also not available. D. Read and Write Costs and Availability The probability that a read or write operation is available for a given QP under the node availability p is described by a r (p) and a w (p) respectively, where 0 a r (p),a w (p) 1. The minimal average costs per read and write operation are given by c r (p) and c w (p). For some QPs, there exist a closed formula to compute a r (p), a w (p), c r (p), and c w (p). In general, the equations presented below, are used to analyze the read and write availability as well as the costs per operation of a QP. Given all RQs and all WQs, and RQS = {c c P(N) x RQs for which c x} (5) a r (p) = p c (1 p) N c. (6) c RQS WQS = {c c P(N) x WQs for which c x} (7) a r (p) = p c (1 p) N c. (8) c WQS are used to calculate the a r (p) and a w (p) for a given p. P(s) denotes the power set of s gives all unique subsets of s [4]. The set of all RQs is used to construct the read quorum set (RQS), which is the set of all replica sets that have a subset which is a RQ for the given QP. Different elements of the RQS can have the same subset in the set of RQ. Analogously, the same is true for the write quorum set (WQS) of a WQ. The Equation 6 and Equation 8 are taking the sum of the probability of all elements in RQS or WQS being available for a given replica availability p. The average read c r (p) and (write costs c w (p)) measure the average minimal number of replicas that is required to execute an operation for a given replica availability of p. It is computed by summing up the minimal number of replicas required to construct a read quorum (or write quorum) for every replica set in RQS (or WQS) with the probability of the replica set appearing. Additionally, this sum needs to be divided by a r (p) 99

3 (respectively a w (p)) to normalize the cost measure. The costs for the operations are given by c RQS c r (p) = p c (1 p) N c minrq(c) (9) a r (p) and c w (p) = c WQS p c (1 p) N c minw Q(c). (10) a w (p) The function minrq(c) (and minw Q(c)) determines the minimal RQ (and WQ) for the given combination of available replicas. III. DISCUSSION OF EXISTING QUORUM PROTOCOLS A. The Majority Consensus Protocol (MCS) The MCS reads N/2 replicas and writes (N +1)/2 replicas, where N is the total number of replicas [2]. MCS guarantees 1SR. The read availability a r (p) of the MCS is N ( ) N a r (p) = p k (1 p) N k (11) k k= N/2 and the write availability a w (p) is N ( ) N a w (p) = p k (1 p) N k. (12) k k= (N+1)/2 The read costs c r (p) are N/2. The write costs c w (p) are (N +1)/2 [5]. As MCS is a UQP, it implicitly assumes that there is a direct communication link between all the nodes. B. The Triangular Lattice Protocol (TLP) Figure 2b shows an example of a GS used by the TLP. Every RQ consists of a complete vertical or a complete horizontal path through the GS. Every WQ consists of a complete vertical and a complete horizontal path through the GS. In Figure 2b, the diagonal path 0, 4, 8 connecting the replicas creates a minimal path that crosses the GS vertically and horizontally. This diagonal path can therefore be used as a very efficient WQ. As quorums for the TLP are created by finding paths through a GS, no simple closed formula exists that calculates the read and write availability. Therefore, we use the formulas presented in Section II-D are used to calculate the read and write availability, and the cost per operation for the TLP [3]. IV. AVAILABILITY COMPARISON In Section II-D, we showed how to compute the read and write availability a r and a w, as well as the average minimal costs c r and c w for any quorum. As discussed in Section I, QPs assume direct communication links between their nodes. In order to usefully and fairly analyze and compare QPs, we have to perform the analysis on a PNT. This is because, in general PNTs do not offer direct communication links between all nodes of the real-world network. Therefore, additional nodes are required to reestablish the communication between the nodes of the original quorum. These additional nodes need to be considered in the analysis as more nodes per operation results in lower availability and higher costs. In Section IV-A, we present the Mapping Approach, where the nodes of the LNT of the QP are mapped to the nodes of the PNT. The GS of the PNT is then used as the communication medium for the analysis. None of the presented QPs has such a mapping feature, nor could such a mapping algorithm be identified in the literature. A. The Mapping Approach A mapping is an injection from one GS to another GS. This requires that the number of nodes in the codomain structure is at least equal to the number of the nodes of the original structure. Formally, a mapping M(GS, GS ) from GS to GS is defined as: M(GS, GS )={(v 1,v 1),...,(v n,v n)} (13) (v, v ) M : v V,v V (14) (v, v ), (v, v ) M : v = v (15) (v,v),(v,v) M : v = v (16) When a mapping has been created, the QP logically works on its LNT. But the mapping is then used as a communication medium between the nodes. For every node selected to participate in a quorum, the mapping selects the mapped node of the PNT. After the QP has selected all necessary nodes to construct a quorum based on its LNT, the mapping tests whether the nodes are connected. As mappings are usually not between homomorphic GSs, in the general case, it can be assumed that the replicas of the quorum are not connected directly with each other in the PNT [6]. Consequently, the mapping adds additional nodes to reestablish the communication between the nodes of the quorum. The cost and availability analysis of a Algorithm 1 Procedure ARENODESCONNECTED 1: Inputs: nodes = a set of nodes that is tested whether they are connected in GS GS = the graph structure the nodes are supposed to be connected in 2: Returns: true if there exists a path between all two elements of nodes in GS, false otherwise 3: procedure ARENODESCONNECTED(nodes, GS) 4: return ( n, n nodes : n,...,n GS) 5: end procedure mapped protocol has to consider the additional nodes required on the PNT level. It is a desired goal, to obtain mappings that require few additional replicas on the PNT level in relation to the LNT level, as thus the expected cost and availability characteristics of the QP on the LNT level can be matched the closest. For that reason, the important question is how to create good or even optimal mappings. In order to rate mappings, we have to define a measurement criterion. Any number of criteria can be selected depending on the intended use of the QP. Possible criteria are the average 100

4 write costs, maximal costs, average costs, write availability, etc. For this paper, we use the average read and write availability value (ARW). The ARW approximates the weighted accumulation of the integral of the read and write availability. ARW = 1.0 p=0.0 a w (p)+ 1.0 p=0.0 The higher the ARW, the better is the mapping. a r (p) (17) B. Optimal Mapping In this section, we present the OptimalMapping algorithm, that finds the optimal mapping under the given measurement criterion. Optimal in the scope of this paper means: the mapping where the ARW is the highest. Algorithm 2 Procedure FINDSMALLEST 1: Inputs: nodest oconnect = the nodes for which a path needs to exists, so they can communicate GS = the graph structure in which the nodest oconnect need to be connected in 2: Returns: the smallest subset of V (GS) for which the nodest oconnect are connected 3: procedure FINDSMALLEST(nodesT oconnect, GS) 4: # all subsets of replicas including nodest oconnect 5: subsets P(V(GS)) 6: smallest V (GS) 7: 8: # the subsets are iterated in increasing order of the 9: # number of replicas contained in each subset 10: for all i subsets do 11: if ARENODESCONNECTED( nodestoconnect, GS(i,E(GS)) ) i smallest then 12: smallest i 13: end if 14: end for 15: return smallest 16: end procedure To get an intuition for the mapping approach, see the following example. Let the TLP of Figure 2b be mapped to the PNT in Figure 2a with the mapping M(GS, GS )= {(0, 0), (1, 1), (2, 2), (3, 3), (4, 4), (5, 5), (6, 6), (7, 7), (8, 8)}. In the current state of the system, replicas 0, 1, 2, 4, 5, 6, 7, and 8 are available. Let the TLP have identified the diagonal, consisting of the replicas 0, 4, and 8, as the currently cheapest WQ. Under the shown mapping, none of these replicas are directly connected in the GS in Figure 2a. Therefore we have to reconnect the replicas with the minimal additional number of replicas to reestablish communication between them. Considering the currently available replicas and the given WQ, two additional replicas are needed to reestablish communication between the elements of the WQ, e.g. replicas 1 and 6. Note, that the reconnected quorum consisting of five replicas is less likely to be available than the original quorum consisting of three replicas. Given a PNT and the set of RQs and WQs, the procedure OPTIMALMAPPING, shown in Algorithm 4, finds the optimal mapping. The procedure OPTIMALMAPPING has a runtime complexity of O(N!), where N is the number of nodes in the PNT, as there are N! possible mappings for N nodes. It does not require any knowledge of the QP used to generate the RQs and WQs, nor and knowledge of the LNT used by the QP. It only requires the set of RQs and WQs created by the QP, which makes it applicable to a wide variety of QPs. The algorithm iterates all N! mappings. For each mapping, the procedure APPLYMAPPING shown in Algorithm 4 is called. In Algorithm 3 Procedures to create Mappings and map nodes 1: procedure MAPPINGS(GS) 2: return all possible mappings of the replicas of the GS 3: end procedure 4: Inputs: nodest omap = the nodes to map, mapping = the mapping to use 5: Returns: the nodes and their mappings 6: procedure MAP(nodesT omap,mapping) 7: return {(v, v ) v nodest omap (v, v ) mapping} 8: end procedure essence, APPLYMAPPINGS uses the procedure FINDSMALL- EST to find the smallest reconnecting set of mapped nodes for each of the quorums in RQs and WQs. The procedure FINDSMALLEST is described in Algorithm 2. FINDSMALLEST works by finding the element in the power set with the least nodes that still connects the nodes in nodest oconnect. The procedure ARENODESCONNECTED shown in Algorithm 1 tests whether the nodes in nodest oconnect are connected. The procedure SELECTBESTMAPPING compares two mapped two-tuple consisting of the RQs and the WQs and returns the better one depending on the chosen measurement criterion. V. EVALUATION AND DISCUSSION In this evaluation, we examine how the read and write availability of the MCS and the TLP change when they are optimally mapped to the GS in Figure 2a. Both QPs use nine replicas. The nine replicas of the TLP are arranged as shown in Figure 2b. Figure 3 and Figure 4 show the read and write availability of the MCS and the TLP in their mapped and unmapped state. Figure 5 and Figure 6 show the read and write availability of the MCS and the TLP mapped and unmapped to the PNT where p 0.8. The optimal mapping for the MCS is M(GS, GS ) = {(0, 0), (1, 1), (2, 2), (3, 3), (4, 4), (5, 5), (6, 6), (7, 7), (8, 8)}. The optimal mapping for the TLP is M(GS, GS ) = {(0, 1), (1, 2), (2, 0), (3, 6), (4, 4), (5, 3), (6, 8), (7, 5), (8, 7)}. Both QPs use the ARW as measurement criterion for the comparison of the mappings. It can be seen in Figure 6, that the TLP behaves reasonably well with the given PNT. The read operation of the TLP loses 2% availability and 101

5 Algorithm 4 Procedures to find the optimal mapping 1: Inputs: quorums = (RQs,WQs), RQs and WQs are sets of sets of nodes mapping = the mapping to use GS = the graph structure to use 2: Returns: a modified copy of quorums; where for each quorum in RQs and WQs the procedure FINDSMALLEST is called 3: procedure APPLYMAPPING(quorums,mapping,GS) 4: return ({FINDSMALLEST(MAP(q,mapping),GS) q RQs}, {FINDSMALLEST(MAP(q,mapping),GS) q WQs}) 5: end procedure 6: Inputs: QRs, QW s = a list of all read and write quorums created by the unmapped QP GS = the graph structure the QP should be mapped to 7: Returns: the best mapping i according to the user supplied mapping comparison function SelectBestMapping 8: procedure OPTIMALMAPPING(QRs,QW s,gs) 9: optmapping empty tuple 10: for all i MAPPINGS(GS) do 11: optmapping SELECTBESTMAPPING( optmapping, APPLYMAPPING((QRs, QW s),i,gs) ) 12: end for 13: return optmapping 14: end procedure its write operation loses 3% availability for the region of p>0.8. The MCS losses 6% availability for its read and write operation as shown in Figure 5 for the same region. These are significant reductions of the operation availability, considering the goal of data replication with QP is to create a highly availability service. Figure 7 shows how the cost per operation changes for the TLP. For p < 0.4 the mapped TLP has lower write costs, because overall, less WQs are available and the WQs that are available consist of few nodes. The costs per operation of the mapped MCS are identical to the original MCS. It is interesting to note that all mappings of the MCS yield the same result. This is due to the way how the RQs and the WQ are constructed by the MCS. With nine replicas, all quorums consist of a subset of five replicas. As the MCS has no preference what five replicas it should use, all quorums are chosen with the same probability. This information can be used to accelerate the analysis of the MCS mapped to any PNT. Essentially, the OPTIMALMAPPING algorithm only must test one mapping. This is different for the TLP, where the algorithm has to test all N! mappings. VI. CONCLUSION AND FUTURE WORK In this paper, we have shown that there is a divide in the cost and availability predictions between the idealized LNT used by QPs and the costs and availability predictions when these QPs are actually used on a real-world PNT. The mapping approach formalizes this idea. Additionally, this approach finds the optimal mapping for a set of RQs and WQs on any PNT. The approach allows to evaluate the read and write availability and the read and write costs of any QP mapped on any PNT. We have shown how the mapping approach can be parameterized to facilitate different kinds of QPs. Finally, we used the presented methods to analyze the MCS and TLP when they are mapped to a particular PNT. Currently, the extremely fast-growing number of mappings is the limiting factor to which extend analyses can be carried out. To mitigate this problem, we are working into two directions. The first direction is to find properties of the mapped QPs that allow us to compare less than N! mappings. An example for of doing so is the MCS where only one mapping has to be analyzed. The other approach is to use machine learning algorithms and statistical methods to approximate the optimal mapping by analyzing only a limited number of mappings. The approach presented in this paper increases the accuracy of the real-world availability and cost predictions of QPs by considering the PNTs for the analysis. The accuracy of the predictions can be increased further by also considering the availability probabilities of the edges of the GS. Currently, all replicas fail independently, but the availability of each replica is the same. Realistically, not all replicas will be available with the same probability, therefore analyzing QPs with heterogenes replica availabilities would further increase the accuracy of the availability and cost analysis. Another area of focus is to answer the question how good a particular QP can be mapped to a specific class of GSs. By class of GSs, we mean, for example, GSs with nine vertices and two to five edges per vertex. For this work, we will use statistical methods, such as statistical inference [7], and the graph structure generator presented in [8]. REFERENCES [1] Philip A. Bernstein, Vassos Hadzilacos, and Nathan Goodman. Concurrency Control and Recovery in Database Systems. ISBN Addison Wesley, Feb. 1987, p [2] Robert H. Thomas. A Majority Consensus Approach to Concurrency Control for Multiple Copy Databases. In: ACM Transactions on Database Systems 4.2 (June 1979), pp [3] Chienwen Wu and Geneva G. Belford. The Triangular Lattice Protocol: A Highly Fault Tolerant and Highly Efficient Protocol for Replicated Data. In: Proceedings of the 11th Symposium on Reliable Distributed Systems (SRDS 92). IEEE Computer Society Press, Oct [4] Keith Devlin. Fundamentals of contemporary set theory. New York: Springer-Verlag, ISBN:

6 Figure 3: The Read (R) and Write (W) Availability of the MCS with nine replicas unmapped and mapped to the GS in Figure 2a. The lines MCS R, MCS W and MCS-Mapped R, MCS-Mapped W completely overlap. Figure 6: The Read (R) and Write (W) Availability of the TLP unmapped on a GS as shown in Figure 2b, and mapped to the GS in Figure 2a with p>=0.8. Figure 4: The Read (R) and Write (W) Availability of the TLP unmapped on a GS as shown in Figure 2b, and mapped to the GS in Figure 2a. Figure 5: The Read (R) and Write (W) Availability of the MCS with nine replicas unmapped and mapped to the GS in Figure 2a with p>=0.8. The lines MCS R, MCS W and MCS-Mapped R, MCS-Mapped W completely overlap. Figure 7: The Read (R) and Write (W) Costs per Operation of the TLP when unmapped and mapped to the GS in Figure 2a in comparison with the original TLP. [5] Hans-Henning Koch. Entwurf und Bewertung von Replikationsverfahren (in German). PhD thesis. Department of Computer Science, University of Darmstadt, Germany, June [6] Gary Chartrand, Linda Lesniak, and Ping Zhang. Graphs & Digraphs, Fifth Edition. 5th. Chapman & Hall/CRC, ISBN: , [7] Kishor S. Trivedi. Probability and Statistics with Reliability, Queuing and Computer Science Applications. 2nd Edition. ISBN John Wiley & Sons, [8] Robert Schadek and Oliver Theel. A Graph Suite Generator for Real World Quorum Protocol Analysis. In: Proc. of the 2nd Argentinian National Conference on Engineer Informatics and Information Systems (CoNaIISI 14). San Luis, Argentina: Red de Carreras de Ingeniería Informática / Sistemas de Informatión (RIISIC), Nov

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords:

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords: Embedding Protocols for Scalable Replication Management 1 Henning Koch Dept. of Computer Science University of Darmstadt Alexanderstr. 10 D-64283 Darmstadt Germany koch@isa.informatik.th-darmstadt.de Keywords:

More information

A Universal Quorum Protocol for N-Dimensional Structures

A Universal Quorum Protocol for N-Dimensional Structures A Universal Quorum Protocol for N-Dimensional Structures Robert Schadek and Oliver Theel Carl von Ossietzky University of Oldenburg Department of Computer Science D-26111 Oldenburg, Germany {robert.schadek,theel}@informatik.uni-oldenburg.de

More information

10. Replication. CSEP 545 Transaction Processing Philip A. Bernstein Sameh Elnikety. Copyright 2012 Philip A. Bernstein

10. Replication. CSEP 545 Transaction Processing Philip A. Bernstein Sameh Elnikety. Copyright 2012 Philip A. Bernstein 10. Replication CSEP 545 Transaction Processing Philip A. Bernstein Sameh Elnikety Copyright 2012 Philip A. Bernstein 1 Outline 1. Introduction 2. Primary-Copy Replication 3. Multi-Master Replication 4.

More information

A Mechanism for Sequential Consistency in a Distributed Objects System

A Mechanism for Sequential Consistency in a Distributed Objects System A Mechanism for Sequential Consistency in a Distributed Objects System Cristian Ţăpuş, Aleksey Nogin, Jason Hickey, and Jerome White California Institute of Technology Computer Science Department MC 256-80,

More information

Coordination and Agreement

Coordination and Agreement Coordination and Agreement Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Introduction 2. Distributed Mutual Exclusion 3. Elections 4. Multicast Communication 5. Consensus and related problems

More information

The alternator. Mohamed G. Gouda F. Furman Haddix

The alternator. Mohamed G. Gouda F. Furman Haddix Distrib. Comput. (2007) 20:21 28 DOI 10.1007/s00446-007-0033-1 The alternator Mohamed G. Gouda F. Furman Haddix Received: 28 August 1999 / Accepted: 5 July 2000 / Published online: 12 June 2007 Springer-Verlag

More information

Vesa Halava Tero Harju. Walks on Borders of Polygons

Vesa Halava Tero Harju. Walks on Borders of Polygons Vesa Halava Tero Harju Walks on Borders of Polygons TUCS Technical Report No 698, June 2005 Walks on Borders of Polygons Vesa Halava Tero Harju Department of Mathematics and TUCS - Turku Centre for Computer

More information

Cost Reduction of Replicated Data in Distributed Database System

Cost Reduction of Replicated Data in Distributed Database System Cost Reduction of Replicated Data in Distributed Database System 1 Divya Bhaskar, 2 Meenu Department of computer science and engineering Madan Mohan Malviya University of Technology Gorakhpur 273010, India

More information

An Optimal Voting Scheme for Minimizing the. Overall Communication Cost in Replicated Data. December 14, Abstract

An Optimal Voting Scheme for Minimizing the. Overall Communication Cost in Replicated Data. December 14, Abstract An Optimal Voting Scheme for Minimizing the Overall Communication Cost in Replicated Data Management Xuemin Lin and Maria E. Orlowska y December 14, 1995 Abstract Quorum consensus methods have been widely

More information

A Commit Scheduler for XML Databases

A Commit Scheduler for XML Databases A Commit Scheduler for XML Databases Stijn Dekeyser and Jan Hidders University of Antwerp Abstract. The hierarchical and semistructured nature of XML data may cause complicated update-behavior. Updates

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK ENHANCED DATA REPLICATION TECHNIQUES FOR DISTRIBUTED DATABASES SANDIP PANDURANG

More information

RTC: Language Support for Real-Time Concurrency

RTC: Language Support for Real-Time Concurrency RTC: Language Support for Real-Time Concurrency Insup Lee, Susan Davidson, and Victor Wolfe 1 Introduction The RTC (Real-Time Concurrency) programming concepts and language constructs for expressing timing

More information

Data Modeling and Databases Ch 14: Data Replication. Gustavo Alonso, Ce Zhang Systems Group Department of Computer Science ETH Zürich

Data Modeling and Databases Ch 14: Data Replication. Gustavo Alonso, Ce Zhang Systems Group Department of Computer Science ETH Zürich Data Modeling and Databases Ch 14: Data Replication Gustavo Alonso, Ce Zhang Systems Group Department of Computer Science ETH Zürich Database Replication What is database replication The advantages of

More information

A Novel Quorum Protocol for Improved Performance

A Novel Quorum Protocol for Improved Performance A Novel Quorum Protocol for Improved Performance A. Parul Pandey 1, B. M Tripathi 2 2 Computer Science, Institution of Engineering and Technology, Lucknow, U.P., India Abstract In this paper, we present

More information

arxiv: v1 [math.co] 4 Apr 2011

arxiv: v1 [math.co] 4 Apr 2011 arxiv:1104.0510v1 [math.co] 4 Apr 2011 Minimal non-extensible precolorings and implicit-relations José Antonio Martín H. Abstract. In this paper I study a variant of the general vertex coloring problem

More information

TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS

TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS Hacettepe Journal of Mathematics and Statistics Volume 4 (200), 8 9 TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS Nazan Danacıoğlu and F.Zehra Muluk Received 0: 0: 200 : Accepted 14: 06:

More information

Specifying and Proving Broadcast Properties with TLA

Specifying and Proving Broadcast Properties with TLA Specifying and Proving Broadcast Properties with TLA William Hipschman Department of Computer Science The University of North Carolina at Chapel Hill Abstract Although group communication is vitally important

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS

JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS MEIKE AKVELD AND RAPHAEL BERNHARD Abstract. In this paper, we consider a class of scheduling problems that are among the fundamental optimization problems in

More information

The Replication Technology in E-learning Systems

The Replication Technology in E-learning Systems Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 28 (2011) 231 235 WCETR 2011 The Replication Technology in E-learning Systems Iacob (Ciobanu) Nicoleta Magdalena a *

More information

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents E-Companion: On Styles in Product Design: An Analysis of US Design Patents 1 PART A: FORMALIZING THE DEFINITION OF STYLES A.1 Styles as categories of designs of similar form Our task involves categorizing

More information

Transaction Processing Concurrency control

Transaction Processing Concurrency control Transaction Processing Concurrency control Hans Philippi March 14, 2017 Transaction Processing: Concurrency control 1 / 24 Transactions Transaction Processing: Concurrency control 2 / 24 Transaction concept

More information

Report to Brewer s original presentation of his CAP Theorem at the Symposium on Principles of Distributed Computing (PODC) 2000

Report to Brewer s original presentation of his CAP Theorem at the Symposium on Principles of Distributed Computing (PODC) 2000 Brewer s CAP Theorem Report to Brewer s original presentation of his CAP Theorem at the Symposium on Principles of Distributed Computing (PODC) 2000 Written by Table of Contents Introduction... 2 The CAP-Theorem...

More information

Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming

Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming Raphael Arias Technische Universität München 19.1.2015 Abstract

More information

From Task Graphs to Petri Nets

From Task Graphs to Petri Nets From Task Graphs to Petri Nets Anthony Spiteri Staines Department of Computer Inf. Systems, Faculty of ICT, University of Malta Abstract This paper describes the similarities between task graphs and Petri

More information

Correctness Criteria Beyond Serializability

Correctness Criteria Beyond Serializability Correctness Criteria Beyond Serializability Mourad Ouzzani Cyber Center, Purdue University http://www.cs.purdue.edu/homes/mourad/ Brahim Medjahed Department of Computer & Information Science, The University

More information

Transactions with Replicated Data. Distributed Software Systems

Transactions with Replicated Data. Distributed Software Systems Transactions with Replicated Data Distributed Software Systems One copy serializability Replicated transactional service Each replica manager provides concurrency control and recovery of its own data items

More information

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal NP versus PSPACE Frank Vega To cite this version: Frank Vega. NP versus PSPACE. Preprint submitted to Theoretical Computer Science 2015. 2015. HAL Id: hal-01196489 https://hal.archives-ouvertes.fr/hal-01196489

More information

Development of an interface that allows MDX based data warehouse queries by less experienced users

Development of an interface that allows MDX based data warehouse queries by less experienced users Development of an interface that allows MDX based data warehouse queries by less experienced users Mariana Duprat André Monat Escola Superior de Desenho Industrial 400 Introduction Data analysis is a fundamental

More information

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed

Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy. Miroslav Bures and Bestoun S. Ahmed 1 Employment of Multiple Algorithms for Optimal Path-based Test Selection Strategy Miroslav Bures and Bestoun S. Ahmed arxiv:1802.08005v1 [cs.se] 22 Feb 2018 Abstract Executing various sequences of system

More information

Mobile and Heterogeneous databases Distributed Database System Transaction Management. A.R. Hurson Computer Science Missouri Science & Technology

Mobile and Heterogeneous databases Distributed Database System Transaction Management. A.R. Hurson Computer Science Missouri Science & Technology Mobile and Heterogeneous databases Distributed Database System Transaction Management A.R. Hurson Computer Science Missouri Science & Technology 1 Distributed Database System Note, this unit will be covered

More information

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points MC 0 GRAPH THEORY 0// Solutions to HW # 0 points + XC points ) [CH] p.,..7. This problem introduces an important class of graphs called the hypercubes or k-cubes, Q, Q, Q, etc. I suggest that before you

More information

A simple correctness proof of the MCS contention-free lock. Theodore Johnson. Krishna Harathi. University of Florida. Abstract

A simple correctness proof of the MCS contention-free lock. Theodore Johnson. Krishna Harathi. University of Florida. Abstract A simple correctness proof of the MCS contention-free lock Theodore Johnson Krishna Harathi Computer and Information Sciences Department University of Florida Abstract Mellor-Crummey and Scott present

More information

Equations for Asynchronous Message Passing

Equations for Asynchronous Message Passing Equations for Asynchronous Message Passing Ludwik Czaja 1,2 1 Institute of Informatics, The University of Warsaw 2 University of Economics and Computer Science Vistula in Warsaw lczaja@mimuw.edu.pl 1 Introduction

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

and therefore the system throughput in a distributed database system [, 1]. Vertical fragmentation further enhances the performance of database transa

and therefore the system throughput in a distributed database system [, 1]. Vertical fragmentation further enhances the performance of database transa Vertical Fragmentation and Allocation in Distributed Deductive Database Systems Seung-Jin Lim Yiu-Kai Ng Department of Computer Science Brigham Young University Provo, Utah 80, U.S.A. Email: fsjlim,ngg@cs.byu.edu

More information

10. Replication. CSEP 545 Transaction Processing Philip A. Bernstein. Copyright 2003 Philip A. Bernstein. Outline

10. Replication. CSEP 545 Transaction Processing Philip A. Bernstein. Copyright 2003 Philip A. Bernstein. Outline 10. Replication CSEP 545 Transaction Processing Philip A. Bernstein Copyright 2003 Philip A. Bernstein 1 Outline 1. Introduction 2. Primary-Copy Replication 3. Multi-Master Replication 4. Other Approaches

More information

Efficient Recovery in Harp

Efficient Recovery in Harp Efficient Recovery in Harp Barbara Liskov Sanjay Ghemawat Robert Gruber Paul Johnson Liuba Shrira Laboratory for Computer Science Massachusetts Institute of Technology 1. Introduction Harp is a replicated

More information

A Formal Model of Crash Recovery in Distributed Software Transactional Memory (Extended Abstract)

A Formal Model of Crash Recovery in Distributed Software Transactional Memory (Extended Abstract) A Formal Model of Crash Recovery in Distributed Software Transactional Memory (Extended Abstract) Paweł T. Wojciechowski, Jan Kończak Poznań University of Technology 60-965 Poznań, Poland {Pawel.T.Wojciechowski,Jan.Konczak}@cs.put.edu.pl

More information

Unsupervised Learning : Clustering

Unsupervised Learning : Clustering Unsupervised Learning : Clustering Things to be Addressed Traditional Learning Models. Cluster Analysis K-means Clustering Algorithm Drawbacks of traditional clustering algorithms. Clustering as a complex

More information

A Case Study of Agreement Problems in Distributed Systems : Non-Blocking Atomic Commitment

A Case Study of Agreement Problems in Distributed Systems : Non-Blocking Atomic Commitment A Case Study of Agreement Problems in Distributed Systems : Non-Blocking Atomic Commitment Michel RAYNAL IRISA, Campus de Beaulieu 35042 Rennes Cedex (France) raynal @irisa.fr Abstract This paper considers

More information

Real-time Optimistic Concurrency Control based on Transaction Finish Degree

Real-time Optimistic Concurrency Control based on Transaction Finish Degree Journal of Computer Science 1 (4): 471-476, 2005 ISSN 1549-3636 Science Publications, 2005 Real-time Optimistic Concurrency Control based on Transaction Finish Degree 1 Han Qilong, 1,2 Hao Zhongxiao 1

More information

Test Case Generation According to the Binary Search Strategy

Test Case Generation According to the Binary Search Strategy Test Case Generation According to the Binary Search Strategy Sami Beydeda and Volker Gruhn University of Leipzig Department of Computer Science Chair of Applied Telematics / e-business Klostergasse 3 04109

More information

Construction of a transitive orientation using B-stable subgraphs

Construction of a transitive orientation using B-stable subgraphs Computer Science Journal of Moldova, vol.23, no.1(67), 2015 Construction of a transitive orientation using B-stable subgraphs Nicolae Grigoriu Abstract A special method for construction of transitive orientations

More information

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Power Set of a set and Relations

Power Set of a set and Relations Power Set of a set and Relations 1 Power Set (1) Definition: The power set of a set S, denoted P(S), is the set of all subsets of S. Examples Let A={a,b,c}, P(A)={,{a},{b},{c},{a,b},{b,c},{a,c},{a,b,c}}

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

A Note on Vertex Arboricity of Toroidal Graphs without 7-Cycles 1

A Note on Vertex Arboricity of Toroidal Graphs without 7-Cycles 1 International Mathematical Forum, Vol. 11, 016, no. 14, 679-686 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/imf.016.667 A Note on Vertex Arboricity of Toroidal Graphs without 7-Cycles 1 Haihui

More information

Three Read Priority Locking for Concurrency Control in Distributed Databases

Three Read Priority Locking for Concurrency Control in Distributed Databases Three Read Priority Locking for Concurrency Control in Distributed Databases Christos Papanastasiou Technological Educational Institution Stereas Elladas, Department of Electrical Engineering 35100 Lamia,

More information

Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy

Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, 00142 Roma, Italy e-mail: pimassol@istat.it 1. Introduction Questions can be usually asked following specific

More information

Precisely Serializable Snapshot Isolation

Precisely Serializable Snapshot Isolation Precisely Serializable Snapshot Isolation Stephen Revilak Ph.D. Dissertation Supervised by Patrick O Neil University of Massachusetts Boston Nov. 8, 2011 1 / 38 What is Snapshot Isolation? Snapshot Isolation

More information

Consistency in Distributed Systems

Consistency in Distributed Systems Consistency in Distributed Systems Recall the fundamental DS properties DS may be large in scale and widely distributed 1. concurrent execution of components 2. independent failure modes 3. transmission

More information

Polytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering

Polytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering Polytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering Course Syllabus Note : This is a major revision, the

More information

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example Lecture 2: Combinatorial search and optimisation problems Different types of computational problems Examples of computational problems Relationships between problems Computational properties of different

More information

Topological Invariance under Line Graph Transformations

Topological Invariance under Line Graph Transformations Symmetry 2012, 4, 329-335; doi:103390/sym4020329 Article OPEN ACCESS symmetry ISSN 2073-8994 wwwmdpicom/journal/symmetry Topological Invariance under Line Graph Transformations Allen D Parks Electromagnetic

More information

The Near Greedy Algorithm for Views Selection in Data Warehouses and Its Performance Guarantees

The Near Greedy Algorithm for Views Selection in Data Warehouses and Its Performance Guarantees The Near Greedy Algorithm for Views Selection in Data Warehouses and Its Performance Guarantees Omar H. Karam Faculty of Informatics and Computer Science, The British University in Egypt and Faculty of

More information

Complexity Classes and Polynomial-time Reductions

Complexity Classes and Polynomial-time Reductions COMPSCI 330: Design and Analysis of Algorithms April 19, 2016 Complexity Classes and Polynomial-time Reductions Lecturer: Debmalya Panigrahi Scribe: Tianqi Song 1 Overview In this lecture, we introduce

More information

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Henry Lin Division of Computer Science University of California, Berkeley Berkeley, CA 94720 Email: henrylin@eecs.berkeley.edu Abstract

More information

DOUBLE DOMINATION CRITICAL AND STABLE GRAPHS UPON VERTEX REMOVAL 1

DOUBLE DOMINATION CRITICAL AND STABLE GRAPHS UPON VERTEX REMOVAL 1 Discussiones Mathematicae Graph Theory 32 (2012) 643 657 doi:10.7151/dmgt.1633 DOUBLE DOMINATION CRITICAL AND STABLE GRAPHS UPON VERTEX REMOVAL 1 Soufiane Khelifi Laboratory LMP2M, Bloc of laboratories

More information

CSE 544 Principles of Database Management Systems. Alvin Cheung Fall 2015 Lecture 14 Distributed Transactions

CSE 544 Principles of Database Management Systems. Alvin Cheung Fall 2015 Lecture 14 Distributed Transactions CSE 544 Principles of Database Management Systems Alvin Cheung Fall 2015 Lecture 14 Distributed Transactions Transactions Main issues: Concurrency control Recovery from failures 2 Distributed Transactions

More information

Experimental Node Failure Analysis in WSNs

Experimental Node Failure Analysis in WSNs Experimental Node Failure Analysis in WSNs Jozef Kenyeres 1.2, Martin Kenyeres 2, Markus Rupp 1 1) Vienna University of Technology, Institute of Communications, Vienna, Austria 2) Slovak University of

More information

Symbolic Evaluation of Sums for Parallelising Compilers

Symbolic Evaluation of Sums for Parallelising Compilers Symbolic Evaluation of Sums for Parallelising Compilers Rizos Sakellariou Department of Computer Science University of Manchester Oxford Road Manchester M13 9PL United Kingdom e-mail: rizos@csmanacuk Keywords:

More information

Set Cover with Almost Consecutive Ones Property

Set Cover with Almost Consecutive Ones Property Set Cover with Almost Consecutive Ones Property 2004; Mecke, Wagner Entry author: Michael Dom INDEX TERMS: Covering Set problem, data reduction rules, enumerative algorithm. SYNONYMS: Hitting Set PROBLEM

More information

Fast algorithm for generating ascending compositions

Fast algorithm for generating ascending compositions manuscript No. (will be inserted by the editor) Fast algorithm for generating ascending compositions Mircea Merca Received: date / Accepted: date Abstract In this paper we give a fast algorithm to generate

More information

Commit Protocols and their Issues in Distributed Databases

Commit Protocols and their Issues in Distributed Databases Proceedings of the 4 th National Conference; INDIACom-2010 Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Commit

More information

DOMINATION PARAMETERS OF A GRAPH AND ITS COMPLEMENT

DOMINATION PARAMETERS OF A GRAPH AND ITS COMPLEMENT Discussiones Mathematicae Graph Theory 38 (2018) 203 215 doi:10.7151/dmgt.2002 DOMINATION PARAMETERS OF A GRAPH AND ITS COMPLEMENT Wyatt J. Desormeaux 1, Teresa W. Haynes 1,2 and Michael A. Henning 1 1

More information

ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES. Nikolay Kosovskiy

ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES. Nikolay Kosovskiy International Journal Information Theories and Applications, Vol. 20, Number 2, 2013 131 ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES Nikolay Kosovskiy Abstract: A mathematical

More information

The Rainbow Connection of a Graph Is (at Most) Reciprocal to Its Minimum Degree

The Rainbow Connection of a Graph Is (at Most) Reciprocal to Its Minimum Degree The Rainbow Connection of a Graph Is (at Most) Reciprocal to Its Minimum Degree Michael Krivelevich 1 and Raphael Yuster 2 1 SCHOOL OF MATHEMATICS, TEL AVIV UNIVERSITY TEL AVIV, ISRAEL E-mail: krivelev@post.tau.ac.il

More information

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

2015, IJARCSSE All Rights Reserved Page 31

2015, IJARCSSE All Rights Reserved Page 31 Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Procedural Cognitive

More information

An Effective Class Hierarchy Concurrency Control Technique in Object-Oriented Database Systems

An Effective Class Hierarchy Concurrency Control Technique in Object-Oriented Database Systems An Effective Class Hierarchy Concurrency Control Technique in Object-Oriented Database Systems Woochun Jun and Le Gruenwald School of Computer Science University of Oklahoma Norman, OK 73019 wocjun@cs.ou.edu;

More information

Single-pass Static Semantic Check for Efficient Translation in YAPL

Single-pass Static Semantic Check for Efficient Translation in YAPL Single-pass Static Semantic Check for Efficient Translation in YAPL Zafiris Karaiskos, Panajotis Katsaros and Constantine Lazos Department of Informatics, Aristotle University Thessaloniki, 54124, Greece

More information

On Transaction Liveness in Replicated Databases

On Transaction Liveness in Replicated Databases On Transaction Liveness in Replicated Databases Fernando Pedone Rachid Guerraoui Ecole Polytechnique Fédérale de Lausanne Département d Informatique CH-1015, Switzerland Abstract This paper makes a first

More information

Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors

Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors A. Fabri 1 and P. Recht 2 1 Universität Dortmund a.fabri@wiso.uni-dortmund.de 2 Universität Dortmund p.recht@wiso.uni-dortmund.de

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically

More information

A STRUCTURAL OPTIMIZATION METHODOLOGY USING THE INDEPENDENCE AXIOM

A STRUCTURAL OPTIMIZATION METHODOLOGY USING THE INDEPENDENCE AXIOM Proceedings of ICAD Cambridge, MA June -3, ICAD A STRUCTURAL OPTIMIZATION METHODOLOGY USING THE INDEPENDENCE AXIOM Kwang Won Lee leekw3@yahoo.com Research Center Daewoo Motor Company 99 Cheongchon-Dong

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Data Replication Model For Remote Procedure Call Transactions

Data Replication Model For Remote Procedure Call Transactions Data Replication Model For Remote Procedure Call Transactions MUSTAFA MAT DERIS, ALI MAMAT*, MISWAN SURIP, SAZALI KHALID Department of Information Systems, Faculty of Information Technology and Multimedia

More information

Revision of Inconsistent Orthographic Views

Revision of Inconsistent Orthographic Views Journal for Geometry and Graphics Volume 2 (1998), No. 1, 45 53 Revision of Inconsistent Orthographic Views Takashi Watanabe School of Informatics and Sciences, Nagoya University, Nagoya 464-8601, Japan

More information

On the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling

On the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling International Journal of Performability Engineering Vol. 9, No. 2, March 2013, pp. 123-132. RAMS Consultants Printed in India On the Role of Weibull-type Distributions in NHPP-based Software Reliability

More information

1. Introduction. Classic algorithms for Pairwise Testing. Andreas Rothmann Hochschule Offenburg November 2008.

1. Introduction. Classic algorithms for Pairwise Testing. Andreas Rothmann Hochschule Offenburg November 2008. Classic algorithms for Pairwise ing Andreas Rothmann Hochschule Offenburg andy.rothmann@gmx.de November 2008 Abstract This paper gives an overview on the most important classic algorithms for pairwise

More information

An Integrated Course on Parallel and Distributed Processing

An Integrated Course on Parallel and Distributed Processing An Integrated Course on Parallel and Distributed Processing José C. Cunha João Lourenço fjcc, jmlg@di.fct.unl.pt Departamento de Informática Faculdade de Ciências e Tecnologia Universidade Nova de Lisboa

More information

Basic vs. Reliable Multicast

Basic vs. Reliable Multicast Basic vs. Reliable Multicast Basic multicast does not consider process crashes. Reliable multicast does. So far, we considered the basic versions of ordered multicasts. What about the reliable versions?

More information

Achieving Robustness in Distributed Database Systems

Achieving Robustness in Distributed Database Systems Achieving Robustness in Distributed Database Systems DEREK L. EAGER AND KENNETH C. SEVCIK University of Toronto The problem of concurrency control in distributed database systems in which site and communication

More information

Clustering Using Graph Connectivity

Clustering Using Graph Connectivity Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the

More information

COMPUTABILITY THEORY AND RECURSIVELY ENUMERABLE SETS

COMPUTABILITY THEORY AND RECURSIVELY ENUMERABLE SETS COMPUTABILITY THEORY AND RECURSIVELY ENUMERABLE SETS JOSHUA LENERS Abstract. An algorithm is function from ω to ω defined by a finite set of instructions to transform a given input x to the desired output

More information

Embedding a graph-like continuum in some surface

Embedding a graph-like continuum in some surface Embedding a graph-like continuum in some surface R. Christian R. B. Richter G. Salazar April 19, 2013 Abstract We show that a graph-like continuum embeds in some surface if and only if it does not contain

More information

ON CONSISTENCY CHECKING OF SPATIAL RELATIONSHIPS IN CONTENT-BASED IMAGE DATABASE SYSTEMS

ON CONSISTENCY CHECKING OF SPATIAL RELATIONSHIPS IN CONTENT-BASED IMAGE DATABASE SYSTEMS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2005 International Press Vol. 5, No. 3, pp. 341-366, 2005 004 ON CONSISTENCY CHECKING OF SPATIAL RELATIONSHIPS IN CONTENT-BASED IMAGE DATABASE SYSTEMS QING-LONG

More information

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques 24 Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Ruxandra PETRE

More information

Lecture 4: September 11, 2003

Lecture 4: September 11, 2003 Algorithmic Modeling and Complexity Fall 2003 Lecturer: J. van Leeuwen Lecture 4: September 11, 2003 Scribe: B. de Boer 4.1 Overview This lecture introduced Fixed Parameter Tractable (FPT) problems. An

More information

Improving Range Query Performance on Historic Web Page Data

Improving Range Query Performance on Historic Web Page Data Improving Range Query Performance on Historic Web Page Data Geng LI Lab of Computer Networks and Distributed Systems, Peking University Beijing, China ligeng@net.pku.edu.cn Bo Peng Lab of Computer Networks

More information

Classification with Diffuse or Incomplete Information

Classification with Diffuse or Incomplete Information Classification with Diffuse or Incomplete Information AMAURY CABALLERO, KANG YEN Florida International University Abstract. In many different fields like finance, business, pattern recognition, communication

More information

Module 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur

Module 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur Module 3 Requirements Analysis and Specification Lesson 6 Formal Requirements Specification Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a formal

More information

REDUCING GRAPH COLORING TO CLIQUE SEARCH

REDUCING GRAPH COLORING TO CLIQUE SEARCH Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University

More information

DEVELOPER DAY. Vulkan Subgroup Explained Daniel Koch NVIDIA MONTRÉAL APRIL Copyright Khronos Group Page 1

DEVELOPER DAY. Vulkan Subgroup Explained Daniel Koch NVIDIA MONTRÉAL APRIL Copyright Khronos Group Page 1 DEVELOPER DAY Vulkan Subgroup Explained Daniel Koch (@booner_k), NVIDIA MONTRÉAL APRIL 2018 Copyright Khronos Group 2018 - Page 1 Copyright Khronos Group 2018 - Page 2 Agenda Motivation Subgroup overview

More information