Hasil untuk "cs.DC"

Menampilkan 20 dari ~251697 hasil · dari arXiv, DOAJ, CrossRef

JSON API
arXiv Open Access 2024
Optimizing CNN Using HPC Tools

Shahrin Rahman

This paper optimizes the Convolutional Neural Network (CNN) algorithm using high-performance computing (HPC) technologies. It uses multi-core processors, GPUs, and parallel computing frameworks like OpenMPI and CUDA to speed up CNN model training. The approach improves performance and training time and is superior to alternative strategies. The study demonstrates how HPC technologies can refine the CNN method, resulting in faster and more accurate training of large-scale CNN models.

en cs.DC
arXiv Open Access 2023
Subquadratic Multivalued Asynchronous Byzantine Agreement WHP

Shir Cohen, Idit Keidar

There have been several reductions from multivalued consensus to binary consensus over the past 20 years. To the best of our knowledge, none of them solved it for Byzantine asynchronous settings. In this paper, we close this gap. Moreover, we do so in subquadratic communication, using newly developed subquadratic binary Byzantine Agreement techniques.

en cs.DC
arXiv Open Access 2023
Progress Metrics in DAG-based Consensus

Quan Nguyen, James Henderson, Egor Lysenko

Lachesis protocol~\cite{lachesis2021} leverages a DAG of events to allow nodes to reach fast consensus of events. This work introduces DAG progress metrics to drive the nodes to emit new events more effectively. With these metrics, nodes can select event timing and can choose previous events as parents for their own new events. Our results show that our event timing and parent selection methods can help reaching consensus quicker and thus can reduce lower time to finality significantly.

en cs.DC
arXiv Open Access 2023
Capabilities for Distributed Authorization in Information-Centric Networking

Jens Finkhäuser

Authorization currently introduces partial centralization in otherwise distributed network architectures, such as ICN approaches. Analyzing existing work in (partially) distributed authentication and authorization, and rearranging proven methods, this paper introduces a generalized, capability based and fully distributed authorization scheme. It argues that such a scheme can fit neatly into ICN architectures in order to enhance the trust model and mitigate against certain classes of denial-of-service attacks. Keywords: authorization, distributed systems security, ICN

en cs.DC, cs.CR
arXiv Open Access 2022
RTNN: Accelerating Neighbor Search Using Hardware Ray Tracing

Yuhao Zhu

Neighbor search is of fundamental important to many engineering and science fields such as physics simulation and computer graphics. This paper proposes to formulate neighbor search as a ray tracing problem and leverage the dedicated ray tracing hardware in recent GPUs for acceleration. We show that a naive mapping under-exploits the ray tracing hardware. We propose two performance optimizations, query scheduling and query partitioning, to tame the inefficiencies. Experimental results show 2.2X -- 65.0X speedups over existing neighbor search libraries on GPUs. The code is available at https://github.com/horizon-research/rtnn.

en cs.DC, cs.GR
arXiv Open Access 2019
Robustness and efficiency of leaderless probabilistic consensus protocols within Byzantine infrastructures

Angelo Capossele, Sebastian Mueller, Andreas Penzkofer

This paper investigates leaderless binary majority consensus protocols with low computational complexity in noisy Byzantine infrastructures. Using computer simulations, we show that explicit randomization of the consensus protocol can significantly increase the robustness towards faulty and malicious nodes. We identify the optimal amount of randomness for various Byzantine attack strategies on different kinds of network topologies.

en cs.DC, math.PR
arXiv Open Access 2018
Database Consistency Models

Marc Shapiro, Pierre Sutra

A data store allows application processes to put and get data from a shared memory. In general, a data store cannot be modelled as a strictly sequential process. Applications observe non-sequential behaviours, called anomalies. The set of pos- sible behaviours, and conversely of possible anomalies, constitutes the consistency model of the data store.

en cs.DC, cs.DB
arXiv Open Access 2018
Extending Causal Consistency to any Object Defined by a Sequential Specification

Achour Mostéfaoui, Matthieu Perrin, Michel Raynal

This paper presents a simple generalization of causal consistency suited to any object defined by a sequential specification. As causality is captured by a partial order on the set of operations issued by the processes on shared objects (concurrent operations are not ordered), it follows that causal consistency allows different processes to have different views of each object history.

en cs.DC
arXiv Open Access 2018
Analysis of the XRP Ledger Consensus Protocol

Brad Chase, Ethan MacBrough

The XRP Ledger Consensus Protocol is a previously developed consensus protocol powering the XRP Ledger. It is a low-latency Byzantine agreement protocol, capable of reaching consensus without full agreement on which nodes are members of the network. We present a detailed explanation of the algorithm and derive conditions for its safety and liveness.

en cs.DC
arXiv Open Access 2018
Efficient Multichannel in XML Wireless Broadcast Stream

Arezoo Khatibi, Omid Khatibi

In this paper we recommend the use of multi-channel for XML data in wireless broadcasting. First we divide XML data into information units as bucket, then extract path information (XPath) for any unit and build an index tree from the data path. Finally, make wireless data stream with merging parts of index tree and parts of XML data in multichannel XML. Then, create a protocol that allows mobile users access to the wireless XML stream generated with our method. We study 11 channels in server side and 3 orthogonal channels in client side.

en cs.DC
arXiv Open Access 2018
A 3D Parallel Algorithm for QR Decomposition

Grey Ballard, James Demmel, Laura Grigori et al.

Interprocessor communication often dominates the runtime of large matrix computations. We present a parallel algorithm for computing QR decompositions whose bandwidth cost (communication volume) can be decreased at the cost of increasing its latency cost (number of messages). By varying a parameter to navigate the bandwidth/latency tradeoff, we can tune this algorithm for machines with different communication costs.

en cs.DC
arXiv Open Access 2016
Parametric, Probabilistic, Timed Resource Discovery System

Camille Coti

This paper presents a fully distributed resource discovery and reservation system. Verification of such a system is important to ensure the execution of distributed applications on a set of resources in appropriate conditions. A semi-formal model for his system is presented using probabilistic timed automata. This model is timed, parametric and probabilistic, making it a challenge to the parameter synthesis community.

en cs.DC, cs.SE
arXiv Open Access 2015
A Certain Tendency Of The Database Community

Christopher S. Meiklejohn

We posit that striving for distributed systems that provide "single system image" semantics is fundamentally flawed and at odds with how systems operate in the physical world. We realize the database as an optimization of this system: a required, essential optimization in practice that facilitates central data placement and ease of access to participants in a system. We motivate a new model of computation that is designed to address the problems of computation over "eventually consistent" information in a large-scale distributed system.

en cs.DC
arXiv Open Access 2013
Clustering Algorithms for Scale-free Networks and Applications to Cloud Resource Management

Ashkan Paya, Dan C. Marinescu

In this paper we introduce algorithms for the construction of scale-free networks and for clustering around the nerve centers, nodes with a high connectivity in a scale-free networks. We argue that such overlay networks could support self-organization in a complex system like a cloud computing infrastructure and allow the implementation of optimal resource management policies.

en cs.DC
arXiv Open Access 2012
An Introduction on Dependency Between Hardware Life Time Components and Dynamic Voltage Scaling

Nasrin Jaberi

The main open question is how to calculate the effect of switching between frequencies in DVFS technique on the lifetime of the cluster components. As moving from one frequency to another in DVFS technique always gives a shock to the component and consequently decreases the component lifetime, therefore, it becomes interesting to answer the question of how fast a component can change its speed in order to decrease power without changing its lifetime.

en cs.DC
arXiv Open Access 2012
Multiprocessor Scheduling Using Parallel Genetic Algorithm

Nourah Al-Angari, Abdullatif ALAbdullatif

Tasks scheduling is the most challenging problem in the parallel computing. Hence, the inappropriate scheduling will reduce or even abort the utilization of the true potential of the parallelization. Genetic algorithm (GA) has been successfully applied to solve the scheduling problem. The fitness evaluation is the most time consuming GA operation for the CPU time, which affect the GA performance. The proposed synchronous master-slave algorithm outperforms the sequential algorithm in case of complex and high number of generations problem.

en cs.DC
arXiv Open Access 2011
On the algebraic numbers computable by some generalized Ehrenfest urns

Marie Albenque, Lucas Gerin

This article deals with some stochastic population protocols, motivated by theoretical aspects of distributed computing. We modelize the problem by a large urn of black and white balls from which at every time unit a fixed number of balls are drawn and their colors are changed according to the number of black balls among them. When the time and the number of balls both tend to infinity the proportion of black balls converges to an algebraic number. We prove that, surprisingly enough, not every algebraic number can be "computed" this way.

en cs.DC

Halaman 21 dari 12585