Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJune 2023
Brief Announcement: The MBroadcast Abstraction
PODC '23: Proceedings of the 2023 ACM Symposium on Principles of Distributed ComputingPages 282–285https://doi.org/10.1145/3583668.3594569This short article presents a new communication abstraction denoted Mutual Broadcast (in short MBroadcast). It provides each pair of processes with the following property (called mutual ordering): for any pair of processes p and p′, if p broadcasts a ...
- research-articleOctober 2022
Efficient and stable quorum-based log replication and replay for modern cluster-databases
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 16, Issue 5https://doi.org/10.1007/s11704-020-0210-yAbstractThe modern in-memory database (IMDB) can support highly concurrent on-line transaction processing (OLTP) workloads and generate massive transactional logs per second. Quorum-based replication protocols such as Paxos or Raft have been widely used ...
- research-articleNovember 2020
Quadratic Difference Set-Based Quorum Generation Algorithm in Distributed System
WSSE '20: Proceedings of the 2nd World Symposium on Software EngineeringPages 85–89https://doi.org/10.1145/3425329.3425345The quorum generation algorithm proposed in this paper is based on the quadratic difference set and initializes the quadratic difference set with a sequence of prime numbers. Initialization with prime numbers increases the fairness of marking the ...
- research-articleJune 2019
State of Public and Private Blockchains: Myths and Reality
SIGMOD '19: Proceedings of the 2019 International Conference on Management of DataPages 404–411https://doi.org/10.1145/3299869.3314116It has been a decade since the concept of blockchain was invented as the underlying core data structure of the permissionless or public Bitcoin cryptocurrency network. Since then, several cryptocurrencies, tokens and ICOs have emerged. After much ...
-
- research-articleDecember 2015
Optimal and Maximized Configurable Power Saving Protocols for Corona-Based Wireless Sensor Networks
IEEE Transactions on Mobile Computing (ITMV), Volume 14, Issue 12Pages 2544–2559https://doi.org/10.1109/TMC.2015.2404796Wireless sensor networks (WSNs) are one of the most important ingredients in the Internet of Things. Thus it is vital to design a good power saving protocol, which operates at the medium access control (MAC) layer, for a WSN since sensors are generally ...
- ArticleDecember 2014
Multicast Rendezvous in Cognitive Radio Networks: A Hypercube Approach
CSE '14: Proceedings of the 2014 IEEE 17th International Conference on Computational Science and EngineeringPages 1175–1180https://doi.org/10.1109/CSE.2014.229In cognitive radio networks (CRN), secondary users (SUs) need to first discover neighbors and form communication links, referred to as the rendezvous process. Moreover, rendezvous between multiple SUs can only be achieved on a same channel. However, ...
- ArticleOctober 2013
A Generalized Mutual Exclusion Problem and Its Algorithm
ICPP '13: Proceedings of the 2013 42nd International Conference on Parallel ProcessingPages 300–309https://doi.org/10.1109/ICPP.2013.39Mutual exclusion (ME) is a fundamental problem for resource allocation in distributed systems, It is concerned with how the various processes access shared resources in a mutually exclusive way. Besides the classic ME problem, several variant problems ...
- research-articleJuly 2013
Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors
PODC '13: Proceedings of the 2013 ACM symposium on Principles of distributed computingPages 166–175https://doi.org/10.1145/2484239.2484249A message adversary is a daemon that suppresses messages in round-based message-passing synchronous systems in which no process crashes. A property imposed on a message adversary defines a subset of messages that cannot be eliminated by the adversary. ...
- research-articleDecember 2012
Evaluation of multimedia quorum-based synchronization protocols
MoMM '12: Proceedings of the 10th International Conference on Advances in Mobile Computing & MultimediaPages 128–135https://doi.org/10.1145/2428955.2428984We discuss how to efficiently make replicas of a multimedia object consistent. Multimedia objects are characterized in terms of not only data structure but also quality of service (QoS). There are two types of write operations: enriching and ...
- ArticleNovember 2012
Multimedia Quorum-based Synchronization Protocols
BWCCA '12: Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and ApplicationsPages 141–148https://doi.org/10.1109/BWCCA.2012.33Replicas of multimedia objects are distributed to peers in overlay networks. Multimedia objects are characterized in terms of not only data structure parameter but also quality of service (QoS) parameters like frame rate. Replicas have to be ...
- ArticleSeptember 2012
Design and Evaluation of Multimedia Quorum-Based Synchronization Protocols
NBIS '12: Proceedings of the 2012 15th International Conference on Network-Based Information SystemsPages 164–171https://doi.org/10.1109/NBiS.2012.14Replicas of multimedia objects are distributed to peers in overlay networks. In quorum-based (QB) protocols, every replica may not be up-to-date and the up-to-date replica can be found in the version counter. Multimedia objects are characterized in ...
- ArticleSeptember 2012
Binary vote assignment grid quorum for managing fragmented database
ICICA'12: Proceedings of the Third international conference on Information Computing and ApplicationsPages 584–591https://doi.org/10.1007/978-3-642-34062-8_76Replication usually referred as mechanism to increase availability and performance in distributed databases. Handling fragmented database replication becomes challenging issue since the distributed database is scattered into split fragments. ...
- ArticleAugust 2012
Chasing the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems
NCA '12: Proceedings of the 2012 IEEE 11th International Symposium on Network Computing and ApplicationsPages 44–51https://doi.org/10.1109/NCA.2012.19This paper continues our quest for the weakest failure detector which allows the k-set agreement problem to be solved in asynchronous message-passing systems prone to process failures. It has two main contributions which will be instrumental to complete ...
- ArticleJuly 2012
Quorums for Replication of Multimedia Objects in P2P Overlay Networks
CISIS '12: Proceedings of the 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)Pages 148–155https://doi.org/10.1109/CISIS.2012.153Replicas of multimedia objects are distributed to peers through downloading and caching in peer-to-peer(P2P) overlay networks. Every replica has to be consistent. In quorum-based (QB) protocols, every replica may not be up-to-date and the up-to-date ...
- ArticleMarch 2012
Completable Quorums of Multimedia Objects
AINA '12: Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and ApplicationsPages 597–604https://doi.org/10.1109/AINA.2012.135Multimedia objects are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. In the quorum-based (QB) protocols, every replica of an object is not up-to-date and the replicas are totally ordered in the version ...
- ArticleDecember 2011
Adaptive Traffic-Aware Power-Saving Protocol for IEEE 802.11 Ad Hoc Networks
ICPADS '11: Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed SystemsPages 866–871https://doi.org/10.1109/ICPADS.2011.23Due to rapid advances in wireless network technologies, and the maturity of portable communication devices, ubiquitous wireless computing has become increasingly popular. One of the most important issues in ubiquitous wireless computing is the reduction ...
- research-articleDecember 2011
A multimedia quorum-based (MQB) protocol in P2P overlay networks
MoMM '11: Proceedings of the 9th International Conference on Advances in Mobile Computing and MultimediaPages 103–109https://doi.org/10.1145/2095697.2095717Multimedia objects are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. Multimedia objects are characterized in terms of not only data structure but also quality of service (QoS). Replicas of a multimedia ...
- ArticleNovember 2011
Enriching and Impoverishing Types of Write Operations in the Multimedia Quorum-based (MQB) Protocol
INCOS '11: Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative SystemsPages 378–383https://doi.org/10.1109/INCoS.2011.85Multimedia objects are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. Multimedia objects are characterized in terms of not only data structure but also quality of service (QoS). Replicas of a multimedia ...
- ArticleOctober 2011
A Quorum-Based Synchronization Protocol
BWCCA '11: Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and ApplicationsPages 189–196https://doi.org/10.1109/BWCCA.2011.93Multimedia objects are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. In this paper, we consider multimedia objects which are characterized in terms of not only data structure but also quality of service (...