A Protocol for Constraint Automata Execution in a Synchronous Network of Processors

Author(s):  
Alireza Farhadi ◽  
Mohammad Izadi ◽  
Jafar Habibi
Author(s):  
Sourav Das ◽  
Nitin Awathare ◽  
Ling Ren ◽  
Vinay J. Ribeiro ◽  
Umesh Bellur

Proof-of-Work (PoW) based blockchains typically allocate only a tiny fraction (e.g., less than 1% for Ethereum) of the average interarrival time (I) between blocks for validating smart contracts present in transactions. In such systems, block validation and PoW mining are typically performed sequentially, the former by CPUs and the latter by ASICs. A trivial increase in validation time (τ) introduces the popularly known Verifier's Dilemma, and as we demonstrate, causes more forking and hurts fairness. Large τ also reduces the tolerance for safety against a Byzantine adversary. Solutions that offload validation to a set of non-chain nodes (a.k.a. off-chain approaches) suffer from trust and performance issues that are non-trivial to resolve. In this paper, we present Tuxedo, the first on-chain protocol to theoretically scale τ/I ≈1 in PoW blockchains. The key innovation in Tuxedo is to perform CPU-based block processing in parallel to ASIC mining. We achieve this by allowing miners to delay validation of transactions in a block by up to ζ blocks, where ζ is a system parameter. We perform security analysis of Tuxedo considering all possible adversarial strategies in a synchronous network with maximum end-to-end delay Δ and demonstrate that Tuxedo achieves security equivalent to known results for longest chain PoW Nakamoto consensus. Our prototype implementation of Tuxedo atop Ethereum demonstrates that it can scale τ without suffering the harmful effects of naive scaling up of τ/I in existing blockchains


2015 ◽  
Vol 33 (23) ◽  
pp. 4752-4760 ◽  
Author(s):  
Masafumi Koga ◽  
Yusuke Shigeta ◽  
Futoshi Shirazawa ◽  
Hiroshi Ohta ◽  
Akira Mizutori

2019 ◽  
Vol 4 (1) ◽  
Author(s):  
Yi Ming Lai ◽  
Joshua Veasy ◽  
Stephen Coombes ◽  
Rüdiger Thul

Abstract During a single heartbeat, muscle cells in the heart contract and relax. Under healthy conditions, the behaviour of these muscle cells is almost identical from one beat to the next. However, this regular rhythm can be disturbed giving rise to a variety of cardiac arrhythmias including cardiac alternans. Here, we focus on so-called microscopic calcium alternans and show how their complex spatial patterns can be understood with the help of the master stability function. Our work makes use of the fact that cardiac muscle cells can be conceptualised as a network of networks, and that calcium alternans correspond to an instability of the synchronous network state. In particular, we demonstrate how small changes in the coupling strength between network nodes can give rise to drastically different activity patterns in the network.


Author(s):  
MOHAMMAD IZADI ◽  
ALI MOVAGHAR

A component-based computing system consists of two main parts: a set of components and a coordination subsystem. Reo is an exogenous coordination language for compositional construction of the coordination subsystem. Constraint automaton has been defined as the operational semantics of Reo. The main goal of this paper is to prepare a model checking method for verifying linear time temporal properties of component-based systems whose coordinating subsystems are modeled by Reo and components are modeled by labeled transition systems. For this purpose, we introduce modified definitions of constraint automata and their composition operators by which, every constraint automaton can be considered as a labeled transition system and each labeled transition system can be translated into a constraint automaton. We show that failure-based equivalences CFFD and NDFD are congruences with respect to the composition operators of constraint automata. Also we present a method for compositional model checking of component-based systems using these equivalences for reducing the sizes of constraint automata models.


Sign in / Sign up

Export Citation Format

Share Document