distributed computation
Recently Published Documents


TOTAL DOCUMENTS

505
(FIVE YEARS 93)

H-INDEX

32
(FIVE YEARS 4)

Author(s):  
Othon Michail ◽  
George Skretas ◽  
Paul G. Spirakis

AbstractWe study here systems of distributed entities that can actively modify their communication network. This gives rise to distributed algorithms that apart from communication can also exploit network reconfiguration to carry out a given task. Also, the distributed task itself may now require a global reconfiguration from a given initial network $$G_s$$ G s to a target network $$G_f$$ G f from a desirable family of networks. To formally capture costs associated with creating and maintaining connections, we define three edge-complexity measures: the total edge activations, the maximum activated edges per round, and the maximum activated degree of a node. We give (poly)log(n) time algorithms for the task of transforming any $$G_s$$ G s into a $$G_f$$ G f of diameter (poly)log(n), while minimizing the edge-complexity. Our main lower bound shows that $$\varOmega (n)$$ Ω ( n ) total edge activations and $$\varOmega (n/\log n)$$ Ω ( n / log n ) activations per round must be paid by any algorithm (even centralized) that achieves an optimum of $$\varTheta (\log n)$$ Θ ( log n ) rounds. We give three distributed algorithms for our general task. The first runs in $$O(\log n)$$ O ( log n ) time, with at most 2n active edges per round, a total of $$O(n\log n)$$ O ( n log n ) edge activations, a maximum degree $$n-1$$ n - 1 , and a target network of diameter 2. The second achieves bounded degree by paying an additional logarithmic factor in time and in total edge activations. It gives a target network of diameter $$O(\log n)$$ O ( log n ) and uses O(n) active edges per round. Our third algorithm shows that if we slightly increase the maximum degree to polylog(n) then we can achieve $$o(\log ^2 n)$$ o ( log 2 n ) running time.


2021 ◽  
Author(s):  
◽  
Koshy John

<p>Scientific researchers faced with extremely large computations or the requirement of storing vast quantities of data have come to rely on distributed computational models like grid and cloud computing. However, distributed computation is typically complex and expensive. The Social Cloud for Public eResearch aims to provide researchers with a platform to exploit social networks to reach out to users who would otherwise be unlikely to donate computational time for scientific and other research oriented projects. This thesis explores the motivations of users to contribute computational time and examines the various ways these motivations can be catered to through established social networks. We specifically look at integrating Facebook and BOINC, and discuss the architecture of the functional system and the novel social engineering algorithms that power it.</p>


2021 ◽  
Author(s):  
◽  
Koshy John

<p>Scientific researchers faced with extremely large computations or the requirement of storing vast quantities of data have come to rely on distributed computational models like grid and cloud computing. However, distributed computation is typically complex and expensive. The Social Cloud for Public eResearch aims to provide researchers with a platform to exploit social networks to reach out to users who would otherwise be unlikely to donate computational time for scientific and other research oriented projects. This thesis explores the motivations of users to contribute computational time and examines the various ways these motivations can be catered to through established social networks. We specifically look at integrating Facebook and BOINC, and discuss the architecture of the functional system and the novel social engineering algorithms that power it.</p>


2021 ◽  
Author(s):  
Tianchi Chen ◽  
Muhammad Ali Al-Radhawi ◽  
Christopher Voigt ◽  
Eduardo Sontag

A design for genetically-encoded counters is proposed via repressor-based circuits. An N-bit counter reads sequences of input pulses and displays the total number of pulses, modulo 2^N. The design is based on distributed computation, with specialized cell types allocated to specific tasks. This allows scalability and bypasses constraints on the maximal number of circuit genes per cell due to toxicity or failures due to resource limitations. The design starts with a single-bit counter. The N-bit counter is then obtained by interconnecting (using diffusible chemicals) a set of N single-bit counters and connector modules. An optimization framework is used to determine appropriate gate parameters and to compute bounds on admissible pulse widths and relaxation (inter-pulse) times, as well as to guide the construction of novel gates. This work can be viewed as a step toward obtaining circuits that are capable of finite-automaton computation, in analogy to digital central processing units.


2021 ◽  
Vol 17 (4) ◽  
pp. 1-19
Author(s):  
Xiaoming Sun ◽  
David P. Woodruff ◽  
Guang Yang ◽  
Jialin Zhang

We consider algorithms with access to an unknown matrix M ε F n×d via matrix-vector products , namely, the algorithm chooses vectors v 1 , ⃛ , v q , and observes Mv 1 , ⃛ , Mv q . Here the v i can be randomized as well as chosen adaptively as a function of Mv 1 , ⃛ , Mv i-1 . Motivated by applications of sketching in distributed computation, linear algebra, and streaming models, as well as connections to areas such as communication complexity and property testing, we initiate the study of the number q of queries needed to solve various fundamental problems. We study problems in three broad categories, including linear algebra, statistics problems, and graph problems. For example, we consider the number of queries required to approximate the rank, trace, maximum eigenvalue, and norms of a matrix M; to compute the AND/OR/Parity of each column or row of M, to decide whether there are identical columns or rows in M or whether M is symmetric, diagonal, or unitary; or to compute whether a graph defined by M is connected or triangle-free. We also show separations for algorithms that are allowed to obtain matrix-vector products only by querying vectors on the right, versus algorithms that can query vectors on both the left and the right. We also show separations depending on the underlying field the matrix-vector product occurs in. For graph problems, we show separations depending on the form of the matrix (bipartite adjacency versus signed edge-vertex incidence matrix) to represent the graph. Surprisingly, very few works discuss this fundamental model, and we believe a thorough investigation of problems in this model would be beneficial to a number of different application areas.


Electronics ◽  
2021 ◽  
Vol 10 (20) ◽  
pp. 2466
Author(s):  
Kangjie Zhang ◽  
Xiaodong Xu ◽  
Jingxuan Zhang ◽  
Shujun Han ◽  
Bizhu Wang ◽  
...  

Flexible resource scheduling and network forecast are crucial functions to enhance mobile vehicular network performances. However, BaseStations (BSs) and their computing unit which undertake the functions cannot meet the delay requirement because of limited computation capability. Offloading the time-sensitive functions to User Equipment (UE) is believed to be an effective method to tackle this challenge. The disadvantage of the method is offloading occupies communication resources, which deteriorate the system capability. To better coordinate offloading and communication, a multi-connectivity enhanced joint scheduling scheme for distributed computation offloading and communication resources allocation in vehicular networks is proposed in this article. Computation tasks are divided into many slices and distributed to UEs to aggregate the computation capability. A communication-incentive mechanism is provided for involving UEs to compensate the loss of UEs, while multi-connectivity is adopted to enhance the system throughput. We also defined offloading failure ratio as a conclusive condition for offloading size by analyzing the movement of UEs. By a two-step optimization, the co-scheduling of offloading size and throughput is solved. The system-level simulation results show that the offloading size and throughput of the proposed scheme are larger than comparisons when the time constraint is tight.


Sign in / Sign up

Export Citation Format

Share Document