BlockDAG protocols SPECTRE, PHANTOM
|
|
- Hilda Norton
- 5 years ago
- Views:
Transcription
1 lockdag protocols SPECTRE, PHANTOM PASE 18, Stanford Yonatan Sompolinsky Joint work with Aviv Zohar
2 Motivation - Algorithms on graphs are fun - lockchain does not scale - lockdag - generlization of Satoshi s paradigm blocks per day 1 million blocks per day
3 - Proof-of-work - Miners - locks - lock rewards - Transactions - Transcation fees - Activity on-chain -
4 - Proof-of-stake - yzcoin [Kogias et al.], Hybrid Consensus/Thunderella [Shi, Pass] - Lightning Network [Poon and Dryja] - Sharding protocols - lockchain project X
5 lockdag paradigm
6 lockdag lockchain with 10 blocks per second genesis block
7 lockdag lockchain with 10 blocks per second genesis block
8 DAG mining protocol rule #1: reference tip of longest chain all tips of DAG rule #2: publish block immediately genesis block new block
9 Key observations 1. Two honest blocks unconnected in the DAG only if created at approx same time 2. Rarely more than k honest blocks created at approx same time 3. Attacker can create arbitrary structures, but <50% E H I genesis block A k=2 C D G J k = k(d λ) λ = block rate D = propagation delay
10 A C D E k=0 A k=2 C D E G H I J k 2 D λ D = prop delay λ = block rate k=10
11 lockdag paradigm It s a paradigm, not a solution Still need to resolve conflicts, aka double-spends k=10
12 The PHANTOM protocol
13 PHANTOM s goal: recognize cluster of honest blocks, discard (or penalize) the rest G J A E K L M D H I C
14 Definition: A k-cluster is a subset of blocks such that each block in it is connected to every block in it, apart from at most k blocks E not connected to D,H not connected to H,I J not connected to E,,K,L,D,H,I A E G J K L M D H I C 2-cluster
15 Good news #1: honest blocks form a k-cluster A C G E J D H I J L Key observations: K 1. Two honest blocks are unconnected in the DAG only if created at approx same time 2. At most k blocks created at approx same time honest large k-cluster
16 Good news #1: honest blocks form a k-cluster ad news: attacker forms a k-cluster as well attacker k-cluster C G J L M C G J L M A E K A E K D H I honest k-cluster D H I
17 Good news #1: honest blocks form a k-cluster ad news: attacker forms a k-cluster as well Good news #2: honest blocks form a larger one! attacker small k-cluster C G J L M C G J L M A E K A E K D H I honest large k-cluster D H I
18 C G J L M The PHANTOM protocol A E K D H I Algorithm (NP hard version): 1. Search for largest k-cluster 2. Order its blocks via some topological ordering 3. Iterate over blocks in the prescribed order, and accept transactions consistent with history
19 The PHANTOM protocol Algorithm (NP hard version): 1. Search for largest k-cluster 2. Order its blocks via some topological ordering 3. Iterate over blocks in the prescribed order, and accept transactions consistent with history
20 Generalization of Satoshi s paradigm
21 orks in the blockchain J A D E G H I C deliberate attack? miner of C ignored propagation delay? miner of C didn t receive yet What happened here? Who is honest???
22 Recognizing honest chain of blocks J A D E G H I C deliberate attack? miner of C ignored propagation delay? miner of C didn t receive yet
23 Recognizing honest chain of blocks J A D E G H I C deliberate attack? miner of C ignored propagation delay? miner of C didn t receive yet
24 Recognizing honest chain of blocks J A D E G H I C Key observations 1. Two honest blocks unconnected in the DAG chain only if created at approx same time 2. Rarely more than k 1 honest block created at approx same time 3. Attacker can create arbitrary structures, but <50%
25 Longest chain = Largest 0-cluster I A D E G H J C 0-cluster
26 Theorem (itcoin): If attacker<50%, then under low throughput, the largest 0-cluster (aka longset chain) was created by honest nodes Theorem (PHANTOM): If attacker<50%, then under any throughput, the largest k-cluster was created by honest nodes, for some suitable k
27 PHANTOM Greedy Algorithm Algorithm (NP hard version): 1. Search for largest k-cluster 2. Order its blocks via some topological ordering 3. Iterate over blocks in the prescribed order, and accept transactions consistent with history
28 Why not longest-chain of DAG?? weight = 5 weight = 6 b/c orphans do not contribute to honest chain
29 Why not count all orphans?? weight = 11 weight = 6
30 Why not count all orphans?? I J L C K M weight = 11 E D G N weight = 15 b/c orphans will contribute to attacker chain
31 PHANTOM s solution: Count all orphans that are well connected to the chain I J L C K M weight = 11 A E D N G weight = 10 Longest chain: count no orphans (attackable) Previous suggestion: count all orphans (attackable) PHANTOM: count some orphans (secure)
32 Definition: A k-uncle of a chain is a block which is unconnected to at most k blocks in it G J A E K L M Examples: - 0-uncle (it s inside the chain) C D - 1-uncle (unconnected to E) H - 2-uncle (unconnected to E,) C - 4-uncle (unconnected to,e,,k) D H I
33 PHANTOM (greedy version): 1. Search for chain with largest # of uncles of degree k; the chain + uncles are honest 2. Order its blocks via some topological ordering 3. Iterate over blocks in the prescribed order, and accept transactions consistent with history PHANTOM (NP hard version): 1. Search for largest k-cluster; the cluster is honest 2. Order its blocks via some topological ordering 3. Iterate over blocks in the prescribed order, and accept transactions consistent with history
34 The chain with largest number of 2-uncles: G J A E K L M D H I C
35 Security guarantee: or properly chosen k, 1. (almost) all honest block are uncles of degree k of heaviest chain 2. (almost) no attacker blocks are uncles of degree k of heaviest chain 3. any topological order over honest blocks will converge A E G J K L M C D H I
36 PHANTOM pros and cons throughput unlimited by the protocol easy to implement efficiently poor waiting times when conflicts are visible
37 Throughput Desired throughput Required bandwidth Required storage lock size lock creation rate 1,000 txns per sec 0.5 M per sec ~100 G per day 50 K 10 blocks per sec 10,000 txns per sec 5 M per sec ~1 T per day 100 K 50 blocks per sec 1,000,000 txns per sec 500 M per sec ~0.1 P per day 0.5 G 1 block per sec
38 Scalability, SPECTRE vs PHANTOM Protocol Throughput limited by Confirmation times w/o conflicts w/ conflicts Ordering itcoin latency slow slow linear SPECTRE capacity very fast not guaranteed* pairwise PHANTOM capacity slow very slow linear SPECTRE + PHANTOM capacity very fast very slow pairwise *under active balancing attack; Weak Liveness
39 More stuff in the paper Other greedy variants How to incorporate red blocks as well ormal proof of convergence Waiting times in PHANTOM Combining SPECTRE and PHANTOM
arxiv: v2 [cs.cr] 8 Nov 2018
Deconstructing the Blockchain to Approach Physical Limits Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath arxiv:1810.08092v2 [cs.cr] 8 Nov 2018 Stanford University, University
More informationSecure High-Rate Transaction Processing in Bitcoin
Secure High-Rate Transaction Processing in Bitcoin (full version) Yonatan Sompolinsky 1 and Aviv Zohar 1,2 1 School of Engineering and Computer Science, The Hebrew University of Jerusalem, Israel 2 Microsoft
More informationSPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via. Recursive Elections. Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar
SPECTRE: Serialization of Proof-of-work Events: Confirming Transactions via Recursive Elections Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar School of Engineering and Computer Science, The Hebrew
More informationOn the Phase Space of Block-Hiding Strategies
On the Phase Space of Block-Hiding Strategies Assaf Shomer 1 February 16, 014 1 Contact the author at assafshomer at gmail dot com. Support this research at 18wuRLYvbpeiEEUSykjms89cVciWBfcFF (BTC), LXT14HrbdQxU3cMiwuMPyEvp47frZkCD9
More informationThe first glance at the simulation of the Tangle: discrete model
The first glance at the simulation of the Tangle: discrete model B. Kuśmierz IOTA Foundation November 6, 2017 Abstract In this paper we present preliminary results obtained with the computer simulation
More informationarxiv: v1 [cs.gt] 8 Jul 2016
Blockchain Mining Games Aggelos Kiayias Elias Koutsoupias Maria Kyropoulou Yiannis Tselekounis arxiv:1607.02420v1 [cs.gt] 8 Jul 2016 Abstract We study the strategic considerations of miners participating
More informationSimple Proofs of Sequential Work
Simple Proofs of Sequential Work Bram Cohen Krzysztof Pietrzak Eurocrypt 2018, Tel Aviv, May 1st 2018 Outline What How Why Proofs of Sequential Work Sketch of Construction & Proof Sustainable Blockchains
More informationDREP Chain A Novel Sharding Infrastructure Technical Whitepaer
DREP Chain A Novel Sharding Infrastructure Technical Whitepaer DREP foundation V1.0.1 June 18, 2018 Abstract We present DREP chain, a novel scale-out blockchain protocol without compromising decentralization
More informationI Can t Believe It s Not Causal! Scalable Causal Consistency with No Slowdown Cascades
I Can t Believe It s Not Causal! Scalable Causal Consistency with No Slowdown Cascades Syed Akbar Mehdi 1, Cody Littley 1, Natacha Crooks 1, Lorenzo Alvisi 1,4, Nathan Bronson 2, Wyatt Lloyd 3 1 UT Austin,
More informationThe tangle. Serguei Popov, for Jinn Labs. December 28, Version 0.5
The tangle Serguei Popov, for Jinn Labs December 28, 205. Version 0.5 Abstract In this paper we analyze the technology used as a backbone of iota a cryptocurrency for Internet-of-Things industry). This
More informationBlockchain Mining Games with Pay-Forward
Blockchain Mining Games with Pay-Forward Elias Koutsoupias, Philip Lazos, Foluso Ogunlana, and Paolo Serafino University of Oxford Abstract. We study the strategic implications that arise from adding one
More informationBitcoin s Security Model Revisited
Bitcoin s Security Model Revisited Yonatan Sompolinsky 1 and Aviv Zohar 1,2 1 School of Engineering and Computer Science, The Hebrew University of Jerusalem, Israel 2 Microsoft Research, Herzliya, Israel
More informationSecurity of Blockchain Technologies
Security of Blockchain Technologies Master Thesis Karl Wüst 2016-07-11 Supervisor: Prof. Dr. Srdjan Capkun Advisor: Arthur Gervais Department of Computer Science, ETH Zürich Abstract Proof of Work (PoW)
More informationDEXON Consensus Algorithm
DEXON Consensus Algorithm Infinitely Scalable, Low-Latency Byzantine Fault Tolerant Blocklattice DEXON Foundation Aug 9 2018, v1.0 Abstract A blockchain system is a replicated state machine that must be
More informationThe Tangle. Serguei Popov. October 1, Version 1.3
The Tangle Serguei Popov October, 207. Version.3 Abstract In this paper we analyze the mathematical foundations of IOTA, a cryptocurrency for the Internet-of-Things (IoT) industry. The main feature of
More informationAnalysis of hashrate-based double-spending
Analysis of hashrate-based double-spending Meni Rosenfeld December 11, 2012 Latest version: December 13, 2012 Abstract Bitcoin ([1]) is the world s first decentralized digital currency. Its main technical
More informationarxiv: v1 [cs.dc] 22 Oct 2018
FANTOM: A SCALABLE FRAMEWORK FOR ASYNCHRONOUS DISTRIBUTED SYSTEMS A PREPRINT Sang-Min Choi, Jiho Park, Quan Nguyen, and Andre Cronje arxiv:1810.10360v1 [cs.dc] 22 Oct 2018 FANTOM Lab FANTOM Foundation
More informationHathor Network 1 A Novel, Scalable, and Decentralized Architecture for a General Distributed Ledger
Hathor Network 1 A Novel, Scalable, and Decentralized Architecture for a General Distributed Ledger Hathor is a transactional consensus platform comprised of an entirely novel architecture, based on concepts
More informationAnnouncements. CS 188: Artificial Intelligence Fall Causality? Example: Traffic. Topology Limits Distributions. Example: Reverse Traffic
CS 188: Artificial Intelligence Fall 2008 Lecture 16: Bayes Nets III 10/23/2008 Announcements Midterms graded, up on glookup, back Tuesday W4 also graded, back in sections / box Past homeworks in return
More informationarxiv: v2 [cs.cr] 23 Jul 2015
Optimal Selfish Mining Strategies in Bitcoin Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar,2 arxiv:507.0683v2 [cs.cr] 23 Jul 205 School of Engineering and Computer Science, he Hebrew University
More informationON PROFITABILITY OF SELFISH MINING
ON PROFITABILITY OF SELFISH MINING CYRIL GRUNSPAN AND RICARDO PÉREZ-MARCO Abstract. We review the so called selfish mining strategy in the Bitcoin network and properly evaluate the cost of the attack and
More informationIntelligent Decentralized Cloud. EDCON 18th February 2017 (V1.0)
Intelligent Decentralized Cloud EDCON 18th February 2017 (V1.0) Experimental Ethereum Sister Network Casper Extreme availability crypto:3 Speed, scale-out The Code is Law Governance by community The AI
More informationSecurity Protocols and Application Final Exam
Security Protocols and Application Final Exam Solution Philippe Oechslin and Serge Vaudenay 25.6.2014 duration: 3h00 no document allowed a pocket calculator is allowed communication devices are not allowed
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationGreedy Maximization Framework for Graph-based Influence Functions
Greedy Maximization Framework for Graph-based Influence Functions Edith Cohen Google Research Tel Aviv University HotWeb '16 1 Large Graphs Model relations/interactions (edges) between entities (nodes)
More informationDEXON : A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
DEXON : A Highly Scalable, Decentralized DAG-Based Consensus Algorithm Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung and Tzu-Wei Chao DEXON Foundation, Taiwan {popo,w,pk,haochung,n}@dexon.org November
More informationBayes Nets III: Inference
1 Hal Daumé III (me@hal3.name) Bayes Nets III: Inference Hal Daumé III Computer Science University of Maryland me@hal3.name CS 421: Introduction to Artificial Intelligence 10 Apr 2012 Many slides courtesy
More informationarxiv: v2 [cs.cr] 17 Feb 2017
SATOSHI RISK TABLES CYRIL GRUNSPAN AND RICARDO PÉREZ-MARCO arxiv:1702.04421v2 [cs.cr] 17 Feb 2017 Abstract. We present Bitcoin Security Tables computing the probability of success p(z, q, t) of a double
More information15-780: Graduate Artificial Intelligence. Bayesian networks: Construction and inference
15-780: Graduate Artificial Intelligence ayesian networks: Construction and inference ayesian networks: Notations ayesian networks are directed acyclic graphs. Conditional probability tables (CPTs) P(Lo)
More informationEvolutionary Game for Mining Pool Selection in Blockchain Networks
Evolutionary Game for Mining Pool Selection in Blockchain Networks Xiaojun Liu, Wenbo Wang, Dusit Niyato, Narisa Zhao and Ping Wang Institute of Systems Engineering, Dalian University of Technology, Dalian,
More informationCSE 431/531: Analysis of Algorithms. Dynamic Programming. Lecturer: Shi Li. Department of Computer Science and Engineering University at Buffalo
CSE 431/531: Analysis of Algorithms Dynamic Programming Lecturer: Shi Li Department of Computer Science and Engineering University at Buffalo Paradigms for Designing Algorithms Greedy algorithm Make a
More informationShortest Link Scheduling with Power Control under Physical Interference Model
2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks Shortest Link Scheduling with Power Control under Physical Interference Model Peng-Jun Wan Xiaohua Xu Department of Computer Science
More informationThe Bitcoin Mining Game
RESEARCH ARTICLE The Bitcoin Mining Game Nicolas Houy Abstract. This article deals with the mining incentives in the Bitcoin protocol. The mining process is used to confirm and secure transactions. This
More information4. How to prove a problem is NPC
The reducibility relation T is transitive, i.e, A T B and B T C imply A T C Therefore, to prove that a problem A is NPC: (1) show that A NP (2) choose some known NPC problem B define a polynomial transformation
More informationLearning in Bayesian Networks
Learning in Bayesian Networks Florian Markowetz Max-Planck-Institute for Molecular Genetics Computational Molecular Biology Berlin Berlin: 20.06.2002 1 Overview 1. Bayesian Networks Stochastic Networks
More informationEquilibria in the Tangle
Equilibria in the Tangle arxiv:1712.05385v2 [math.pr] 9 Mar 2018 Serguei Popov 1, Olivia Saa 2 Paulo Finardi 3 March 12, 2018 1 Department of Statistics, Institute of Mathematics, Statistics and Scientific
More informationOne Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner, University of Applied Sciences mbillah@hs-mittweida.de May 11, 2015 1/ 70 Contents What is Bitcoin What is Mining
More informationMultiparty Computation (MPC) Arpita Patra
Multiparty Computation (MPC) Arpita Patra MPC offers more than Traditional Crypto! > MPC goes BEYOND traditional Crypto > Models the distributed computing applications that simultaneously demands usability
More information30 Classification of States
30 Classification of States In a Markov chain, each state can be placed in one of the three classifications. 1 Since each state falls into one and only one category, these categories partition the states.
More informationCS 273 Prof. Serafim Batzoglou Prof. Jean-Claude Latombe Spring Lecture 12 : Energy maintenance (1) Lecturer: Prof. J.C.
CS 273 Prof. Serafim Batzoglou Prof. Jean-Claude Latombe Spring 2006 Lecture 12 : Energy maintenance (1) Lecturer: Prof. J.C. Latombe Scribe: Neda Nategh How do you update the energy function during the
More informationNetwork alignment and querying
Network biology minicourse (part 4) Algorithmic challenges in genomics Network alignment and querying Roded Sharan School of Computer Science, Tel Aviv University Multiple Species PPI Data Rapid growth
More informationBlockchains from Proofs of Space and Time: from Spacemint to Chia
Blockchains from Proofs of Space and Time: from Spacemint to Chia Krzysztof Pietrzak Guest Lecture, Blockchains and Cryptocurrencies (Spring 2018) Outline Bitcoin and Proofs of Work Proofs of Stake Proofs
More informationThe Blockchain Folk Theorem
The Blockchain Folk Theorem Bruno Biais (TSE), Christophe Bisière (TSE), Matthieu Bouvard (McGill) and Catherine Casamatta (TSE) Swissquote Conference 2017 on Fintech Swiss Finance Institute Ecole Polytechnique
More information1.1 Our Contribution. 1.2 Paper Organization. The Goshawk Protocol 2.1 Improved Two-layer Hybrid Consensus
m T t = T/m B B = (H,B, H,K, h, k, {tx}, n) H,B H,K h k {tx} n B Hash(B) T K T K B T K < Hash(B) T M T M P B H = Hash(B ) P n 0 H T M H T K P B K P B M 2 λ E D N P N 5 The ticket price is adjusted by the
More informationReview: From problem to parallel algorithm
Review: From problem to parallel algorithm Mathematical formulations of interesting problems abound Poisson s equation Sources: Electrostatics, gravity, fluid flow, image processing (!) Numerical solution:
More informationBitcoin mining as cooperative network
Utrecht University Faculty of Science Department of Mathematics Bitcoin mining as cooperative network A pool of money Bachelor Thesis Supervisor: Dr. M. Ruijgrok Wicorel van der Pol Student number 4174801
More informationAlgorithms Exam TIN093 /DIT602
Algorithms Exam TIN093 /DIT602 Course: Algorithms Course code: TIN 093, TIN 092 (CTH), DIT 602 (GU) Date, time: 21st October 2017, 14:00 18:00 Building: SBM Responsible teacher: Peter Damaschke, Tel. 5405
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationDistributed Ledger Technology for Smart Cities, The Sharing Economy, and Social Compliance
Distributed Ledger Technology for Smart Cities, The Sharing Economy, and Social Compliance P. Ferraro, C. King, and R. Shorten 1 arxiv:187.649v2 [cs.sy] 2 Oct 218 Abstract This paper describes how Distributed
More informationAlgorithm Design Strategies V
Algorithm Design Strategies V Joaquim Madeira Version 0.0 October 2016 U. Aveiro, October 2016 1 Overview The 0-1 Knapsack Problem Revisited The Fractional Knapsack Problem Greedy Algorithms Example Coin
More informationCertifying the Global Optimality of Graph Cuts via Semidefinite Programming: A Theoretic Guarantee for Spectral Clustering
Certifying the Global Optimality of Graph Cuts via Semidefinite Programming: A Theoretic Guarantee for Spectral Clustering Shuyang Ling Courant Institute of Mathematical Sciences, NYU Aug 13, 2018 Joint
More informationOn the Complexity of Mining Itemsets from the Crowd Using Taxonomies
On the Complexity of Mining Itemsets from the Crowd Using Taxonomies Antoine Amarilli 1,2 Yael Amsterdamer 1 Tova Milo 1 1 Tel Aviv University, Tel Aviv, Israel 2 École normale supérieure, Paris, France
More informationStochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis
Appeared in INFOCOM 208 Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis Nikolaos Papadis, Sem Borst, Anwar Walid, Mohamed Grissa, Leandros Tassiulas Nokia Bell Labs,
More informationDistributed Data Fusion with Kalman Filters. Simon Julier Computer Science Department University College London
Distributed Data Fusion with Kalman Filters Simon Julier Computer Science Department University College London S.Julier@cs.ucl.ac.uk Structure of Talk Motivation Kalman Filters Double Counting Optimal
More informationRESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE
RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE Yuan-chun Zhao a, b, Cheng-ming Li b a. Shandong University of Science and Technology, Qingdao 266510 b. Chinese Academy of
More informationFruitChains: A Fair Blockchain
FruitChains: A Fair Blockchain Rafael Pass Cornell Tech rafael@cs.cornell.edu Elaine Shi Cornell University elaine@cs.cornell.edu May 5, 2017 Abstract Nakamoto s famous blockchain protocol enables achieving
More informationPerformance Evaluation of Queuing Systems
Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems
More informationMethodology for Computer Science Research Lecture 4: Mathematical Modeling
Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals
More informationModularity and Graph Algorithms
Modularity and Graph Algorithms David Bader Georgia Institute of Technology Joe McCloskey National Security Agency 12 July 2010 1 Outline Modularity Optimization and the Clauset, Newman, and Moore Algorithm
More informationRegister Allocation. Maryam Siahbani CMPT 379 4/5/2016 1
Register Allocation Maryam Siahbani CMPT 379 4/5/2016 1 Register Allocation Intermediate code uses unlimited temporaries Simplifying code generation and optimization Complicates final translation to assembly
More informationCMSC 451: Lecture 7 Greedy Algorithms for Scheduling Tuesday, Sep 19, 2017
CMSC CMSC : Lecture Greedy Algorithms for Scheduling Tuesday, Sep 9, 0 Reading: Sects.. and. of KT. (Not covered in DPV.) Interval Scheduling: We continue our discussion of greedy algorithms with a number
More informationCS242: Probabilistic Graphical Models Lecture 7B: Markov Chain Monte Carlo & Gibbs Sampling
CS242: Probabilistic Graphical Models Lecture 7B: Markov Chain Monte Carlo & Gibbs Sampling Professor Erik Sudderth Brown University Computer Science October 27, 2016 Some figures and materials courtesy
More informationDistributed Systems Principles and Paradigms. Chapter 06: Synchronization
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationBLOCKCHAIN TIME AND HEISENBERG UNCERTAINTY PRINCIPLE
BLOCKCHAIN TIME AND HEISENBERG UNCERTAINTY PRINCIPLE RICARDO PÉREZ MARCO Abstract. We observe that the definition of time as the internal blockchain time of a network based on a Proof-of-Work implies Heisenberg
More informationObservations on Linear Key Predistribution Schemes and Their Applications to Group Deployment of Nodes
Observations on Linear Key Predistribution Schemes and Their Applications to Group Deployment of Nodes Alexey Urivskiy JSC InfoTeCS ourivski@mail.ru, urivskiy@infotecs.ru June 20, 2012 Key Predistribution
More informationWindow-aware Load Shedding for Aggregation Queries over Data Streams
Window-aware Load Shedding for Aggregation Queries over Data Streams Nesime Tatbul Stan Zdonik Talk Outline Background Load shedding in Aurora Windowed aggregation queries Window-aware load shedding Experimental
More informationGravity: Distributed ledger data management protocol.
Gravity: Distributed ledger data management protocol. June 7, 2018 Abstract The concept of a cryptographically protected and distributed transaction ledger has demonstrated its eciency in a series of projects.
More informationNetwork Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,
More informationChapter 4 Deliberation with Temporal Domain Models
Last update: April 10, 2018 Chapter 4 Deliberation with Temporal Domain Models Section 4.4: Constraint Management Section 4.5: Acting with Temporal Models Automated Planning and Acting Malik Ghallab, Dana
More informationReinforcement Learning II
Reinforcement Learning II Andrea Bonarini Artificial Intelligence and Robotics Lab Department of Electronics and Information Politecnico di Milano E-mail: bonarini@elet.polimi.it URL:http://www.dei.polimi.it/people/bonarini
More information(a) Write a greedy O(n log n) algorithm that, on input S, returns a covering subset C of minimum size.
Esercizi su Greedy Exercise 1.1 Let S = {[a 1, b 1 ], [a 2, b 2 ],..., [a n, b n ]} be a set of closed intervals on the real line. We say that C S is a covering subset for S if, for any interval [a, b]
More informationGeneral State Channel Networks
General State Channel Networks Stefan Dziembowski 1,, Sebastian Faust 2,, and Kristina Hostáková 3, 1 stefan.dziembowski@crypto.edu.pl; University of Warsaw, Poland 2 sebastian.faust@cs.tu-darmstadt.de;
More informationCORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO
CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected
More informationFinal Exam, Machine Learning, Spring 2009
Name: Andrew ID: Final Exam, 10701 Machine Learning, Spring 2009 - The exam is open-book, open-notes, no electronics other than calculators. - The maximum possible score on this exam is 100. You have 3
More informationDeep unsupervised learning
Deep unsupervised learning Advanced data-mining Yongdai Kim Department of Statistics, Seoul National University, South Korea Unsupervised learning In machine learning, there are 3 kinds of learning paradigm.
More informationBayesian Networks to design optimal experiments. Davide De March
Bayesian Networks to design optimal experiments Davide De March davidedemarch@gmail.com 1 Outline evolutionary experimental design in high-dimensional space and costly experimentation the microwell mixture
More informationScheduling Coflows in Datacenter Networks: Improved Bound for Total Weighted Completion Time
1 1 2 Scheduling Coflows in Datacenter Networs: Improved Bound for Total Weighted Completion Time Mehrnoosh Shafiee and Javad Ghaderi Abstract Coflow is a recently proposed networing abstraction to capture
More informationTransactional Information Systems:
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery Gerhard Weikum and Gottfried Vossen 2002 Morgan Kaufmann ISBN 1-55860-508-8 Teamwork is essential.
More informationStructural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128 Pierre-Alain Fouque 1 Jérémy Jean 2 Thomas Peyrin 3 1 Université de Rennes 1, France 2 École Normale Supérieure, France 3 Nanyang
More informationOn the Approximability of Partial VC Dimension
On the Approximability of Partial VC Dimension Cristina Bazgan 1 Florent Foucaud 2 Florian Sikora 1 1 LAMSADE, Université Paris Dauphine, CNRS France 2 LIMOS, Université Blaise Pascal, Clermont-Ferrand
More informationAlgorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling.
Algorithm Design Scheduling Algorithms Part 2 Parallel machines. Open-shop Scheduling. Job-shop Scheduling. 1 Parallel Machines n jobs need to be scheduled on m machines, M 1,M 2,,M m. Each machine can
More informationEfficient Reassembling of Graphs, Part 1: The Linear Case
Efficient Reassembling of Graphs, Part 1: The Linear Case Assaf Kfoury Boston University Saber Mirzaei Boston University Abstract The reassembling of a simple connected graph G = (V, E) is an abstraction
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationOn Selfish Behavior in CSMA/CA Networks
On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most
More informationSieving for Shortest Vectors in Ideal Lattices:
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective Joppe W. Bos Microsoft Research LACAL@RISC Seminar on Cryptologic Algorithms CWI, Amsterdam, Netherlands Joint work with Michael
More informationAnnouncements. Inference. Mid-term. Inference by Enumeration. Reminder: Alarm Network. Introduction to Artificial Intelligence. V22.
Introduction to Artificial Intelligence V22.0472-001 Fall 2009 Lecture 15: Bayes Nets 3 Midterms graded Assignment 2 graded Announcements Rob Fergus Dept of Computer Science, Courant Institute, NYU Slides
More informationEditorial Manager(tm) for Data Mining and Knowledge Discovery Manuscript Draft
Editorial Manager(tm) for Data Mining and Knowledge Discovery Manuscript Draft Manuscript Number: Title: Summarizing transactional databases with overlapped hyperrectangles, theories and algorithms Article
More informationWeighted tree enumeration of cubical complexes
Ghodratollah Aalipour 1 Art Duval 2 Jeremy Martin 3 1 University of Colorado, Denver 2 University of Texas at El Paso 3 University of Kansas Joint Mathematics Meetings AMS Special Session on Algebraic
More informationCOS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018
COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2018 Secret Sharing Vault should only open if both Alice and Bob are present Vault should only open if Alice, Bob, and Charlie are
More informationMarkov properties for directed graphs
Graphical Models, Lecture 7, Michaelmas Term 2009 November 2, 2009 Definitions Structural relations among Markov properties Factorization G = (V, E) simple undirected graph; σ Say σ satisfies (P) the pairwise
More informationCS3233 Competitive i Programming
This course material is now made available for public usage. Special acknowledgement to School of Computing, National University of Singapore for allowing Steven to prepare and distribute these teaching
More informationStat 521A Lecture 18 1
Stat 521A Lecture 18 1 Outline Cts and discrete variables (14.1) Gaussian networks (14.2) Conditional Gaussian networks (14.3) Non-linear Gaussian networks (14.4) Sampling (14.5) 2 Hybrid networks A hybrid
More information(tree searching technique) (Boolean formulas) satisfying assignment: (X 1, X 2 )
Algorithms Chapter 5: The Tree Searching Strategy - Examples 1 / 11 Chapter 5: The Tree Searching Strategy 1. Ex 5.1Determine the satisfiability of the following Boolean formulas by depth-first search
More informationiretilp : An efficient incremental algorithm for min-period retiming under general delay model
iretilp : An efficient incremental algorithm for min-period retiming under general delay model Debasish Das, Jia Wang and Hai Zhou EECS, Northwestern University, Evanston, IL 60201 Place and Route Group,
More informationStrand Spaces Proving Protocols Corr. Jonathan Herzog 6 April 2001
Strand Spaces Proving Protocols Corr Jonathan Herzog 6 April 2001 Introduction 3Second part of talk given early last month Introduced class of cryptographic protocols Modeled at high level of abstraction
More informationThe Blockchain folk theorem
The Blockchain folk theorem Bruno Biais (HEC & TSE), Christophe Bisière (TSE), Matthieu Bouvard (Mc Gill & TSE), Catherine Casamatta (TSE) April 2018 What s a blockchain? Distributed ledger, records transactions
More informationEnhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee
Enhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee Faheem Zafari 1, Jian Li 2, Kin K. Leung 1, Don Towsley 2, Ananthram Swami 3 1 Imperial College London 2 University
More informationON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat
ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS Michael G. Rabbat Dept. of Electrical and Computer Engineering McGill University, Montréal, Québec Email: michael.rabbat@mcgill.ca ABSTRACT This paper
More information