Distributed Computing and Systems Research Group
Distributed Computing and Systems
ABOUT
RESEARCH
EDUCATION
PUBLICATIONS
CONTACT
PEOPLE

ABOUT | Seminar

Seminars 2010 | Archived Seminars | Back to About

The group runs a weekly seminar series, covering papers, projects, and events related with our research. These seminars are open to anyone on Chalmers or GU who wishes to attend.

Seminars 2010

Current seminar series coordinator: Daniel Cederman.


iCalendar

RSS Feed
DateTimeLocationSpeakerRefreshment OrganizerTitle + Abstract
Thu, Dec 1613.303320Nhan- Bloom filters
Thu, Dec 915.005128Andreas- Self-stabilizing (k,r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary state, making the system recover from errors and temporarily broken assumptions. Clustering nodes within ad-hoc networks can help forming backbones, facilitating routing, improving scaling, aggregating information, saving power and much more. We present the first self-stabilizing distributed (k,r)-clustering algorithm. A (k,r)-clustering assigns k cluster heads within r communication hops for all nodes in the network while trying to minimize the total number of cluster heads. The algorithm uses synchronous communication rounds and uses multiple paths to different cluster heads for improved security, availability and fault tolerance. The algorithm assigns, when possible, at least k cluster heads to each node within O(r) rounds from an arbitrary configuration. The set of cluster heads stabilizes, with high probability, to a local minimum within O(gr log n) rounds, where n is the size of the network and g is an upper bound on the number of nodes within 2r hops.
Thu, Dec 313.303320Georgios- Distributed approximate matching
Thu, Nov 2613.303320Farnaz- SybilGuard: Defending Against Sybil Attacks via Social Networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the system, the malicious user is able to .out vote. the honest users in collaborative tasks such as Byzantine failure defenses. This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks. Our protocol is based on the .social network. among user identities, where an edge between two identities indicates a human-established trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately-small .cut. in the graph between the sybil nodes and the honest nodes. SybilGuard exploits this property to bound the number of identities a malicious user can create. We show the effectiveness of SybilGuard both analytically and experimentally.
Thu, Nov 1113.304128Daniel- Concurrent Trees
Thu, Nov 413.303320Nhan- Concurrent Hashing
Thu, Oct 2813.303320Zhang- Mining anomalies (2)
Thu, Oct 2113.303320Zhang- Mining anomalies (1)
Thu, Oct 1413.306128Andreas- A Secure Hierarchical Model for Sensor Network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level-based hierarchical system. We compromise between the energy consumption and shortest path route by utilizing number of neighbors (NBR) of a sensor and its level in the hierarchical clustering. In addition, we design a Secure Routing Protocol for Sensor Networks (SRPSN) to safeguard the data packet passing on the sensor networks under different types of attacks. We build the secure route from the source node to sink node. The sink node is guaranteed to receive correct information using our SRPSN. We also propose a group key management scheme, which contains group communication policies, group membership requirements and an algorithm for generating a distributed group key for secure communication.
Thu, Oct 713.304128Georgios- The roommates problem revisited
"How to get a contract in the Swedish market"
Thu, Sep 3013.15EAAnthony Ephremides- Stable throughput, rate control, and delay in multi-access channels
Abstract

The quest for bridging Information-theoretic and Networking views of shared channels, like the Multi-Access Channel, has utilized many different approaches. In this talk we propose a simple framework to model a 2-user Multi-Access channel that incorporates features of Networking, like random arrivals, queueing, and stability, as well as properties of the physical layer like bit rates and multi-packet reception capability. We characterize the stable throughput region in terms of achievable rate values and explain the connections to the broader issues of rate control. We also consider a related problem of emptying a network in minimum time in terms of rate control.

Biography

Anthony Ephremides holds the Cynthia Kim Professorship of Information Technology at the Electrical and Computer Engineering Department of the University of Maryland in College Park where he holds a joint appointment at the Institute for Systems Research, of which he was among the founding members in 1986. He obtained his PhD in Electrical Engineering from Princeton University in 1971 and has been with the University of Maryland ever since. He has held various visiting positions at other Institutions (including MIT, UC Berkeley, ETH Zurich, INRIA, etc) and co-founded and co-directed a NASA-funded Center on Satellite and Hybrid Communication Networks in 1991. He has been the President of Pontos, Inc, since 1980 and has served as President of the IEEE Information Theory Society in 1987 and as a member of the IEEE Board of Directors in 1989 and 1990. He has been the General Chair and/or the Technical Program Chair of several technical conferences (including the IEEE Information Theory Symposium in1991 and 2000, the IEEE Conference on Decision and Control in 1986, the ACM Mobihoc in 2003, and the IEEE Infocom in 1999). He has served on the Editorial Board of numerous journals and was the Founding Director of the Fairchild Scholars and Doctoral Fellows Program, a University-Industry Partnership from 1981 to 1985. He has received the IEEE Donald E. Fink Prize Paper Award in 1991 and the first ACM Achievement Award for Contributions to Wireless Networking in 1996, as well as the 2000 Fred W. Ellersick MILCOM Best Paper Award, the IEEE Third Millennium Medal, the 2000 Outstanding Systems Engineering Faculty Award from the Institute for Systems Research, and the Kirwan Faculty Research and Scholarship Prize from the University of Maryland in 2001, and a few other official recognitions of his work. He also received the 2006 Aaron Wyner Award for Exceptional Service and Leadership to the IEEE Information Theory Society.

Thu, Sep 2313.304128Farnaz- Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. TDGs have recently been proposed as an alternative way to interpret and visualize network traffic. Previous studies have focused on static properties of TDGs using graph snapshots in isolation. In this work, we represent network traffic with a series of related graph instances that change over time. This representation facilitates the analysis of the dynamic nature of network traffic, providing additional descriptive power. For example, DNS and P2P graph instances can appear similar when compared in isolation, but the way the DNS and P2P TDGs change over time differs significantly. To quantify the changes over time, we introduce a series of novel metrics that capture changes both in the graph structure (e.g., the average degree) and the participants (i.e., IP addresses) of a TDG. We apply our new methodologies to improve graph-based traffic classification and to detect changes in the profile of legacy applications (e.g., e-mail).
Fri, Sep 1715.15Edit-roomElad- Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad hoc Networks

In mobile ad hoc networks (MANETs) mobile nodes do not have access to a fixed network infrastructure and they set up a communication network by themselves. MANETs require implementation of a wireless Medium Access Control (MAC) layer. Existing MAC algorithms that consider no mobility, solve the problem of eventually guaranteeing every node with a share of the communications bandwidth. In the context of MANETs, we ask: Is there an efficient MAC algorithm when mobility is considered?

MANETs are subject to transient faults, from which self-stabilizing systems can recover. The self-stabilization design criteria, and related concepts of self-*, liberate the application designer from dealing with low-level complications, and provide an important level of abstraction. Whereas stabilization criteria are important for the development of autonomous systems, adaptation is imperative for coping with a variable environment. Adapting to a variable environment requires dealing with a wide range of practical issues, such as relocation of mobile nodes and changes to the motion patterns.

This work proposes the design and proof of concept implementation of a MAC algorithm named Chameleon-MAC, which is based on a self-stabilizing algorithm by Leone et al., and uses self-* methods in order to further adapt its behavior according to the mobility characteristics of the environment. Moreover, we give an extensive treatment of the aspects and parameters that can bring the algorithm into the practical realm and we demonstrate documented behavior on real network studies (MICAz 2.4 GHz motes) as well as using simulation (TOSSIM), showing improved overhead and fault-recovery periods than existing algorithms. We expect that these advantages, besides the contribution in the algorithmic front of research, can enable quicker adoption by practitioners and faster deployment.

Mon, Sep 1313.30Edit-roomPhilippas- Rehearsal: Models of social networks
Thu, Sep 913.306128Daniel- Hopscotch Hashing
Thu, Jul 813.303364Niklas Elmqvist- Visual Representations and Interaction Techniques for Multiple Time Series

Almost all data found in the real world have a temporal component, or can be visualized with respect to time. Temporal data is prevalent in virtually all scientific domains, and permeates societal phenomena as well---examples include computer and network logs, chronological history, political poll data, stock market information, and climate measurements. One common property of this wide range of data is that the datasets tend to be large, not only in the length of the time period but also in the number of observed attributes. These problems are exacerbated by the fact that many temporal analysis tasks often involve multiple such time series.

Visualization has been suggested as a way to handle this problem, but understanding large-scale temporal datasets require both effective visual representations for viewing them as well as powerful interaction techniques for exploring them. In this talk, I will describe some of my recent and ongoing work on supporting both the visual and interactive aspects of these tasks. More specifically, I will present TraXplorer, a novel system supporting multi-focus interaction of time series data, as well as results from a study evaluating the graphical perception of viewing multiple time series simultaneously using different visual representations.

Bio
Niklas Elmqvist is an assistant professor in the School of Electrical and Computer Engineering at Purdue University in West Lafayette, USA. His research areas are information visualization, human-computer interaction, and visual analytics. He received his Ph.D. in December 2006 from Chalmers University of Technology in Gothenburg, Sweden. Before joining Purdue in August 2008, he was a postdoctoral researcher in the AVIZ group at INRIA in Paris, France, as well as a visiting scholar in the Information Interfaces research group at Georgia Tech. Prof. Elmqvist is an active participant of the scientific community in his field, and recently received the Best Paper Award at the IEEE Conference on Information Visualization. He is also a recipient of a Google research award and is a member of the VACCINE Center of Excellence in Visual Analytics.
Thu, Jun 313.303320Farnaz- A First Look at Internet Backbone Traffic for Identifying Spam
Spam is an increasing problem and current anti-spam tools are only efficient in hiding the spam from users. mailboxes. There is a clear need for moving the defense against spam as close to the spammers as possible in order to reduce problems such as the amount of unwanted traffic and waste of mail server resources. In this talk, I will present the first steps of our ongoing work on measuring email traffic on network- level in order to understand the network characteristics of spam and the network behavior of spammers, and consequently validate that spam traffic can be detected at the network level.
Thu, May 2711.00Edit-roomProf. Ricardo Jimenez-Peris- Scalable database replication
This talk will cover the latest advances in scalable database replication. During the last decade many efforts has been devoted to improve replication of databases to increase its scalability and remove the different bottlenecks. These bottlenecks are related to concurrency control, replica control, and degree of replication. Another branch of research has targeted on improving the autonomic capabilities of database replication including self-optimization, self-configuration, self-helain and self-provisioning. This talk will cover the contributions that the Distributed System Lab (LSD) has acomplished in this area and which are the still open research challenges in this field in particular to move database replication to the cloud.

Bio
Prof. Ricardo Jimenez-Peris got his PhD from UPM and then spent one year as a postdoc researcher at ETH Zurich. After coming back from his postdoctoral stay he co-founded the Distributed System Lab (LSD) that he co-directs. His research has been devoted to theory and practice of distributed systems with a strong emphasis on scalability and fault tolerance. In the last few years he has concentrated on cloud computing and more particularly on Platforms as a Service. He is currently coordinating a couple of European projects on this topic.
Thu, May 2013.305207Zhang- Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods
Rehearsal before licentiate seminar.
Wed, May 1213.303320Daniel- Supporting Lock-Free Composition of Concurrent Data Objects
Rehearsal before CF10.
Thu, May 613.303320Nhan- Garbage collector
The talk will cover one paper about a tracing garbage collection technique and consider how we can improve the idea.
Fri, Apr 3011.006128Georgios- Unstructured overlay networks with guarantees: Algorithms and evaluation methods
Rehearsal before licentiate seminar.
Thu, Apr 2213.303320Daniel- Towards a Software Transactional Memory for Graphics Processors
The introduction of general purpose computing on many-core graphics processor systems, and the general shift in the industry towards parallelism, has created a demand for ease of parallelization. Software transactional memory (STM) simplifies development of concurrent code by allowing the programmer to mark sections of code to be executed concurrently and atomically in an optimistic manner. In contrast to locks, STMs are easy to compose and do not suffer from deadlocks. We have designed and implemented two STMs for graphics processors, one blocking and one non-blocking. The design issues involved in the development of these two STMs are described and explained in the paper together with experimental results comparing the performance of the two STMs.
Thu, Apr 1513.303320Georgios- Overlays with preferences: Approximation algorithms for matching with preference lists
A key property of overlay networks, that is going to play an important part in future networking solutions, is the peers' ability to establish connections with other peers based on some suitability metric related to e.g. the node's distance, interests, recommendations, transaction history or available resources. Each node may choose individually an appropriate metric and try to connect or be matched with the available peers that it considers best. When there are no preference cycles among the peers, it has been proven that a stable matching exists, where peers have maximized the individual satisfaction gleaned of their choices. However, no such guarantees are currently being given for the cases where cycles may exist and known methods may not be able to resolve ``oscillations'' in preference-based connectivity and reach stability. In this work we present a simple yet powerful distributed algorithm that uses aggregate satisfaction as an optimization metric. The algorithm is a generalization of a known elegant approximation one-to-one matching algorithm, into the many-to-many case. We prove that the total satisfaction achieved by our algorithm is a $\frac{1}{4}\left( {1 + \frac{1}{{{b_{\max }}}}} \right)$-approximation of the maximum total satisfaction in the network, where $b_{\max}$ is the maximum number of possible connections of a peer in the overlay.
Thu, Mar 2513.305453Anders Gidenstam- Concurrent Hash-Tables and Dictionaries
Thu, Mar 1813.305128Zhang- Mitigating Distributed Denial of Capability Attacks Using Sink Tree Based Quota Allocation
Network capabilities have been proposed to prevent Distributed Denial of Service (DDoS) attacks proactively. A capability is a ticket-like token, checkable by routers, that a server can issue for legitimate traffic. Still, malicious hosts may swamp a server with requests for capability establishment, essentially causing possible Denial-of-Capability (DoC). In this paper, we propose an algorithm to mitigate DoC attacks. The algorithm divides the server's capacity for handling capability requests into quotas. Quotas are allocated based on a sink tree architecture. Randomization and Bloom filters are used as tools against threats (attacking scenarios). We both analytically and experimentally show that legitimate hosts can get service with guaranteed probability. We also address issues on fault-tolerance and the deployment of the approach proposed.
Thu, Mar 1113.305453Farnaz- Inferring Spammers in the Network Core
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern. Content-analysis techniques and blacklists, the most popular methods used to identify and block spam, are beginning to lose their edge in the battle. We argue here that one not only needs to look into the network-related characteristics of spam traffic, as has been recently suggested, but also to look deeper into the network core, to counter the increasing sophistication of spammers. At the same time, local knowledge available at a given server can often be irreplaceable in identifying specific spammers. To this end, in this paper we show how the local intelligence of mail servers can be gathered and correlated passively, scalably, and with low-processing cost at the ISP-level providing valuable network-wide information. First, we use a large network flow trace from a major national ISP, to demonstrate that the prefiltering decisions and thus spammer-related knowledge of individual mail servers can be easily and accurately tracked and combined at the flow level. Then, we argue that such aggregated knowledge not only allows ISPs to monitor remotely what their "own" servers are doing, but also to develop new methods for fighting spam.
Thu, Mar 413.305128Daniel- Closing the Complexity Gap between FCFS Mutual Exclusion and Mutual Exclusion
In this talk, I will present the paper Closing the Complexity Gap between FCFS Mutual Exclusion and Mutual Exclusion by Robert Danek and Wojciech Golab.
Thu, Feb 2512.005453Gongxi Zhu- Is there an Efficient MAC Algorithm for MANETs?
On the level of the media access control (MAC), various algorithms are developed for wireless communication, such as Slotted Aloha, p-Persistent and FAMA, etc. However, none of them was designed intentionally for the MANET. Thus, new designs are needed. This talk presents a MAC algorithm that is based on the work of Leone, Papatrianta and Schiller (AlgoSensors.09), which analytically estimates the algorithm throughput. This work presents a number of engineering improvements to the implementation of their algorithm. The throughput of our implementation is numerically (and empirically) studied under a variety of mobility model. We discover that, for many practical settings, the throughput of the studied algorithm by Leone et al. is higher than the existing implementations. Moreover, the study shows that the our implementation of the algorithm by Leone et al. has shorter stabilization and lower overheads.
Thu, Feb 1813.305453Daniel- STMs and compiler-assigned locks
In this talk, I will present the paper Compiler aided selective lock assignment for improving the performance of software transactional memory by Sandya Mannarswamy, Dhruva R. Chakrabarti, Kaushik Rajan and Sujoy Saraswati.
Thu, Feb 1113.306128Nhan- Concurrent Data Structures
In this talk, I will introduce two selected papers from Locks and Data Structures session, PPoPP 2010, namely:
Bronson, N. G., et al. A practical concurrent binary search tree.
Agrawal, K., et al. Helper locks for fork-join parallel programming.
Mon, Feb 812.00Conference RoomHenk Wymeersch- Cooperative Positioning -- Distributed Inference on Graphs

Navigation capabilities, enabled by GPS, have become an important part of our lives. Unfortunately, in GPS-challenged environments, such as indoors, in urban canyons, or under tree canopies, alternative navigation technologies need to be considered. These include inertial navigation, ultra-wide bandwidth (UWB), and Wi-Fi. Ideally, a mobile device should be able to fuse information from different sources and wireless technologies, as this can improve accuracy and coverage.

In this talk, I will describe recent efforts to leverage to position information from nearby devices to improve overall performance. This leads to so-called cooperative navigation, where mobile devices help one another navigate. The talk will comprise three components. First, I will cover the fundamental performance improvements that cooperation can yield. Secondly, I will show how to develop scalable distributed algorithms that can perform near optimal data fusion, based on the powerful framework of factor graphs. Through computer simulations, I will demonstrate that these algorithms can provide orders of magnitude performance improvements compared to non-cooperative positioning, even in large mobile, networks. Finally, to demonstrate the practical feasibility of cooperative navigation, I will describe the development of a small-scale UWB testbed on the MIT campus.

Speaker Bio

Henk Wymeersch is Assistant Professor with the Department of Signals and Systems at Chalmers University of Technology, Sweden. Prior to joining Chalmers, he was a Postdoctoral Associate with the Laboratory for Information and Decision Systems (LIDS) at the Massachusetts Institute of Technology (MIT). Henk Wymeersch obtained the Ph.D. degree in electrical engineering/applied sciences in 2005 from Ghent University, Belgium. He is author of the book .Iterative Receiver Design. (Cambridge University Press, August 2007). In 2009 he was part of a team that won the L3 Communication Award for .the practical demonstration of Bayesian UWB localization.. His research interests include algorithm design for wireless transmission, statistical inference, indoor navigation, and iterative processing.

Wed, Jan 2710.005453Daniel- Travel report PPoPP10

Top of Page



Archived Seminars

Use the following links to get access to the seminar schedules of previous years: 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000.

Top of Page





Home Distributed Computing and Systems Research Group
Chalmers university of technology, Computing Science Department
Rännvägen 6B, S-412 96, Gothenburg, Sweden (map)
Phone: +46 (0)31-772 1000 (central), +46 (0)31-16 56 55