Repository logo
  • English
  • Catalร 
  • ฤŒeลกtina
  • Deutsch
  • Espaรฑol
  • Franรงais
  • Gร idhlig
  • Latvieลกu
  • Magyar
  • Nederlands
  • Polski
  • Portuguรชs
  • Portuguรชs do Brasil
  • Suomi
  • Svenska
  • Tรผrkรงe
  • าšะฐะทะฐา›
  • เฆฌเฆพเฆ‚เฆฒเฆพ
  • เคนเคฟเค‚เคฆเฅ€
  • ฮ•ฮปฮปฮทฮฝฮนฮบฮฌ
  • Yะบั€ะฐั—ฬะฝััŒะบะฐ
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Catalร 
  • ฤŒeลกtina
  • Deutsch
  • Espaรฑol
  • Franรงais
  • Gร idhlig
  • Latvieลกu
  • Magyar
  • Nederlands
  • Polski
  • Portuguรชs
  • Portuguรชs do Brasil
  • Suomi
  • Svenska
  • Tรผrkรงe
  • าšะฐะทะฐา›
  • เฆฌเฆพเฆ‚เฆฒเฆพ
  • เคนเคฟเค‚เคฆเฅ€
  • ฮ•ฮปฮปฮทฮฝฮนฮบฮฌ
  • Yะบั€ะฐั—ฬะฝััŒะบะฐ
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Hou, Ruomu"

Now showing 1 - 3 of 3
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Achieving Sublinear Complexity under Constant ๐‘‡ in ๐‘‡ -interval Dynamic Networks
    (2022-05-26) Hou, Ruomu; Jahja, Irvan; Sun, Yucheng; Wu, Jiyan; Yu, Haifeng
    This paper considers standard {\em $T$-interval dynamic networks}, where the $N$ nodes in the network proceed in lock-step {\em rounds}, and where the topology of the network can change arbitrarily from round to round, as determined by an {\em adversary}. The adversary promises that in every $T$ consecutive rounds, the $T$ (potentially different) topologies in those $T$ rounds contain a common connected subgraph that spans all nodes. Within such a context, we propose novel algorithms for solving some fundamental distributed computing problems such as Count/Consensus/Max. Our algorithms are the first algorithms whose complexities do not contain an $\Omega(N)$ term, under constant $T$ values. Previous sublinear algorithms require significantly larger $T$ values.
  • No Thumbnail Available
    Item
    On the Power of Randomization in Distributed Algorithms in Dynamic Networks with Adaptive Adversaries*
    (2020-09-16) Jahja, Irvan; Yu, Haifeng; Hou, Ruomu
    This paper investigates the power of randomization in general distributed algorithms in dynamic networks where the networkโ€™s topology may evolve over time, as determined by some adaptive adversary. In such a context, randomization may help algorithms to better deal with i) โ€œbadโ€ inputs to the algorithm, and ii) evolving topologies generated by โ€œbadโ€ adaptive adversaries. We prove that randomness offers limited power to better deal with โ€œbadโ€ adaptive adversary. We define a simple notion of prophetic adversary for determining the evolving topologies. Such an adversary accurately predicts all randomness in the algorithm beforehand, and hence the randomness will be useless against โ€œbadโ€ prophetic adversaries. Given a randomized algorithm P whose time complexity satisfies some mild conditions, we prove that P can always be converted to a new algorithm Q with comparable time complexity, even when Q runs against prophetic adversaries. This
  • No Thumbnail Available
    Item
    Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains
    (2023-04-06) Hou, Ruomu; Yu, Haifeng
    The robustness of a blockchain against the adversary is often characterized by the maximum fraction (fmax) of adversarial power that it can tolerate. While most existing blockchains can only tolerate fmax < 0.5 or lower, there are some blockchain systems that are able to tolerate a malicious majority, namely fmax >= 0.5. A key price paid by such blockchains, however, is their large confirmation latency. This work aims to significantly reduce the confirmation latency in such blockchains, under the common case where the actual fraction f of adversarial power is relatively small. To this end, we propose a novel blockchain called FLINT. FLINT tolerates fmax >= 0.5 and can give optimistic execution (i.e., fast confirmation) whenever f is relatively small. Our experiments show that the fast confirmation in FLINT only takes a few minutes, as compared to several hours of confirmation latency in prior works.

DSpace software copyright ยฉ 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback