Show simple item record

dc.contributor.authorFernández, A.en
dc.contributor.authorLópez, L.en
dc.contributor.authorSantos, Agustínen
dc.contributor.authorGeorgiou, Chryssisen
dc.creatorFernández, A.en
dc.creatorLópez, L.en
dc.creatorSantos, Agustínen
dc.creatorGeorgiou, Chryssisen
dc.date.accessioned2019-11-13T10:40:04Z
dc.date.available2019-11-13T10:40:04Z
dc.date.issued2006
dc.identifier.isbn0-7695-2677-2
dc.identifier.isbn978-0-7695-2677-5
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/53939
dc.description.abstractIn this work we consider a distributed system formed by a master processor and a collection of n processors (workers) that can execute tasksen
dc.description.abstractworker processors are untrusted and might act maliciously. The master assigns tasks to workers to be executed. Each task returns a binary value, and we want the master to accept only correct values with high probability. Furthermore, we assume that the service provided by the workers is not freeen
dc.description.abstractfor each task that a worker is assigned, the master is charged with a work-unit. Therefore, considering a single task assigned to several workers, our goal is to have the master computer to accept the correct value of the task with high probability, with the smallest possible amount of work (number of workers the master assigns the task). We explore two ways of bounding the number of faulty processors: (a) we consider a fixed bound f < n/2 on the maximum number of workers that may fail, and (b) a probability p < 1/2 of any processor to be faulty (all processors are faulty with probability p, independently of the rest of processors). Our work demonstrates that it is possible to obtain high probability of correct acceptance with low work. In particular, by considering both mechanisms of bounding the number of malicious workers, we first show lower bounds on the minimum amount of (expected) work required, so that any algorithm accepts the correct value with probability of success 1 - ε, where ε ≪ 1 (e.g., 1/n). Then we develop and analyze two algorithms, each using a different decision strategy, and show that both algorithms obtain the same probability of success 1 - ε, and in doing so, they require similar upper bounds on the (expected) work. Furthermore, under certain conditions, these upper bounds are asymptotically optimal with respect to our lower bounds. © 2006 IEEE.en
dc.sourceProceedings of the IEEE Symposium on Reliable Distributed Systemsen
dc.source25th IEEE Symposium on Reliable Distributed Systems, SRDS 2006en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-38949162207&doi=10.1109%2fSRDS.2006.40&partnerID=40&md5=fe5b4caa9de40d586696d9e8c23f04d7
dc.subjectDistributed computer systemsen
dc.subjectDecision theoryen
dc.subjectFault toleranceen
dc.subjectProgram processorsen
dc.subjectBlocking probabilityen
dc.subjectDecision strategyen
dc.subjectFaulty processorsen
dc.subjectSoftware reliabilityen
dc.subjectUntrusted entitiesen
dc.titleReliably executing tasks in the presence of untrusted entitiesen
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.identifier.doi10.1109/SRDS.2006.40
dc.description.startingpage39
dc.description.endingpage48
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeConference Objecten
dc.description.notes<p>Sponsors: IEEE Comput. Soc. Technical Committee on Distributed Processingen
dc.description.notesConference code: 71348en
dc.description.notesCited By :20</p>en
dc.contributor.orcidGeorgiou, Chryssis [0000-0003-4360-0260]
dc.contributor.orcidFernández Anta, Antonio [0000-0001-6501-2377]
dc.gnosis.orcid0000-0003-4360-0260
dc.gnosis.orcid0000-0001-6501-2377


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record