Show simple item record

dc.contributor.authorGeorgiou, Chryssisen
dc.contributor.authorShvartsman, Alex Allisteren
dc.creatorGeorgiou, Chryssisen
dc.creatorShvartsman, Alex Allisteren
dc.date.accessioned2019-11-13T10:40:14Z
dc.date.available2019-11-13T10:40:14Z
dc.date.issued2011
dc.identifier.issn2155-1634
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/54015
dc.source.urihttp://dx.doi.org/10.2200/S00376ED1V01Y201108DCT007
dc.source.urihttp://find.shef.ac.uk/openurl/44SFD/44SFD_services_page?u.ignore_date_coverage=true&rft.mms_id=9973937490001441
dc.subjectAlgorithmsen
dc.subjectComputer networksen
dc.subjectfault-toleranceen
dc.subjectElectronic data processing -- Distributed processingen
dc.subjectalgorithmicsen
dc.subjectAlgorithms -- Congressesen
dc.subjectcomplexity and lower boundsen
dc.subjectComputational complexity -- Congressesen
dc.subjectCOMPUTERS -- Client-Server Computingen
dc.subjectcooperative computingen
dc.subjectdistributed computingen
dc.subjectElectronic data processing -- Distributed processing -- Mathematical modelsen
dc.titleCooperative task-oriented computing : algorithms and complexityen
dc.typeinfo:eu-repo/semantics/article
dc.description.startingpage1
dc.description.endingpageonline
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeArticleen
dc.description.notes<p>ID: 758en
dc.description.notesIncludes bibliographical references (pages 141-148) and index.en
dc.description.notesElectronic book available in PDF format.en
dc.description.notesAlso available in print.en
dc.description.notesMode of access: World Wide Web.en
dc.description.notesSystem requirements: Adobe Acrobat Reader.en
dc.description.notesContents: 1. Introduction -- 1.1 Motivation and landscape -- 1.2 Book roadmap and conventions -- 1.2.1 Roadmap -- 1.2.2 Conventions.en
dc.description.notesContents: 2. Distributed cooperation and adversity -- 2.1 Distributed computing and efficiency -- 2.2 Cooperation problem: do-all computing -- 2.3 Computation and adversarial settings -- 2.4 Fault tolerance, efficiency, and lower bounds -- 2.5 Bibliographic notes.en
dc.description.notesContents: 3. Paradigms and techniques -- 3.1 Algorithmic paradigms -- 3.1.1 Global allocation paradigm -- 3.1.2 Local allocation paradigm -- 3.1.3 Hashed allocation paradigm -- 3.2 Algorithmic techniques in the shared-memory model -- 3.2.1 Basic techniques for implementing allocation paradigms -- 3.2.2 Techniques for improving algorithm efficiency -- 3.3 Algorithmic techniques in the message-passing model -- 3.3.1 Basic techniques for implementing allocation paradigms -- 3.3.2 Techniques for improving algorithm efficiency -- 3.4 Exercises -- 3.5 Bibliographic notes.en
dc.description.notesContents: 4. Shared-memory algorithms -- 4.1 Algorithm W -- 4.1.1 Description of algorithm W -- 4.1.2 Analysis of algorithm W -- 4.1.3 Improving efficiency with oversaturation -- 4.2 Algorithm X -- 4.2.1 Description of algorithm X -- 4.2.2 Analysis of algorithm X -- 4.3 Algorithm Groote -- 4.3.1 A high-level view of the algorithm -- 4.3.2 The algorithm for p = 2k and n = mk -- 4.4 Algorithm AWt -- 4.4.1 Contention of permutations -- 4.4.2 Description of algorithm AWt -- 4.4.3 Analysis of algorithm AWt -- 4.5 Algorithm TwoLevelAW -- 4.5.1 Description of algorithm TLAW(q, t) -- 4.5.2 Analysis of algorithm TLAW(q, t) -- 4.6 Exercises -- 4.7 Bibliographical notes.en
dc.description.notesContents: 5. Message-passing algorithms -- 5.1 Solving do-all through shared-memory -- 5.1.1 Message-passing setting, quorums, and adversity -- 5.1.2 Shared-memory emulation service AM -- 5.1.3 The message-passing algorithm Xmp -- 5.1.4 Algorithm analysis -- 5.2 Algorithm AN -- 5.2.1 Data structures and phases of algorithm AN -- 5.2.2 Details of algorithm AN -- 5.2.3 Analysis of algorithm AN -- 5.3 Algorithm GKS -- 5.3.1 The gossip problem -- 5.3.2 Combinatorial tools -- 5.3.3 The gossip algorithm -- 5.3.4 The do-all algorithm -- 5.4 Algorithms KSaw and KSpa -- 5.4.1 Adversarial model, complexity and lower bounds -- 5.4.2 Family of deterministic algorithms KSaw -- 5.4.3 Algorithm KSpa -- 5.5 Exercises -- 5.6 Bibliographical notes.en
dc.description.notesContents: 6. The do-all problem in other settings -- 6.1 Do-all with Byzantine processors -- 6.2 Do-all with broadcast channels -- 6.3 Do-all in partitionable networks -- 6.4 Do-all in the absence of communication.en
dc.description.notesContents: Bibliography -- Authors' biographies -- Index.en
dc.description.notesSummary: Cooperative network supercomputing is becoming increasingly popular for harnessing the power of the global Internet computing platform. A typical Internet supercomputer consists of a master computer or server and a large number of computers called workers, performing computation on behalf of the master. Despite the simplicity and benefits of a single master approach, as the scale of such computing environments grows, it becomes unrealistic to assume the existence of the infallible master that is able to coordinate the activities of multitudes of workers. Large-scale distributed systems are inherently dynamic and are subject to perturbations, such as failures of computers and network links, thus it is also necessary to consider fully distributed peer-to-peer solutions. We present a study of cooperative computing with the focus on modeling distributed computing settings, algorithmic techniques enabling one to combine efficiency and fault-tolerance in distributed systems, and the exposition of trade-offs between efficiency and fault-tolerance for robust cooperative computing. The focus of the exposition is on the abstract problem, called Do-All, and formulated in terms of a system of cooperating processors that together need to perform a collection of tasks in the presence of adversity. Our presentation deals with models, algorithmic techniques, and analysis. Our goal is to present the most interesting approaches to algorithm design and analysis leading to many fundamental results in cooperative distributed computing. The algorithms selected for inclusion are among the most efficient that additionally serve as good pedagogical examples. Each chapter concludes with exercises and bibliographic notes that include a wealth of references to related work and relevant advanced results.</p>en
dc.contributor.orcidGeorgiou, Chryssis [0000-0003-4360-0260]
dc.gnosis.orcid0000-0003-4360-0260


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record