Skip to main content

Showing 1–29 of 29 results for author: Boykin, P O

.
  1. arXiv:1004.2308  [pdf, ps, other

    cs.DC

    Addressing the P2P Bootstrap Problem for Small Networks

    Authors: David Isaac Wolinsky, Pierre St. Juste, P. Oscar Boykin, Renato Figueiredo

    Abstract: P2P overlays provide a framework for building distributed applications consisting of few to many resources with features including self-configuration, scalability, and resilience to node failures. Such systems have been successfully adopted in large-scale services for content delivery networks, file sharing, and data storage. In small-scale systems, they can be useful to address privacy concerns… ▽ More

    Submitted 13 April, 2010; originally announced April 2010.

  2. arXiv:1002.0865  [pdf, ps, other

    cs.DC cs.HC

    Towards Social Profile Based Overlays

    Authors: David Isaac Wolinsky, Pierre St. Juste, P. Oscar Boykin, Renato Figueiredo

    Abstract: Online social networking has quickly become one of the most common activities of Internet users. As social networks evolve, they encourage users to share more information, requiring the users, in turn, to place more trust into social networks. Peer-to-peer (P2P) overlays provide an environment that can return ownership of information, trust, and control to the users, away from centralized third-… ▽ More

    Submitted 3 February, 2010; originally announced February 2010.

  3. arXiv:1001.2575  [pdf, ps, other

    cs.NI cs.DC

    On the Design and Implementation of Structured P2P VPNs

    Authors: David Isaac Wolinsky, Linton Abraham, Kyungyong Lee, Yonggang Liu, Jiangyan Xu, P. Oscar Boykin, Renato Figueiredo

    Abstract: Centralized Virtual Private Networks (VPNs) when used in distributed systems have performance constraints as all traffic must traverse through a central server. In recent years, there has been a paradigm shift towards the use of P2P in VPNs to alleviate pressure placed upon the central server by allowing participants to communicate directly with each other, relegating the server to handling sess… ▽ More

    Submitted 14 January, 2010; originally announced January 2010.

  4. arXiv:1001.2569  [pdf, ps, other

    cs.NI cs.DC

    Virtual Private Overlays: Secure Group Commounication in NAT-Constrained Environments

    Authors: David Isaac Wolinsky, Kyungyong Lee, Tae Woong Choi, P. Oscar Boykin, Renato Figueiredo

    Abstract: Structured P2P overlays provide a framework for building distributed applications that are self-configuring, scalable, and resilient to node failures. Such systems have been successfully adopted in large-scale Internet services such as content delivery networks and file sharing; however, widespread adoption in small/medium scales has been limited due in part to security concerns and difficulty b… ▽ More

    Submitted 14 January, 2010; originally announced January 2010.

  5. Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education

    Authors: Renato Figueiredo, P. Oscar Boykin, Jose A. B. Fortes, Tao Li, Jie-Kwon Peir, David Wolinsky, Lizy John, David Kaeli, David Lilja, Sally McKee, Gokhan Memik, Alain Roy, Gary Tyson

    Abstract: This paper introduces Archer, a community-based computing resource for computer architecture research and education. The Archer infrastructure integrates virtualization and batch scheduling middleware to deliver high-throughput computing resources aggregated from resources distributed across wide-area networks and owned by different participating entities in a seamless manner. The paper discusse… ▽ More

    Submitted 10 July, 2008; originally announced July 2008.

    Comments: 11 pages, 2 figures. Describes the Archer project, http://archer-project.org

    ACM Class: C.0; I.6.3; C.2.4

  6. arXiv:0709.4048  [pdf, ps, other

    cs.DC cs.NI

    A Symphony Conducted by Brunet

    Authors: P. Oscar Boykin, Jesse S. A. Bridgewater, Joseph S. Kong, Kamen M. Lozev, Behnam A. Rezaei, Vwani P. Roychowdhury

    Abstract: We introduce BruNet, a general P2P software framework which we use to produce the first implementation of Symphony, a 1-D Kleinberg small-world architecture. Our framework is designed to easily implement and measure different P2P protocols over different transport layers such as TCP or UDP. This paper discusses our implementation of the Symphony network, which allows each node to keep… ▽ More

    Submitted 25 September, 2007; originally announced September 2007.

    Comments: 13 pages, 11 figures

  7. arXiv:cs/0606122  [pdf, ps, other

    cs.DC cs.NI

    Comparison of Image Similarity Queries in P2P Systems

    Authors: Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured queries are still necessary (i.e., the underlying queries do not efficiently map onto any structured framework), and are there unstructured P2P systems that can deliver the high bandwidth and computing performance necessary t… ▽ More

    Submitted 29 June, 2006; originally announced June 2006.

    Comments: To appear in IEEE P2P2006

  8. arXiv:cs/0603087  [pdf, ps, other

    cs.DC cs.NI

    IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid Computing

    Authors: Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato Figueiredo

    Abstract: Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc. In this work, we introduce IPOP, a system for creating virtual IP networks on top of a P2P overlay. IPOP enables seamless access to Grid resources spanning multiple domains by aggregating them into a virtual IP network that is c… ▽ More

    Submitted 22 March, 2006; originally announced March 2006.

    Comments: To appear in IPDPS 2006

  9. arXiv:cond-mat/0601211  [pdf, ps, other

    cond-mat.dis-nn

    Finite Percolation at a Multiple of the Threshold

    Authors: Nima Sarshar, Patrick Oscar Boykin, Vwani P. Roychowdhury

    Abstract: Bond percolation on infinite heavy-tailed power-law random networks lacks a proper phase transition; or one may say, there is a phase transition at {\em zero percolation probability}. Nevertheless, a finite size percolation threshold $q_c(N)$, where $N$ is the network size, can be defined. For such heavy-tailed networks, one can choose a percolation probability $q(N)=ρq_c(N)$ such that… ▽ More

    Submitted 9 February, 2006; v1 submitted 10 January, 2006; originally announced January 2006.

  10. arXiv:quant-ph/0511175  [pdf, ps, other

    quant-ph cs.CR cs.IT

    A Proof of the Security of Quantum Key Distribution

    Authors: Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury

    Abstract: We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.

    Submitted 17 November, 2005; originally announced November 2005.

    Comments: 64 pages; Accepted for publication in J. of Cryptology; replaces quant-ph/9912053; short version appeared in STOC'2000 pages 715-724

    Journal ref: Journal of cryptology 19, 381-439 (2006)

  11. arXiv:quant-ph/0506089  [pdf, ps, other

    quant-ph

    Mutually Unbiased Bases and Orthogonal Decompositions of Lie Algebras

    Authors: P. Oscar Boykin, Meera Sitharam, Pham Huu Tiep, Pawel Wocjan

    Abstract: We establish a connection between the problem of constructing maximal collections of mutually unbiased bases (MUBs) and an open problem in the theory of Lie algebras. More precisely, we show that a collection of m MUBs in K^n gives rise to a collection of m Cartan subalgebras of the special linear Lie algebra sl_n(K) that are pairwise orthogonal with respect to the Killing form, where K=R or K=C… ▽ More

    Submitted 10 June, 2005; originally announced June 2005.

    Comments: 13 pages

  12. arXiv:physics/0504026  [pdf, ps, other

    physics.soc-ph cond-mat.dis-nn cs.CY cs.NI

    Let Your CyberAlter Ego Share Information and Manage Spam

    Authors: Joseph S. Kong, P. Oscar Boykin, Behnam A. Rezaei, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to p… ▽ More

    Submitted 7 May, 2005; v1 submitted 4 April, 2005; originally announced April 2005.

    Comments: 13 pages, 10 figures

    Journal ref: Collaborative Spam Filtering Using E-Mail Networks, IEEE Computer, Vol. 39, No. 8, pages 67-73, 2006

  13. arXiv:cs/0504010  [pdf, ps, other

    cs.IT quant-ph

    Reversible Fault-Tolerant Logic

    Authors: P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: It is now widely accepted that the CMOS technology implementing irreversible logic will hit a scaling limit beyond 2016, and that the increased power dissipation is a major limiting factor. Reversible computing can potentially require arbitrarily small amounts of energy. Recently several nano-scale devices which have the potential to scale, and which naturally perform reversible logic, have emer… ▽ More

    Submitted 4 April, 2005; originally announced April 2005.

    Comments: 10 pages, to appear in DSN 2005

  14. arXiv:cond-mat/0504185  [pdf, ps, other

    cond-mat.stat-mech cs.DS cs.NI physics.data-an physics.soc-ph

    Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks

    Authors: Behnam A. Rezaei, Nima Sarshar, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: Susceptibility of scale free Power Law (PL) networks to attacks has been traditionally studied in the context of what may be termed as {\em instantaneous attacks}, where a randomly selected set of nodes and edges are deleted while the network is kept {\em static}. In this paper, we shift the focus to the study of {\em progressive} and instantaneous attacks on {\em reactive} grown and random PL n… ▽ More

    Submitted 11 May, 2005; v1 submitted 7 April, 2005; originally announced April 2005.

    Comments: 12 pages, to be submitted to PRE

  15. arXiv:quant-ph/0502024  [pdf, ps, other

    quant-ph

    Real Mutually Unbiased Bases

    Authors: P. Oscar Boykin, Meera Sitharam, Mohamad Tarifi, Pawel Wocjan

    Abstract: We tabulate bounds on the optimal number of mutually unbiased bases in R^d. For most dimensions d, it can be shown with relatively simple methods that either there are no real orthonormal bases that are mutually unbiased or the optimal number is at most either 2 or 3. We discuss the limitations of these methods when applied to all dimensions, shedding some light on the difficulty of obtaining ti… ▽ More

    Submitted 13 September, 2005; v1 submitted 3 February, 2005; originally announced February 2005.

    Comments: 13 pages

  16. arXiv:q-bio/0501039  [pdf, ps, other

    q-bio.MN cond-mat.dis-nn

    Functionality Encoded In Topology? Discovering Macroscopic Regulatory Modules from Large-Scale Protein-DNA Interaction Networks

    Authors: Riccardo Boscolo, Behnam A. Rezaei, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: The promise of discovering a functional blueprint of a cellular system from large-scale and high-throughput sequence and experimental data is predicated on the belief that the same top-down investigative approach that proved successful in other biological problems (e.g. DNA sequencing) will be as effective when it comes to inferring more complex intracellular processes. The results in this paper… ▽ More

    Submitted 1 March, 2005; v1 submitted 30 January, 2005; originally announced January 2005.

    Comments: 11 pages, 3 figures

  17. arXiv:quant-ph/0412028  [pdf, ps, other

    quant-ph

    Information vs. Disturbance in Dimension D

    Authors: P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: We show that for Eve to get information in one basis about a state, she must cause errors in all bases that are mutually unbiased to that basis. Our result holds in any dimension. We also show that this result holds for all functions of messages that are encrypted with a key.

    Submitted 3 December, 2004; originally announced December 2004.

    Comments: 18 pages, 1 figure

  18. Threshold Error Penalty for Fault Tolerant Computation with Nearest Neighbour Communication

    Authors: T. Szkopek, P. O. Boykin, H. Fan, V. Roychowdhury, E. Yablonovitch, G. Simms, M. Gyure, B. Fong

    Abstract: The error threshold for fault tolerant quantum computation with concatenated encoding of qubits is penalized by internal communication overhead. Many quantum computation proposals rely on nearest-neighbour communication, which requires excess gate operations. For a qubit stripe with a width of L+1 physical qubits implementing L levels of concatenation, we find that the error threshold of 2.1x10^… ▽ More

    Submitted 8 September, 2005; v1 submitted 15 November, 2004; originally announced November 2004.

    Comments: minor correction

    Journal ref: IEEE Trans. Nano., Vol. 5, No. 1, pp 42-49, 2006

  19. arXiv:cs/0411046  [pdf, ps, other

    cs.DC

    Balanced Overlay Networks (BON): Decentralized Load Balancing via Self-Organized Random Networks

    Authors: Jesse S. A. Bridgewater, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: We present a novel framework, called balanced overlay networks (BON), that provides scalable, decentralized load balancing for distributed computing using large-scale pools of heterogeneous computers. Fundamentally, BON encodes the information about each node's available computational resources in the structure of the links connecting the nodes in the network. This distributed encoding is self-o… ▽ More

    Submitted 16 January, 2006; v1 submitted 15 November, 2004; originally announced November 2004.

    Comments: 13 pages, 12 figures. Draft submitted to IEEE TPDS

    ACM Class: C.2.4

  20. A Statistical Mechanical Load Balancer for the Web

    Authors: Jesse S. A. Bridgewater, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: The maximum entropy principle from statistical mechanics states that a closed system attains an equilibrium distribution that maximizes its entropy. We first show that for graphs with fixed number of edges one can define a stochastic edge dynamic that can serve as an effective thermalization scheme, and hence, the underlying graphs are expected to attain their maximum-entropy states, which turn… ▽ More

    Submitted 6 January, 2005; v1 submitted 5 October, 2004; originally announced October 2004.

    Comments: 11 Pages, 5 Postscript figures; added references, expanded on protocol discussion

    Journal ref: Physical Review E 71, 046133, 2005

  21. arXiv:cond-mat/0406152  [pdf, ps, other

    cond-mat.dis-nn cs.NI

    Scalable Percolation Search in Power Law Networks

    Authors: Nima Sarshar, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: We introduce a scalable searching algorithm for finding nodes and contents in random networks with Power-Law (PL) and heavy-tailed degree distributions. The network is searched using a probabilistic broadcast algorithm, where a query message is relayed on each edge with probability just above the bond percolation threshold of the network. We show that if each node caches its directory via a shor… ▽ More

    Submitted 7 June, 2004; originally announced June 2004.

    Journal ref: Best paper award Fourth International Conference on Peer-to-Peer Computing, pp. 2-9, 2004

  22. arXiv:cond-mat/0402143  [pdf, ps, other

    cond-mat.dis-nn cs.NI

    Personal Email Networks: An Effective Anti-Spam Tool

    Authors: P. Oscar Boykin, Vwani Roychowdhury

    Abstract: We provide an automated graph theoretic method for identifying individual users' trusted networks of friends in cyberspace. We routinely use our social networks to judge the trustworthiness of outsiders, i.e., to decide where to buy our next car, or to find a good mechanic for it. In this work, we show that an email user may similarly use his email network, constructed solely from sender and rec… ▽ More

    Submitted 4 February, 2004; originally announced February 2004.

    Comments: 8 pages, 7 figures

    Journal ref: IEEE Computer, Vol. 38, No. 4, pages 61-68, April 2005

  23. arXiv:quant-ph/0210194  [pdf

    quant-ph

    Information Security and Quantum Mechanics: Security of Quantum Protocols

    Authors: P. Oscar Boykin

    Abstract: The problem of security of quantum key protocols is examined. In addition to the distribution of classical keys, the problem of encrypting quantum data and the structure of the operators which perform quantum encryption is studied. It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution… ▽ More

    Submitted 28 October, 2002; originally announced October 2002.

    Comments: PhD Thesis. 168 pages

  24. Algorithmic Cooling and Scalable NMR Quantum Computers

    Authors: P. Oscar Boykin, Tal Mor, Vwani Roychowdhury, Farrokh Vatan, Rutger Vrijen

    Abstract: We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxilia… ▽ More

    Submitted 18 June, 2001; originally announced June 2001.

    Comments: 21 pages, 3 figures

  25. arXiv:quant-ph/0103162  [pdf, ps, other

    quant-ph

    A new proof for the existence of mutually unbiased bases

    Authors: Somshubhro Bandyopadhyay, P. Oscar Boykin, Vwani Roychowdhury, Farrokh Vatan

    Abstract: We develop a strong connection between maximally commuting bases of orthogonal unitary matrices and mutually unbiased bases. A necessary condition of the existence of mutually unbiased bases for any finite dimension is obtained. Then a constructive proof of the existence of mutually unbiased bases for dimensions which are power of a prime is presented. It is also proved that in any dimension d t… ▽ More

    Submitted 7 September, 2001; v1 submitted 29 March, 2001; originally announced March 2001.

    Comments: Revised version. To appear in the special issue of Algorithmica on Quantum Algorithms and Quantum Cryptography

  26. Optimal Encryption of Quantum Bits

    Authors: P. Oscar Boykin, Vwani Roychowdhury

    Abstract: We characterize the complete set of protocols that may be used to securely encrypt n quantum bits using secret and random classical bits. In addition to the application of such quantum encryption protocols to quantum data security, our framework allows for generalizations of many classical cryptographic protocols to quantum data. We show that the encrypted state gives no information without the… ▽ More

    Submitted 20 March, 2000; v1 submitted 16 March, 2000; originally announced March 2000.

    Comments: 12 pages, LaTeX. Replacement fixes incorrect reference [15], otherwise identical

    Journal ref: Phys. Rev. A 67, 042317 (2003)

  27. arXiv:quant-ph/9912053  [pdf, ps, other

    quant-ph

    A Proof of the Security of Quantum Key Distribution

    Authors: Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury

    Abstract: We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.

    Submitted 10 December, 1999; originally announced December 1999.

  28. arXiv:quant-ph/9907067  [pdf, ps, other

    quant-ph

    Algorithms on Ensemble Quantum Computers

    Authors: P. Oscar Boykin, Tal Mor, Vwani Roychowdhury, Farrokh Vatan

    Abstract: In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms… ▽ More

    Submitted 21 July, 1999; originally announced July 1999.

    Comments: 16 pages, 4 figures

  29. arXiv:quant-ph/9906054  [pdf, ps, other

    quant-ph

    On Universal and Fault-Tolerant Quantum Computing

    Authors: P. Oscar Boykin, Tal Mor, Matthew Pulver, Vwani Roychowdhury, Farrokh Vatan

    Abstract: A novel universal and fault-tolerant basis (set of gates) for quantum computation is described. Such a set is necessary to perform quantum computation in a realistic noisy environment. The new basis consists of two single-qubit gates (Hadamard and ${σ_z}^{1/4}$), and one double-qubit gate (Controlled-NOT). Since the set consisting of Controlled-NOT and Hadamard gates is not universal, the new ba… ▽ More

    Submitted 15 June, 1999; originally announced June 1999.

    Comments: 10 pages, Latex. Emails addresses {boykin, talmo, pulver, vwani, vatan}@ee.ucla.edu