Skip to main content

Showing 1–18 of 18 results for author: Trehan, A

.
  1. arXiv:2403.02198  [pdf, ps, other

    cs.DM cs.CC cs.CE

    Payment Scheduling in the Interval Debt Model

    Authors: Tom Friedetzky, David C. Kutner, George B. Mertzios, Iain A. Stewart, Amitabh Trehan

    Abstract: The network-based study of financial systems has received considerable attention in recent years but has seldom explicitly incorporated the dynamic aspects of such systems. We consider this problem setting from the temporal point of view and introduce the Interval Debt Model (IDM) and some scheduling problems based on it, namely: Bankruptcy Minimization/Maximization, in which the aim is to produce… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 30 pages, 17 figures

  2. arXiv:2305.14178  [pdf, other

    cs.DC cs.DS

    A Distributed Conductance Tester Without Global Information Collection

    Authors: Tugkan Batu, Amitabh Trehan, Chhaya Trehan

    Abstract: We propose a simple and time-optimal algorithm for property testing a graph for its conductance in the CONGEST model. Our algorithm takes only $O(\log n)$ rounds of communication (which is known to be optimal), and consists of simply running multiple random walks of $O(\log n)$ length from a certain number of random sources, at the end of which nodes can decide if the underlying network is a good… ▽ More

    Submitted 10 March, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

  3. arXiv:2009.05776  [pdf, other

    cs.DC cs.DM cs.DS cs.NI

    Terminating cases of flooding

    Authors: Walter Hussak, Amitabh Trehan

    Abstract: Basic synchronous flooding proceeds in rounds. Given a finite undirected (network) graph $G$, a set of sources $I \subseteq G$ initiate flooding in the first round by every node in $I$ sending the same message to all of its neighbours. In each subsequent round, nodes send the message to all of their neighbours from which they did not receive the message in the previous round. Flooding terminates w… ▽ More

    Submitted 12 September, 2020; originally announced September 2020.

    Comments: Submitted for journal publication. 26 pages. Related to arXiv:1907.07078, https://doi.org/10.4230/LIPIcs.STACS.2020.17, and https://doi.org/10.1145/3293611.3331586

    MSC Class: 68W15; 68W40; 68R10; 05C85; 05C38 ACM Class: G.2.2; F.2.2; E.1; C.2; C.2.4

  4. arXiv:1907.07078  [pdf, other

    cs.DS cs.DC cs.DM

    On The Termination of a Flooding Process

    Authors: Walter Hussak, Amitabh Trehan

    Abstract: Flooding is among the simplest and most fundamental of all distributed network algorithms. A node begins the process by sending a message to all its neighbours and the neighbours, in the next round forward the message to all the neighbours they did not receive the message from and so on. We assume that the nodes do not keep a record of the flooding event. We call this amnesiac flooding (AF). Since… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

    Comments: A summary to appear as a Brief Announcement at ACM PODC'19. Full version under submission

  5. Contextual and Granular Policy Enforcement in Database-backed Applications

    Authors: Abhishek Bichhawat, Matt Fredrikson, Jean Yang, Akash Trehan

    Abstract: Database-backed applications rely on inlined policy checks to process users' private and confidential data in a policy-compliant manner as traditional database access control mechanisms cannot enforce complex policies. However, application bugs due to missed checks are common in such applications, which result in data breaches. While separating policy from code is a natural solution, many data pro… ▽ More

    Submitted 13 March, 2020; v1 submitted 20 November, 2018; originally announced November 2018.

  6. arXiv:1803.03042  [pdf, other

    cs.DC

    Some Problems in Compact Message Passing

    Authors: Armando Castañeda, Jonas Lefèvre, Amitabh Trehan

    Abstract: This paper seeks to address the question of designing distributed algorithms for the setting of compact memory i.e. sublinear bits working memory for arbitrary connected networks. The nodes in our networks may have much lower internal memory as compared to the number of their possible neighbours implying that a node may not be able to store all the IDs of its neighbours. These algorithms are usefu… ▽ More

    Submitted 21 May, 2018; v1 submitted 8 March, 2018; originally announced March 2018.

    Comments: 22 pages, 5 figures, submitted to DISC 2018

    ACM Class: E.1; H.3.4; C.2.1; C.2.4; G.2.2

  7. arXiv:1508.04234  [pdf, other

    cs.DC cs.DS cs.NI

    Compact Routing Messages in Self-Healing Trees

    Authors: Armando Castaneda, Danny Dolev, Amitabh Trehan

    Abstract: Existing compact routing schemes, e.g., Thorup and Zwick [SPAA 2001] and Chechik [PODC 2013], often have no means to tolerate failures, once the system has been setup and started. This paper presents, to our knowledge, the first self-healing compact routing scheme. Besides, our schemes are developed for low memory nodes, i.e., nodes need only $O(\log^2 n)$ memory, and are thus, compact schemes.… ▽ More

    Submitted 18 August, 2015; originally announced August 2015.

    Comments: Under Submission

    ACM Class: E.1; H.3.4; C.2.1; C.2.4; G.2.2

  8. arXiv:1305.4675  [pdf, other

    cs.DS cs.DC cs.NI

    Algorithms for Self-Healing Networks

    Authors: Amitabh Trehan

    Abstract: Many modern networks are \emph{reconfigurable}, in the sense that the topology of the network can be changed by the nodes in the network. For example, peer-to-peer, wireless and ad-hoc networks are reconfigurable. More generally, many social networks, such as a company's organizational chart; infrastructure networks, such as an airline's transportation network; and biological networks, such as the… ▽ More

    Submitted 20 May, 2013; originally announced May 2013.

    Comments: Ph.D. Dissertation. University of New Mexico Computer Science, May 2010

  9. arXiv:1210.4822  [pdf, ps, other

    cs.DS cs.DC

    Sublinear Bounds for Randomized Leader Election

    Authors: Shay Kutten, Gopal Pandurangan, David Peleg, Peter Robinson, Amitabh Trehan

    Abstract: This paper concerns {\em randomized} leader election in synchronous distributed networks. A distributed leader election algorithm is presented for complete $n$-node networks that runs in O(1) rounds and (with high probability) uses only $O(\sqrt{n}\log^{3/2} n)$ messages to elect a unique leader (with high probability). When considering the "explicit" variant of leader election where eventually ev… ▽ More

    Submitted 15 May, 2013; v1 submitted 17 October, 2012; originally announced October 2012.

    Comments: Best Paper Award winner at ICDCN 2013, CDCN 2013 14th International Conference on Distributed Computing and Networking. Tata Institute of Fundamental Research, Mumbai, India

  10. arXiv:1208.1454  [pdf, ps, other

    cs.DC cs.DS

    Dense Subgraphs on Dynamic Networks

    Authors: Atish Das Sarma, Ashwin Lall, Danupon Nanongkai, Amitabh Trehan

    Abstract: In distributed networks, it is often useful for the nodes to be aware of dense subgraphs, e.g., such a dense subgraph could reveal dense subtructures in otherwise sparse graphs (e.g. the World Wide Web or social networks); these might reveal community clusters or dense regions for possibly maintaining good communication infrastructure. In this work, we address the problem of self-awareness of node… ▽ More

    Submitted 7 August, 2012; originally announced August 2012.

    Comments: To appear in the 26th International Symposium on Distributed Computing (DISC 2012)

    ACM Class: C.2.4; F.0; F.2.2; G.2.2

  11. arXiv:1206.1522  [pdf, other

    cs.DC cs.DS

    DEX: Self-healing Expanders

    Authors: Gopal Pandurangan, Peter Robinson, Amitabh Trehan

    Abstract: We present a fully-distributed self-healing algorithm DEX, that maintains a constant degree expander network in a dynamic setting. To the best of our knowledge, our algorithm provides the first efficient distributed construction of expanders --- whose expansion properties hold {\em deterministically} --- that works even under an all-powerful adaptive adversary that controls the dynamic changes to… ▽ More

    Submitted 21 October, 2013; v1 submitted 7 June, 2012; originally announced June 2012.

    MSC Class: 68W15 ACM Class: C.2.4; E.1; G.2.2

  12. arXiv:1202.2466  [pdf, other

    cs.DC cs.DS

    Self-healing systems and virtual structures

    Authors: Amitabh Trehan

    Abstract: Modern networks are large, highly complex and dynamic. Add to that the mobility of the agents comprising many of these networks. It is difficult or even impossible for such systems to be managed centrally in an efficient manner. It is imperative for such systems to attain a degree of self-management. Self-healing i.e. the capability of a system in a good state to recover to another good state in f… ▽ More

    Submitted 6 June, 2012; v1 submitted 11 February, 2012; originally announced February 2012.

  13. arXiv:1108.5893  [pdf, ps, other

    cs.DC cs.DS cs.NI

    Edge-preserving self-healing: kee** network backbones densely connected

    Authors: Atish Das Sarma, Amitabh Trehan

    Abstract: Healing algorithms play a crucial part in distributed P2P networks where failures occur continuously and frequently. Several self-healing algorithms have been suggested recently [IPDPS'08, PODC'08, PODC'09, PODC'11] in a line of work that has yielded gradual improvements in the properties ensured on the graph. This work motivates a strong general phenomenon of edge-preserving healing that aims at… ▽ More

    Submitted 30 August, 2011; originally announced August 2011.

    Comments: Submitted to IEEE InfoComm

  14. arXiv:1105.5255  [pdf, other

    cs.GT cs.CY cs.DC

    Composition Games for Distributed Systems: the EU Grant games

    Authors: Shay Kutten, Ron Lavi, Amitabh Trehan

    Abstract: We analyze ways by which people decompose into groups in distributed systems. We are interested in systems in which an agent can increase its utility by connecting to other agents, but must also pay a cost that increases with the size of the sys- tem. The right balance is achieved by the right size group of agents. We formulate and analyze three intuitive and realistic games and show how simple ch… ▽ More

    Submitted 20 May, 2013; v1 submitted 26 May, 2011; originally announced May 2011.

    Comments: Accepted at AAAI 2013: Twenty-Seventh Conference on Artificial Intelligence, Bellevue, Washington, USA

  15. arXiv:1104.0882  [pdf, ps, other

    cs.DS cs.DC cs.NI

    Xheal: Localized Self-healing using Expanders

    Authors: Gopal Pandurangan, Amitabh Trehan

    Abstract: We consider the problem of self-healing in reconfigurable networks (e.g. peer-to-peer and wireless mesh networks) that are under repeated attack by an omniscient adversary and propose a fully distributed algorithm, Xheal that maintains good expansion and spectral properties of the network, also kee** the network connected. Moreover, Xheal does this while allowing only low stretch and degree incr… ▽ More

    Submitted 5 April, 2011; originally announced April 2011.

    Comments: A shorter version of this to be presented at PODC, 2011, San Jose, CA

    ACM Class: C.2.1; C.2.4; C.4; E.1; G.2.2; G.3; H.3.4

  16. arXiv:0902.2501  [pdf, other

    cs.DS cs.DC

    The Forgiving Graph: A distributed data structure for low stretch under adversarial attack

    Authors: Tom Hayes, Jared Saia, Amitabh Trehan

    Abstract: We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that, over a sequence of rounds, an adversary either inserts a node with arbitrary connections or deletes an arbitrary node from the network. The network responds to each such change by quick "repairs," which consist of adding or deleting a small number of edges.… ▽ More

    Submitted 14 February, 2009; originally announced February 2009.

    Comments: Submitted to Principles of Distributed Computing (PODC) 2009

    ACM Class: C.2.1; C.2.3; C.2.4; C.4; H.3.4

    Journal ref: Distributed Computing, 2012, Volume 25, Number 4, Pages 261-278

  17. arXiv:0802.3267  [pdf, other

    cs.DC cs.NI

    The Forgiving Tree: A Self-Healing Distributed Data Structure

    Authors: Tom Hayes, Navin Rustagi, Jared Saia, Amitabh Trehan

    Abstract: We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up to n rounds where n is the total number of nodes initially in the network: the adversary deletes an arbitrary node from the network, then the network responds by quickly adding a small number of new edges. We present a… ▽ More

    Submitted 22 February, 2008; originally announced February 2008.

    Comments: Submitted to Principles of Distributed Computing (PODC) 2008

    ACM Class: C.2.1; C.2.3; C.2.4; C.4; H.3.4

    Journal ref: PODC '08: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. 2008, pages 203--212

  18. Picking up the Pieces: Self-Healing in Reconfigurable Networks

    Authors: Jared Saia, Amitabh Trehan

    Abstract: We consider the problem of self-healing in networks that are reconfigurable in the sense that they can change their topology during an attack. Our goal is to maintain connectivity in these networks, even in the presence of repeated adversarial node deletion, by carefully adding edges after each attack. We present a new algorithm, DASH, that provably ensures that: 1) the network stays connected e… ▽ More

    Submitted 24 January, 2008; originally announced January 2008.

    Comments: To be presented at IPDPS (IEEE International Parallel & Distributed Processing Symposium) 2008

    ACM Class: C.2.1; C.2.3; C.2.4; C.4; H.3.4