-
SWE-agent: Agent-Computer Interfaces Enable Automated Software Engineering
Authors:
John Yang,
Carlos E. Jimenez,
Alexander Wettig,
Kilian Lieret,
Shunyu Yao,
Karthik Narasimhan,
Ofir Press
Abstract:
Language model (LM) agents are increasingly being used to automate complicated tasks in digital environments. Just as humans benefit from powerful software applications, such as integrated development environments, for complex tasks like software engineering, we posit that LM agents represent a new category of end users with their own needs and abilities, and would benefit from specially-built int…
▽ More
Language model (LM) agents are increasingly being used to automate complicated tasks in digital environments. Just as humans benefit from powerful software applications, such as integrated development environments, for complex tasks like software engineering, we posit that LM agents represent a new category of end users with their own needs and abilities, and would benefit from specially-built interfaces to the software they use. We investigate how interface design affects the performance of language model agents. As a result of this exploration, we introduce SWE-agent: a system that facilitates LM agents to autonomously use computers to solve software engineering tasks. SWE-agent's custom agent-computer interface (ACI) significantly enhances an agent's ability to create and edit code files, navigate entire repositories, and execute tests and other programs. We evaluate SWE-agent on SWE-bench and HumanEvalFix, achieving state-of-the-art performance on both with a pass@1 rate of 12.5% and 87.7%, respectively, far exceeding the previous state-of-the-art achieved with non-interactive LMs. Finally, we provide insight on how the design of the ACI can impact agents' behavior and performance.
△ Less
Submitted 30 May, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
SWE-bench: Can Language Models Resolve Real-World GitHub Issues?
Authors:
Carlos E. Jimenez,
John Yang,
Alexander Wettig,
Shunyu Yao,
Kexin Pei,
Ofir Press,
Karthik Narasimhan
Abstract:
Language models have outpaced our ability to evaluate them effectively, but for their future development it is essential to study the frontier of their capabilities. We find real-world software engineering to be a rich, sustainable, and challenging testbed for evaluating the next generation of language models. To this end, we introduce SWE-bench, an evaluation framework consisting of $2,294$ softw…
▽ More
Language models have outpaced our ability to evaluate them effectively, but for their future development it is essential to study the frontier of their capabilities. We find real-world software engineering to be a rich, sustainable, and challenging testbed for evaluating the next generation of language models. To this end, we introduce SWE-bench, an evaluation framework consisting of $2,294$ software engineering problems drawn from real GitHub issues and corresponding pull requests across $12$ popular Python repositories. Given a codebase along with a description of an issue to be resolved, a language model is tasked with editing the codebase to address the issue. Resolving issues in SWE-bench frequently requires understanding and coordinating changes across multiple functions, classes, and even files simultaneously, calling for models to interact with execution environments, process extremely long contexts and perform complex reasoning that goes far beyond traditional code generation tasks. Our evaluations show that both state-of-the-art proprietary models and our fine-tuned model SWE-Llama can resolve only the simplest issues. The best-performing model, Claude 2, is able to solve a mere $1.96$% of the issues. Advances on SWE-bench represent steps towards LMs that are more practical, intelligent, and autonomous.
△ Less
Submitted 5 April, 2024; v1 submitted 10 October, 2023;
originally announced October 2023.
-
Safety of the Intended Functionality Concept Integration into a Validation Tool Suite
Authors:
Víctor J. Expósito Jiménez,
Bernhard Winkler,
Joaquim M. Castella Triginer,
Heiko Scharke,
Hannes Schneider,
Eugen Brenner,
Georg Macher
Abstract:
Nowadays, the increasing complexity of Advanced Driver Assistance Systems (ADAS) and Automated Driving (AD) means that the industry must move towards a scenario-based approach to validation rather than relying on established technology-based methods. This new focus also requires the validation process to take into account Safety of the Intended Functionality (SOTIF), as many scenarios may trigger…
▽ More
Nowadays, the increasing complexity of Advanced Driver Assistance Systems (ADAS) and Automated Driving (AD) means that the industry must move towards a scenario-based approach to validation rather than relying on established technology-based methods. This new focus also requires the validation process to take into account Safety of the Intended Functionality (SOTIF), as many scenarios may trigger hazardous vehicle behaviour. Thus, this work demonstrates how the integration of the SOTIF process within an existing validation tool suite can be achieved. The necessary adaptations are explained with accompanying examples to aid comprehension of the approach.
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
C-STS: Conditional Semantic Textual Similarity
Authors:
Ameet Deshpande,
Carlos E. Jimenez,
Howard Chen,
Vishvak Murahari,
Victoria Graf,
Tanmay Rajpurohit,
Ashwin Kalyan,
Danqi Chen,
Karthik Narasimhan
Abstract:
Semantic textual similarity (STS), a cornerstone task in NLP, measures the degree of similarity between a pair of sentences, and has broad application in fields such as information retrieval and natural language understanding. However, sentence similarity can be inherently ambiguous, depending on the specific aspect of interest. We resolve this ambiguity by proposing a novel task called Conditiona…
▽ More
Semantic textual similarity (STS), a cornerstone task in NLP, measures the degree of similarity between a pair of sentences, and has broad application in fields such as information retrieval and natural language understanding. However, sentence similarity can be inherently ambiguous, depending on the specific aspect of interest. We resolve this ambiguity by proposing a novel task called Conditional STS (C-STS) which measures sentences' similarity conditioned on an feature described in natural language (hereon, condition). As an example, the similarity between the sentences "The NBA player shoots a three-pointer." and "A man throws a tennis ball into the air to serve." is higher for the condition "The motion of the ball" (both upward) and lower for "The size of the ball" (one large and one small). C-STS's advantages are two-fold: (1) it reduces the subjectivity and ambiguity of STS and (2) enables fine-grained language model evaluation through diverse natural language conditions. We put several state-of-the-art models to the test, and even those performing well on STS (e.g. SimCSE, Flan-T5, and GPT-4) find C-STS challenging; all with Spearman correlation scores below 50. To encourage a more comprehensive evaluation of semantic similarity and natural language understanding, we make nearly 19K C-STS examples and code available for others to train and test their models.
△ Less
Submitted 6 November, 2023; v1 submitted 24 May, 2023;
originally announced May 2023.
-
MUX-PLMs: Data Multiplexing for High-throughput Language Models
Authors:
Vishvak Murahari,
Ameet Deshpande,
Carlos E. Jimenez,
Izhak Shafran,
Mingqiu Wang,
Yuan Cao,
Karthik Narasimhan
Abstract:
The widespread adoption of large language models such as ChatGPT and Bard has led to unprecedented demand for these technologies. The burgeoning cost of inference for ever-increasing model sizes coupled with hardware shortages has limited affordable access and poses a pressing need for efficiency approaches geared towards high throughput and performance. Multi-input multi-output (MIMO) algorithms…
▽ More
The widespread adoption of large language models such as ChatGPT and Bard has led to unprecedented demand for these technologies. The burgeoning cost of inference for ever-increasing model sizes coupled with hardware shortages has limited affordable access and poses a pressing need for efficiency approaches geared towards high throughput and performance. Multi-input multi-output (MIMO) algorithms such as data multiplexing, offer a promising solution with a many-fold increase in throughput by performing inference for multiple inputs at the cost of a single input. Yet these approaches are not currently performant enough to be deployed in modern systems. We change that by develo** MUX-PLMs, a class of high throughput pre-trained language models (PLMs) trained with data multiplexing, that can be fine-tuned for any downstream task to yield high-throughput high-performance. Our novel multiplexing and demultiplexing modules proficiently entangle and disentangle inputs, and enable high-performance high throughput \muxplms{} that are competitive with vanilla PLMs while achieving 2x/5x inference speedup with only a $1-4\%$ drop on a broad suite of tasks.
△ Less
Submitted 22 May, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Triggering Conditions Analysis and Use Case for Validation of ADAS/ADS Functions
Authors:
Víctor J. Expósito Jiménez,
Helmut Martin,
Christian Schwarzl,
Georg Macher,
Eugen Brenner
Abstract:
Safety in the automotive domain is a well-known topic, which has been in constant development in the past years. The complexity of new systems that add more advanced components in each function has opened new trends that have to be covered from the safety perspective. In this case, not only specifications and requirements have to be covered but also scenarios, which cover all relevant information…
▽ More
Safety in the automotive domain is a well-known topic, which has been in constant development in the past years. The complexity of new systems that add more advanced components in each function has opened new trends that have to be covered from the safety perspective. In this case, not only specifications and requirements have to be covered but also scenarios, which cover all relevant information of the vehicle environment. Many of them are not yet still sufficient defined or considered. In this context, Safety of the Intended Functionality (SOTIF) appears to ensure the system when it might fail because of technological shortcomings or misuses by users. An identification of the plausibly insufficiencies of ADAS/ADS functions has to be done to discover the potential triggering conditions that can lead to these unknown scenarios, which might effect a hazardous behaviour. The main goal of this publication is the definition of an use case to identify these triggering conditions that have been applied to the collision avoidance function implemented in our self-developed mobile Hardware-in-Loop (HiL) platform.
△ Less
Submitted 31 January, 2023;
originally announced February 2023.
-
State of the Art Study of the Safety Argumentation Frameworks for Automated Driving System Safety
Authors:
Ilona Cieslik,
Víctor J. Expósito Jiménez,
Helmut Martin,
Heiko Scharke,
Hannes Schneider
Abstract:
The automotive industry is experiencing a transition from assisted to highly automated driving. New concepts for validation of Automated Driving System (ADS) include amongst other a shift from a "technology based" approach to a "scenario based" assessment. The safety validation and type approval process of ADS are seen as the biggest challenges for the automotive industry today. Having in mind a v…
▽ More
The automotive industry is experiencing a transition from assisted to highly automated driving. New concepts for validation of Automated Driving System (ADS) include amongst other a shift from a "technology based" approach to a "scenario based" assessment. The safety validation and type approval process of ADS are seen as the biggest challenges for the automotive industry today. Having in mind a variety of existing white papers, standardization activities and regulatory approaches, manufactures still struggle with selecting the best practices that keep aligned with their Safety Management System and Safety Culture. A step forward would be to implement a harmonized global safety assurance scheme that is compliant with relevant regulations, laws, standards, and reflects local rules. Today many communities (regulatory bodies, local authorities, industrial stake-holders) work on proof-of-concept framework for the Safety Argumentation as an answer to this problem. Unfortunately, there is still no consensus on one definitive methodology and a set of safety metrics to measure ADS safety. An objective of this summary report is to facilitate a comprehensive review and analysis of the literature concerning available methods and approaches for vehicle safety, engineering frameworks, processes of scenario-based evaluation and a vendor- and technology-neutral Safety Argumentation approaches and tools.
△ Less
Submitted 31 January, 2023;
originally announced February 2023.
-
CSRE4SOC (CSR evaluation for software companies)
Authors:
Elisa Jimenez,
Coral Calero,
Maria Ángeles Moraga
Abstract:
Software development companies are increasingly concerned about their impact on the environment. This is translated into the incorporation of actions related to software sustainability in their Corporate Social Responsibility (CSR) document. CSR reflects a company's obligations to society and the environment. However, we have found that companies do not always have the necessary knowledge to be ab…
▽ More
Software development companies are increasingly concerned about their impact on the environment. This is translated into the incorporation of actions related to software sustainability in their Corporate Social Responsibility (CSR) document. CSR reflects a company's obligations to society and the environment. However, we have found that companies do not always have the necessary knowledge to be able to include actions related to software sustainability. Moreover, there is still a lot of work to be done, as the number of actions they incorporate is often insufficient. Taking all this into account, we consider it essential for software development companies to have a tool that allows them to assess their level of software sustainability, based on the actions of their CSR, and to automatically provide them with a series of improvements to advance their level of software sustainability. Therefore, this paper introduces CSRE4SOC, a tool for the evaluation and monitoring of the software sustainability level of software development companies according to their CSR.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Deepfake histological images for enhancing digital pathology
Authors:
Kianoush Falahkheirkhah,
Saumya Tiwari,
Kevin Yeh,
Sounak Gupta,
Loren Herrera-Hernandez,
Michael R. McCarthy,
Rafael E. Jimenez,
John C. Cheville,
Rohit Bhargava
Abstract:
An optical microscopic examination of thinly cut stained tissue on glass slides prepared from a FFPE tissue blocks is the gold standard for tissue diagnostics. In addition, the diagnostic abilities and expertise of any pathologist is dependent on their direct experience with common as well as rarer variant morphologies. Recently, deep learning approaches have been used to successfully show a high…
▽ More
An optical microscopic examination of thinly cut stained tissue on glass slides prepared from a FFPE tissue blocks is the gold standard for tissue diagnostics. In addition, the diagnostic abilities and expertise of any pathologist is dependent on their direct experience with common as well as rarer variant morphologies. Recently, deep learning approaches have been used to successfully show a high level of accuracy for such tasks. However, obtaining expert-level annotated images is an expensive and time-consuming task and artificially synthesized histological images can prove greatly beneficial. Here, we present an approach to not only generate histological images that reproduce the diagnostic morphologic features of common disease but also provide a user ability to generate new and rare morphologies. Our approach involves develo** a generative adversarial network model that synthesizes pathology images constrained by class labels. We investigated the ability of this framework in synthesizing realistic prostate and colon tissue images and assessed the utility of these images in augmenting diagnostic ability of machine learning methods as well as their usability by a panel of experienced anatomic pathologists. Synthetic data generated by our framework performed similar to real data in training a deep learning model for diagnosis. Pathologists were not able to distinguish between real and synthetic images and showed a similar level of inter-observer agreement for prostate cancer grading. We extended the approach to significantly more complex images from colon biopsies and showed that the complex microenvironment in such tissues can also be reproduced. Finally, we present the ability for a user to generate deepfake histological images via a simple markup of sematic labels.
△ Less
Submitted 16 June, 2022;
originally announced June 2022.
-
CARETS: A Consistency And Robustness Evaluative Test Suite for VQA
Authors:
Carlos E. Jimenez,
Olga Russakovsky,
Karthik Narasimhan
Abstract:
We introduce CARETS, a systematic test suite to measure consistency and robustness of modern VQA models through a series of six fine-grained capability tests. In contrast to existing VQA test sets, CARETS features balanced question generation to create pairs of instances to test models, with each pair focusing on a specific capability such as rephrasing, logical symmetry or image obfuscation. We e…
▽ More
We introduce CARETS, a systematic test suite to measure consistency and robustness of modern VQA models through a series of six fine-grained capability tests. In contrast to existing VQA test sets, CARETS features balanced question generation to create pairs of instances to test models, with each pair focusing on a specific capability such as rephrasing, logical symmetry or image obfuscation. We evaluate six modern VQA systems on CARETS and identify several actionable weaknesses in model comprehension, especially with concepts such as negation, disjunction, or hypernym invariance. Interestingly, even the most sophisticated models are sensitive to aspects such as swap** the order of terms in a conjunction or varying the number of answer choices mentioned in the question. We release CARETS to be used as an extensible tool for evaluating multi-modal model robustness.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
DataMUX: Data Multiplexing for Neural Networks
Authors:
Vishvak Murahari,
Carlos E. Jimenez,
Runzhe Yang,
Karthik Narasimhan
Abstract:
In this paper, we introduce data multiplexing (DataMUX), a technique that enables deep neural networks to process multiple inputs simultaneously using a single compact representation. DataMUX demonstrates that neural networks are capable of generating accurate predictions over mixtures of inputs, resulting in increased throughput with minimal extra memory requirements. Our approach uses two key co…
▽ More
In this paper, we introduce data multiplexing (DataMUX), a technique that enables deep neural networks to process multiple inputs simultaneously using a single compact representation. DataMUX demonstrates that neural networks are capable of generating accurate predictions over mixtures of inputs, resulting in increased throughput with minimal extra memory requirements. Our approach uses two key components -- 1) a multiplexing layer that performs a fixed linear transformation to each input before combining them to create a mixed representation of the same size as a single input, which is then processed by the base network, and 2) a demultiplexing layer that converts the base network's output back into independent representations before producing predictions for each input. We show the viability of DataMUX for different architectures (Transformers, and to a lesser extent MLPs and CNNs) across six different tasks spanning sentence classification, named entity recognition and image classification. For instance, DataMUX for Transformers can multiplex up to $20$x/$40$x inputs, achieving $11$x/$18$x increase in throughput with minimal absolute performance drops of $<2\%$ and $<4\%$ respectively on MNLI, a natural language inference task. We also provide a theoretical construction for multiplexing in self-attention networks and analyze the effect of various design elements in DataMUX.
△ Less
Submitted 14 November, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Radar detection rate comparison through a mobile robot platform at the ZalaZONE proving ground
Authors:
Victor J. Exposito Jimenez,
Christian Schwarzl,
Szilard Josvai
Abstract:
Since an automotive driving vehicle is controlled by Advanced Driver-Assistance Systems (ADAS) / Automated Driving (AD) functions, the selected sensors for the perception process become a key component of the system. Therefore, the necessity of ensuring precise data is crucial. But the correctness of the data is not the only part that has to be ensured, the limitations of the different technologie…
▽ More
Since an automotive driving vehicle is controlled by Advanced Driver-Assistance Systems (ADAS) / Automated Driving (AD) functions, the selected sensors for the perception process become a key component of the system. Therefore, the necessity of ensuring precise data is crucial. But the correctness of the data is not the only part that has to be ensured, the limitations of the different technologies to accurately sense the reality must be checked for an error-free decision making according to the current scenario. In this context, this publication presents a comparison between two different automotive radars through our self-developed robot mobile platform called SPIDER, and how they can detect different kinds of objects in the tests carried out at the ZalaZONE proving ground.
△ Less
Submitted 22 October, 2020; v1 submitted 21 October, 2020;
originally announced October 2020.
-
Dynamic Buffer Sizing for Out-of-Order Event Compensation for Time-Sensitive Applications
Authors:
Wolfgang Weiss,
Victor J. Exposito Jimenez,
Herwig Zeiner
Abstract:
Today's sensor network implementations often comprise various types of nodes connected with different types of networks. These and various other aspects influence the delay of transmitting data and therefore of out-of-order data occurrences. This turns into a crucial problem in time-sensitive applications where data must be processed promptly and decisions must be reliable.
In this paper, we wer…
▽ More
Today's sensor network implementations often comprise various types of nodes connected with different types of networks. These and various other aspects influence the delay of transmitting data and therefore of out-of-order data occurrences. This turns into a crucial problem in time-sensitive applications where data must be processed promptly and decisions must be reliable.
In this paper, we were researching dynamic buffer sizing algorithms for multiple, distributed and independent sources, which reorder event streams, thus enabling subsequent time-sensitive applications to work correctly. To be able to evaluate such algorithms, we had to record datasets first. Five novel dynamic buffer sizing algorithms were implemented and compared to state-of-the-art approaches in this domain. The evaluation has shown that the use of a dynamic time-out buffering method is preferable over a static buffer. The higher the variation of the network or other influences in the environment, the more necessary it becomes to use an algorithm which dynamically adapts its buffer size. These algorithms are universally applicable, easy to integrate in existing architectures, and particularly interesting for time-sensitive applications. Dynamic time-out buffering is still a trade-off between reaction time and out-of-order event compensation.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
Evaluation of an indoor localization system for a mobile robot
Authors:
Victor J. Exposito Jimenez,
Christian Schwarzl,
Helmut Martin
Abstract:
Although indoor localization has been a wide researched topic, obtained results may not fit the requirements that some domains need. Most approaches are not able to precisely localize a fast moving object even with a complex installation, which makes their implementation in the automated driving domain complicated. In this publication, common technologies were analyzed and a commercial product, ca…
▽ More
Although indoor localization has been a wide researched topic, obtained results may not fit the requirements that some domains need. Most approaches are not able to precisely localize a fast moving object even with a complex installation, which makes their implementation in the automated driving domain complicated. In this publication, common technologies were analyzed and a commercial product, called Marvelmind Indoor GPS, was chosen for our use case in which both ultrasound and radio frequency communications are used. The evaluation is given in a first moment on small indoor scenarios with static and moving objects. Further tests were done on wider areas, where the system is integrated within our Robotics Operating System (ROS)-based self-developed 'Smart PhysIcal Demonstration and evaluation Robot (SPIDER)' and the results of these outdoor tests are compared with the obtained localization by the installed GPS on the robot. Finally, the next steps to improve the results in further developments are discussed.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
CoronaSurveys: Using Surveys with Indirect Reporting to Estimate the Incidence and Evolution of Epidemics
Authors:
Oluwasegun Ojo,
Augusto García-Agundez,
Benjamin Girault,
Harold Hernández,
Elisa Cabana,
Amanda García-García,
Payman Arabshahi,
Carlos Baquero,
Paolo Casari,
Ednaldo José Ferreira,
Davide Frey,
Chryssis Georgiou,
Mathieu Goessens,
Anna Ishchenko,
Ernesto Jiménez,
Oleksiy Kebkal,
Rosa Lillo,
Raquel Menezes,
Nicolas Nicolaou,
Antonio Ortega,
Paul Patras,
Julian C Roberts,
Efstathios Stavrakis,
Yuichi Tanaka,
Antonio Fernández Anta
Abstract:
The world is suffering from a pandemic called COVID-19, caused by the SARS-CoV-2 virus. National governments have problems evaluating the reach of the epidemic, due to having limited resources and tests at their disposal. This problem is especially acute in low and middle-income countries (LMICs). Hence, any simple, cheap and flexible means of evaluating the incidence and evolution of the epidemic…
▽ More
The world is suffering from a pandemic called COVID-19, caused by the SARS-CoV-2 virus. National governments have problems evaluating the reach of the epidemic, due to having limited resources and tests at their disposal. This problem is especially acute in low and middle-income countries (LMICs). Hence, any simple, cheap and flexible means of evaluating the incidence and evolution of the epidemic in a given country with a reasonable level of accuracy is useful. In this paper, we propose a technique based on (anonymous) surveys in which participants report on the health status of their contacts. This indirect reporting technique, known in the literature as network scale-up method, preserves the privacy of the participants and their contacts, and collects information from a larger fraction of the population (as compared to individual surveys). This technique has been deployed in the CoronaSurveys project, which has been collecting reports for the COVID-19 pandemic for more than two months. Results obtained by CoronaSurveys show the power and flexibility of the approach, suggesting that it could be an inexpensive and powerful tool for LMICs.
△ Less
Submitted 26 June, 2020; v1 submitted 24 May, 2020;
originally announced May 2020.
-
An Overview of Wireless IoT Protocol Security in the Smart Home Domain
Authors:
Stefan Marksteiner,
Víctor Juan Expósito Jiménez,
Heribert Vallant,
Herwig Zeiner
Abstract:
While the application of IoT in smart technologies becomes more and more proliferated, the pandemonium of its protocols becomes increasingly confusing. More seriously, severe security deficiencies of these protocols become evident, as time-to- market is a key factor, which satisfaction comes at the price of a less thorough security design and testing. This applies especially to the smart home doma…
▽ More
While the application of IoT in smart technologies becomes more and more proliferated, the pandemonium of its protocols becomes increasingly confusing. More seriously, severe security deficiencies of these protocols become evident, as time-to- market is a key factor, which satisfaction comes at the price of a less thorough security design and testing. This applies especially to the smart home domain, where the consumer-driven market demands quick and cheap solutions. This paper presents an overview of IoT application domains and discusses the most important wireless IoT protocols for smart home, which are KNX-RF, EnOcean, Zigbee, Z-Wave and Thread. Finally, it describes the security features of said protocols and compares them with each other, giving advice on whose protocols are more suitable for a secure smart home.
△ Less
Submitted 22 January, 2018;
originally announced January 2018.
-
Simulation of Underwater RF Wireless Sensor Networks using Castalia
Authors:
Sergio Valcarcel Macua,
Santiago Zazo,
Javier Zazo,
Marina Pérez Jiménez,
Iván Pérez-Álvarez,
Eugenio Jiménez,
Joaquín Hernández Brito
Abstract:
We use real measurements of the underwater channel to simulate a whole underwater RF wireless sensor networks, including propagation impairments (e.g., noise, interference), radio hardware (e.g., modulation scheme, bandwidth, transmit power), hardware limitations (e.g., clock drift, transmission buffer) and complete MAC and routing protocols. The results should be useful for designing centralized…
▽ More
We use real measurements of the underwater channel to simulate a whole underwater RF wireless sensor networks, including propagation impairments (e.g., noise, interference), radio hardware (e.g., modulation scheme, bandwidth, transmit power), hardware limitations (e.g., clock drift, transmission buffer) and complete MAC and routing protocols. The results should be useful for designing centralized and distributed algorithms for applications like monitoring, event detection, localization and aid to navigation. We also explain the changes that have to be done to Castalia in order to perform the simulations.
△ Less
Submitted 12 April, 2016;
originally announced April 2016.
-
Failure Detectors in Homonymous Distributed Systems (with an Application to Consensus)
Authors:
Sergio Arévalo,
Antonio Fernández Anta,
Damien Imbs,
Ernesto Jiménez,
Michel Raynal
Abstract:
This paper addresses the consensus problem in homonymous distributed systems where processes are prone to crash failures and have no initial knowledge of the system membership ("homonymous" means that several processes may have the same identifier). New classes of failure detectors suited to these systems are first defined. Among them, the classes HΩ and HΣ are introduced that are the homonymous c…
▽ More
This paper addresses the consensus problem in homonymous distributed systems where processes are prone to crash failures and have no initial knowledge of the system membership ("homonymous" means that several processes may have the same identifier). New classes of failure detectors suited to these systems are first defined. Among them, the classes HΩ and HΣ are introduced that are the homonymous counterparts of the classes Ω and Σ, respectively. (Recall that the pair <Ω,Σ> defines the weakest failure detector to solve consensus.) Then, the paper shows how HΩ and HΣ can be implemented in homonymous systems without membership knowledge (under different synchrony requirements). Finally, two algorithms are presented that use these failure detectors to solve consensus in homonymous asynchronous systems where there is no initial knowledge of the membership. One algorithm solves consensus with <HΩ,HΣ>, while the other uses only HΩ, but needs a majority of correct processes.
Observe that the systems with unique identifiers and anonymous systems are extreme cases of homonymous systems from which follows that all these results also apply to these systems. Interestingly, the new failure detector class HΩ can be implemented with partial synchrony, while the analogous class AΩ defined for anonymous systems can not be implemented (even in synchronous systems). Hence, the paper provides us with the first proof showing that consensus can be solved in anonymous systems with only partial synchrony (and a majority of correct processes).
△ Less
Submitted 27 November, 2011; v1 submitted 9 October, 2011;
originally announced October 2011.
-
Distributed Slicing in Dynamic Systems
Authors:
Antonio Fernandez,
Vincent Gramoli,
Ernesto Jimenez,
Anne-Marie Kermarrec,
Michel Raynal
Abstract:
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with providing useful P2P middleware services capable of dealing with resource assignment and management in a large-scale, heterogeneous and unreliable environment. The slicing service, has been proposed to allow for an auto…
▽ More
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with providing useful P2P middleware services capable of dealing with resource assignment and management in a large-scale, heterogeneous and unreliable environment. The slicing service, has been proposed to allow for an automatic partitioning of P2P networks into groups (slices) that represent a controllable amount of some resource and that are also relatively homogeneous with respect to that resource. In this paper we propose two gossip-based algorithms to solve the distributed slicing problem. The first algorithm speeds up an existing algorithm sorting a set of uniform random numbers. The second algorithm statistically approximates the rank of nodes in the ordering. The scalability, efficiency and resilience to dynamics of both algorithms rely on their gossip-based models. These algorithms are proved viable theoretically and experimentally.
△ Less
Submitted 26 December, 2007;
originally announced December 2007.
-
Distributed Slicing in Dynamic Systems
Authors:
Antonio Fernandez,
Vincent Gramoli,
Ernesto Jimenez,
Anne-Marie Kermarrec,
Michel Raynal
Abstract:
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with providing useful P2P middleware services that are capable of dealing with resource assignment and management in a large-scale, heterogeneous and unreliable environment. One such service, the slicing service, has been pr…
▽ More
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with providing useful P2P middleware services that are capable of dealing with resource assignment and management in a large-scale, heterogeneous and unreliable environment. One such service, the slicing service, has been proposed to allow for an automatic partitioning of P2P networks into groups (slices) that represent a controllable amount of some resource and that are also relatively homogeneous with respect to that resource, in the face of churn and other failures. In this report we propose two algorithms to solve the distributed slicing problem. The first algorithm improves upon an existing algorithm that is based on gossip-based sorting of a set of uniform random numbers. We speed up convergence via a heuristic for gossip peer selection. The second algorithm is based on a different approach: statistical approximation of the rank of nodes in the ordering. The scalability, efficiency and resilience to dynamics of both algorithms relies on their gossip-based models. We present theoretical and experimental results to prove the viability of these algorithms.
△ Less
Submitted 6 December, 2006;
originally announced December 2006.