Skip to main content

Showing 1–11 of 11 results for author: Konwar, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:1907.01077  [pdf, other

    cs.IT

    5G NR CA-Polar Maximum Likelihood Decoding by GRAND

    Authors: Ken Duffy, Amit Solomon, Kishori M. Konwar, Muriel Medard

    Abstract: CA-Polar codes have been selected for all control channel communications in 5G NR, but accurate, computationally feasible decoders are still subject to development. Here we report the performance of a recently proposed class of optimally precise Maximum Likelihood (ML) decoders, GRAND, that can be used with any block-code. As published theoretical results indicate that GRAND is computationally eff… ▽ More

    Submitted 18 February, 2021; v1 submitted 1 July, 2019; originally announced July 2019.

    MSC Class: 94A05 ACM Class: E.4

    Journal ref: 2020 54th Annual Conference on Information Sciences and Systems (CISS)

  2. arXiv:1811.10577  [pdf, other

    cs.DC

    SNOW Revisited: Understanding When Ideal READ Transactions Are Possible

    Authors: Kishori M Konwar, Wyatt Lloyd, Haonan Lu, Nancy Lynch

    Abstract: READ transactions that read data distributed across servers dominate the workloads of real-world distributed storage systems. The SNOW Theorem stated that ideal READ transactions that have optimal latency and the strongest guarantees, i.e. "SNOW" READ transactions, are impossible in one specific setting that requires three or more clients: at least two readers and one writer. However, it left many… ▽ More

    Submitted 22 May, 2021; v1 submitted 26 November, 2018; originally announced November 2018.

  3. arXiv:1805.03727  [pdf, other

    cs.DC

    ARES: Adaptive, Reconfigurable, Erasure coded, atomic Storage

    Authors: Nicolas Nicolaou, Viveck Cadambe, N. Prakash, Andria Trigeorgi, Kishori M. Konwar, Nancy Lynch, Muriel Medard

    Abstract: Atomicity or strong consistency is one of the fundamental, most intuitive, and hardest to provide primitives in distributed shared memory emulations. To ensure survivability, scalability, and availability of a storage service in the presence of failures, traditional approaches for atomic memory emulation, in message passing environments, replicate the objects across multiple servers. Compared to r… ▽ More

    Submitted 28 May, 2021; v1 submitted 9 May, 2018; originally announced May 2018.

  4. arXiv:1802.07817  [pdf, other

    cs.DC

    Formalizing and Implementing Distributed Ledger Objects

    Authors: Antonio Fernández Anta, Chryssis Georgiou, Kishori Konwar, Nicolas Nicolaou

    Abstract: Despite the hype about blockchains and distributed ledgers, no formal abstraction of these objects has been proposed. To face this issue, in this paper we provide a proper formulation of a distributed ledger object. In brief, we define a ledger object as a sequence of records, and we provide the operations and the properties that such an object should support. Implementation of a ledger object on… ▽ More

    Submitted 4 May, 2018; v1 submitted 21 February, 2018; originally announced February 2018.

    Comments: 18 pages, 3 figures, preliminary version appears in Proceedings of NETYS 2018

  5. arXiv:1703.01286  [pdf, other

    cs.DC cs.IT

    A Layered Architecture for Erasure-Coded Consistent Distributed Storage

    Authors: Kishori M. Konwar, N. Prakash, Nancy Lynch, Muriel Medard

    Abstract: Motivated by emerging applications to the edge computing paradigm, we introduce a two-layer erasure-coded fault-tolerant distributed storage system offering atomic access for read and write operations. In edge computing, clients interact with an edge-layer of servers that is geographically near; the edge-layer in turn interacts with a back-end layer of servers. The edge-layer provides low latency… ▽ More

    Submitted 30 May, 2017; v1 submitted 3 March, 2017; originally announced March 2017.

    Comments: To appear in ACM PODC 2017

  6. arXiv:1605.05717  [pdf, ps, other

    cs.DC cs.IT

    RADON: Repairable Atomic Data Object in Networks

    Authors: Kishori M. Konwar, N. Prakash, Nancy Lynch, Muriel Medard

    Abstract: Erasure codes offer an efficient way to decrease storage and communication costs while implementing atomic memory service in asynchronous distributed storage systems. In this paper, we provide erasure-code-based algorithms having the additional ability to perform background repair of crashed nodes. A repair operation of a node in the crashed state is triggered externally, and is carried out by the… ▽ More

    Submitted 21 November, 2016; v1 submitted 18 May, 2016; originally announced May 2016.

    Comments: To be presented at OPODIS 2016

  7. Storage-Optimized Data-Atomic Algorithms for Handling Erasures and Errors in Distributed Storage Systems

    Authors: Kishori M. Konwar, N. Prakash, Erez Kantor, Nancy Lynch, Muriel Medard, Alexander A. Schwarzmann

    Abstract: Erasure codes are increasingly being studied in the context of implementing atomic memory objects in large scale asynchronous distributed storage systems. When compared with the traditional replication based schemes, erasure codes have the potential of significantly lowering storage and communication costs while simultaneously guaranteeing the desired resiliency levels. In this work, we propose th… ▽ More

    Submitted 5 May, 2016; originally announced May 2016.

    Comments: Accepted for Publication at IEEE IPDPS, 2016

  8. arXiv:1407.0696  [pdf, ps, other

    cs.DC

    Technical Report: Estimating Reliability of Workers for Cooperative Distributed Computing

    Authors: Seda Davtyan, Kishori M. Konwar, Alexander A. Shvartsman

    Abstract: Internet supercomputing is an approach to solving partitionable, computation-intensive problems by harnessing the power of a vast number of interconnected computers. For the problem of using network supercomputing to perform a large collection of independent tasks, prior work introduced a decentralized approach and provided randomized synchronous algorithms that perform all tasks correctly with hi… ▽ More

    Submitted 1 July, 2014; originally announced July 2014.

  9. arXiv:1407.0442  [pdf, ps, other

    cs.DC

    Technical Report: Dealing with Undependable Workers in Decentralized Network Supercomputing

    Authors: Seda Davtyan, Kishori M. Konwar, Alexander Russell, Alexander A. Shvartsman

    Abstract: Internet supercomputing is an approach to solving partitionable, computation-intensive problems by harnessing the power of a vast number of interconnected computers. This paper presents a new algorithm for the problem of using network supercomputing to perform a large collection of independent tasks, while dealing with undependable processors. The adversary may cause the processors to return bogus… ▽ More

    Submitted 1 July, 2014; originally announced July 2014.

  10. arXiv:cs/0502065  [pdf, ps, other

    cs.DS

    Highly Scalable Algorithms for Robust String Barcoding

    Authors: Bhaskar DasGupta, Kishori M. Konwar, Ion I. Mandoiu, Alex A. Shvartsman

    Abstract: String barcoding is a recently introduced technique for genomic-based identification of microorganisms. In this paper we describe the engineering of highly scalable algorithms for robust string barcoding. Our methods enable distinguisher selection based on whole genomic sequences of hundreds of microorganisms of up to bacterial size on a well-equipped workstation, and can be easily parallelized… ▽ More

    Submitted 14 February, 2005; originally announced February 2005.

  11. arXiv:cs/0406053  [pdf, ps, other

    cs.DS cs.DM q-bio.QM

    Approximation Algorithms for Minimum PCR Primer Set Selection with Amplification Length and Uniqueness Constraints

    Authors: K. Konwar, I. Mandoiu, A. Russell, A. Shvartsman

    Abstract: A critical problem in the emerging high-throughput genoty** protocols is to minimize the number of polymerase chain reaction (PCR) primers required to amplify the single nucleotide polymorphism loci of interest. In this paper we study PCR primer set selection with amplification length and uniqueness constraints from both theoretical and practical perspectives. We give a greedy algorithm that a… ▽ More

    Submitted 27 July, 2004; v1 submitted 28 June, 2004; originally announced June 2004.

    ACM Class: F.2.2; G.1.6