Skip to main content

Showing 1–6 of 6 results for author: Miller, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.15671  [pdf, other

    cs.DM math.CO

    Lower Bound for Independence Covering in $C_4$-Free Graphs

    Authors: Michael Kuhn, Daniel Lokshtanov, Zachary Miller

    Abstract: An independent set in a graph $G$ is a set $S$ of pairwise non-adjacent vertices in $G$. A family $\mathcal{F}$ of independent sets in $G$ is called a $k$-independence covering family if for every independent set $I$ in $G$ of size at most $k$, there exists an $S \in \mathcal{F}$ such that $I \subseteq S$. Lokshtanov et al. [ACM Transactions on Algorithms, 2018] showed that graphs of degeneracy… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    Comments: 8 pages, 1 figure

    MSC Class: 68R10 (Primary) 68R05 (Secondary) ACM Class: G.2.1; F.2.2

  2. arXiv:2305.05074  [pdf, other

    cs.DB cs.DS cs.IR

    Autumn: A Scalable Read Optimized LSM-tree based Key-Value Stores with Fast Point and Range Read Speed

    Authors: Fuheng Zhao, Zach Miller, Leron Reznikov, Divyakant Agrawal, Amr El Abbadi

    Abstract: The Log Structured Merge Trees (LSM-tree) based key-value stores are widely used in many storage systems to support a variety of operations such as updates, point reads, and range reads. Traditionally, LSM-tree's merge policy organizes data into multiple levels of exponentially increasing capacity to support high-speed writes. However, we contend that the traditional merge policies are not optimiz… ▽ More

    Submitted 30 June, 2024; v1 submitted 8 May, 2023; originally announced May 2023.

  3. SciTokens: Demonstrating Capability-Based Access to Remote Scientific Data using HTCondor

    Authors: Alex Withers, Brian Bockelman, Derek Weitzel, Duncan Brown, Jason Patton, Jeff Gaynor, Jim Basney, Todd Tannenbaum, You Alex Gao, Zach Miller

    Abstract: The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows to fail to fetch needed input data or store valuable scientific results, distracting scientists from their research by requiring them to diagnose the p… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

    Comments: 8 pages, 3 figures, PEARC '19: Practice and Experience in Advanced Research Computing, July 28-August 1, 2019, Chicago, IL, USA. arXiv admin note: substantial text overlap with arXiv:1807.04728

  4. SciTokens: Capability-Based Secure Access to Remote Scientific Data

    Authors: Alex Withers, Brian Bockelman, Derek Weitzel, Duncan Brown, Jeff Gaynor, Jim Basney, Todd Tannenbaum, Zach Miller

    Abstract: The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows to fail to fetch needed input data or store valuable scientific results, distracting scientists from their research by requiring them to diagnose the p… ▽ More

    Submitted 12 July, 2018; originally announced July 2018.

    Comments: 8 pages, 6 figures, PEARC '18: Practice and Experience in Advanced Research Computing, July 22--26, 2018, Pittsburgh, PA, USA

  5. arXiv:1804.03768  [pdf, other

    math.CO cs.IT

    New Lower Bounds for Permutation Arrays Using Contraction

    Authors: Sergey Bereg, Zevi Miller, Luis Gerardo Mojica, Linda Morales, I. H. Sudborough

    Abstract: A permutation array $A$ is a set of permutations on a finite set $Ω$, say of size $n$. Given distinct permutations $π, σ\in Ω$, we let $hd(π, σ) = |\{ x\in Ω: π(x) \ne σ(x) \}|$, called the Hamming distance between $π$ and $σ$. Now let $hd(A) =$ min$\{ hd(π, σ): π, σ\in A \}$. For positive integers $n$ and $d$ with $d\le n$, we let $M(n,d)$ be the maximum number of permutations in any array $A$ sa… ▽ More

    Submitted 11 September, 2018; v1 submitted 10 April, 2018; originally announced April 2018.

  6. Flexible Session Management in a Distributed Environment

    Authors: Zach Miller, Dan Bradley, Todd Tannenbaum, Igor Sfiligoi

    Abstract: Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's s… ▽ More

    Submitted 2 November, 2010; originally announced November 2010.

    Journal ref: J.Phys.Conf.Ser.219:042017,2010