15 Dynamics at the Boundary of Game Theory and Distributed Computing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Topology in Distributed Computing
Die approbierte Originalversion dieser Diplom-/Masterarbeit ist an der Hauptbibliothek der Technischen Universität Wien aufgestellt (http://www.ub.tuwien.ac.at). The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology (http://www.ub.tuwien.ac.at/englweb/). Topology in Distributed Computing DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Technische Informatik ausgeführt von Thomas Nowak Matrikelnummer 0425201 an der Fakultät für Informatik der Technischen Universität Wien Betreuer: Univ.Prof. Dr. Ulrich Schmid Wien, 18.03.2010 _______________________ ______________________ (Unterschrift Verfasser) (Unterschrift Betreuer) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43/(0)1/58801-0 http://www.tuwien.ac.at Erklärung Thomas Nowak Rechte Wienzeile 73/23 1050 Wien Hiermit erkläre ich, dass ich diese Arbeit selbstständig verfasst habe, dass ich die verwendeten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe. Wien, 18.03.2010 ______________________ (Unterschrift) Abstract Topology is the general mathematical theory of convergence. Distributed com- puting is the formal investigation of communicating concurrent processes. We explore applications of topology to distributed computing in two directions: (1) Point-set topology and (2) algebraic topology. We use the former to study the topological structure of infinite execution trees. This enables us to unify a number of impossibility proofs, in particular, the impossibility of distributed consensus — the task of all processes in a system agreeing on a single value — in various (close to) asynchronous systems with crash failures. -
Why Extension-Based Proofs Fail
Why Extension-Based Proofs Fail Dan Alistarh James Aspnes Faith Ellen IST Austria Yale University of Toronto [email protected] [email protected] [email protected] Rati Gelashvili Leqi Zhu University of Toronto University of Michigan [email protected] [email protected] August 2, 2020 Abstract We introduce extension-based proofs, a class of impossibility proofs that includes valency arguments. They are modelled as an interaction between a prover and a protocol. Using proofs based on combinatorial topology, it has been shown that it is impossible to deterministically solve k-set agreement among n > k 2 processes in a wait-free manner in certain asynchronous models. However, it was unknown whether≥ proofs based on simpler techniques were possible. We show that this impossibility result cannot be obtained for one of these models by an extension- based proof and, hence, extension-based proofs are limited in power. 1 Introduction One of the most well-known results in the theory of distributed computing, due to Fischer, Lynch, and Paterson [FLP85], is that there is no deterministic, wait-free protocol solving consensus among n 2 processes in an asynchronous message passing system, even if at most one process may ≥ crash. Their result has been extended to asynchronous shared memory systems where processes communicate by reading from and writing to shared registers [Abr88, CIL87, Her91, LAA87]. Moses and Rajsbaum [MR02] gave a unified framework for proving the impossibility of consensus in a number of different systems. Chaudhuri [Cha93] conjectured that the impossibility of consensus could be generalized to the k-set agreement problem. -
On the Asynchronous Computability Theorem
On the Asynchronous Computability Theorem Rachid Guerraoui Petr Kouznetsov Bastian Pochon Distributed Programming Laboratory EPFL GETCO 2004 2/23 Characterization T 1 of wait-free computable decision tasks [Herlihy and Shavit, 1993, 1994] • representing decision tasks through simplicial complexes and simplicial maps • a task is solvable iff the corresponding complexes satisfy a topological property T 1 • long-standing impossibility results: set agreement [BG93, SZ93] and (n, 2n)-renaming GETCO 2004 3/23 [Borowsky and Gafni, 1997]: a “stronger” geometric property T 2 • a “simpler” algorithmic proof of T 2 • the equivalence of the properties: T 1 = T 2 (through proving a geometric result with a distributed algorithm) Why “stronger” and “simpler” ? What is the distributed algorithm? GETCO 2004 4/23 Decision task T = (I, O, ∆) [HS93] • I — chromatic input complex (a set of possible input simplexes) • O — chromatic output complex (a set of possible output simplexes) • ∆ ⊆ I × O — task specification (a color-preserving map that carries every input simplex to a set of output simplexes) GETCO 2004 5/23 Wait-free protocols Every process starts with an input value, executes a number of writes and reads of the shared memory, and finishes with an output value (applies a decision map to its final state). A protocol solves a task T = (I, O, ∆) if it satisfies the task specification: for any input simplex S ∈ I, any resulting output simplex O ∈ ∆(S). A protocol wait-free if every process finishes in a bounded number of its own steps, no matter how other processes behave. GETCO 2004 6/23 Herlihy and Shavit’s criterion [HS94] Theorem 1. -
Session Types and Game Semantics a Synchronous Side and an Asynchronous Side
Two Sides of the Same Coin: Session Types and Game Semantics A Synchronous Side and an Asynchronous Side SIMON CASTELLAN, Imperial College London, United Kingdom NOBUKO YOSHIDA, Imperial College London, United Kingdom Game semantics and session types are two formalisations of the same concept: message-passing open programs following certain protocols. Game semantics represents protocols as games, and programs as strategies; while session types specify protocols, and well-typed π-calculus processes model programs. Giving faithful models of the π-calculus and giving a precise description of strategies as a programming language are two difficult 27 problems. In this paper, we show how these two problems can be tackled at the same time by building an accurate game semantics model of the session π-calculus. Our main contribution is to fill a semantic gap between the synchrony of the (session) π-calculus and the asynchrony of game semantics, by developing an event-structure based game semantics for synchronous concurrent computation. This model supports the first truly concurrent fully abstract (for barbed congruence) interpretation of the synchronous (session) π-calculus. We further strengthen this correspondence, establishing finite definability of asynchronous strategies by the internal session π-calculus. As an application of these results, we propose a faithful encoding of synchronous strategies into asynchronous strategies by call-return protocols, which induces automatically an encoding at the level of processes. Our results bring session types and game semantics into the same picture, proposing the session calculus as a programming language for strategies, and strategies as a very accurate model of the session calculus. -
Asphalion: Trustworthy Shielding Against Byzantine Faults
Asphalion: Trustworthy Shielding Against Byzantine Faults IVANA VUKOTIC, SnT, University of Luxembourg VINCENT RAHLI, University of Birmingham PAULO ESTEVES-VERÍSSIMO, SnT, University of Luxembourg Byzantine fault-tolerant state-machine replication (BFT-SMR) is a technique for hardening systems to tolerate arbitrary faults. Although robust, BFT-SMR protocols are very costly in terms of the number of required replicas (3f + 1 to tolerate f faults) and of exchanged messages. However, with “hybrid” architectures, where “normal” components trust some “special” components to provide properties in a trustworthy manner, the cost of using BFT can be dramatically reduced. Unfortunately, even though such hybridization techniques decrease the message/time/space complexity of BFT protocols, they also increase their structural complexity. Therefore, we introduce Asphalion, the first theorem prover-based framework for verifying implementations of hybrid systems and protocols. It relies on three novel languages: (1) HyLoE: a Hybrid Logic of Events to reason about hybrid fault models; (2) MoC: a Monadic Component language to implement systems as collections of interacting hybrid components; and (3) LoCK: a sound Logic Of events-based Calculus of Knowledge to reason about both homogeneous and hybrid systems at a high-level of abstraction (thereby allowing reusing proofs, and capturing the high-level logic of distributed systems). In addition, Asphalion supports compositional reasoning, e.g., through mechanisms to lift properties about trusted-trustworthy components, to the level of the distributed systems they are integrated in. As a case study, we have verified crucial safety properties (e.g., agreement) of several implementations of hybrid protocols. CCS Concepts: • Theory of computation → Logic and verification. -
On the Space Complexity of Colourless Tasks by Leqi Zhu A
On the Space Complexity of Colourless Tasks by Leqi Zhu A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Computer Science University of Toronto c Copyright 2019 by Leqi Zhu Abstract On the Space Complexity of Colourless Tasks Leqi Zhu Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2019 In this thesis, we prove lower bounds on the number of registers needed to solve colourless tasks in asynchronous shared memory systems. Many fundamental synchronization tasks, such as consensus, k-set agreement, and -approximate agreement, are colourless. We show that it is possible to transform any nondeterministic solo-terminating algorithm (including any randomized wait-free algorithm) into an obstruction-free algorithm that uses the same number of registers. This result extends to algorithms using any finite number of deterministic objects that support read operations. Hence, we can focus on proving lower bounds for obstruction-free algorithms. We prove a tight lower bound on the number of registers needed to solve obstruction-free consensus. We also prove the first non-constant lower bounds on the number of registers needed to solve obstruction- free k-set agreement and obstruction-free -approximate agreement. The bound for k-set agreement is asymptotically tight when k is a constant and the bound for -approximate agreement is asymptotically tight when is sufficiently small. To prove these bounds, we introduce a new technique, revisionist simulations. This technique allows us to prove a general theorem that yields lower bounds on the number of registers needed to solve any colourless task in an obstruction-free manner. -
Sok: a Consensus Taxonomy in the Blockchain Era*
SoK: A Consensus Taxonomy in the Blockchain Era* Juan A. Garay Aggelos Kiayias† Texas A&M University University of Edinburgh & IOHK [email protected] [email protected] Sunday 8th December, 2019 Abstract Consensus is arguably one of the most fundamental problems in distributed computing, playing also an important role in the area of cryptographic protocols as the enabler of a secure broadcast functionality. While the problem has a long and rich history and has been analyzed from many dif- ferent perspectives, recently, with the advent of blockchain protocols like Bitcoin, it has experienced renewed interest from a much wider community of researchers and has seen its application expand to various novel settings. One of the main issues in consensus research is the many different variants of the problem that exist as well as the various ways the problem behaves when different setup, computational assump- tions and network models are considered. In this work we perform a systematization of knowledge in the landscape of consensus research in the Byzantine failure model starting with the original formu- lation in the early 1980s up to the present blockchain-based new class of consensus protocols. Our work is a roadmap for studying the consensus problem under its many guises, classifying the way it operates in the various settings and highlighting the exciting new applications that have emerged in the blockchain era. 1 Introduction The consensus problem—reaching agreement distributedly in the presence of faults—has been exten- sively studied in the literature starting with the seminal work of Shostak, Pease and Lamport [PSL80, LSP82]. -
Learning Under Limited Information∗
Learning Under Limited Information¤ Yan Chen School of Information, University of Michigan 550 East University Avenue, Ann Arbor, MI 48109-1092 Yuri Khoroshilov Department of Finance, University of Michigan Business School 701 Tappan Street, Ann Arbor, MI 48109-1234 August 28, 2002 Running title: learning under limited information Address for manuscript correspondence: Yan Chen School of Information, University of Michigan 550 East University Avenue, Ann Arbor, MI 48109-1092 Email: [email protected] Phone: (734) 763-2285 Fax: (734) 764-2475 ¤We thank Julie Cullen, Ido Erev, Dan Friedman, Eric Friedman, Drew Fudenburg, Amy Greenwald, Teck-Hua Ho, Lutz Kilian, David Lucking-Reiley, Atanasios Mitropoulos, Tom Palfrey, Rajiv Sarin, Scott Shenker, Farshid Vahid and seminar participants at Michigan, Mississippi, Rutgers, Texas A&M, the 1998 Econometric Society meetings (Chicago), ESA 2000 (New York City) and the 2001 Econometric Society meetings (New Orleans) for discussions and comments. We are grateful to John Van Huyck for providing the data and for helping us with part of the estimation. Emre Sucu provided excellent research assistance. We are grateful to two anonymous referees for their constructive comments which significantly improved the paper. The research support provided by NSF grant SBR-9805586 and SES-0079001 to Chen and the Deutsche Forschungsgemeinschaft through SFB303 at Universit¨atBonn are gratefully acknowledged. Any remaining errors are our own. 1 Abstract We study how human subjects learn under extremely limited information. We use Chen’s (forthcoming) data on cost sharing games, and Van Huyck, Battalio and Rankin’s (1996) data on coordination games to compare three payoff-based learning models. -
K-Set Agreement Bounds in Round-Based Models Through Combinatorial Topology Adam Shimi, Armando Castañeda
K-set agreement bounds in round-based models through combinatorial topology Adam Shimi, Armando Castañeda To cite this version: Adam Shimi, Armando Castañeda. K-set agreement bounds in round-based models through combina- torial topology. 39th ACM Symposium on Principles of Distributed Computing (PODC 2020), Aug 2020, Salerno, Italy. pp.395-404. hal-02950742 HAL Id: hal-02950742 https://hal.archives-ouvertes.fr/hal-02950742 Submitted on 28 Sep 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Open Archive Toulouse Archive Ouverte OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible This is an author’s version published in: http://oatao.univ-toulouse.fr/26404 Official URL https://doi.org/10.1145/3382734.3405752 To cite this version: Shimi, Adam and Castañeda, Armando K-set agreement bounds in round-based models through combinatorial topology. (2020) In: 39th ACM Symposium on Principles of Distributed Computing (PODC 2020), 3 August 2020 - 7 August 2020 (Salerno, -
Evolutionary Game Theory: a Renaissance
games Review Evolutionary Game Theory: A Renaissance Jonathan Newton ID Institute of Economic Research, Kyoto University, Kyoto 606-8501, Japan; [email protected] Received: 23 April 2018; Accepted: 15 May 2018; Published: 24 May 2018 Abstract: Economic agents are not always rational or farsighted and can make decisions according to simple behavioral rules that vary according to situation and can be studied using the tools of evolutionary game theory. Furthermore, such behavioral rules are themselves subject to evolutionary forces. Paying particular attention to the work of young researchers, this essay surveys the progress made over the last decade towards understanding these phenomena, and discusses open research topics of importance to economics and the broader social sciences. Keywords: evolution; game theory; dynamics; agency; assortativity; culture; distributed systems JEL Classification: C73 Table of contents 1 Introduction p. 2 Shadow of Nash Equilibrium Renaissance Structure of the Survey · · 2 Agency—Who Makes Decisions? p. 3 Methodology Implications Evolution of Collective Agency Links between Individual & · · · Collective Agency 3 Assortativity—With Whom Does Interaction Occur? p. 10 Assortativity & Preferences Evolution of Assortativity Generalized Matching Conditional · · · Dissociation Network Formation · 4 Evolution of Behavior p. 17 Traits Conventions—Culture in Society Culture in Individuals Culture in Individuals · · · & Society 5 Economic Applications p. 29 Macroeconomics, Market Selection & Finance Industrial Organization · 6 The Evolutionary Nash Program p. 30 Recontracting & Nash Demand Games TU Matching NTU Matching Bargaining Solutions & · · · Coordination Games 7 Behavioral Dynamics p. 36 Reinforcement Learning Imitation Best Experienced Payoff Dynamics Best & Better Response · · · Continuous Strategy Sets Completely Uncoupled · · 8 General Methodology p. 44 Perturbed Dynamics Further Stability Results Further Convergence Results Distributed · · · control Software and Simulations · 9 Empirics p. -
Self-Sorting SSD: Producing Sorted Data Inside Active Ssds
Foreword This volume contains the papers presentedat the Third Israel Symposium on the Theory of Computing and Systems (ISTCS), held in Tel Aviv, Israel, on January 4-6, 1995. Fifty five papers were submitted in response to the Call for Papers, and twenty seven of them were selected for presentation. The selection was based on originality, quality and relevance to the field. The program committee is pleased with the overall quality of the acceptedpapers and, furthermore, feels that many of the papers not used were also of fine quality. The papers included in this proceedings are preliminary reports on recent research and it is expected that most of these papers will appear in a more complete and polished form in scientific journals. The proceedings also contains one invited paper by Pave1Pevzner and Michael Waterman. The program committee thanks our invited speakers,Robert J. Aumann, Wolfgang Paul, Abe Peled, and Avi Wigderson, for contributing their time and knowledge. We also wish to thank all who submitted papers for consideration, as well as the many colleagues who contributed to the evaluation of the submitted papers. The latter include: Noga Alon Alon Itai Eric Schenk Hagit Attiya Roni Kay Baruch Schieber Yossi Azar Evsey Kosman Assaf Schuster Ayal Bar-David Ami Litman Nir Shavit Reuven Bar-Yehuda Johan Makowsky Richard Statman Shai Ben-David Yishay Mansour Ray Strong Allan Borodin Alain Mayer Eli Upfal Dorit Dor Mike Molloy Moshe Vardi Alon Efrat Yoram Moses Orli Waarts Jack Feldman Dalit Naor Ed Wimmers Nissim Francez Seffl Naor Shmuel Zaks Nita Goyal Noam Nisan Uri Zwick Vassos Hadzilacos Yuri Rabinovich Johan Hastad Giinter Rote The work of the program committee has been facilitated thanks to software developed by Rob Schapire and FOCS/STOC program chairs. -
Combinatorial Topology and Distributed Computing Copyright 2010 Herlihy, Kozlov, and Rajsbaum All Rights Reserved
Combinatorial Topology and Distributed Computing Copyright 2010 Herlihy, Kozlov, and Rajsbaum All rights reserved Maurice Herlihy Dmitry Kozlov Sergio Rajsbaum February 22, 2011 DRAFT 2 DRAFT Contents 1 Introduction 9 1.1 DecisionTasks .......................... 10 1.2 Communication.......................... 11 1.3 Failures .............................. 11 1.4 Timing............................... 12 1.4.1 ProcessesandProtocols . 12 1.5 ChapterNotes .......................... 14 2 Elements of Combinatorial Topology 15 2.1 Theobjectsandthemaps . 15 2.1.1 The Combinatorial View . 15 2.1.2 The Geometric View . 17 2.1.3 The Topological View . 18 2.2 Standardconstructions. 18 2.3 Chromaticcomplexes. 21 2.4 Simplicial models in Distributed Computing . 22 2.5 ChapterNotes .......................... 23 2.6 Exercises ............................. 23 3 Manifolds, Impossibility,DRAFT and Separation 25 3.1 ManifoldComplexes ....................... 25 3.2 ImmediateSnapshots. 28 3.3 ManifoldProtocols .. .. .. .. .. .. .. 34 3.4 SetAgreement .......................... 34 3.5 AnonymousProtocols . .. .. .. .. .. .. 38 3.6 WeakSymmetry-Breaking . 39 3.7 Anonymous Set Agreement versus Weak Symmetry Breaking 40 3.8 ChapterNotes .......................... 44 3.9 Exercises ............................. 44 3 4 CONTENTS 4 Connectivity 47 4.1 Consensus and Path-Connectivity . 47 4.2 Consensus in Asynchronous Read-Write Memory . 49 4.3 Set Agreement and Connectivity in Higher Dimensions . 53 4.4 Set Agreement and Read-Write memory . 59 4.4.1 Critical States . 63 4.5 ChapterNotes .......................... 64 4.6 Exercises ............................. 64 5 Colorless Tasks 67 5.1 Pseudospheres .......................... 68 5.2 ColorlessTasks .......................... 72 5.3 Wait-Free Read-Write Memory . 73 5.3.1 Read-Write Protocols and Pseudospheres . 73 5.3.2 Necessary and Sufficient Conditions . 75 5.4 Read-Write Memory with k-Set Agreement .