Lower Bounds for Distributed Coin-Flipping and Randomized

Total Page:16

File Type:pdf, Size:1020Kb

Lower Bounds for Distributed Coin-Flipping and Randomized Lower Bounds for Distributed CoinFlipping and Randomized Consensus James Aspnes forms the basis of the consensus lower b ound but is in Abstract teresting in its own right We examine a class of col lective coinipping games Consensus is a fundamental problem in distributed that arises from randomized distributed algorithms with computing in which a group of pro cesses must agree on halting failures In these games a sequence of local coin a bit despite the interference of an adversary An addi ips is generated which must b e combined to form a tional condition forbids trivial solutions that always pro single global coin ip An adversary monitors the game duce the same answer In an asynchronous setting it and may attempt to bias its outcome by hiding the re has long b een known that if an adversary can halt a sin sult of up to t lo cal coin ips We show that to guaran gle pro cess then no deterministic consensus algorithm 2 tee at most constant bias t lo cal coins are needed is p ossible without the use of p owerful synchronizatio n even if a the lo cal coins can have arbitrary distribu primitives CIL DDS FLP Her LAA tions and ranges b the adversary is required to de In contrast randomized algorithms can solve con cide immediately whether to hide or reveal each lo cal sensus in a sharedmemory system for n pro cesses even coin and c the game can detect which lo cal coins have if the adversary can halt up to n pro cesses Such b een hidden If the adversary is p ermitted to control algorithms are called waitfree Her b ecause any pro the outcome of the coin except for cases whose prob cess can nish the algorithm without waiting for slower 2 2 ability is p olynomial in t t log t lo cal coins are or p ossibly dead pro cesses These algorithms work needed Combining this fact with an extended version even under the assumption that failures and the tim of the wellknown FischerLynchPaterson imp ossibili ty ing of all events in the system are under the control of pro of of deterministic consensus we show that given an adaptive adversary one that can observe and react an adaptive adversary any tresilient asynchronous con to all asp ects of the systems execution including the 2 2 sensus proto col requires t log t lo cal coin ips in internal states of the pro cesses any mo del that can b e simulated deterministical ly using atomic registers This gives the rst nontrivial lower The rst known algorithm that solves shared b ound on the total work required by waitfree consensus memory consensus against an adaptive adversary is and is tight to within logarithmic factors the exp onentialti me algorithm of Abrahamson Abr since its app earance numerous p olynomial time algo rithms have app eared AH ADS SSW Asp Intro duction DHPW BR BR AW Most of these algo rithms are built around shared coin protocols in which the pro cesses individual l y generate many random lo Our results divide naturally into two parts a lower cal coin ips which are combined by ma jority voting b ound for asynchronous randomized consensus in a wide The adversary may bias the outcome of the voting by variety of mo dels and a still more general lower b ound selectively killing pro cesses that have chosen to vote the for a large class of collective coinippin g games that wrong way b efore they can reveal their most recent Yale University Department of Computer Science votes to the other pro cesses To prevent the adversary Prosp ect StreetPO Box New Haven CT from getting more than a constant bias it is necessary Supp orted by NSF grants CCR and CCR E to collect enough votes that the hidden votes shift the mail aspnescs y ale e du outcome by no more than a constant numb er of stan dard deviations With up to n failures as in the 2 waitfree case this requires a total of n lo cal coin 2 ips and at least n work in order to communicate 1 these coinips 1 Some of the algorithms deviate slightly from the simple Improvements in other asp ects of consensus algo Related Work rithms have steadily brought their costs down from the 4 2 O n total work of AH to the O n log n total work Many varieties of collective coinippin g games have of BR But while these algorithms have steadily ap b een studied starting with the work of BenOr and 2 proached the n barrier none have broken it How Linial BOL Many such games assume that the lo ever no pro of was known that consensus could not b e cations of faulty coins are xed in advance under these 2 solved in less than n time the barrier was solely a assumptions very ecient games exist AN CL result of the apparent absence of alternatives to using BOL Sak Another assumption that greatly lim shared coins based on ma jority voting Indeed it was its the p ower of the adversary is to require that b oth asked in Asp if it was necessarily the case that a ev the lo cations and values of faulty coins are xed in ad + ery consensus proto col contained an emb edded shared vance this is the bit extraction problem CFG Fri coin proto col and b no shared coin proto col could Vaz in which it is p ossible to derive completely un achieve b etter p erformance than ma jority voting biased random bits If none of these limiting assumptions are made the Our Results adversary gains considerabl y more p ower An excellent survey of results for a wide variety of mo dels involving In this pap er we answer b oth of these questions though fair or nearly fair twovalued lo cal coins can b e found the answers are not as simple as might have b een hop ed in BOLS Our work diers from these in that we We show that a every tresilient asynchronous consen allow arbitrary distribution s on the lo cal coins With a sus proto col in the sharedmemory mo del with at least restriction to fair coins Harp ers isop erimetric inequal constant probability either executes a shared coin pro ity for the hyp ercub e Har implies that the ma jority to col with bias at most one minus a p olynomial in t or function gives the least p ower to an oline adversary 2 carries out an exp ected t lo cal coinips avoiding that can see all coins b efore deciding which to change it and b any such shared coin proto col requires an and Lichtenstein Linial and Saks LLS have shown 2 2 exp ected t log t lo cal coin ips It follows that that ma jority is also optimal against an online adver tresilient asynchronous consensus requires an exp ected sary similar to the one we consider here Without such a 2 2 t log t lo cal coin ips Since proto cols based on restriction the b est previously known b ound is a b ound p 2 n on the inuence of an adversary that can ma jority voting require only O t lo cal coin ips this of lower b ound is very close to b eing tight hide one coin this is an easy corollary of a theorem ab out gaps in martingale sequences due to Cleve and Since we are counting coinips rather than op era Impagliazzo CI tions the lower b ound is not aected by deterministic simulations So for example it continues to hold in A very nice lower b ound on the space used by wait messagepassing mo dels with up to t pro cess failures free sharedmemory consensus is due to Fich Herlihy since a message channel can b e simulated by an un and Shavit FHS They show that any such consensus p b oundedly large register or in a sharedmemory mo del proto col must use n distinct registers to guaran with counters or cheap atomic snapshots Furthermore tee agreement Unfortunately their techniques do not since our lower b ound assumes that lo cal coin ips can app ear to generalize to showing lower b ounds on work have arbitrary ranges and distribution s we may assume without loss of generality that any two successive coin ips by the same pro cess are separated by at least one CoinFlipping Games deterministic op eration in any of these mo dels so the lower b ound on lo cal coinips in fact implies a lower A collective coinippin g game BOL is an algorithm b ound on total work for combining many local coins into a single global coin The lower b ound on coinippi ng games is still more whose bias should b e small even though some of the general and holds in any mo del in which the adversary lo cal coins may b e obscured by a malicious adversary may intercept up to t lo cal coinips b efore they are re Though the particular coinippi ng games we consider vealed no matter what deterministic synchronization here are motivated by their application to proving lower primitives or shared ob jects are available Furthermore b ounds on distributed algorithms with failures they ab it is tight in the sense that it shows that no constantbias stract away almost all of the details of the original dis 2 shared coin can use less than t lo cal coins a b ound tributed systems and are thus likely to b e useful in other achieved ignoring constants by ma jority voting contexts ma jorityvoting approach describ ed here In the algorithm of We assume that the lo cal coins are indep endent ran Aspnes Asp some votes are generated deterministically In dom variables whose ranges and distributions are arbi the algorithm of Saks Shavit and Woll SSW several coin trary The values of these variables are revealed one at ipping proto cols optimized for dierent execution patterns are run in parallel In the algorithm of Aspnes and Waarts AW a time to an adversary who must immediately cho ose pro cesses that have already cast many votes generate votes with whether to reveal or obscure each value If the adver increasing weights in order to nish the proto col quickly How sary cho oses to obscure the value of a particular lo cal ever none of these proto cols costs
Recommended publications
  • FOCS 2005 Program SUNDAY October 23, 2005
    FOCS 2005 Program SUNDAY October 23, 2005 Talks in Grand Ballroom, 17th floor Session 1: 8:50am – 10:10am Chair: Eva´ Tardos 8:50 Agnostically Learning Halfspaces Adam Kalai, Adam Klivans, Yishay Mansour and Rocco Servedio 9:10 Noise stability of functions with low influences: invari- ance and optimality The 46th Annual IEEE Symposium on Elchanan Mossel, Ryan O’Donnell and Krzysztof Foundations of Computer Science Oleszkiewicz October 22-25, 2005 Omni William Penn Hotel, 9:30 Every decision tree has an influential variable Pittsburgh, PA Ryan O’Donnell, Michael Saks, Oded Schramm and Rocco Servedio Sponsored by the IEEE Computer Society Technical Committee on Mathematical Foundations of Computing 9:50 Lower Bounds for the Noisy Broadcast Problem In cooperation with ACM SIGACT Navin Goyal, Guy Kindler and Michael Saks Break 10:10am – 10:30am FOCS ’05 gratefully acknowledges financial support from Microsoft Research, Yahoo! Research, and the CMU Aladdin center Session 2: 10:30am – 12:10pm Chair: Satish Rao SATURDAY October 22, 2005 10:30 The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative Type Metrics Tutorials held at CMU University Center into `1 [Best paper award] Reception at Omni William Penn Hotel, Monongahela Room, Subhash Khot and Nisheeth Vishnoi 17th floor 10:50 The Closest Substring problem with small distances Tutorial 1: 1:30pm – 3:30pm Daniel Marx (McConomy Auditorium) Chair: Irit Dinur 11:10 Fitting tree metrics: Hierarchical clustering and Phy- logeny Subhash Khot Nir Ailon and Moses Charikar On the Unique Games Conjecture 11:30 Metric Embeddings with Relaxed Guarantees Break 3:30pm – 4:00pm Ittai Abraham, Yair Bartal, T-H.
    [Show full text]
  • Self-Sorting SSD: Producing Sorted Data Inside Active Ssds
    Foreword This volume contains the papers presentedat the Third Israel Symposium on the Theory of Computing and Systems (ISTCS), held in Tel Aviv, Israel, on January 4-6, 1995. Fifty five papers were submitted in response to the Call for Papers, and twenty seven of them were selected for presentation. The selection was based on originality, quality and relevance to the field. The program committee is pleased with the overall quality of the acceptedpapers and, furthermore, feels that many of the papers not used were also of fine quality. The papers included in this proceedings are preliminary reports on recent research and it is expected that most of these papers will appear in a more complete and polished form in scientific journals. The proceedings also contains one invited paper by Pave1Pevzner and Michael Waterman. The program committee thanks our invited speakers,Robert J. Aumann, Wolfgang Paul, Abe Peled, and Avi Wigderson, for contributing their time and knowledge. We also wish to thank all who submitted papers for consideration, as well as the many colleagues who contributed to the evaluation of the submitted papers. The latter include: Noga Alon Alon Itai Eric Schenk Hagit Attiya Roni Kay Baruch Schieber Yossi Azar Evsey Kosman Assaf Schuster Ayal Bar-David Ami Litman Nir Shavit Reuven Bar-Yehuda Johan Makowsky Richard Statman Shai Ben-David Yishay Mansour Ray Strong Allan Borodin Alain Mayer Eli Upfal Dorit Dor Mike Molloy Moshe Vardi Alon Efrat Yoram Moses Orli Waarts Jack Feldman Dalit Naor Ed Wimmers Nissim Francez Seffl Naor Shmuel Zaks Nita Goyal Noam Nisan Uri Zwick Vassos Hadzilacos Yuri Rabinovich Johan Hastad Giinter Rote The work of the program committee has been facilitated thanks to software developed by Rob Schapire and FOCS/STOC program chairs.
    [Show full text]
  • Combinatorial Topology and Distributed Computing Copyright 2010 Herlihy, Kozlov, and Rajsbaum All Rights Reserved
    Combinatorial Topology and Distributed Computing Copyright 2010 Herlihy, Kozlov, and Rajsbaum All rights reserved Maurice Herlihy Dmitry Kozlov Sergio Rajsbaum February 22, 2011 DRAFT 2 DRAFT Contents 1 Introduction 9 1.1 DecisionTasks .......................... 10 1.2 Communication.......................... 11 1.3 Failures .............................. 11 1.4 Timing............................... 12 1.4.1 ProcessesandProtocols . 12 1.5 ChapterNotes .......................... 14 2 Elements of Combinatorial Topology 15 2.1 Theobjectsandthemaps . 15 2.1.1 The Combinatorial View . 15 2.1.2 The Geometric View . 17 2.1.3 The Topological View . 18 2.2 Standardconstructions. 18 2.3 Chromaticcomplexes. 21 2.4 Simplicial models in Distributed Computing . 22 2.5 ChapterNotes .......................... 23 2.6 Exercises ............................. 23 3 Manifolds, Impossibility,DRAFT and Separation 25 3.1 ManifoldComplexes ....................... 25 3.2 ImmediateSnapshots. 28 3.3 ManifoldProtocols .. .. .. .. .. .. .. 34 3.4 SetAgreement .......................... 34 3.5 AnonymousProtocols . .. .. .. .. .. .. 38 3.6 WeakSymmetry-Breaking . 39 3.7 Anonymous Set Agreement versus Weak Symmetry Breaking 40 3.8 ChapterNotes .......................... 44 3.9 Exercises ............................. 44 3 4 CONTENTS 4 Connectivity 47 4.1 Consensus and Path-Connectivity . 47 4.2 Consensus in Asynchronous Read-Write Memory . 49 4.3 Set Agreement and Connectivity in Higher Dimensions . 53 4.4 Set Agreement and Read-Write memory . 59 4.4.1 Critical States . 63 4.5 ChapterNotes .......................... 64 4.6 Exercises ............................. 64 5 Colorless Tasks 67 5.1 Pseudospheres .......................... 68 5.2 ColorlessTasks .......................... 72 5.3 Wait-Free Read-Write Memory . 73 5.3.1 Read-Write Protocols and Pseudospheres . 73 5.3.2 Necessary and Sufficient Conditions . 75 5.4 Read-Write Memory with k-Set Agreement .
    [Show full text]
  • SIGACT Viability
    SIGACT Name and Mission: SIGACT: SIGACT Algorithms & Computation Theory The primary mission of ACM SIGACT (Association for Computing Machinery Special Interest Group on Algorithms and Computation Theory) is to foster and promote the discovery and dissemination of high quality research in the domain of theoretical computer science. The field of theoretical computer science is interpreted broadly so as to include algorithms, data structures, complexity theory, distributed computation, parallel computation, VLSI, machine learning, computational biology, computational geometry, information theory, cryptography, quantum computation, computational number theory and algebra, program semantics and verification, automata theory, and the study of randomness. Work in this field is often distinguished by its emphasis on mathematical technique and rigor. Newsletters: Volume Issue Issue Date Number of Pages Actually Mailed 2014 45 01 March 2014 N/A 2013 44 04 December 2013 104 27-Dec-13 44 03 September 2013 96 30-Sep-13 44 02 June 2013 148 13-Jun-13 44 01 March 2013 116 18-Mar-13 2012 43 04 December 2012 140 29-Jan-13 43 03 September 2012 120 06-Sep-12 43 02 June 2012 144 25-Jun-12 43 01 March 2012 100 20-Mar-12 2011 42 04 December 2011 104 29-Dec-11 42 03 September 2011 108 29-Sep-11 42 02 June 2011 104 N/A 42 01 March 2011 140 23-Mar-11 2010 41 04 December 2010 128 15-Dec-10 41 03 September 2010 128 13-Sep-10 41 02 June 2010 92 17-Jun-10 41 01 March 2010 132 17-Mar-10 Membership: based on fiscal year dates 1st Year 2 + Years Total Year Professional
    [Show full text]
  • Federated Computing Research Conference, FCRC’96, Which Is David Wise, Steering Being Held May 20 - 28, 1996 at the Philadelphia Downtown Marriott
    CRA Workshop on Academic Careers Federated for Women in Computing Science 23rd Annual ACM/IEEE International Symposium on Computing Computer Architecture FCRC ‘96 ACM International Conference on Research Supercomputing ACM SIGMETRICS International Conference Conference on Measurement and Modeling of Computer Systems 28th Annual ACM Symposium on Theory of Computing 11th Annual IEEE Conference on Computational Complexity 15th Annual ACM Symposium on Principles of Distributed Computing 12th Annual ACM Symposium on Computational Geometry First ACM Workshop on Applied Computational Geometry ACM/UMIACS Workshop on Parallel Algorithms ACM SIGPLAN ‘96 Conference on Programming Language Design and Implementation ACM Workshop of Functional Languages in Introductory Computing Philadelphia Skyline SIGPLAN International Conference on Functional Programming 10th ACM Workshop on Parallel and Distributed Simulation Invited Speakers Wm. A. Wulf ACM SIGMETRICS Symposium on Burton Smith Parallel and Distributed Tools Cynthia Dwork 4th Annual ACM/IEEE Workshop on Robin Milner I/O in Parallel and Distributed Systems Randy Katz SIAM Symposium on Networks and Information Management Sponsors ACM CRA IEEE NSF May 20-28, 1996 SIAM Philadelphia, PA FCRC WELCOME Organizing Committee Mary Jane Irwin, Chair Penn State University Steve Mahaney, Vice Chair Rutgers University Alan Berenbaum, Treasurer AT&T Bell Laboratories Frank Friedman, Exhibits Temple University Sampath Kannan, Student Coordinator Univ. of Pennsylvania Welcome to the second Federated Computing Research Conference, FCRC’96, which is David Wise, Steering being held May 20 - 28, 1996 at the Philadelphia downtown Marriott. This second Indiana University FCRC follows the same model of the highly successful first conference, FCRC’93, in Janice Cuny, Careers which nine constituent conferences participated.
    [Show full text]
  • On the Nature of the Theory of Computation (Toc)∗
    Electronic Colloquium on Computational Complexity, Report No. 72 (2018) On the nature of the Theory of Computation (ToC)∗ Avi Wigderson April 19, 2018 Abstract [This paper is a (self contained) chapter in a new book on computational complexity theory, called Mathematics and Computation, available at https://www.math.ias.edu/avi/book]. I attempt to give here a panoramic view of the Theory of Computation, that demonstrates its place as a revolutionary, disruptive science, and as a central, independent intellectual discipline. I discuss many aspects of the field, mainly academic but also cultural and social. The paper details of the rapid expansion of interactions ToC has with all sciences, mathematics and philosophy. I try to articulate how these connections naturally emanate from the intrinsic investigation of the notion of computation itself, and from the methodology of the field. These interactions follow the other, fundamental role that ToC played, and continues to play in the amazing developments of computer technology. I discuss some of the main intellectual goals and challenges of the field, which, together with the ubiquity of computation across human inquiry makes its study and understanding in the future at least as exciting and important as in the past. This fantastic growth in the scope of ToC brings significant challenges regarding its internal orga- nization, facilitating future interactions between its diverse parts and maintaining cohesion of the field around its core mission of understanding computation. Deliberate and thoughtful adaptation and growth of the field, and of the infrastructure of its community are surely required and such discussions are indeed underway.
    [Show full text]
  • Concurrent Data Structures
    1 Concurrent Data Structures 1.1 Designing Concurrent Data Structures ::::::::::::: 1-1 Performance ² Blocking Techniques ² Nonblocking Techniques ² Complexity Measures ² Correctness ² Verification Techniques ² Tools of the Trade 1.2 Shared Counters and Fetch-and-Á Structures ::::: 1-12 1.3 Stacks and Queues :::::::::::::::::::::::::::::::::::: 1-14 1.4 Pools :::::::::::::::::::::::::::::::::::::::::::::::::::: 1-17 1.5 Linked Lists :::::::::::::::::::::::::::::::::::::::::::: 1-18 1.6 Hash Tables :::::::::::::::::::::::::::::::::::::::::::: 1-19 1.7 Search Trees:::::::::::::::::::::::::::::::::::::::::::: 1-20 Mark Moir and Nir Shavit 1.8 Priority Queues :::::::::::::::::::::::::::::::::::::::: 1-22 Sun Microsystems Laboratories 1.9 Summary ::::::::::::::::::::::::::::::::::::::::::::::: 1-23 The proliferation of commercial shared-memory multiprocessor machines has brought about significant changes in the art of concurrent programming. Given current trends towards low- cost chip multithreading (CMT), such machines are bound to become ever more widespread. Shared-memory multiprocessors are systems that concurrently execute multiple threads of computation which communicate and synchronize through data structures in shared memory. The efficiency of these data structures is crucial to performance, yet designing effective data structures for multiprocessor machines is an art currently mastered by few. By most accounts, concurrent data structures are far more difficult to design than sequential ones because threads executing concurrently may interleave
    [Show full text]
  • Table of Contents
    Table of Contents The 2010 Edsger W. Dijkstra Prize in Distributed Computing 1 Invited Lecture I: Consensus (Session la) The Power of Abstraction (Invited Lecture Abstract) 3 Barbara Liskov Fast Asynchronous Consensus with Optimal Resilience 4 Ittai Abraham, Marcos K. Aguilera, and Dahlia Malkhi Transactions (Session lb) Transactions as the Foundation of a Memory Consistency Model 20 Luke Dalessandro, Michael L. Scott, and Michael F. Spear The Cost of Privatization 35 Hagit Attiya and Eshcar Hillel A Scalable Lock-Free Universal Construction with Best Effort Transactional Hardware 50 Francois Carouge and Michael Spear Window-Based Greedy Contention Management for Transactional Memory 64 Gokarna Sharma, Brett Estrade, and Costas Busch Shared Memory Services and Concurrency (Session lc) Scalable Flat-Combining Based Synchronous Queues 79 Danny Hendler, Hai Incze, Nir Shavit, and Moran Tzafrir Fast Randomized Test-and-Set and Renaming 94 Dan Alistarh, Hagit Attiya, Seth Gilbert, Andrei Giurgiu, and Rachid Guerraoui Concurrent Computing and Shellable Complexes 109 Maurice Herlihy and Sergio Rajsbaum Bibliografische Informationen digitalisiert durch http://d-nb.info/1005454485 XII Table of Contents Brief Announcements I (Session Id) Hybrid Time-Based Transactional Memory 124 Pascal Felber, Christof Fetzer, Patrick Marlier, Martin Nowack, and Torvald Riegel Quasi-Linearizability: Relaxed Consistency for Improved Concurrency 127 Yehuda Afek, Guy Korland, and Eitan Yanovsky Fast Local-Spin Abortable Mutual Exclusion with Bounded Space 130 Hyonho
    [Show full text]
  • The Topological Structure of Asynchronous Computability
    The Topological Structure of Asynchronous Computability MAURICE HERLIHY Brown University, Providence, Rhode Island AND NIR SHAVIT Tel-Aviv University, Tel-Aviv Israel Abstract. We give necessary and sufficient combinatorial conditions characterizing the class of decision tasks that can be solved in a wait-free manner by asynchronous processes that communicate by reading and writing a shared memory. We introduce a new formalism for tasks, based on notions from classical algebraic and combinato- rial topology, in which a task’s possible input and output values are each associated with high- dimensional geometric structures called simplicial complexes. We characterize computability in terms of the topological properties of these complexes. This characterization has a surprising geometric interpretation: a task is solvable if and only if the complex representing the task’s allowable inputs can be mapped to the complex representing the task’s allowable outputs by a function satisfying certain simple regularity properties. Our formalism thus replaces the “operational” notion of a wait-free decision task, expressed in terms of interleaved computations unfolding in time, by a static “combinatorial” description expressed in terms of relations among topological spaces. This allows us to exploit powerful theorems from the classic literature on algebraic and combinatorial topology. The approach yields the first impossibility results for several long-standing open problems in distributed computing, such as the “renaming” problem of Attiya et al., and the “k-set agreement” problem of Chaudhuri. Preliminary versions of these results appeared as HERLIHY,M.P.,AND SHAVIT, N. 1993. The asynchronous computability theorem for t-resilient tasks. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (San Diego, Calif., May 16–18).
    [Show full text]
  • Debugging and Profiling of Transactional Programs
    Abstract of \Debugging and Profiling of Transactional Programs" by Yossi Lev, Ph.D., Brown Uni- versity, May 2010. Transactional memory (TM) has become increasingly popular in recent years as a promising programming paradigm for writing correct and scalable concurrent pro- grams. Despite its popularity, there has been very little work on how to debug and profile transactional programs. This dissertation addresses this situation by exploring the debugging and profiling needs of transactional programs, explaining how the tools should change to support these needs, and describing a preliminary implementation of infrastructure to support this change. Debugging and Profiling of Transactional Programs by Yossi Lev B. Sc., Tel Aviv University, Israel, 1999 M. Sc., Tel Aviv University, Israel, 2004 M. S., Brown University, Providence, RI, USA, 2004 A dissertation submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in the Department of Computer Science at Brown University Providence, Rhode Island May 2010 c Copyright 2010 by Yossi Lev This dissertation by Yossi Lev is accepted in its present form by the Department of Computer Science as satisfying the dissertation requirement for the degree of Doctor of Philosophy. Date Maurice Herlihy, Director Recommended to the Graduate Council Date Mark Moir, Reader Date John Jannotti, Reader Approved by the Graduate Council Date Dean of the Graduate School iii Vitae Contact information Yossi Lev 736 W 187th st New York, NY 10033 (617) 276-5617 [email protected] http://www.cs.brown.edu/people/levyossi/ Research Interests Concurrent Programming Parallel Algorithms Transactional Memory Concurrent Datastructures Architectural Support Place of Birth Israel.
    [Show full text]
  • The Theoretic Center of Computer Science2
    The Theoretic Center of Computer Science2 Michael Kuhn and Roger Wattenhofer Computer Engineering and Networks Laboratory ETH Zurich 8092 Zurich, Switzerland fkuhnmi,[email protected] Abstract In this article we examine computer science in general, and theory and distributed computing in par- ticular. We present a map of the computer science conferences, speculating about the center of computer science. In addition we present some trends and developments. Finally we revisit centrality, wondering about the central actors in computer science. This article is a printed version of a frivolous PODC 2007 business meeting talk, held by the second author. In an attempt to address a broader audience we have ex- tended the content by data about theory conferences and computer science in general. Still, the character of the information remains the same, meaning our investigations should not be taken too seriously. 1 Introduction People have always been fascinated by centrality. They have been afraid of the middle of the night, and estimated time based on the middle of the day. Most people also like to be the center of attention, and look at things in egocentric ways. Not surprisingly, the Babylonians placed themselves in the middle of their world map. And even today, almost any country claims to be the center of its continent. Noteworthy is surely also the question about the center of the universe. Among many others Ptolemy, Copernicus, and Galileo have thought about it, some of them at the risk of life.3 Recently, when presenting some material about conference similarities, we have been asked a question of similar nature by a colleague.
    [Show full text]
  • Goldwasser Transcript Final with Timestamps)
    A. M. Turing Award Oral History Interview with Shafi Goldwasser by Alon Rosen Weizmann Institute, Rehovat, Israel November 23, 2017 Prof. Rosen: Hi. My name is Alon Rosen. I am a professor of computer science at the Herzliya Interdisciplinary Center in Israel. Today is the 23rd of November 2017 and I’m here in Rehovot at the Weizmann Institute of Science toGether with Shafi Goldwasser, who is beinG interviewed as part of the ACM TurinG Award Winners project. Hi, Shafi. We are here to conduct an interview about your life, about your achievements. We will Go chronoloGically accordinG … Generally speakinG chronoloGically and we will talk at two levels. The first level will be a General audience type of level and the second level will be more specific, more oriented towards people that specialize in the subject and are interested in the details. Let’s beGin. So could you Give us some family background? I’d be interested in your parents, where they came from, what they did, and maybe your earliest memories. Prof. Goldwasser: Okay. Well, first of all, thank you Alon for takinG this opportunity to interview me. My family background? I was born in New York actually, in Sea Gate, which is riGht outside New York City. It’s sort of a beach community. We were a family of four. I have an older brother who’s six years older than me and my parents were Israelis who were actually visitinG the United States for a period of time. My which is the health ,( תפוק םילוח ) ”father was representinG the Israel “Kupat Cholim services at the time.
    [Show full text]