We investigate properties of an identification type of recursive functions, called co-learning. The inductive process refutes all possible programs but one, and, by definition, this program is demanded to be correct. ...
详细信息
ISBN:
(纸本)9781629939773
We investigate properties of an identification type of recursive functions, called co-learning. The inductive process refutes all possible programs but one, and, by definition, this program is demanded to be correct. This type of identification was introduced in [6]. M. Kummer in the paper [9] showed that this type characterizes computable numberings possessing a certain property thus answering a long standing open problem by Yu. L. Ershov [2]. We consider probabilistic algorithms of co-learning and establish an infinite discrete hierarchy of classes of recursive functions. The parameters of this new hierarchy coincide with the hierarchy by R. Freivalds [4] for probabilistic algorithms of finite identification.
Byzantine reliable broadcast is a fundamental primitive in distributed systems that allows a set of processes to agree on a message broadcast by a dedicated process, even when some of them are malicious (Byzantine). I...
详细信息
Massively parallel computers (MPCs) introduce new requirements for system-level fault diagnosis, like handling a huge number of processing elements in a heterogeneous system. They also have specific attributes, such a...
详细信息
Massively parallel computers (MPCs) introduce new requirements for system-level fault diagnosis, like handling a huge number of processing elements in a heterogeneous system. They also have specific attributes, such as regular topology and low local complexity. Traditional deterministic methods of system-level diagnosis did not consider these issues. This paper presents a new approach, called local information diagnosis that exploits the characteristics of massively parallel systems, The paper defines the diagnostic model, which is based on generalized test invalidation to handle inhomogeneity in multiprocessors. Five effective probabilistic diagnostic algorithms using the proposed method are also given, and their space and time complexity are estimated.
The flash memory is being used to an ever-increasing extent in consumer electronics for the purpose of the dominant secondary storage device. Aiming at the buffer replacement policy for flash-based storage devices in ...
详细信息
The flash memory is being used to an ever-increasing extent in consumer electronics for the purpose of the dominant secondary storage device. Aiming at the buffer replacement policy for flash-based storage devices in efficiency, a new efficient flash-aware buffer replacement algorithm based on probability is proposed, where three LRU linked lists are used to manage the buffer. The proposed algorithm delays the eviction of hot clean pages by evicting the cold clean pages preferentially. When the cold clean linked list is empty, the pages in the cold dirty linked list will be expelled from the buffer with a higher probability, whereas the probability of evicting the hot clean pages is lower. In that way, hot clean pages cannot reside in the buffer for a long time. Moreover, an interpretation model for describing the proposed algorithm is developed from FSM. Highlights of the experiments include an evaluation with the dynamic write/read ratio traces. Experimental results and detailed comparisons with other similar best-known competitor algorithms on the static write/read ratio traces and the dynamic write/read ratio traces show that not only does the proposed algorithm reduce the write counts, but also it offers a trade-off between the hit ratio and the overall runtime in most cases. The adaptability of the proposed method is also verified by the experiments on various kinds of traces including random, read-most, write-most and Zipf.(1)
Probe defects are a major source of noise in gene expression studies. While existing approaches detect noisy probes based on external information such as genomic alignments, we introduce and validate a targeted probab...
详细信息
Probe defects are a major source of noise in gene expression studies. While existing approaches detect noisy probes based on external information such as genomic alignments, we introduce and validate a targeted probabilistic method for analyzing probe reliability directly from expression data and independently of the noise source. This provides insights into the various sources of probe-level noise and gives tools to guide probe design.
Dijkstra's algorithm to solve the shortest path problem (SPP) is a very well-known algorithm. When applied to real situations, although the shortest path can be computed with Dijkstra's algorithm, it is not al...
详细信息
Dijkstra's algorithm to solve the shortest path problem (SPP) is a very well-known algorithm. When applied to real situations, although the shortest path can be computed with Dijkstra's algorithm, it is not always the one that is chosen. In traffic situations, for example, the driver may not know the exact length of the lanes or the shortest path to follow. Even more compelling is the fact that although the driver knows the shortest route, he/she may prefer choosing a different route. In this paper we present the new algorithm PEDA (probabilistic Extension of Dijkstra's Algorithm) which introduces probabilistic changes in the weight of the edges and also in the decisions when choosing the shortest path. When PEDA is applied to traffic flow, more realistic simulations, in which the shortest path is not always chosen, are obtained. This more accurately simulates the more normal behavior of drivers. As an example of an application, we introduce the ATISMART+ model, an extension of the ATISMART model, where an accelerated-time simulation of car traffic in a smart city was described. In that previous work, all cars in the system used Dijkstra's algorithm to choose improved ATISMART(+) model, for accelerated time simulations of traffic flow in smart cities, uses the new PEDA algorithm. The results obtained show that ATISMART+ produces more realistic simulations considering different drivers' behaviors. (C) 2014 Elsevier Inc. All rights reserved.
In this paper we present a new probabilistic clock synchronization algorithm, its prototype implementation and experimental results. The algorithm follows the client-server programming paradigm and is designed to work...
详细信息
In this paper we present a new probabilistic clock synchronization algorithm, its prototype implementation and experimental results. The algorithm follows the client-server programming paradigm and is designed to work in a departmental environment with few servers and a number of clients connected through an arbitrary network topology. At the core of the algorithm is a remote clock reading method that mitigates the negative effects of message delay uncertainty. The implementation proves the effectiveness of this approach and corroborates the theoretical speculations.
A probabilistic sequential polling protocol (PSPP) is presented for the estimation of the sensor population in a large-scale sensor network with a mobile access point. It is shown that PSPP requires O(log(2) N) sensor...
详细信息
A probabilistic sequential polling protocol (PSPP) is presented for the estimation of the sensor population in a large-scale sensor network with a mobile access point. It is shown that PSPP requires O(log(2) N) sensor transmissions and a total of O((log(2) N)(2)) polls to achieve an arbitrarily predetermined level of accuracy.
Centroidal Voronoi tessellations (CVTs) are Voronoi tessellations of a region such that the generating points of the tessellations are also the centroids of the corresponding Voronoi cells. In this paper, some probabi...
详细信息
Centroidal Voronoi tessellations (CVTs) are Voronoi tessellations of a region such that the generating points of the tessellations are also the centroids of the corresponding Voronoi cells. In this paper, some probabilistic methods for determining CVTs and their parallel implementations on distributed memory systems are presented. By using multi-sampling in a new probabilistic algorithm we introduce, more accurate and efficient approximations of CVTs are obtained without the need to explicit construct Voronoi diagrams. The new algorithm lends itself well to parallelization, i.e., near prefect linear speed up in the number of processors is achieved. The results of computational experiments performed on a CRAY T3E-600 system are provided which illustrate the superior sequential and parallel performance of the new algorithm when compared to existing algorithms. In particular, for the same amount of work, the new algorithms produce significantly more accurate CVTs. (C) 2002 Elsevier Science B.V. All rights reserved.
In this paper, we introduce probabilistic snap-stabilization. We relax the definition of deterministic snap-stabilization without compromising its safety guarantees. In an unsafe environment, a probabilistically snap-...
详细信息
In this paper, we introduce probabilistic snap-stabilization. We relax the definition of deterministic snap-stabilization without compromising its safety guarantees. In an unsafe environment, a probabilistically snap-stabilizing algorithm satisfies its safety property immediately after the last fault;whereas its liveness property is only ensured with probability 1. We show that probabilistic snap- stabilization is more expressive than its deterministic counterpart. Indeed, we propose two probabilistic snap-stabilizing algorithms for a problem having no deterministic snap- or self-stabilizing solution: guaranteed service leader election in arbitrary anonymous networks. This problem consists in computing a correct answer to each process that initiates the question "Am I the leader of the network?," i.e., (1) processes always compute the same answer to that question and (2) exactly one process computes the answer true. Our solutions being probabilistically snap-stabilizing, the answers are only delivered within an almost surely finite time;however any delivered answer is correct, regardless the arbitrary initial configuration and provided the question has been properly started. (C) 2015 Elsevier B.V. All rights reserved.
暂无评论