Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/872035acmconferencesBook PagePublication PagespodcConference Proceedingsconference-collections
PODC '03: Proceedings of the twenty-second annual symposium on Principles of distributed computing
ACM2003 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
PODC03: Twenty-Second Annual ACM Symposium on Principles of Distributed Computing Boston Massachusetts July 13 - 16, 2003
ISBN:
978-1-58113-708-8
Published:
13 July 2003
Sponsors:

Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Abstract Section
Abstract

This volume contains the 35 papers and 16 brief announcements presented at the 22nd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), which was held from July 13 to 16, 2003, in Boston, Massachusetts, USA. PODC included a special celebration honoring the work of Michael Fischer. This volume includes two talks of this celebration. This year, PODC included a Special Security Track chaired by Amir Herzberg. The goal of this track was to promote interaction between the distributed computing and the security communities. This volume contains two invited talks to this Track, as well as 8 papers and 5 brief announcements (included in the count of 35 papers and 16 brief announcements above).The contributed papers were selected from 208 submissions to the regular presentations track and 18 submissions to the brief announcements track in electronic discussions and at a meeting of the program committee on March 29 and 30, 2003 at the Kendall Hotel in Cambridge, Massachusetts. The regular presentations were read and evaluated by the program committee, but were not formally refereed; it is expected that many of them will appear in more polished form in fully refereed scientific journals. A selection of papers will appear in a special issue of Distributed Computing dedicated to PODC 2003. The brief announcements were screened by the program committee based on short abstracts; it is expected that many of them will be published elsewhere (including in other conferences).

Article
Cryptography and competition policy: issues with 'trusted computing'

The most significant strategic development in information technology over the past year has been 'trusted computing'. This is popularly associated with Microsoft's 'Palladium' project, recently renamed 'NGSCB'. In this paper, I give an outline of the ...

Article
Working with mike on distributed computing theory, 1978--1992

I have had the honor of working with Mike Fischer on no fewer than 15 projects in the area of distributed computing theory, plus a few others in other areas. The results of some of these projects, like the one with Mike Paterson on impossibility of ...

Article
Simple and fast optimistic protocols for fair electronic exchange

Assume each of two parties has something the other wants. Then, a fair exchange is an electronic protocol guaranteeing that either both parties get what they want, or none of them does. Protocols relying on traditional trusted parties easily guarantee ...

Article
Fischer's cryptographic protocols

This note is prepared for Michael Fischer's 60th birthday celebration at PODC 2003. In it, I briefly describe some of Michael Fischer's work on distributed cryptographic protocols.

Article
Constant-time distributed dominating set approximation

Finding a small dominating set is one of the most fundamental problems of traditional graph theory. In this paper, we present a new fully distributed approximation algorithm based on LP relaxation techniques. For an arbitrary parameter k and maximum ...

Article
Distributed error confinement

We initiate the study of error confinement in distributed applications, where the goal is that only nodes that were directly hit by a fault may deviate from their correct external behavior, and only temporarily. The external behavior of all other nodes ...

Article
Compact roundtrip routing with topology-independent node names

This paper presents compact roundtrip routing schemes with local tables of size Õ(√n) and stretch 6 for any directed network with arbitrary edge weights; and with local tables of size Õ(√−1n2/k) and stretch min((2k/2 −1)(k + √), 16k 2+ 8 k − 8), for any ...

Article
A new approach to on-demand loop-free routing in ad hoc networks

A new protocol is presented for on-demand loop-free routing in ad hoc networks. The new protocol, called labeled distance routing (LDR) protocol, uses a distance invariant to establish an ordering criterion and per-destination sequence numbers to reset ...

Article
Geometric ad-hoc routing: of theory and practice

All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc routing. In particular we consider two aspects: We propose a new geometric ...

Article
Broadcasting in undirected ad hoc radio networks

We consider distributed broadcasting in radio networks, modeled as undirected graphs, whose nodes have no information on the topology of the network, nor even on their immediate neighborhood. For randomized broadcasting, we give an algorithm working in ...

Article
Operation-valency and the cost of coordination

This paper introduces operation-valency, a generalization of the valency proof technique originated by Fischer, Lynch, and Paterson. By focusing on critical events that influence the return values of individual operations rather then on critical events ...

Article
Software transactional memory for dynamic-sized data structures

We propose a new form of software transactional memory (STM) designed to support dynamic-sized data structures, and we describe a novel non-blocking implementation. The non-blocking property we consider is obstruction-freedom. Obstruction-freedom is ...

Article
Split-ordered lists: lock-free extensible hash tables

We present the first lock-free implementation of an extensible hash table running on current architectures. It provides concurrent insert, delete, and search operations with an expected O(1) cost. It consists of very simple code, easily implementable ...

Article
Article
Brief announcement: dynamic group communication
Article
Scalable and dynamic quorum systems

We investigate issues related to the probe complexity of quorum systems and their implementation in a dynamic environment. Our contribution is twofold. The first regards the algorithmic complexity of finding a quorum in case of random failures. We show ...

Article
Peer-to-peer systems for prefix search

This paper presents a general methodology for building message-passing peer-to-peer systems capable of performing prefix search for arbitrary user-defined names. Our methodology allows to achieve even load distribution, high fault-tolerance, and low-...

Article
Routing networks for distributed hash tables

Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing deterministic routing topologies is presented. Using this technique, classical ...

Article
Asynchronous resource discovery

Consider a dynamic, large-scale communication infrastructure (e.g., the Internet) where nodes (e.g., in a peer to peer system) can communicate only with nodes whose id (e.g., IP address) are known to them. One of the basic building blocks of such a ...

Article
Brief announcement: an overview of the content-addressable network D2B

In this brief announcement, we overview the structure and performances of the distributed hash table D2B described in [2] (a preliminary version appeared in [3]).

Article
Brief announcement: deterministic skipnet

We present a deterministic scalable overlay network. In contrast, most previous overlays use randomness or hashing (pseudo-randomness) to achieve a uniform distribution of data and routing traffic.

Article
An asynchronous protocol for distributed computation of RSA inverses and its applications

This paper presents an efficient asynchronous protocol to compute RSA inverses with respect to a public RSA modulus N whose factorization is secret and shared among a group of parties. Given two numbers x and e, the protocol computes y such that yex (...

Article
Efficient revocation and threshold pairing based cryptosystems

Boneh, Ding, Tsudik and Wong recently proposed a way for obtaining fast revocation of RSA keys. Their method consists in using security mediators that keep a piece of each user's private key in such a way that every decrytion or signature operation ...

Article
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures

Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allows two parties to exchange items in a fair way so that either each party ...

Article
Oblivious signature-based envelope

Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the flow of sensitive ...

Article
Scalable public-key tracing and revoking

Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is fingerprinted and when a pirate decoder is discovered, the authorities ...

Article
Distributed consensus in the presence of sectional faults

Consider a synchronous network of n players, each with a local input. The goal of distributed consensus is to globally agree on one of the valid inputs even if some non-trivial subset of the players are faulty. By valid input, we mean the input of any ...

Contributors
  • Boston College
  • National Autonomous University of Mexico

Recommendations

Acceptance Rates

PODC '03 Paper Acceptance Rate 51 of 226 submissions, 23%;
Overall Acceptance Rate 740 of 2,477 submissions, 30%
YearSubmittedAcceptedRate
PODC '231102926%
PODC '191734828%
PODC '181634125%
PODC '171543825%
PODC '161494027%
PODC '151914524%
PODC '141413928%
PODC '131453726%
PODC '091102725%
PODC '032265123%
PODC '021494329%
PODC '011183933%
PODC '001173227%
PODC '971494631%
PODC '961176959%
PODC '951324937%
PODC '941336750%
Overall2,47774030%