Probabilistic Methods in Concurrency Lecture 3 The pi-calculus hierarchy: separation results Catuscia Palamidessi

Slides:



Advertisements
Similar presentations
08 April PPS - Groupe de Travail en Concurrence The probabilistic asynchronous -calculus Catuscia Palamidessi, INRIA Futurs, France.
Advertisements

1 Decomposing Hypergraphs with Hypertrees Raphael Yuster University of Haifa - Oranim.
Techniques for Proving the Completeness of a Proof System Hongseok Yang Seoul National University Cristiano Calcagno Imperial College.
N-Consensus is the Second Strongest Object for N+1 Processes Eli Gafni UCLA Petr Kuznetsov Max Planck Institute for Software Systems.
Cs4432concurrency control1 CS4432: Database Systems II Lecture #21 Concurrency Control : Theory Professor Elke A. Rundensteiner.
Paris, 3 Dec 2007MPRI Course on Concurrency MPRI – Course on Concurrency Lecture 12 Probabilistic process calculi Catuscia Palamidessi LIX, Ecole Polytechnique.
Cs4432concurrency control1 CS4432: Database Systems II Lecture #22 Concurrency Control Professor Elke A. Rundensteiner.
Distributed Computing 1. Lower bound for leader election on a complete graph Shmuel Zaks ©
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
01/05/2015 Agay Spring School, March'02 Mobility 1 : the Pi Calculus Cédric Fournet Microsoft Research Cambridge.
Failure detector The story goes back to the FLP’85 impossibility result about consensus in presence of crash failures. If crash can be detected, then consensus.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Probabilistic Methods in Concurrency Lecture 9 Other uses of randomization: a randomized protocol for anonymity Catuscia Palamidessi
Bangalore, 2 Feb 2005Probabilistic security protocols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture.
Byzantine Generals Problem: Solution using signed messages.
Section 13 Homomorphisms Definition A map  of a group G into a group G’ is a homomorphism if the homomophism property  (ab) =  (a)  (b) Holds for.
Course on Probabilistic Methods in Concurrency (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1 The pi-calculus and the asynchronous.
1 Introduction to Computability Theory Lecture13: Mapping Reductions Prof. Amos Israeli.
CPSC 668Set 4: Asynchronous Lower Bound for LE in Rings1 CPSC 668 Distributed Algorithms and Systems Fall 2009 Prof. Jennifer Welch.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
Ivan Lanese Computer Science Department University of Bologna/INRIA Italy On the Expressive Power of Primitives for Compensation Handling Joint work with.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Beyond selfish routing: Network Formation Games. Network Formation Games NFGs model the various ways in which selfish agents might create/use networks.
Complexity1 Pratt’s Theorem Proved. Complexity2 Introduction So far, we’ve reduced proving PRIMES  NP to proving a number theory claim. This is our next.
Variable-Length Codes: Huffman Codes
Prof. Diletta Romana Cacciagrano.  From sequential over concurrent to mobile systems  Introduction to the Pi-Calculus  Operational Equivalences based.
Index FAQ Limits of Sequences of Real Numbers Sequences of Real Numbers Limits through Rigorous Definitions The Squeeze Theorem Using the Squeeze Theorem.
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
CSCI 4325 / 6339 Theory of Computation Zhixiang Chen.
Lecture #12 Distributed Algorithms (I) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Probabilistic Methods in Concurrency Lecture 4 Problems in distributed systems for which only randomized solutions exist Catuscia Palamidessi
11 February CdP INRIA Futurs Catuscia Palamidessi INRIA Saclay.
Distributed Algorithms – 2g1513 Lecture 9 – by Ali Ghodsi Fault-Tolerance in Distributed Systems.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
10 December 2002ENS Cachan1 Generalized dining philosophers Catuscia Palamidessi, INRIA in collaboration with Mihaela Oltea Herescu, IBM Michael Pilquist,
MPRI – Course on Concurrency Probabilistic methods in Concurrency Catuscia Palamidessi INRIA Futurs and LIX
11/19/20151 Metodi formali nello sviluppo software a.a.2013/2014 Prof.Anna Labella.
Probabilistic Anonymity Mohit Bhargava, IIT New Delhi Catuscia Palamidessi, INRIA Futurs & LIX.
Paris, 17 December 2007MPRI Course on Concurrency MPRI – Course on Concurrency Lecture 14 Application of probabilistic process calculi to security Catuscia.
MPRI 3 Dec 2007Catuscia Palamidessi 1 Why Probability and Nondeterminism? Concurrency Theory Nondeterminism –Scheduling within parallel composition –Unknown.
Beyond selfish routing: Network Games. Network Games NGs model the various ways in which selfish users (i.e., players) strategically interact in using.
MPRI – Course on Concurrency Lectures 11 and 12 The pi-calculus expressiveness hierarchy Catuscia Palamidessi INRIA Futurs and LIX
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
Relations Over Asymptotic Notations. Overview of Previous Lecture Although Estimation but Useful It is not always possible to determine behaviour of an.
14 October BASICS'09, Shanghai On the expressive power of synchronization primitives in the π-calculus Catuscia Palamidessi, INRIA Saclay, France.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
Concurrency 5 The theory of CCS Specifications and Verification Expressive Power Catuscia Palamidessi
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
1 Fault tolerance in distributed systems n Motivation n robust and stabilizing algorithms n failure models n robust algorithms u decision problems u impossibility.
C SC 573 Theory of Computation Theory of Computation Lecture 05 Reduction.
Failure Detectors n motivation n failure detector properties n failure detector classes u detector reduction u equivalence between classes n consensus.
Program Correctness. The designer of a distributed system has the responsibility of certifying the correctness of the system before users start using.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
Probabilistic Methods in Concurrency Lecture 6 Progress statements: A tool for verification of probabilistic automata Catuscia Palamidessi
6 October PPDP / GPCE 2002 Mobile Calculi Catuscia Palamidessi, INRIA Futurs, France joint work with Mihaela Herescu, IBM, Austin for Distributed.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
NP-Completeness A problem is NP-complete if: It is in NP
Catuscia Palamidessi, INRIA Saclay, France
Probabilistic Methods in Concurrency Lecture 5 Basics of Measure Theory and Probability Theory Probabilistic Automata Catuscia Palamidessi
GROUPS & THEIR REPRESENTATIONS: a card shuffling approach
Distributed Consensus
Distributed Systems, Consensus and Replicated State Machines
Homomorphisms (11/20) Definition. If G and G’ are groups, a function  from G to G’ is called a homomorphism if it is operation preserving, i.e., for all.
Bayesian Networks Independencies Representation Probabilistic
Probabilistic Methods in Concurrency Lecture 7 The probabilistic asynchronous p-calculus Catuscia Palamidessi
Markov Networks Independencies Representation Probabilistic Graphical
Failure Detectors motivation failure detector properties
Locality In Distributed Graph Algorithms
Integer and fractional packing of graph families
Presentation transcript:

Probabilistic Methods in Concurrency Lecture 3 The pi-calculus hierarchy: separation results Catuscia Palamidessi Page of the course:

Pisa, 30 June 2004Prob methods in Concurrency2 aa  ic  op ss  II ccs vp  op Honda-Tokoro Boudol Nestmann-Pierce Nestmann  a : asynchronous   ic : asynchronous  + input-guarded choice  op : asynchronous  + output prefix  s : asynchronous  + separate choice  I :  with internal choice (Sangiorgi) ccs vp : value-passing ccs : Language inclusion : Encoding : Non-encoding The  -calculus hierarchy

Pisa, 30 June 2004Prob methods in Concurrency3 The separation between  and  s This separation result is based on the fact that it is not possible to solve the symmetric leader election problem in  s, while it is possible in  Some definitions: –Leader Election Problem (LEP): All the nodes of a distributed system must agree on who is the leader. This means that in every possible computation, all the nodes must eventually output the name of the leader on a special channel out No deadlock No livelock No conflict (only one leader must be elected, every process outputs its name and only its name) –Symmetric LEP: the LEP on a symmetric network Hypergraphs and hypergraph associated to a network Hypergraph automorphism Orbits, well-balanced automorphism Examples Symmetry

Pisa, 30 June 2004Prob methods in Concurrency4 The separation between  and  s Theorem: If a network with at last two nodes has an automorphism   id with only one orbit, then it is not possible to write in  s a symmetric solution to the LEP Corollary: The same holds if the authomorphism is well- balanced Proof (sketch). We prove that in  s every system trying to solve the electoral problem has at least one diverging computation 1.If the system is symmetric, then the first action cannot be 2.As soon as a process perform an action, let all the other processes in the same orbit perform the same action as well. At the end of the round in the orbit, the system is again symmetric. Note that the system can change communication structure dynamically

Pisa, 30 June 2004Prob methods in Concurrency5 The separation between  and  s Crucial point: if the action performed by P i is a communication with P j in the same orbit, we need to ensure that P j can do the same action afterwards. This property holds in fact, due to the following: Lemma: Diamond lemma for  s Note that in  (in  with mixed choice)  the diamond lemma does not hold

Pisa, 30 June 2004Prob methods in Concurrency6 The separation between  and  s Remark: In  (in  with mixed choice) we can easily write a symmetric solution for the LEP in a network of two nodes: P0P0P0P0 P1P1 y x

Pisa, 30 June 2004Prob methods in Concurrency7 The separation between  and  s Corollary: there does not exists an encoding of  (  with mixed choice) in  s which is homomorphic wrt | and renaming, and preserves the observables on every computation. Proof (scketch): An encoding homomorphic wrt | and renaming transforms a symmetric solutions to the LEP in the source language into a symmetric solution to the LEP in the target language

Pisa, 30 June 2004Prob methods in Concurrency8 The separation between  and  I, ccs vp Theorem: If a network with at least two nodes has a well- balanced automorphism   id such that –  i and  node P, if  i  id then there is no arc between P and  i (P), then in  I and ccs vp there is no symmetric solution to the LEP. Example: a network which satisfies the above condition

Pisa, 30 June 2004Prob methods in Concurrency9 The separation between  and  I, ccs vp A solution to the leader election problem for the same network in  winner looser

Pisa, 30 June 2004Prob methods in Concurrency10 The separation between  and  I, ccs vp Corollary: there does not exists an encoding of  (  with mixed choice) in  s which is homomorphic wrt | and renaming, does not increase the connectivity, and preserves the observables on every computation.