Skip to main content

Showing 1–19 of 19 results for author: Ben-David, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.01793  [pdf, ps, other

    cs.DC

    Byzantine Agreement with Predictions

    Authors: Naama Ben-David, Muhammad Ayaz Dzulfikar, Faith Ellen, Seth Gilbert

    Abstract: In this paper, we study the problem of \emph{Byzantine Agreement with predictions}. Along with a proposal, each process is also given a prediction, i.e., extra information which is not guaranteed to be true. For example, one might imagine that the prediction is produced by a network security monitoring service that looks for patterns of malicious behavior. Our goal is to design an algorithm that… ▽ More

    Submitted 3 May, 2025; originally announced May 2025.

  2. arXiv:2308.03919  [pdf, other

    cs.DC

    The FIDS Theorems: Tensions between Multinode and Multicore Performance in Transactional Systems

    Authors: Naama Ben-David, Gal Sela, Adriana Szekeres

    Abstract: Traditionally, distributed and parallel transactional systems have been studied in isolation, as they targeted different applications and experienced different bottlenecks. However, modern high-bandwidth networks have made the study of systems that are both distributed (i.e., employ multiple nodes) and parallel (i.e., employ multiple cores per node) necessary to truly make use of the available har… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  3. arXiv:2210.17174  [pdf, other

    cs.DC

    uBFT: Microsecond-scale BFT using Disaggregated Memory [Extended Version]

    Authors: Marcos K. Aguilera, Naama Ben-David, Rachid Guerraoui, Antoine Murat, Athanasios Xygkis, Igor Zablotchi

    Abstract: We propose uBFT, the first State Machine Replication (SMR) system to achieve microsecond-scale latency in data centers, while using only $2f{+}1$ replicas to tolerate $f$ Byzantine failures. The Byzantine Fault Tolerance (BFT) provided by uBFT is essential as pure crashes appear to be a mere illusion with real-life systems reportedly failing in many unexpected ways. uBFT relies on a small non-tail… ▽ More

    Submitted 16 March, 2023; v1 submitted 31 October, 2022; originally announced October 2022.

  4. arXiv:2208.11114  [pdf, other

    cs.DC

    Survey of Persistent Memory Correctness Conditions

    Authors: Naama Ben-David, Michal Friedman, Yuanhao Wei

    Abstract: The study of concurrent persistent programs has seen a surge of activity in recent years due to the introduction of non-volatile random access memories (NVRAM), yielding many models and correctness notions that are difficult to compare. In this paper, we survey existing correctness properties for this setting, placing them into the same context and comparing them. We present a hierarchy of these p… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

  5. arXiv:2201.00813  [pdf, other

    cs.DC

    Lock-Free Locks Revisited

    Authors: Naama Ben-David, Guy E. Blelloch, Yuanhao Wei

    Abstract: This paper presents a new and practical approach to lock-free locks based on helping, which allows the user to write code using fine-grained locks, but run it in a lock-free manner. Although lock-free locks have been suggested in the past, they are widely viewed as impractical, have some key limitations, and, as far as we know, have never been implemented. The paper presents some key techniques… ▽ More

    Submitted 28 January, 2022; v1 submitted 3 January, 2022; originally announced January 2022.

    Comments: This is the full version of the paper appearing in PPoPP 2022

  6. arXiv:2112.04197  [pdf, ps, other

    cs.LG stat.ML

    A Fast Algorithm for PAC Combinatorial Pure Exploration

    Authors: Noa Ben-David, Sivan Sabato

    Abstract: We consider the problem of Combinatorial Pure Exploration (CPE), which deals with finding a combinatorial set or arms with a high reward, when the rewards of individual arms are unknown in advance and must be estimated using arm pulls. Previous algorithms for this problem, while obtaining sample complexity reductions in many cases, are highly computationally intensive, thus making them impractical… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: Full version of paper accepted to AAAI-22

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), 36(6), 6064--6071, 2022

  7. arXiv:2108.04520  [pdf, ps, other

    cs.DC cs.DS

    Fast and Fair Randomized Wait-Free Locks

    Authors: Naama Ben-David, Guy E. Blelloch

    Abstract: We present a randomized approach for wait-free locks with strong bounds on time and fairness in a context in which any process can be arbitrarily delayed. Our approach supports a tryLock operation that is given a set of locks, and code to run when all the locks are acquired. A tryLock operation, or attempt, may fail if there is contention on the locks, in which case the code is not run. Given an u… ▽ More

    Submitted 28 October, 2022; v1 submitted 10 August, 2021; originally announced August 2021.

  8. arXiv:2108.04202  [pdf, other

    cs.DC

    FliT: A Library for Simple and Efficient Persistent Algorithms

    Authors: Yuanhao Wei, Naama Ben-David, Michal Friedman, Guy E. Blelloch, Erez Petrank

    Abstract: Non-volatile random access memory (NVRAM) offers byte-addressable persistence at speeds comparable to DRAM. However, with caches remaining volatile, automatic cache evictions can reorder updates to memory, potentially leaving persistent memory in an inconsistent state upon a system crash. Flush and fence instructions can be used to force ordering among updates, but are expensive. This has motivate… ▽ More

    Submitted 18 August, 2021; v1 submitted 9 August, 2021; originally announced August 2021.

  9. Space and Time Bounded Multiversion Garbage Collection

    Authors: Naama Ben-David, Guy E. Blelloch, Panagiota Fatourou, Eric Ruppert, Yihan Sun, Yuanhao Wei

    Abstract: We present a general technique for garbage collecting old versions for multiversion concurrency control that simultaneously achieves good time and space complexity. Our technique takes only $O(1)$ time on average to reclaim each version and maintains only a constant factor more versions than needed (plus an additive term). It is designed for multiversion schemes using version lists, which are the… ▽ More

    Submitted 16 December, 2021; v1 submitted 5 August, 2021; originally announced August 2021.

    Comments: This is the full version of the paper appearing in the International Symposium on Distributed Computing (DISC 2021)

  10. arXiv:2108.01330  [pdf, other

    cs.DC

    Frugal Byzantine Computing

    Authors: M. K. Aguilera, N. Ben-David, R. Guerraoui, D. Papuc, A. Xygkis, I. Zablotchi

    Abstract: Traditional techniques for handling Byzantine failures are expensive: digital signatures are too costly, while using $3f{+}1$ replicas is uneconomical ($f$ denotes the maximum number of Byzantine processes). We seek algorithms that reduce the number of replicas to $2f{+}1$ and minimize the number of signatures. While the first goal can be achieved in the message-and-memory model, accomplishing the… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Comments: This paper is an extended version of the DISC 2021 paper

  11. arXiv:2105.10566  [pdf, other

    cs.DC cs.CR

    Classifying Trusted Hardware via Unidirectional Communication

    Authors: Naama Ben-David, Kartik Nayak

    Abstract: It is well known that Byzantine fault tolerant (BFT) consensus cannot be solved in the classic asynchronous message passing model when one-third or more of the processes may be faulty. Since many modern applications require higher fault tolerance, this bound has been circumvented by introducing non-equivocation mechanisms that prevent Byzantine processes from sending conflicting messages to other… ▽ More

    Submitted 21 May, 2021; originally announced May 2021.

  12. arXiv:2103.13796  [pdf, other

    cs.LG stat.ML

    Active Structure Learning of Bayesian Networks in an Observational Setting

    Authors: Noa Ben-David, Sivan Sabato

    Abstract: We study active structure learning of Bayesian networks in an observational setting, in which there are external limitations on the number of variable values that can be observed from the same sample. Random samples are drawn from the joint distribution of the network variables, and the algorithm iteratively selects which variables to observe in the next sample. We propose a new active learning al… ▽ More

    Submitted 17 July, 2022; v1 submitted 25 March, 2021; originally announced March 2021.

    Journal ref: Journal of Machine Learning Research, 23(188):1--38, 2022

  13. arXiv:2010.06288  [pdf, other

    cs.DC

    Microsecond Consensus for Microsecond Applications

    Authors: Marcos K. Aguilera, Naama Ben-David, Rachid Guerraoui, Virendra J. Marathe, Athanasios Xygkis, Igor Zablotchi

    Abstract: We consider the problem of making apps fault-tolerant through replication, when apps operate at the microsecond scale, as in finance, embedded computing, and microservices apps. These apps need a replication scheme that also operates at the microsecond scale, otherwise replication becomes a burden. We propose Mu, a system that takes less than 1.3 microseconds to replicate a (small) request in memo… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

    Comments: Full version of OSDI'20 paper

  14. arXiv:2007.02372  [pdf, other

    cs.DC

    Constant-Time Snapshots with Applications to Concurrent Data Structures

    Authors: Yuanhao Wei, Naama Ben-David, Guy E. Blelloch, Panagiota Fatourou, Eric Ruppert, Yihan Sun

    Abstract: We present an approach for efficiently taking snapshots of the state of a collection of CAS objects. Taking a snapshot allows later operations to read the value that each CAS object had at the time the snapshot was taken. Taking a snapshot requires a constant number of steps and returns a handle to the snapshot. Reading a snapshotted value of an individual CAS object using this handle is wait-free… ▽ More

    Submitted 30 December, 2020; v1 submitted 5 July, 2020; originally announced July 2020.

    Comments: To appear in PPoPP'21

  15. arXiv:2004.02841  [pdf, other

    cs.DC

    NVTraverse: In NVRAM Data Structures, the Destination is More Important than the Journey

    Authors: Michal Friedman, Naama Ben-David, Yuanhao Wei, Guy E. Blelloch, Erez Petrank

    Abstract: The recent availability of fast, dense, byte-addressable non-volatile memory has led to increasing interest in the problem of designing and specifying durable data structures that can recover from system crashes. However, designing durable concurrent data structures that are efficient and also satisfy a correctness criterion has proven to be very difficult, leading many algorithms to be inefficien… ▽ More

    Submitted 24 November, 2021; v1 submitted 6 April, 2020; originally announced April 2020.

  16. arXiv:1905.12143  [pdf, other

    cs.DC cs.DS

    The Impact of RDMA on Agreement

    Authors: Marcos K. Aguilera, Naama Ben-David, Rachid Guerraoui, Virendra Marathe, Igor Zablotchi

    Abstract: Remote Direct Memory Access (RDMA) is becoming widely available in data centers. This technology allows a process to directly read and write the memory of a remote host, with a mechanism to control access permissions. In this paper, we study the fundamental power of these capabilities. We consider the well-known problem of achieving consensus despite failures, and find that RDMA can improve the in… ▽ More

    Submitted 25 February, 2021; v1 submitted 28 May, 2019; originally announced May 2019.

    Comments: Full version of PODC'19 paper, strengthened broadcast algorithm

  17. arXiv:1806.04780  [pdf, other

    cs.DC

    Delay-Free Concurrency on Faulty Persistent Memory

    Authors: Naama Ben-David, Guy E. Blelloch, Michal Friedman, Yuanhao Wei

    Abstract: Non-volatile memory (NVM) promises persistent main memory that remains correct despite loss of power. This has sparked a line of research into algorithms that can recover from a system crash. Since caches are expected to remain volatile, concurrent data structures and algorithms must be redesigned to guarantee that they are left in a consistent state after a system crash, and that the execution ca… ▽ More

    Submitted 18 June, 2020; v1 submitted 12 June, 2018; originally announced June 2018.

  18. Multiversion Concurrency with Bounded Delay and Precise Garbage Collection

    Authors: Naama Ben-David, Guy E. Blelloch, Yihan Sun, Yuanhao Wei

    Abstract: In this paper we are interested in bounding the number of instructions taken to process transactions. The main result is a multiversion transactional system that supports constant delay (extra instructions beyond running in isolation) for all read-only transactions, delay equal to the number of processes for writing transactions that are not concurrent with other writers, and lock-freedom for conc… ▽ More

    Submitted 15 May, 2019; v1 submitted 22 March, 2018; originally announced March 2018.

  19. arXiv:1710.02637  [pdf, other

    cs.DS

    Implicit Decomposition for Write-Efficient Connectivity Algorithms

    Authors: Naama Ben-David, Guy E. Blelloch, Jeremy T. Fineman, Phillip B. Gibbons, Yan Gu, Charles McGuffey, Julian Shun

    Abstract: The future of main memory appears to lie in the direction of new technologies that provide strong capacity-to-performance ratios, but have write operations that are much more expensive than reads in terms of latency, bandwidth, and energy. Motivated by this trend, we propose sequential and parallel algorithms to solve graph connectivity problems using significantly fewer writes than conventional a… ▽ More

    Submitted 7 October, 2017; originally announced October 2017.