Skip to main content

Showing 1–14 of 14 results for author: Setzer, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.03054  [pdf, other

    cs.SC cs.CR cs.LO cs.SI

    Verification of Bitcoin Script in Agda using Weakest Preconditions for Access Control

    Authors: Fahad F. Alhabardi, Arnold Beckmann, Bogdan Lazar, Anton Setzer

    Abstract: This paper contributes to the verification of programs written in Bitcoin's smart contract language SCRIPT in the interactive theorem prover Agda. It focuses on the security property of access control for SCRIPT programs that govern the distribution of Bitcoins. It advocates that weakest preconditions in the context of Hoare triples are the appropriate notion for verifying access control. It aims… ▽ More

    Submitted 11 June, 2022; v1 submitted 6 March, 2022; originally announced March 2022.

    Comments: 27 pages

  2. arXiv:1904.11395  [pdf, ps, other

    cs.DC cs.CC cs.NI

    On the Complexity of Local Graph Transformations

    Authors: Christian Scheideler, Alexander Setzer

    Abstract: We consider the problem of transforming a given graph $G_s$ into a desired graph $G_t$ by applying a minimum number primitives from a particular set of local graph transformation primitives. These primitives are local in the sense that each node can apply them based on local knowledge and by affecting only its $1$-neighborhood. Although the specific set of primitives we consider makes it possible… ▽ More

    Submitted 10 September, 2020; v1 submitted 25 April, 2019; originally announced April 2019.

    Comments: This publication is the full version of a paper that appeared at ICALP'19

  3. arXiv:1809.05013  [pdf, other

    cs.DC

    Relays: A New Approach for the Finite Departure Problem in Overlay Networks

    Authors: Christian Scheideler, Alexander Setzer

    Abstract: A fundamental problem for overlay networks is to safely exclude leaving nodes, i.e., the nodes requesting to leave the overlay network are excluded from it without affecting its connectivity. To rigorously study self-tabilizing solutions to this problem, the Finite Departure Problem (FDP) has been proposed [12]. In the FDP we are given a network of processes in an arbitrary state, and the goal is… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

  4. arXiv:1809.02436  [pdf, other

    cs.DC

    On Underlay-Aware Self-Stabilizing Overlay Networks

    Authors: Thorsten Götte, Christian Scheideler, Alexander Setzer

    Abstract: We present a self-stabilizing protocol for an overlay network that constructs the Minimum Spanning Tree (MST) for an underlay that is modeled by a weighted tree. The weight of an overlay edge between two nodes is the weighted length of their shortest path in the tree. We rigorously prove that our protocol works correctly under asynchronous and non-FIFO message delivery. Further, the protocol stabi… ▽ More

    Submitted 7 September, 2018; originally announced September 2018.

    Comments: A conference version of this paper was accepted at the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018)

  5. arXiv:1805.00774  [pdf, ps, other

    cs.DC

    Breaking the $\tildeΩ(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary

    Authors: Peter Robinson, Christian Scheideler, Alexander Setzer

    Abstract: We study the consensus problem in a synchronous distributed system of $n$ nodes under an adaptive adversary that has a slightly outdated view of the system and can block all incoming and outgoing communication of a constant fraction of the nodes in each round. Motivated by a result of Ben-Or and Bar-Joseph (1998), showing that any consensus algorithm that is resilient against a linear number of cr… ▽ More

    Submitted 2 May, 2018; originally announced May 2018.

  6. arXiv:1804.06398  [pdf, other

    cs.CR

    Modelling Bitcoin in Agda

    Authors: Anton Setzer

    Abstract: We present two models of the block chain of Bitcoin in the interactive theorem prover Agda. The first one is based on a simple model of bank accounts, while having transactions with multiple inputs and outputs. The second model models transactions, which refer directly to unspent transaction outputs, rather than user accounts. The resulting blockchain gives rise to a transaction tree. That model i… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: 27 pages

    MSC Class: 14G56; 94A60; 91B60; 91G99; 91B74 ACM Class: F.3.1; I.6.5; D.2.4; D.1.1; K.4.4

  7. arXiv:1802.07504  [pdf, ps, other

    cs.DC

    Skueue: A Scalable and Sequentially Consistent Distributed Queue

    Authors: Michael Feldmann, Christian Scheideler, Alexander Setzer

    Abstract: We propose a distributed protocol for a queue, called \textsc{Skueue}, which spreads its data fairly onto multiple processes, avoiding bottlenecks in high throughput scenarios. \textsc{Skueue} can be used in highly dynamic environments, through the addition of join and leave requests to the standard queue operations enqueue and dequeue. Furthermore \textsc{Skueue} satisfies sequential consistency… ▽ More

    Submitted 20 August, 2018; v1 submitted 21 February, 2018; originally announced February 2018.

  8. arXiv:1709.04714  [pdf, other

    cs.PL cs.DC cs.LO

    Trace and Stable Failures Semantics for CSP-Agda

    Authors: Bashar Igried, Anton Setzer

    Abstract: CSP-Agda is a library, which formalises the process algebra CSP in the interactive theorem prover Agda using coinductive data types. In CSP-Agda, CSP processes are in monadic form, which sup- ports a modular development of processes. In this paper, we implement two main models of CSP, trace and stable failures semantics, in CSP-Agda, and define the corresponding refinement and equal- ity relations… ▽ More

    Submitted 14 September, 2017; originally announced September 2017.

    Comments: In Proceedings CoALP-Ty'16, arXiv:1709.04199

    ACM Class: D.1.3 Concurrent Programming---Parallel programming, D.2.4 Software/Program Verification---Formal methods, D.3.1 Formal Definitions and Theory---Semantics, F.3.2 Semantics of Programming Languages---Denotational semantics---Operational semantics---Process

    Journal ref: EPTCS 258, 2017, pp. 36-51

  9. arXiv:1607.05165  [pdf, other

    cs.DC

    Towards a Universal Approach for Monotonic Searchability in Self-Stabilizing Overlay Networks

    Authors: Christian Scheideler, Alexander Setzer, Thim Strothmann

    Abstract: For overlay networks, the ability to recover from a variety of problems like membership changes or faults is a key element to preserve their functionality. In recent years, various self-stabilizing overlay networks have been proposed that have the advantage of being able to recover from any illegal state. However, the vast majority of these networks cannot give any guarantees on its functionality… ▽ More

    Submitted 28 September, 2016; v1 submitted 18 July, 2016; originally announced July 2016.

  10. arXiv:1512.06593  [pdf, other

    cs.DC

    Towards Establishing Monotonic Searchability in Self-Stabilizing Data Structures (full version)

    Authors: Christian Scheideler, Alexander Setzer, Thim Strothmann

    Abstract: Distributed applications are commonly based on overlay networks interconnecting their sites so that they can exchange information. For these overlay networks to preserve their functionality, they should be able to recover from various problems like membership changes or faults. Various self-stabilizing overlay networks have already been proposed in recent years, which have the advantage of being a… ▽ More

    Submitted 21 December, 2015; originally announced December 2015.

  11. arXiv:1410.4395  [pdf, other

    cs.DM cs.DS

    Minimum Linear Arrangement of Series-Parallel Graphs

    Authors: Martina Eikel, Christian Scheideler, Alexander Setzer

    Abstract: We present a factor $14D^2$ approximation algorithm for the minimum linear arrangement problem on series-parallel graphs, where $D$ is the maximum degree in the graph. Given a suitable decomposition of the graph, our algorithm runs in time $O(|E|)$ and is very easy to implement. Its divide-and-conquer approach allows for an effective parallelization. Note that a suitable decomposition can also be… ▽ More

    Submitted 16 October, 2014; originally announced October 2014.

  12. arXiv:1409.4991  [pdf, other

    cs.DS cs.DC

    RoBuSt: A Crash-Failure-Resistant Distributed Storage System

    Authors: Martina Eikel, Christian Scheideler, Alexander Setzer

    Abstract: In this work we present the first distributed storage system that is provably robust against crash failures issued by an adaptive adversary, i.e., for each batch of requests the adversary can decide based on the entire system state which servers will be unavailable for that batch of requests. Despite up to $γn^{1/\log\log n}$ crashed servers, with $γ>0$ constant and $n$ denoting the number of serv… ▽ More

    Submitted 23 February, 2015; v1 submitted 17 September, 2014; originally announced September 2014.

    Comments: Revised full version

  13. arXiv:1409.1005  [pdf, ps, other

    cs.DS cs.DM

    The planar minimum linear arrangement problem is different from the minimum linear arrangement problem

    Authors: Alexander Setzer

    Abstract: In various research papers, such as [2], one will find the claim that the minLA is optimally solvable on outerplanar graphs, with a reference to [1]. However, the problem solved in that publication, which we refer to as the planar minimum linear arrangement problem (planar minLA), is different from the minimum linear arrangement problem (minLA), as we show in this article.

    Submitted 3 September, 2014; originally announced September 2014.

  14. arXiv:1207.5419  [pdf, ps, other

    cs.GT

    Basic Network Creation Games with Communication Interests

    Authors: Andreas Cord-Landwehr, Martina Hüllmann, Peter Kling, Alexander Setzer

    Abstract: Network creation games model the creation and usage costs of networks formed by a set of selfish peers. Each peer has the ability to change the network in a limited way, e.g., by creating or deleting incident links. In doing so, a peer can reduce its individual communication cost. Typically, these costs are modeled by the maximum or average distance in the network. We introduce a generalized versi… ▽ More

    Submitted 23 July, 2012; originally announced July 2012.

    Comments: An extended abstract of this paper has been accepted for publication in the proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)

    ACM Class: G.2.2; F.2.2