Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zoë Diamadi is active.

Publication


Featured researches published by Zoë Diamadi.


principles of distributed computing | 2004

Computation in networks of passively mobile finite-state sensors

Dana Angluin; James Aspnes; Zoë Diamadi; Michael J. Fischer; René Peralta

We explore the computational power of networks of small resource-limited mobile agents. We define two new models of computation based on pairwise interactions of finite-state agents in populations of finite but unbounded size. With a fairness condition on interactions, we define the concept of stable computation of a function or predicate, and give protocols that stably compute functions in a class including Boolean combinations of threshold-k, parity, majority, and simple arithmetic. We prove that all stably computable predicates are in NL. With uniform random sampling of pairs to interact, we define the model of conjugating automata and show that any counter machine with O(1) counters of capacity O(n) can be simulated with high probability by a protocol in a population of size n. We prove that all predicates computable with high probability in this model are in P ∩ RL. Several open problems and promising future directions are discussed.


principles of distributed computing | 2002

Fault-tolerant routing in peer-to-peer systems

James Aspnes; Zoë Diamadi; Gauri Shah

We consider the problem of designing an overlay network and routing mechanism that permits finding resources efficiently in a peer-to-peer system. We argue that many existing approaches to this problem can be modeled as the construction of a random graph embedded in a metric space whose points represent resource identifiers, where the probability of a connection between two nodes depends only on the distance between them in the metric space. We study the performance of a peer-to-peer system where nodes are embedded at grid points in a simple metric space: a one-dimensional real line. We prove upper and lower bounds on the message complexity of locating particular resources in such a system, under a variety of assumptions about failures of either nodes or the connections between them. Our lower bounds in particular show that the use of inverse power-law distributions in routing, as suggested by Kleinberg [5], is close to optimal. We also give heuristics to efficiently maintain a network supporting efficient routing as nodes enter and leave the system. Finally, we give some experimental results that suggest promising directions for future work.


Wuhan University Journal of Natural Sciences | 2001

A simple game for the study of trust in distributed systems

Zoë Diamadi; Michael J. Fischer

Trust is an important aspect of the design and analysis of secure distributed systems. It is often used informally to designate those portions of a system that must function correctly in order to achieve the desired outcome. But it is a notoriously diffcult notion to formalize. What are the properties of trust? How is it learned, propagated, and utilized successfully? How can it be modeled? How can a trust model be used to derive protocols that are effcient and reliable when employed in today’s expansive networks? Past work has been concerned with only a few of these issues, without concentrating on the need for a comprehensive approach to trust modeling.In this paper, we take a first step in that direction by studying an artificial community of agents that uses a notion of trust to succeed in a game against nature. The model is simple enough to analyze and simulate, but also rich enough to exhibit phenomena of real-life interactive communities. The model requires agents to make decisions. To do well, the agents are informed by knowledge gained from their own past experience as well as from the experience of other agents. Communication among agents allows knowledge to propagate faster through the network, which in turn can allow for a more successful community. We analyze the model from both a theoretical and an experimental point of view.


Journal of Cryptology | 2015

Spreading Alerts Quietly and the Subgroup Escape Problem

James Aspnes; Zoë Diamadi; Aleksandr Yampolskiy; Kristian Gjøsteen; Rene C. Peralta

We introduce a new cryptographic primitive called a blind coupon mechanism (BCM). In effect, a BCM is an authenticated bit commitment scheme, which is AND-homomorphic. We show that a BCM has natural and important applications. In particular, we use it to construct a mechanism for transmitting alerts undetectably in a message-passing system of


international conference on the theory and application of cryptology and information security | 2005

Spreading alerts quietly and the subgroup escape problem

James Aspnes; Zoë Diamadi; Kristian Gjøsteen; René Peralta; Aleksandr Yampolskiy


Archive | 2006

Greedy Routing in Peer-to-Peer Systems ∗

James Aspnes; Zoë Diamadi; Gauri Shah

n


Archive | 2018

COMPUTING DEVICE FOR IMPROVING CONTENT SHARING

Jordan Levy; Arin Sarkissian; Wayne Pan; Hojeong Kim; Rebeca Sermer; Zoë Diamadi


IACR Cryptology ePrint Archive | 2005

Spreading Alerts Quietly and the Subgroup Escape Problem.

James Aspnes; Zoë Diamadi; Kristian Gjøsteen; René Peralta; Aleksandr Yampolskiy

n nodes. Our algorithms allow an alert to quickly propagate to all nodes without its source or existence being detected by an adversary, who controls all message traffic. Our proofs of security are based on a new subgroup escape problem, which seems hard on certain groups with bilinear pairings and on elliptic curves over the ring


Archive | 2004

Societies of randomly interacting finite-state automata

Zoë Diamadi; James Aspnes; Michael J. Fischer

Collaboration


Dive into the Zoë Diamadi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

René Peralta

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar

Kristian Gjøsteen

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge