• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2016 Vol.8(1): 36-40 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2016.V8.1016

Monitoring Remote Data Problem

Naoshi Sakamoto
Abstract—On administrating a computer system, its configuration data is important. Thus, the system usually treats to protect the configuration data. Moreover, recently, computer systems that consist of large scale network, such as distributed systems, cloud systems and so on, have been developed. For these systems, it is an important issue to administrate the configuration data of each computer of the system. On the other hand, in general, a computer system becomes more complicated because of not only its scale but also its improvement of the services. Then, this causes increase in size of its configuration data.
In this paper, we introduce the k-monitoring remote data problem where the remote data rarely happens to be changed. The data is expected to be changed in at most k bits. We assume that a remote computer and a local computer are connected by network, and share the same data of length N at the beginning. We also assume that some of bits of the remote data are expected to be changed, after a while. Then, the problem is finding the protocol between the computers so that the local computer outputs the each position of the changed bits.
In this paper, we propose the protocols within the communication bits of length θ(logN) for 1- and 2-Monitoring Remote Data Protocol.

Index Terms—Humming distance, communication complexity, redundant coding.

N. Sakamoto is with the Department of Information and Communication Engineering, Tokyo Denki University, Tokyo, Japan (e-mail: sakamoto@c.dendai.ac.jp).

[PDF]

Cite:Naoshi Sakamoto, "Monitoring Remote Data Problem," International Journal of Computer Theory and Engineering vol. 8, no. 1, pp. 36-40, 2016.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com