shortest paths through a graph. The BC property ma-
kes a statement about how often a particular vertex
is part of all shortest paths through a graph. Bet-
weennessMax expresses how often the replica, that
is part of the most shortest paths in a graph, is part
of a shortest path. Therefore, BetweennessMax ba-
sically states the BC value of the most important re-
plica in the graph in regards of mapping quorums. As
we are using graphs with the same number of vertices
for each kNN iteration, BetweennessMax turns out to
be a very good estimator for the quality of the map-
ping that we can expect from a graph. This is because
graphs with the same BetweennessMax value have a
very similar structure.
Overall, it can be said that the kNN methods in
combination with graph properties predict the read
and write operation availability of the optimal map-
ping very well. Especially, if the average or median is
used in the predictions.
Since an MSE of 0.0 can not be improved, we re-
frained from testing methods like e. g support vector
machines.
6 CONCLUSION AND FUTURE
WORK
In this paper, we presented an approach to predict
the read and write availability of mappings based on
graph properties. We have shown the high quality
of these predictions based on five examples with 255
graphs. Additionally, we have demonstrated that bet-
weenness centrality is a good property to use for pre-
dicting the read and write operation availability of
mappings of Quorum Protocols. With the approach
presented in this Paper, the reader has the opportu-
nity to make an informed decision whether or not it
is worth executing the computational expensive algo-
rithm to determine the optimal mapping.
Going forward, we will test more graphs and
graphs with more vertices. The next step would be
to test with 12 vertices as this would allow to test the
TLP on a 3×4 or 4×3 grids. Testing TLP on a 1×9,
1 ×10, or 1 ×11 grid is not useful, since degenerated
grids will transform the analyzed TLP into the Read-
One/Write-All protocol. In order to achieve this, first
we have to improve the approach of finding an opti-
mal mapping significantly. Currently, identifying an
optimal mapping with nine vertices takes about se-
ven hours. A graph with 12 vertices is 1320 times
more complex and would therefore take about a year
of computation time. Depending on the results obtai-
ned from these extended analyses, different prediction
methods may be utilized.
Our second goal is to use the predictions of graphs
with n vertices to give predictions of graphs with
n + m vertices, where m > 0. This approach could
significantly reduce computation time.
REFERENCES
Bailey, T. and Jain, A. (1978). Note on distance-weighted
k-nearest neighbor rules. IEEE Transactions on Sys-
tems, Man and Cybernetics, SMC-8(4):311–313.
Bernstein, P. A., Hadzilacos, V., and Goodman, N. (1987).
Concurrency Control and Recovery in Database Sys-
tems. Addison Wesley.
Chartrand, G., Lesniak, L., and Zhang, P. (2010). Graphs &
Digraphs, Fifth Edition. Chapman & Hall/CRC, 5th
edition.
Cover, T. and Hart, P. (1967). Nearest neighbor pattern clas-
sification. IEEE Transactions on Information Theory,
13(1):21–27.
Devlin, K. (1979). Fundamentals of contemporary set the-
ory. Springer-Verlag, New York.
Freeman, L. C. (1977). A set of measures of centrality based
on betweenness. Sociometry, 40(1):35–41.
Harary, F. (1969). Graph theory. Addison-Wesley Publis-
hing Co., Reading, Mass.-Menlo Park, Calif.-London.
Koch, H.-H. (1994). Entwurf und Bewertung von Replika-
tionsverfahren (in German). PhD thesis, Department
of Computer Science, University of Darmstadt, Ger-
many.
Mohamad, I. B. and Usman, D. (2013). Standardization
and its effects on k-means clustering algorithm. Re-
search Journal of Applied Sciences, Engineering and
Technology, 6.
Schadek, R. and Theel, O. E. (2017). Increasing the accu-
racy of cost and availability predictions of quorum
protocols. In 22nd IEEE Pacific Rim International
Symposium on Dependable Computing, PRDC 2017.
Thomas, R. H. (1979). A majority consensus approach
to concurrency control for multiple copy databases.
ACM Transactions on Database Systems, 4(2):180–
207.
Wu, C. and Belford, G. G. (1992). The triangular lat-
tice protocol: A highly fault tolerant and highly ef-
ficient protocol for replicated data. In Proceedings of
the 11th Symposium on Reliable Distributed Systems
(SRDS’92). IEEE Computer Society Press.
ICAART 2018 - 10th International Conference on Agents and Artificial Intelligence
558