Colorless Wait-Free Computation

Size: px
Start display at page:

Download "Colorless Wait-Free Computation"

Transcription

1 Colorless Wait-Free Computation Companion slides for Distributed Computing Through Maurice Herlihy & Dmitry Kozlov & Sergio Rajsbaum Distributed Computing through 1

2 Colorless Tasks Apr-14 2

3 Colorless Tasks Apr-14 3

4 Colorless Tasks The set of input values determines the set of output values. Number and identities irrelevant for both input and output values 19-Apr-14 4

5 Examples Consensus 32 k-set agreement Apr-14 5

6 Non-Examples Weak Symmetry-Breaking When all participate At least one on group 0, group 1 19-Apr-14 6

7 Yes No No No! No! Majority No!

8 Operational Model Road Map Combinatorial Model Main Theorem Distributed Computing through 8

9 A process is a state machine Processes Could be Turing machines or more powerful Distributed Computing though 9

10 Processes A process s state is called its view Distributed Computing though Process names taken from a domain Each process has a unique name (color) P i 2 10

11 Each process knows its own name Processes But not the names of the other processes Distributed Computing though 11

12 Often, P i is just i Processes Sometimes P i and i are distinct, and the process knows P i but not i Distributed Computing though 12

13 Processes There are n+1 processes Distributed Computing though 13

14 Shared Read-Write Memory Distributed Computing though For now, they communicate via reading & writing shared memory 14

15 Immediate Snapshot Individual reads & writes are too low-level A snapshot = atomic read of all memory We will use immediate snapshot Distributed Computing through 15

16 Immediate Snapshot write view to memory take snapshot adjacent steps! Distributed Computing through 16

17 Immediate Snapshot write view to memory take snapshot write view to memory take snapshot Distributed Computing through 17

18 Immediate Snapshot immediate mem[i] := view; snap := snapshot(mem[*]) Distributed Computing through 18

19 P Q R write snap write snap write snap {p} {p,q} {p,q,r} P Q R write snap write write snap snap {p} {p,q,r} {p,q,r} P Q R write write write snap snap snap {p,q,r} {p,q,r} {p,q,r}

20 Realistic? No! My laptop reads only a few contiguous memory words at a time Yes! Simpler lower bounds: if it s impossible with IS, it s impossible on your laptop. Can implement IS from read-write Distributed Computing through 20

21 Crashes Processes may halt without warning as many as n out of n+1 19-Apr-14 21

22 Asynchronous

23 Asynchronous Failures?? detection impossible

24 Configurations C = {s 0,, s n } set of simultaneous process states initial configurations final configurations Distributed Computing through 24

25 Executions processes that communicate C 0, S 0, C 1, S 1,,S r, C r+1 initial configuration final configuration next configuration Distributed Computing through 25

26 Executions triple is a concurrent step C 0, S 0, C 1, S 1,,S r, C r+1 Processes in S 0 said to participate in step Only P i 2 S 0 can change between C 0 and C 1 state change result of communication Distributed Computing through 26

27 Executions finite C 0, S 0, C 1, S 1,, S r, C r+1 infinite C 0, S 0, C 1, S 1,, partial C 0, S 0, C 1, S 1,, S r, C r+1 Distributed Computing through 27

28 Crashes are Implicit C 0, S 0, C 1, S 1,, S r, C r+1 If P i s state not final in the final configuration then P i has crashed. crash cannot be detected in finite time Distributed Computing through 28

29 Colorless Tasks (I, O, ) (colorless) input assignment carrier map : I! 2 O (colorless) output assignment Distributed Computing through 29

30 Input Assignments {(P j, v j ), P j 2, v j 2 V in } name, value pair domain of process names domain of input values Distributed Computing through 30

31 Colorless Input Assignments {(P j, v j ), P j 2, v j 2 V in } discard process names, keep values Distributed Computing through 31

32 (Colorless) Output Assignments {(P j, v j ), P j 2, v j 2 V out } {(P j, v j ), P j 2, v j 2 V out } Distributed Computing through 32

33 Example: Binary Consensus I = {{0}, {1}, {0,1}} All start with 0 All start with 1 Distributed Computing through start with both 33

34 Example: Binary Consensus I = {{0}, {1}, {0,1}} O = {{0}, {1}} All decide 0 All decide 1 Distributed Computing through 34

35 Example: Binary Consensus ({0}) = {{0}} All start with 0, all decide 0 Distributed Computing through 35

36 Example: Binary Consensus ({0}) = {{0}} ({1}) = {{1}} All start with 1, all decide 1 Distributed Computing through 36

37 Example: Binary Consensus ({0}) = {{0}} ({1}) = {{1}} ({0,1}) = {{0},{1}} with mixed inputs, all decide 0, or all decide 1 Distributed Computing through 37

38 Colorless Layered Protocol shared mem array 0..N-1,0..n of Value view := input for l := 0 to N-1 do immediate mem[l][i] := view; snap := snapshot(mem[l][*]) view := set of values in snap return δ(view) Distributed Computing through 38

39 Colorless Layered Protocol shared mem array 0..N-1,0..n of Value view := input for j := 0 to N-1 do immediate 2-dimensional memory array mem[j][i] := view; row is clean per-layer memory snap := snapshot(mem[j][*]) view := set column of values is per-process in snap word return δ(view) Distributed Computing through 39

40 Colorless Layered Protocol shared mem array 0..N-1,0..n of Value view := input for j := 0 to N-1 do immediate initial mem[j][i] view is input := view; value snap := snapshot(mem[j][*]) view := set of values in snap return δ(view) Distributed Computing through 40

41 Colorless Layered Protocol shared mem array 0..N-1,0..n of Value view := input for l := 0 to N-1 do immediate mem[j][i] := view; snap run := for snapshot(mem[j][*]) N layers view := set of values in snap return δ(view) Distributed Computing through 41

42 Colorless Layered Protocol shared mem array 0..N-1,0..n of Value layer l : immediate write & snapshot of row l view := input for j := 0 to N-1 do immediate mem[l][i] := view; snap := snapshot(mem[l][*]) view := set of values in snap return δ(view) Distributed Computing through 42

43 Colorless Layered Protocol shared mem array 0..N-1,0..n of Value view := input for j := 0 to N-1 do immediate new view is set of values seen mem[j][i] := view; snap := snapshot(mem[j][*]) view := set of values in snap return δ(view) Distributed Computing through 43

44 Colorless Layered Protocol shared mem array 0..N-1,0..n of Value view := input for j := 0 to N-1 do immediate finally mem[j][i] apply decision := view; value to final view snap := snapshot(mem[j][*]) view := set of values in snap return δ(view) Distributed Computing through 44

45 {p},{p,q,r} Q {p},q,{p,r} {p},{p,q,r},{p,r} R {p},{p,q},r {p},{p,q},{p,q,r} {p,q,r},{q} P p,{q},{q,r} {p,q,r},{q},{q,r} {p,q},{q},r R {p,q},{q},{p,q,r} {q,r},{p,q,r} {p,r},{p,q,r} {p,q},{p,q,r} {p,q,r},{r} p,{q,r},{r} P {p,q,r},{q,r},{r} {p,r},q,{r} Q {p,r},{p,q,r},{r} R {p,q,r} p,{q,r} {p,r},q {p,q},r R Q QR {p},q,r p,{q},r p,q,{r} R P PR Q P PQ Q P p,q,r PQR P Q R PQ PR QR

46 P Q R p,q,r PQ PR QR PQR {p},q,r p,{q},r p,q,{r} {p,q},r {p,q,r} QR PR PQ Q R P R P Q R {p},{p,q},r {p},q,{p,r} {p},{p,q,r} {p,q},{q},r p,{q},{q,r} {p,q,r},{q} {p,r},q,{r} p,{q,r},{r} {p,q,r},{r} {q,r},{p,q,r} R Q R P Q P {p},{p,q},{p,q,r} {p},{p,q,r},{p,r} {p,q},{q},{p,q,r} {p,q,r},{q},{q,r} {p,r},{p,q,r},{r} {p,q,r},{q,r},{r} Colorless configurations for {p,r},q {p,q},{p,q,r} processes Q P,Q,R, inputs p,q,r, p,{q,r} final P configurations {p,r},{p,q,r} in black.

47 Operational Model Road Map Combinatorial Model Main Theorem Distributed Computing through 47

48 Vertex = Process State Process ID (color) 7 Value (input or output) 19-Apr-14 48

49 Simplex = Global State 19-Apr-14 49

50 Complex = Global States 19-Apr-14 50

51 Input Complex for Binary Consensus 0 All possible initial states Processes: red, green, blue 1 Independently assigned 0 or 1 19-Apr-14 51

52 Output Complex for Binary Consensus 0 0 All possible final states Output values all 0 or all 1 1 Two disconnected simplexes 19-Apr-14 52

53 Carrier Map for Consensus All 0 inputs All 0 outputs 19-Apr-14 53

54 Carrier Map for Consensus All 1 inputs All 1 outputs 19-Apr-14 54

55 Carrier Map for Consensus All 0 outputs Mixed 0-1 inputs All 1 outputs 19-Apr-14 55

56 Task Specification (I, O, ) Input complex Output complex Carrier map : I! 2 O 19-Apr-14 56

57 Colorless Tasks (I, P, ) (colorless) input complex strict carrier map : I! 2 P (colorless) protocol complex Distributed Computing through 57

58 Protocol Complex Vertex: process name, view all values read and written Simplex: compatible set of views Each execution defines a simplex 19-Apr-14 Distributed Computing through 58

59 Example: Synchronous Message-Passing Round 0 Round 1 19-Apr-14 59

60 Failures: Fail-Stop Partial broadcast 19-Apr-14 Distributed Computing through 60

61 Single Input: Round Zero 0 No messages sent View is input value 0 0 Same as input simplex 19-Apr-14 Distributed Computing through 61

62 Round Zero Protocol Complex 0 No messages sent View is input value 1 Same as input complex 19-Apr-14 Distributed Computing through 62

63 Single Input: Round One Apr-14 Distributed Computing through 63

64 Single Input: Round One no one fails 19-Apr-14 Distributed Computing through 64

65 Single Input: Round One blue fails no one fails Apr-14 Distributed Computing through 65

66 Single Input: Round One red fails green fails blue fails no one fails Apr-14 Distributed Computing through 66

67 Protocol Complex: Round One 19-Apr-14 Distributed Computing through 67

68 Protocol Complex: Round Two 19-Apr-14 Distributed Computing through 68

69 Protocol Complex Evolution zero one two 19-Apr-14 69

70 Ξ protocol complex Summary δ input complex output complex Δ 19-Apr-14 70

71 Decision Map δ Simplicial map, sending simplexes to simplexes Protocol complex Output complex 19-Apr-14 71

72 Lower Bound Strategy δ Find topological obstruction to this simplicial map Protocol complex Output complex 19-Apr-14 72

73 Consensus Example 1 0 Subcomplex of all-0 inputs δ Must map here 0 1 Protocol Output 19-Apr-14 Distributed Computing through 73

74 Consensus Example 1 0 δ 0 1 Protocol Subcomplex of all-1 inputs Must map Output here 19-Apr-14 Distributed Computing through 74

75 Consensus Example Image under δ must start here δ 0 1 Protocol Path from all-0 to all-1 and end here Output 19-Apr-14 Distributed Computing through 75

76 Consensus Example path 0 1 δ? 0 1 Output 19-Apr-14 Distributed Computing through 76

77 Consensus Example Image under δ must start here.. But this hole is δ an obstruction Protocol Path from all-0 to all-1 and end here Output 19-Apr-14 Distributed Computing through 77

78 Conjecture A protocol cannot solve consensus if its complex is path-connected Model-independent! 19-Apr-14 Distributed Computing through 78

79 If Adversary keeps Protocol Complex path-connected Forever Consensus is impossible For r rounds A round-complexity lower bound For time t A time-complexity lower bound 19-Apr-14 Distributed Computing through 79

80 Barycentric Agreement I Bary I Distributed Computing through 80

81 Barycentric Agreement (I, bary I, bary( )) arbitrary input complex subdivided output complex subdivision as carrier map Distributed Computing through 81

82 If There are n Processes (I, bary skel n I, bary skel n ) Inputs only from n-skeleton of input complex Distributed Computing through 82

83 Theorem A one-layer immediate snapshot protocol solves the n-process barycentric agreement task (I, bary skel n I, bary skel n ) Proof All input simplices belong to skel n I Immediate snapshot results are ordered Distributed Computing through 83

84 Barycentric Agreement Protocol {v 0 } {v 0,v 1,v 2 } {v 0, v 2 } v 0 v 1 v 2 Snapshots are ordered

85 Barycentric Agreement Protocol {v 0,v 1,v 2 } {v 0 } {v 0, v 2 } Each view is a face of ¾

86 Barycentric Agreement Protocol {v 0 } {v 0,v 1,v 2 } {v 0, v 2 } Each view is a face of ¾

87 Barycentric Agreement Protocol {v 0 } {v 0,v 1,v 2 } {v 0, v 2 } Each face of ¾ is a vertex of Bary ¾

88 Barycentric Agreement Protocol Ordered faces ) simplex of Bary ¾

89 Iterated Barycentric Agreement skel n I bary N skel n I

90 Iterated Barycentric Agreement (I, bary N skel n I, bary N skel n ) Distributed Computing through 90

91 One-Layer Immediate Snapshot Protocol Complex {p}{pq}{pqr} {p}{pqr}{pqr} {pqr}{pqr}{pqr} {pqr}{qr}{qr} Distributed Computing through

92 Compare Views P Q R p,q,r PQ P R Q PQR R {p},q,r Q {p},{p,q},r {p},{p,q},{p,q,r} R R {p},q,{p,r} {p},{p,q,r},{p,r} Q QR {p},{p,q,r} p,{q},r P {p,q},{q},r {p,q},{q},{p,q,r} R R p,{q},{q,r} {p,q,r},{q},{q,r} P PR {p,q,r},{q} p,q,{r} P {p,r},q,{r} {p,r},{p,q,r},{r} Q Q p,{q,r},{r} {p,q,r},{q,r},{r} P PQ {p,q},r {p,q,r},{r} R {p,r},q {p,q},{p,q,r} Q p,{q,r} {p,r},{p,q,r} P {p,q,r} {q,r},{p,q,r} Operational view {p}{pq}{pqr} {p}{pqr}{pqr} {pqr}{pqr}{pqr} {pqr}{qr}{qr} Combinatorial view Distributed Computing through

93 Compositions Given protocols (I,P, ) (I,P, ) where P µ I their composition is (I,P, ) where = and P = (I) Distributed Computing through 93

94 Operational Model Road Map Combinatorial Model Main Theorem Distributed Computing through 94

95 Fundamental Theorem Theorem (I,O, ) has a wait-free (n+1)-process layered protocol iff there is a continuous map f: skel n I O... carried by 19-Apr-14 Distributed Computing through

96 Proof Outline Lemma If there is a WF layered protocol for then (I,O, ) there is a continuous f: skel n I! O carried by. 19-Apr-14 Distributed Computing through 96

97 Map ) Protocol Hypothesis f Continuous Bary n I O Distributed Computing through 97

98 Map ) Protocol Á f Simplicial approximation Bary n I O 19-Apr-14 Distributed Computing through 98

99 Map ) Protocol Á Run barycentric Agreement Bary n I Apply Á O 19-Apr-14 Distributed Computing through 99 QED

100 Protocol ) Map Lemma Theorem If there is a WF-RW protocol for then if and only if (I,O, ) there is a continuous f: skel n I! O carried by. 19-Apr-14 Distributed Computing through 100

101 Proof strategy Protocol ) Map Inductive construction g d : skel d I! (I). Base d = 0 Define g 0 : skel 0 I! (I) Let g 0 (v) be any vertex in ({v}) 19-Apr-14 Distributed Computing through 101

102 Induction Hypothesis Protocol ) Map g d-1 : skel d-1 I! (I) For all ¾ in skel d-1 I g d-1 sends skel d-1 ¾ (¾) But (¾) is (d-1)-connected (earlier theorem) Can extend to g d : ¾ (¾) Yielding g d : skel d I! (I) 19-Apr-14 Distributed Computing through 102

103 Constructed Protocol ) Map g: skel n I (I) Simplicial decision map δ: (skel n I) O δ : (skel n I) O Composition f = δ g yields f: skel n I! O carried by. QED 19-Apr-14 Distributed Computing through 103

104 This work is licensed under a Creative Commons Attribution- ShareAlike 2.5 License. You are free: to Share to copy, distribute and transmit the work to Remix to adapt the work Under the following conditions: Attribution. You must attribute the work to Distributed Computing through (but not in any way that suggests that the authors endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same, similar or a compatible license. For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to Any of the above conditions can be waived if you get permission from the copyright holder. Nothing in this license impairs or restricts the author's moral rights. 104 Distributed Computing through

Early stopping: the idea. TRB for benign failures. Early Stopping: The Protocol. Termination

Early stopping: the idea. TRB for benign failures. Early Stopping: The Protocol. Termination TRB for benign failures Early stopping: the idea Sender in round : :! send m to all Process p in round! k, # k # f+!! :! if delivered m in round k- and p " sender then 2:!! send m to all 3:!! halt 4:!

More information

Valency Arguments CHAPTER7

Valency Arguments CHAPTER7 CHAPTER7 Valency Arguments In a valency argument, configurations are classified as either univalent or multivalent. Starting from a univalent configuration, all terminating executions (from some class)

More information

Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors

Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors Michel RAYNAL, Julien STAINER Institut Universitaire de France IRISA, Université de Rennes, France Message adversaries

More information

Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures

Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Xianbing Wang 1, Yong-Meng Teo 1,2, and Jiannong Cao 3 1 Singapore-MIT Alliance, 2 Department of Computer Science,

More information

Section 6 Fault-Tolerant Consensus

Section 6 Fault-Tolerant Consensus Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.

More information

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Agreement Protocols CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Classification of Faults Based on components that failed Program

More information

Failure detectors Introduction CHAPTER

Failure detectors Introduction CHAPTER CHAPTER 15 Failure detectors 15.1 Introduction This chapter deals with the design of fault-tolerant distributed systems. It is widely known that the design and verification of fault-tolerent distributed

More information

Unreliable Failure Detectors for Reliable Distributed Systems

Unreliable Failure Detectors for Reliable Distributed Systems Unreliable Failure Detectors for Reliable Distributed Systems A different approach Augment the asynchronous model with an unreliable failure detector for crash failures Define failure detectors in terms

More information

Implementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links

Implementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links Implementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links Jialin Zhang Tsinghua University zhanggl02@mails.tsinghua.edu.cn Wei Chen Microsoft Research Asia weic@microsoft.com

More information

Fault-Tolerant Consensus

Fault-Tolerant Consensus Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process

More information

CS505: Distributed Systems

CS505: Distributed Systems Cristina Nita-Rotaru CS505: Distributed Systems. Required reading for this topic } Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson for "Impossibility of Distributed with One Faulty Process,

More information

Asynchronous Models For Consensus

Asynchronous Models For Consensus Distributed Systems 600.437 Asynchronous Models for Consensus Department of Computer Science The Johns Hopkins University 1 Asynchronous Models For Consensus Lecture 5 Further reading: Distributed Algorithms

More information

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications: AGREEMENT PROBLEMS (1) AGREEMENT PROBLEMS Agreement problems arise in many practical applications: agreement on whether to commit or abort the results of a distributed atomic action (e.g. database transaction)

More information

Simple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems

Simple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems Simple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems Xianbing Wang, Yong-Meng Teo, and Jiannong Cao Singapore-MIT Alliance E4-04-10, 4 Engineering Drive 3, Singapore 117576 Abstract

More information

C 1. Recap: Finger Table. CSE 486/586 Distributed Systems Consensus. One Reason: Impossibility of Consensus. Let s Consider This

C 1. Recap: Finger Table. CSE 486/586 Distributed Systems Consensus. One Reason: Impossibility of Consensus. Let s Consider This Recap: Finger Table Finding a using fingers Distributed Systems onsensus Steve Ko omputer Sciences and Engineering University at Buffalo N102 86 + 2 4 N86 20 + 2 6 N20 2 Let s onsider This

More information

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,

More information

The Extended BG-Simulation and the Characterization of t-resiliency

The Extended BG-Simulation and the Characterization of t-resiliency The Extended BG-Simulation and the Characterization of t-resiliency Eli Gafni November 17, 2008 Abstract A distributed task T on n processors is an input/output relation between a collection of processors

More information

Distributed Algorithms (CAS 769) Dr. Borzoo Bonakdarpour

Distributed Algorithms (CAS 769) Dr. Borzoo Bonakdarpour Distributed Algorithms (CAS 769) Week 1: Introduction, Logical clocks, Snapshots Dr. Borzoo Bonakdarpour Department of Computing and Software McMaster University Dr. Borzoo Bonakdarpour Distributed Algorithms

More information

Distributed Systems Byzantine Agreement

Distributed Systems Byzantine Agreement Distributed Systems Byzantine Agreement He Sun School of Informatics University of Edinburgh Outline Finish EIG algorithm for Byzantine agreement. Number-of-processors lower bound for Byzantine agreement.

More information

Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus

Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus Yehuda Afek 1, Eli Gafni 2, Sergio Rajsbaum 3, Michel Raynal 4, and Corentin Travers 4 1 Computer Science Department, Tel-Aviv

More information

Distributed Consensus

Distributed Consensus Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement

More information

Consensus and Universal Construction"

Consensus and Universal Construction Consensus and Universal Construction INF346, 2015 So far Shared-memory communication: safe bits => multi-valued atomic registers atomic registers => atomic/immediate snapshot 2 Today Reaching agreement

More information

Geometric Steiner Trees

Geometric Steiner Trees Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015

More information

Randomized Protocols for Asynchronous Consensus

Randomized Protocols for Asynchronous Consensus Randomized Protocols for Asynchronous Consensus Alessandro Panconesi DSI - La Sapienza via Salaria 113, piano III 00198 Roma, Italy One of the central problems in the Theory of (feasible) Computation is

More information

Distributed Computing in Shared Memory and Networks

Distributed Computing in Shared Memory and Networks Distributed Computing in Shared Memory and Networks Class 2: Consensus WEP 2018 KAUST This class Reaching agreement in shared memory: Consensus ü Impossibility of wait-free consensus 1-resilient consensus

More information

On the weakest failure detector ever

On the weakest failure detector ever On the weakest failure detector ever The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Guerraoui, Rachid

More information

Eventually consistent failure detectors

Eventually consistent failure detectors J. Parallel Distrib. Comput. 65 (2005) 361 373 www.elsevier.com/locate/jpdc Eventually consistent failure detectors Mikel Larrea a,, Antonio Fernández b, Sergio Arévalo b a Departamento de Arquitectura

More information

Conditions on Input Vectors for Consensus Solvability in Asynchronous Distributed Systems

Conditions on Input Vectors for Consensus Solvability in Asynchronous Distributed Systems Conditions on Input Vectors for Consensus Solvability in Asynchronous Distributed Systems ACHOUR MOSTEFAOUI Irisa/Ifsic, Université de Rennes, France SERGIO RAJSBAUM Instituto de Matemáticas, UNAM, Mexico

More information

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1. Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation

More information

arxiv: v2 [cs.dc] 18 Feb 2015

arxiv: v2 [cs.dc] 18 Feb 2015 Consensus using Asynchronous Failure Detectors Nancy Lynch CSAIL, MIT Srikanth Sastry CSAIL, MIT arxiv:1502.02538v2 [cs.dc] 18 Feb 2015 Abstract The FLP result shows that crash-tolerant consensus is impossible

More information

arxiv:cs/ v1 [cs.dc] 29 Dec 2004

arxiv:cs/ v1 [cs.dc] 29 Dec 2004 Reductions in Distributed Computing Part I: Consensus and Atomic Commitment Tasks arxiv:cs/0412115v1 [cs.dc] 29 Dec 2004 Bernadette Charron-Bost Abstract We introduce several notions of reduction in distributed

More information

The Weakest Failure Detector to Solve Mutual Exclusion

The Weakest Failure Detector to Solve Mutual Exclusion The Weakest Failure Detector to Solve Mutual Exclusion Vibhor Bhatt Nicholas Christman Prasad Jayanti Dartmouth College, Hanover, NH Dartmouth Computer Science Technical Report TR2008-618 April 17, 2008

More information

Lecture 8: The Dummy Adversary

Lecture 8: The Dummy Adversary 6.897: Selected Topics in Cryptography 27 February 2004 Lecture 8: The Dummy dversary Instructor: Ran Canetti Scribed by: Jonathan Herzog 1 Previous Lecture Motivation for the Universally Composable (UC)

More information

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Rachid Guerraoui Petr Kouznetsov Distributed Programming Laboratory EPFL Abstract Recent papers [7, 9] define the weakest failure detector

More information

A Brief Introduction to Model Checking

A Brief Introduction to Model Checking A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:

More information

The Las-Vegas Processor Identity Problem (How and When to Be Unique)

The Las-Vegas Processor Identity Problem (How and When to Be Unique) The Las-Vegas Processor Identity Problem (How and When to Be Unique) Shay Kutten Department of Industrial Engineering The Technion kutten@ie.technion.ac.il Rafail Ostrovsky Bellcore rafail@bellcore.com

More information

Impossibility of Distributed Consensus with One Faulty Process

Impossibility of Distributed Consensus with One Faulty Process Impossibility of Distributed Consensus with One Faulty Process Journal of the ACM 32(2):374-382, April 1985. MJ Fischer, NA Lynch, MS Peterson. Won the 2002 Dijkstra Award (for influential paper in distributed

More information

Combining Shared Coin Algorithms

Combining Shared Coin Algorithms Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence

More information

Warm-Up Problem. Please fill out your Teaching Evaluation Survey! Please comment on the warm-up problems if you haven t filled in your survey yet.

Warm-Up Problem. Please fill out your Teaching Evaluation Survey! Please comment on the warm-up problems if you haven t filled in your survey yet. Warm-Up Problem Please fill out your Teaching Evaluation Survey! Please comment on the warm-up problems if you haven t filled in your survey yet Warm up: Given a program that accepts input, is there an

More information

CS505: Distributed Systems

CS505: Distributed Systems Department of Computer Science CS505: Distributed Systems Lecture 10: Consensus Outline Consensus impossibility result Consensus with S Consensus with Ω Consensus Most famous problem in distributed computing

More information

Consensus when failstop doesn't hold

Consensus when failstop doesn't hold Consensus when failstop doesn't hold FLP shows that can't solve consensus in an asynchronous system with no other facility. It can be solved with a perfect failure detector. If p suspects q then q has

More information

On the weakest failure detector ever

On the weakest failure detector ever Distrib. Comput. (2009) 21:353 366 DOI 10.1007/s00446-009-0079-3 On the weakest failure detector ever Rachid Guerraoui Maurice Herlihy Petr Kuznetsov Nancy Lynch Calvin Newport Received: 24 August 2007

More information

The Weighted Byzantine Agreement Problem

The Weighted Byzantine Agreement Problem The Weighted Byzantine Agreement Problem Vijay K. Garg and John Bridgman Department of Electrical and Computer Engineering The University of Texas at Austin Austin, TX 78712-1084, USA garg@ece.utexas.edu,

More information

The Opinion Number of Set-Agreement

The Opinion Number of Set-Agreement The Opinion Number of Set-Agreement Pierre Fraigniaud, Sergio Rajsbaum, Matthieu Roy, Corentin Travers To cite this version: Pierre Fraigniaud, Sergio Rajsbaum, Matthieu Roy, Corentin Travers. The Opinion

More information

Shared Memory vs Message Passing

Shared Memory vs Message Passing Shared Memory vs Message Passing Carole Delporte-Gallet Hugues Fauconnier Rachid Guerraoui Revised: 15 February 2004 Abstract This paper determines the computational strength of the shared memory abstraction

More information

Weakening Failure Detectors for k-set Agreement via the Partition Approach

Weakening Failure Detectors for k-set Agreement via the Partition Approach Weakening Failure Detectors for k-set Agreement via the Partition Approach Wei Chen 1, Jialin Zhang 2, Yu Chen 1, Xuezheng Liu 1 1 Microsoft Research Asia {weic, ychen, xueliu}@microsoft.com 2 Center for

More information

Concurrent Non-malleable Commitments from any One-way Function

Concurrent Non-malleable Commitments from any One-way Function Concurrent Non-malleable Commitments from any One-way Function Margarita Vald Tel-Aviv University 1 / 67 Outline Non-Malleable Commitments Problem Presentation Overview DDN - First NMC Protocol Concurrent

More information

On Equilibria of Distributed Message-Passing Games

On Equilibria of Distributed Message-Passing Games On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu

More information

Computational Models Lecture 8 1

Computational Models Lecture 8 1 Computational Models Lecture 8 1 Handout Mode Nachum Dershowitz & Yishay Mansour. Tel Aviv University. May 17 22, 2017 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice

More information

Model Checking of Fault-Tolerant Distributed Algorithms

Model Checking of Fault-Tolerant Distributed Algorithms Model Checking of Fault-Tolerant Distributed Algorithms Part I: Fault-Tolerant Distributed Algorithms Annu Gmeiner Igor Konnov Ulrich Schmid Helmut Veith Josef Widder LOVE 2016 @ TU Wien Josef Widder (TU

More information

I R I S A P U B L I C A T I O N I N T E R N E THE NOTION OF VETO NUMBER FOR DISTRIBUTED AGREEMENT PROBLEMS

I R I S A P U B L I C A T I O N I N T E R N E THE NOTION OF VETO NUMBER FOR DISTRIBUTED AGREEMENT PROBLEMS I R I P U B L I C A T I O N I N T E R N E N o 1599 S INSTITUT DE RECHERCHE EN INFORMATIQUE ET SYSTÈMES ALÉATOIRES A THE NOTION OF VETO NUMBER FOR DISTRIBUTED AGREEMENT PROBLEMS ROY FRIEDMAN, ACHOUR MOSTEFAOUI,

More information

Computational Models for Wireless Sensor Networks: A Survey

Computational Models for Wireless Sensor Networks: A Survey Computational Models for Wireless Sensor Networks: A Survey Apostolos Filippas 2, Stavros Nikolaou 2, Andreas Pavlogiannis 2, Othon Michail 1,2, Ioannis Chatzigiannakis 1,2, and Paul G. Spirakis 1,2 1

More information

6.897: Selected Topics in Cryptography Lectures 7 and 8. Lecturer: Ran Canetti

6.897: Selected Topics in Cryptography Lectures 7 and 8. Lecturer: Ran Canetti 6.897: Selected Topics in Cryptography Lectures 7 and 8 Lecturer: Ran Canetti Highlights of past lectures Presented a basic framework for analyzing the security of protocols for multi-party function evaluation.

More information

Time. To do. q Physical clocks q Logical clocks

Time. To do. q Physical clocks q Logical clocks Time To do q Physical clocks q Logical clocks Events, process states and clocks A distributed system A collection P of N single-threaded processes (p i, i = 1,, N) without shared memory The processes in

More information

Computational Models Lecture 8 1

Computational Models Lecture 8 1 Computational Models Lecture 8 1 Handout Mode Ronitt Rubinfeld and Iftach Haitner. Tel Aviv University. May 11/13, 2015 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice

More information

The Space Complexity of Unbounded Timestamps!

The Space Complexity of Unbounded Timestamps! The Space Complexity of Unbounded Timestamps! Faith Ellen, University of Toronto! Panagiota Fatourou, University of Ioannina! Eric Ruppert, York University! Timestamp System! a set of timestamps U! two

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170 UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability

More information

Symmetric Rendezvous in Graphs: Deterministic Approaches

Symmetric Rendezvous in Graphs: Deterministic Approaches Symmetric Rendezvous in Graphs: Deterministic Approaches Shantanu Das Technion, Haifa, Israel http://www.bitvalve.org/~sdas/pres/rendezvous_lorentz.pdf Coauthors: Jérémie Chalopin, Adrian Kosowski, Peter

More information

Reliable Broadcast for Broadcast Busses

Reliable Broadcast for Broadcast Busses Reliable Broadcast for Broadcast Busses Ozalp Babaoglu and Rogerio Drummond. Streets of Byzantium: Network Architectures for Reliable Broadcast. IEEE Transactions on Software Engineering SE- 11(6):546-554,

More information

In the Stone Age. Stephan Holzer. Yuval Emek - Technion Roger Wattenhofer - ETH Zürich

In the Stone Age. Stephan Holzer. Yuval Emek - Technion Roger Wattenhofer - ETH Zürich The Power of a Leader In the Stone Age - MIT Yuval Emek - Technion Roger Wattenhofer - ETH Zürich 2nd Workshop on Biological Distributed Algorithms, October 11-12, 2014 in Austin, Texas USA The Power of

More information

Zero-Knowledge Against Quantum Attacks

Zero-Knowledge Against Quantum Attacks Zero-Knowledge Against Quantum Attacks John Watrous Department of Computer Science University of Calgary January 16, 2006 John Watrous (University of Calgary) Zero-Knowledge Against Quantum Attacks QIP

More information

SFM-11:CONNECT Summer School, Bertinoro, June 2011

SFM-11:CONNECT Summer School, Bertinoro, June 2011 SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision

More information

Do we have a quorum?

Do we have a quorum? Do we have a quorum? Quorum Systems Given a set U of servers, U = n: A quorum system is a set Q 2 U such that Q 1, Q 2 Q : Q 1 Q 2 Each Q in Q is a quorum How quorum systems work: A read/write shared register

More information

Computational Models Lecture 8 1

Computational Models Lecture 8 1 Computational Models Lecture 8 1 Handout Mode Ronitt Rubinfeld and Iftach Haitner. Tel Aviv University. April 18/ May 2, 2016 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice

More information

Optimal Resilience Asynchronous Approximate Agreement

Optimal Resilience Asynchronous Approximate Agreement Optimal Resilience Asynchronous Approximate Agreement Ittai Abraham, Yonatan Amit, and Danny Dolev School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel {ittaia, mitmit,

More information

LOWER BOUNDS FOR RANDOMIZED CONSENSUS UNDER A WEAK ADVERSARY

LOWER BOUNDS FOR RANDOMIZED CONSENSUS UNDER A WEAK ADVERSARY LOWER BOUNDS FOR RANDOMIZED CONSENSUS UNDER A WEAK ADVERSARY HAGIT ATTIYA AND KEREN CENSOR-HILLEL Abstract. This paper studies the inherent trade-off between termination probability and total step complexity

More information

How to solve consensus in the smallest window of synchrony

How to solve consensus in the smallest window of synchrony How to solve consensus in the smallest window of synchrony Dan Alistarh 1, Seth Gilbert 1, Rachid Guerraoui 1, and Corentin Travers 2 1 EPFL LPD, Bat INR 310, Station 14, 1015 Lausanne, Switzerland 2 Universidad

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly

More information

Early consensus in an asynchronous system with a weak failure detector*

Early consensus in an asynchronous system with a weak failure detector* Distrib. Comput. (1997) 10: 149 157 Early consensus in an asynchronous system with a weak failure detector* André Schiper Ecole Polytechnique Fe dérale, De partement d Informatique, CH-1015 Lausanne, Switzerland

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Byzantine Agreement. Gábor Mészáros. Tatracrypt 2012, July 2 4 Smolenice, Slovakia. CEU Budapest, Hungary

Byzantine Agreement. Gábor Mészáros. Tatracrypt 2012, July 2 4 Smolenice, Slovakia. CEU Budapest, Hungary CEU Budapest, Hungary Tatracrypt 2012, July 2 4 Smolenice, Slovakia Byzantium, 1453 AD. The Final Strike... Communication via Messengers The Byzantine Generals Problem Communication System Model Goal G

More information

Atomic snapshots in O(log 3 n) steps using randomized helping

Atomic snapshots in O(log 3 n) steps using randomized helping Atomic snapshots in O(log 3 n) steps using randomized helping James Aspnes Keren Censor-Hillel September 7, 2018 Abstract A randomized construction of single-writer snapshot objects from atomic registers

More information

The Heard-Of Model: Computing in Distributed Systems with Benign Failures

The Heard-Of Model: Computing in Distributed Systems with Benign Failures The Heard-Of Model: Computing in Distributed Systems with Benign Failures Bernadette Charron-Bost Ecole polytechnique, France André Schiper EPFL, Switzerland Abstract Problems in fault-tolerant distributed

More information

There are problems that cannot be solved by computer programs (i.e. algorithms) even assuming unlimited time and space.

There are problems that cannot be solved by computer programs (i.e. algorithms) even assuming unlimited time and space. Undecidability There are problems that cannot be solved by computer programs (i.e. algorithms) even assuming unlimited time and space. Proved by Alan Turing in 1936 What is a computer program/algorithm?

More information

Snap-Stabilizing Depth-First Search on Arbitrary Networks

Snap-Stabilizing Depth-First Search on Arbitrary Networks The Author 006. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org Advance Access

More information

Failure Detectors. Seif Haridi. S. Haridi, KTHx ID2203.1x

Failure Detectors. Seif Haridi. S. Haridi, KTHx ID2203.1x Failure Detectors Seif Haridi haridi@kth.se 1 Modeling Timing Assumptions Tedious to model eventual synchrony (partial synchrony) Timing assumptions mostly needed to detect failures Heartbeats, timeouts,

More information

Decidability: Church-Turing Thesis

Decidability: Church-Turing Thesis Decidability: Church-Turing Thesis While there are a countably infinite number of languages that are described by TMs over some alphabet Σ, there are an uncountably infinite number that are not Are there

More information

Turing Machines Part III

Turing Machines Part III Turing Machines Part III Announcements Problem Set 6 due now. Problem Set 7 out, due Monday, March 4. Play around with Turing machines, their powers, and their limits. Some problems require Wednesday's

More information

Review for B33DV2-Digital Design. Digital Design

Review for B33DV2-Digital Design. Digital Design Review for B33DV2 The Elements of Modern Behaviours Design Representations Blocks Waveforms Gates Truth Tables Boolean Algebra Switches Rapid Prototyping Technologies Circuit Technologies TTL MOS Simulation

More information

8. INTRACTABILITY I. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley. Last updated on 2/6/18 2:16 AM

8. INTRACTABILITY I. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley. Last updated on 2/6/18 2:16 AM 8. INTRACTABILITY I poly-time reductions packing and covering problems constraint satisfaction problems sequencing problems partitioning problems graph coloring numerical problems Lecture slides by Kevin

More information

How can one get around FLP? Around FLP in 80 Slides. How can one get around FLP? Paxos. Weaken the problem. Constrain input values

How can one get around FLP? Around FLP in 80 Slides. How can one get around FLP? Paxos. Weaken the problem. Constrain input values How can one get around FLP? Around FLP in 80 Slides Weaken termination Weaken the problem use randomization to terminate with arbitrarily high probability guarantee termination only during periods of synchrony

More information

THE COMMUNICATIONS COMPLEXITY HIERARCHY IN DISTRIBUTED COMPUTING. J. B. Sidney + and J. Urrutia*

THE COMMUNICATIONS COMPLEXITY HIERARCHY IN DISTRIBUTED COMPUTING. J. B. Sidney + and J. Urrutia* THE COMMUNICATIONS COMPLEXITY HIERARCHY IN DISTRIBUTED COMPUTING J. B. Sidney + and J. Urrutia* 1. INTRODUCTION Since the pioneering research of Cook [1] and Karp [3] in computational complexity, an enormous

More information

Early-Deciding Consensus is Expensive

Early-Deciding Consensus is Expensive Early-Deciding Consensus is Expensive ABSTRACT Danny Dolev Hebrew University of Jerusalem Edmond Safra Campus 9904 Jerusalem, Israel dolev@cs.huji.ac.il In consensus, the n nodes of a distributed system

More information

Real Interactive Proofs for VPSPACE

Real Interactive Proofs for VPSPACE Brandenburgische Technische Universität, Cottbus-Senftenberg, Germany Colloquium Logicum Hamburg, September 2016 joint work with M. Baartse 1. Introduction Blum-Shub-Smale model of computability and complexity

More information

CSC 8301 Design & Analysis of Algorithms: Lower Bounds

CSC 8301 Design & Analysis of Algorithms: Lower Bounds CSC 8301 Design & Analysis of Algorithms: Lower Bounds Professor Henry Carter Fall 2016 Recap Iterative improvement algorithms take a feasible solution and iteratively improve it until optimized Simplex

More information

Efficient Algorithms for Checking the Atomicity of a Run of Read and Write Operations

Efficient Algorithms for Checking the Atomicity of a Run of Read and Write Operations 1 Acta Informatica (Springer-Verlag) 32, pp.155-170, 1995 Efficient Algorithms for Checking the Atomicity of a Run of Read and Write Operations Lefteris M. Kirousis 1,2,3 Andreas G. Veneris 4,5 January

More information

Section 14.1 Computability then else

Section 14.1 Computability then else Section 14.1 Computability Some problems cannot be solved by any machine/algorithm. To prove such statements we need to effectively describe all possible algorithms. Example (Turing machines). Associate

More information

198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007

198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007 198:538 Complexity of Computation Lecture 16 Rutgers University, Spring 2007 8 March 2007 In this lecture we discuss Shamir s theorem that PSPACE is the set of languages that have interactive proofs with

More information

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,

More information

Decentralized Sequential Hypothesis Testing. Change Detection

Decentralized Sequential Hypothesis Testing. Change Detection Decentralized Sequential Hypothesis Testing & Change Detection Giorgos Fellouris, Columbia University, NY, USA George V. Moustakides, University of Patras, Greece Outline Sequential hypothesis testing

More information

(Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains

(Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains Tyler Crain Vincent Gramoli, Mikel Larrea, Michel Raynal, University of Sydney, Australia {tyler.crain,vincent.gramoli}@sydney.edu.au

More information

Failure Detection and Consensus in the Crash-Recovery Model

Failure Detection and Consensus in the Crash-Recovery Model Failure Detection and Consensus in the Crash-Recovery Model Marcos Kawazoe Aguilera Wei Chen Sam Toueg Department of Computer Science Upson Hall, Cornell University Ithaca, NY 14853-7501, USA. aguilera,weichen,sam@cs.cornell.edu

More information

On the Homological Dimension of Lattices

On the Homological Dimension of Lattices On the Homological Dimension of Lattices Roy Meshulam August, 008 Abstract Let L be a finite lattice and let L = L {ˆ0, ˆ1}. It is shown that if the order complex L satisfies H k L 0 then L k. Equality

More information

Byzantine Agreement. Gábor Mészáros. CEU Budapest, Hungary

Byzantine Agreement. Gábor Mészáros. CEU Budapest, Hungary CEU Budapest, Hungary 1453 AD, Byzantium Distibuted Systems Communication System Model Distibuted Systems Communication System Model G = (V, E) simple graph Distibuted Systems Communication System Model

More information

THE chase for the weakest system model that allows

THE chase for the weakest system model that allows 1 Chasing the Weakest System Model for Implementing Ω and Consensus Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou Abstract Aguilera et al. and Malkhi et al. presented two system models, which

More information

More on NP and Reductions

More on NP and Reductions Indian Institute of Information Technology Design and Manufacturing, Kancheepuram Chennai 600 127, India An Autonomous Institute under MHRD, Govt of India http://www.iiitdm.ac.in COM 501 Advanced Data

More information

6.852: Distributed Algorithms Fall, Class 24

6.852: Distributed Algorithms Fall, Class 24 6.852: Distributed Algorithms Fall, 2009 Class 24 Today s plan Self-stabilization Self-stabilizing algorithms: Breadth-first spanning tree Mutual exclusion Composing self-stabilizing algorithms Making

More information

U.C. Berkeley CS174: Randomized Algorithms Lecture Note 12 Professor Luca Trevisan April 29, 2003

U.C. Berkeley CS174: Randomized Algorithms Lecture Note 12 Professor Luca Trevisan April 29, 2003 U.C. Berkeley CS174: Randomized Algorithms Lecture Note 12 Professor Luca Trevisan April 29, 2003 Fingerprints, Polynomials, and Pattern Matching 1 Example 1: Checking Matrix Multiplication Notes by Alistair

More information

Nontrivial and Universal Helping for Wait-Free Queues and Stacks

Nontrivial and Universal Helping for Wait-Free Queues and Stacks Nontrivial and Universal Helping for Wait-Free Queues and Stacks Hagit Attiya 1, Armando Castañeda 2, and Danny Hendler 3 1 Technion 2 UNAM 3 BGU Abstract This paper studies two approaches to formalize

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information