8 (0,1,3,0,1) (3,0,1,3,0) 5 9 (1,3,0,1,3) (3,0,1,3,0) 6 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) leader
|
|
- Norman Henderson
- 5 years ago
- Views:
Transcription
1 Deterministic, silence and self-stabilizing leader election algorithm on id-based ring Colette Johnen L.R.I./C.N.R.S., Universite de Paris-Sud Bat. 490, Campus d'orsay F Orsay Cedex, France. phone : (+33) fax : (+33) colette@lri.fr Abstract We present in this paper a deterministic, silence and self-stabilizing leader election algorithm on unidirectional, id-based rings which have a bound on their id-values. The id-values of processors in a ring whose size is N, have to be inferior to N + k. The size of communication registers required by the algorithm is constant. The algorithm stabilizes in (k +)N + 1 time. keywords: self-stabilization, leader election, silent algorithm, memory space. 1 Introduction The notion of self-stabilization was introduced by Dijkstra [Dij74]. He dened a system as selfstabilizing when "regardless of its initial state, it is guaranteed to arrive at a legitimate state in a nite number of steps". Such a property is very desirable for any distributed system, because after any unexpected perturbation modifying the memory state, the system eventually recovers and returns to a legitimate state, without any outside intervention. Furthermore, self-stabilizing systems do not require particular initial state when a processor recovers assuming that processor codes are not corrupted. In this paper, we present a deterministic, silence and self-stabilizing algorithm that elects the processor having the minimal id-value on id-based unidirectional N-rings such that the id-values of its processors is inferior to N + k. In an id-based system, as processor ids are not part of the local variables, whatever is the current state each processor as distinct identity. Thereisseveral deterministic self-stabilizing leader election protocols on id-based systems whose the memory space requirement isn states per processor. Some of these algorithms build a spanning tree - the leader will be the tree root - [AG93] (in that protocol, processors need to know abound on the network size, the same protocol is presented in the read/write model [AG94]) in [AKY90] the knowledge of ring size is not required. the algorithm presented in [Dol93] assume only the read/write atomicity and processors does not need to know the network size. Ghosh and Gupta have designed a self-stabilizing algorithm on unidirectional ring that contained faults: after a fault, the ring will recovers in O(1) time [GG96]. Mayer, Ostrovsky and Yung, in [MOY96] have proposed a compiler that transforms any selfstabilizing protocol on bidirectional uniform ring to a self-stabilizing protocol which run on unidirectional uniform ring (their compiler to break the symmetric ip coins). Afek and Bremler 1
2 in [AB97] have proposed a general paradigm for the development of self-stabilizing algorithm on unidirectional general id-based processors that communicate by messages-passing. The size of the exchanged messages is log(n) (processors exchange their id-value). There are two principal measures of eciency for self-stabilizing algorithms: stabilization time, and memory requirements per processor. On huge, distributed networks (containing several millions of processors) managed by several organizations, the properly functioning of network management protocols should not depend on global properties (as network size) which can be modied at any time, by anybody. Therefore, we propose an algorithm whose space complexity is constant (thus it is independent of ring size). When, the ring grows, the local algorithm implementations do not need to be changed. There is several self-stabilizing protocols where the required memory space is constant [GH96], [JABD97], [Joh97], [Pet97], [PV97], and [Vil97]. On general uniform rings, there is no deterministic and self-stabilizing leader election protocol ([BJ98]). Only on bidirectional and prime size rings, one can designed a protocol requiring only constant memory space (such a protocol is presented in[ils95]). To my knowledge, we present here the rst self-stabilizing leader election algorithm on id-based ring where the required memory space is constant. A self-stabilizing algorithm is silent if once the system is stabilized, processors do not change their state (processors only check that their neighbor states have not be corrupted). The silence property of self-stabilizing algorithms is a desirable property in terms of simplicity and communication overhead. Our algorithm completes, in some sense, the result by Dolev, Gouda and Schneider [DGS96]. They state that the memory requirement to a silent self-stabilizing leader election protocol is O(log N) in the general case (i.e. when there is no bound on the id-values). Section describes our model. In section 3, we present the algorithm. Section 4 is devoted to the proof of convergence and section 5 to the proof of correctness. Model Distributed Unidirectional Ring. A distributed unidirectional ring is a connected ring of processors. A processor may only obtain \information" from its left neighbor, and give \information" to its right neighbor. Communication among processors is carried out by communication registers. A processor can write and read in its register, and read the register of its left neighbor. Thus, processors have two types of variables: local variables and eld variables. The eld variables of a processors are in its register (which is readed by its right neighbor). The local variables are used strictly locally, meaning that they can be only accessed (writing/reading) by their owner. The path from p 0 to p is the processors sequence (p 1 p ::: p m ) such that (i) p 0 = p 1, (ii) p = p m, (iii) 8j ]1,m[, the left neighbor of p j is p j;1 and its right neighbor is p j+1. On bidirectional rings, a processor may give and obtain \information" from its both neighbors: it can read the communication register of its both neighbors. An algorithm on unidirectional ring may be performed on bidirectional ring the converse is not true. States and Congurations. The register state of processor is dened by the values of its eld variables. The state of processor is dened by the values of its local variables and eld variables. A conguration of an unidirectional ring is a product of the states of all processors of ring. The set of congurations of the ring is denoted as C. Id-based ring. In an id-based ring, processors have distinct identities: processor are distinct. An id-based ring whose size is N is k-bounded if and only if id-values of its processors is inferior or equal to N + k.
3 Actions. Each processor executes an algorithm. The algorithm consists of a set of variables and a nite set of actions. Each action is uniquely identied by a label and is of the following form: < label >:: <guard>;! < statement > The guard of an action in the algorithm of p is a boolean expression involving the local, eld variables of p, and the eld variables of its left neighbor. The statement of an action of p updates some local variables and/or eld variables of p. An action can be executed only if its guard evaluates to true. We assume that the actions are atomically executed: the evaluation of a guard and the execution of the corresponding statement of an action, if executed, are done in one atomic step. Computations. During a computation step, one or more processors execute an atomic step, and a processor may take at most one atomic step this is known as the distributed daemon [BGM89]. Since the system is asynchronous, we dene a time unit, round, to compute the time complexity. A round is a maximal computation step where all processors that hold the guard of an action, execute the corresponding action during the step. A round is called by some authors a synchronous computation step. A computation e of an algorithm A is a fair, maximal sequence of congurations c 1 c ::: such that for i =1 :::, the conguration c n+1 is reached from c n by a computation step. c 1 is called the initial conguration of e. Along a fair sequence, if a processor may continuously perform an action then it will eventually perform an action. A maximal sequence is either innite, or it is nite in that case no action is enabled in the nal conguration. The set of computations of an algorithm A starting with a particular initial conguration c C is denoted by E c. The set of computations of A whose initial congurations are elements of B C is denoted as E B. E is the set of all possible fair and maximal computations (E = E C ). Register space complexity. The register space complexity of a self-stabilizing algorithm is the number of register states of a processor performing the self-stabilizing algorithm. An algorithm requires only constant register space if the number of register states on each processor required by the algorithm is a constant. Predicates. Let X be a set. x ` P means that an element x Xsatises the predicate P dened on the set X. We distinguish a special predicate: true (satised by each element of X ) formally dened as follows: x ` true. Self-Stabilization. We use the following term, attractor in the denition of self-stabilization. Denition.1 (Attractor) Let X and Y be two predicates dened on C. In C, Y is an attractor for X if and only if the following conditions are true: convergence 8e E X : (e = c 1 c :::):: 9n 1 c n ` Y closure 8c ` Y : 8c 0 where (c,c 0 ) is a computation step:: c 0 ` Y Let LS be a predicate dened on C. The system self-stabilizes to LS if only if LS is attractor for true. Denition. (trap) Let Pr be a predicate dened on processor state. Pr is a trap if only if Pr veries the closure property: Let c be aconguration where p ` Pr, 8c 0 where (c,c 0 )isacomputation step:: p ` Pr in c 0. To prove the correctness of our algorithm, we use the convergent stair [GM91] theorem. Theorem.1 Let Y and X be two congurations sets of a ring that performs an algorithm A. if X is an attractor for true and if Y is and for X then Y is an attractor for true. 3
4 3 Algorithm In this section, we present a deterministic, silence and self-stabilizing algorithm that elects the processor having the minimal id-value on id-based unidirectional ring with a k-bound on its idvalues. On a k-bounded ring, the value of the smallest id-value is inferior to k + (id-values are greater or equal to 0). Only processors whose id-value is inferior to k + can be a leader other processors will never be elected. Thus, we dene two processors sets. One set (SI) contains the processors that may have the smallest id-value only these processors compete to the leadership. The other set (BI) contains processor that cannot be the leader these processors do not compete to the leadership and are as \quiet" as possible. Formally SI: the set of processors whose id-value is inferior or equal to to k +1 BI: the set of processors whose id-value is greater than k +1. The algorithm is designed such way that once the ring is stabilized processors know id-value of each processor of SI (these values are stored in an array called F ). Thus, each processor knows the smallest id-value in the ring (the id-value of the leader). Nevertheless, a processor knows at most k + id-values (all of them inferior to k +). That why, the register size required by the algorithm is constant whatever is the ring size. Algorithm 3.1 Leader election algorithm on k-bounded ring Field Variables: F p is an array ofk + elements taking value in [0 k+ [. Ld p is a boolean. Notation: lp is the left neighbor of p. F lp is the value of F on lp. id p is the value of the p identier. Predicate: Next(p, p 0 ) (8i [0 k+ 1[: F p [i] =F p 0[i + 1]) ^ (F p [k +1]=id p ). F ollowing(p) Next(p lp). Macro: U pdate(p) :8i [0 k+1[:f p [i] :=F lp [i +1] F p [k +1]:=id p. Action: fthe two following actions are executed by the processors of BIg A 1 : (id p >k+1)^ (F p 6= F lp ) ;! F p := F lp. A : (id p >k+1)^ (Ld p =1);! Ld p := 0. fthe three following actions are executed by the processors of SIg B 1 : (id p k +1) ^ :F ollowing(p) ;! Update(p) B : (id p k +1) ^ F ollowing(p) ^ id p is not the smallest value in F p ^ Ld p =1;! Ld := 0 B 3 : (id p k +1) ^ F ollowing(p) ^ id p is the smallest value in F p ^ Ld p =0;! Ld p := 1 Denition 3.1 Aleader is a processor p such that Ld p =1. The processors of BI \transmit" the array (A 1 ) and they also set up their Ld variable to 0 (A ). The processors of SI left-shift the F array elements (the rst value is withdrawn) and then 4
5 they add their own id-value at the end of the array 1 (B 1 ). This simple action will ensure that (once the ring is stabilized) the array of each processor contains all the id-values of SI processors that are in the ring and only these id-values though processors of SI have dierent arrays (the id-values are not in the same order), Thus once the ring is stabilized, a processor of SI may decide if it is the leader or not: it compares its id-value with the smallest id-value of its F variable (B or B 3 ). Denition 3. A conguration is a deadlock if only if no processor may perform an action. (3,0,1,3,0) (3,0,1,3,0) 5 (3,0,1,3,0) (0,1,3,0,1) 8 (0,1,3,0,1) 3 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) 0 9 (1,3,0,1,3) 10 (1,3,0,1,3) leader Figure 1: the deadlock conguration in a 10-Ring that is 3-bounded Denition 3.3 We call LS, the set of deadlock congurations where one and only one processor is elected. The conguration presented in the gure 1 is a deadlock where one processor is elected. In the section 4 we prove that from any conguration, whatever the computation performs, a deadlock conguration is reached. In the section 5, we will prove that the reached deadlock conguration belongs to LS: one and only one processor is elected. We will also proof that the elected processor has the smallest id-value of the ring. 4 Convergence Denition 4.1 REG 0 = f8p SI F p [k +1]=id p g. Let p be aprocessor of SI. Thus, in REG 0, F p [k +1] is the id-value of p. Lemma 4.1 Let p be aprocessor of SI. Whatever the computation performs, F p [k +1] will eventually get the value id p. Then, F p [k +1] will keep this value forever. Whatever the current conguration, after a round, each processor p of SI verify the equality: F p [k +1]=id p. Proof: Closure After an action, p veries the F ollowing predicate according to the denition of guard actions that p may perform (B 1, B,orB 3 ). thus no action may change the value of F p [k +1], once F p [k +1]=id p. Convergence if F p [k +1] 6= id p, then p holds the B 1 guard till F p [k +1] 6= id p. Thus, p will 1 this action is similar to an action on a FIFO list where the processors gets the rst value of the list and adds it id-value at the end of the list. 5
6 eventually perform this action. Stabilization time all processors of SI such that F p [k +1]6= id p hold the B 1 guard. During the rst round, they perform this action thus after the round all processors of SI verify the equality F p [k +1]=id p. The following lemma is a direct consequence of lemma 4.1 and its proof. Lemma 4. REG 0 is attractor for true. Whatever the initial conguration, REG 0 is reached in one round. Denition 4. i [0 k +1], REG 0 i = REG i \f8p BI F p [k +1; i] is the id-value of the i+1-th previous processor of p in the ring that belongs to SIg. i [1 k +1], REG i = REG 0 i;1 \f8p SI F p [k +1; i] is the id-value of the i-th previous processor of p in the ring that belongs to SIg. In the ring of the gure 1, SI contains 3 processors (processors whose id-value are 0 1 or 3). Call p the processor whose id-value is 0. 3 is the id-value of the rst previous processor of p that belongs to SI 1 is the id-value of the second one 0 is the id-value of the third one 3 is the id-value of the forth one. Notice that third previous processor of p in SI is p itself. Observation 4.1 Let c be aconguration of REG 0 i. In c, aprocessor p of SI veries the following predicate: 8j [1 i] F p [k +1; j] is the id-value of the j-th previous processor of p in the ring that belongs to SI and F p [k +1] = id p. In c, a processor p of BI veries the following predicate: 8j [0 i] F p [k +1; j] is the id-value of the j+1-th previous processor of p in the ring that belongs to SI. The gure illustrates how a ring stabilizes. From any conguration, whatever the computation performs REG 0 is reached in at most one round. After that, REG 0 0 is reached in at most N ; 1 rounds then REG 1 in one round, REG 0 1 in at most N ; 1 rounds.... We have proven that REG 0 is an attractor. We will nish the convergence verication by proving that (i) REG 0 i is an attractor if REG i is an attractor (ii) REG i+1 is an attractor if REG 0 i is an attractor (iii) from any conguration of REG i, REG 0 i is reached in at most N ;1 rounds (iv) from any conguration of REG 0 i, REG i+1 is reached in 1 round. Thus, we will prove thatreg 0 k+1 is an attractor that is reachedinatmost(k +1)N. Denition 4.3 Let p be aprocessor of BI. Let us call p 0 the rst previous processor of p belonging to SI. p veries the predicate stable i if only if (i) F p [k +1; i] = F p 0[k +1; i] and if (ii) lp veries stable i predicate or lp belonging to SI. Observation 4. Let c be aconguration of REG i. c is a conguration of REG 0 i if and only if all processors of BI verify the stable i predicate Lemma 4.3 If REG i is closed then stable i predicate is a trap in REG i. Proof: Let p be a processor of BI that veries the stable i predicate in REG i. Call p 0 the rst previous processor of p belonging to SI. Let p0 p be the path from p' to p. If p veries the stable i predicate then each processor in the path p0 p veries the stable i predicate. Assume that p stops to verify the stable i predicate. Let us call ps the rst processor in the path p0 p that has stopped to verify the stable i predicate (such a processor exists by assumption). In order to stop to verify the stable i predicate in REG i, ps hastochange its F ps [k +1; i] value although F ps [k +1; i] was equal to F lps [k +1; i] value and lps 3 has not modied the F lps [k +1; i] value. Such a change cannot be done. lp is the left neighbor of p. 3 lps is the left neighbor of ps. 6
7 round rounds REG REG rounds 6 3 (0,,) unstable 1 quasi-stable 1 (0,,) REG 1 (0,,) rounds stable 1 (1,,) (0,,) (0,,) (,,) 6 (,,) (,,) (1,,) 5 4 REG (0,,) 5 rounds 0 1 (,,) 5 4 REG (,,) Figure : stabilization in a 5-Ring that is 1-bounded Denition 4.4 Let p be a processor of BI. p veries the predicate quasi stable i if only if (i) p does not verify the stable i predicate, and (ii) lp veries the stable i predicate or lp SI. The denitions of stable and quasi stable predicate are illustrated in the gure. Lemma 4.4 If it exists a processor p of BI that does not verify the stable i,thenthereisaprocessor ps that veries the quasi stable i predicate Proof: Call p 0 the rst previous processor of p belonging to SI. Let p0 p be the path from p' to p. Call p j the rst processus on the path p0 p that p j does not veried the stable i predicate. If j =1 then p 1 does not satisfy the stable i predicate and its left neighbor belong to SI thus p 1 veries the quasi stable i predicate. If j>1, p j does not satisfy the stable i predicate but its left neighbor satises this predicate. In both cases, p j veries the quasi stable i predicate. Lemma 4.5 8i [0 k +1], if REG i is closed then REG 0 i is an attractor for REG i From any conguration of REG i, REG 0 i is reached in at most N ; 1 rounds. 7
8 Proof: Let us call nbr the number of processors of BI that does not verify the stable i predicate. Closure nbr cannot increase in REG i (lemma 4.3) Convergence if REG 0 i is not reached, then there is a processor p of BI that does not verify the stable i predicate (observation 4.). Thus, there is a processor ps that does verify the quasi stable i predicate (lemma 4.4). Let us call ps 0 the rst previous processor of ps that belongs to SI. F ps [k +1; i] 6= F ps 0[k +1; i] (ps does not verify the stable i predicate) and F lps [k +1; i] = F ps 0[k +1; i] (lps veries the stable i predicate or belongs to SI). Thus, ps holds the A 1 guard (F ps [k +1; i] 6= F lps [k +1; i]). As stable i predicate is a trap in REG i (lemma 4.3) ps veries the quasi stable i predicate till it has not executed A 1 action. And, ps holds the A 1 guard till it veries the quasi stable i predicate. By fairness scheduling, ps will eventually execute A 1 action. After this action, ps veries the stable i predicate (F ps [k +1; i] =F lps [k +1; i] =F ps 0[k +1; i]). nbr has decreased. When nbr =0,REG 0 i is reached (observation 4.). Stabilization time according to the round denition, at each round nbr decreases. As nbr is bounded by N ; 1 (BI has at most N ; 1 processors) after at most N ; 1 rounds, REG 0 i is reached. Lemma 4.6 8i [1 k +1], if REG 0 i;1 is closed then REG i is attractor for REG 0 i;1. Whatever the current conguration of REG 0 i;1, REG i is reached in one round. Proof: Let p be a processor belonging to SI. Call p 0 the rst previous processor of p belonging to SI. Let (1) be the equation dened as follows: F lp [k +; i] =F p 0[k +; i] If lp belongs to SI, (1) is always veried. If lp belongs to BI, F lp [k +; i] is the id-value of the (i)-th previous processor of lp (see observation 4.1) and also the id-value of i ; 1-th processor previous of p 0. Therefore, the equation (1) is veried in REG 0 i;1. In REG 0 i;1, F p 0[k +; i] is the id-value of the (i)-th previous processor of p. Thus REG i is not reached if only if there is a processor p of SI verifying the following condition: () F p [k +1; i] 6= F lp [k +; i]. Let us call nbr the number of processors verifying (). Closure nbr cannot increase in REG 0 i;1, because lp cannot change the value of F lp [k +; i] (REG 0 i;1 is closed, see the hypothesis) and once the following equality is veried F p [k +1; i] = F lp [k +; i], it stays verify forever (denition of guard and statement actions). Convergence a processor p verifying () holds the B 1 guard. By fairness, p will perform the action B 1. After that action: F p [k +1; i] =F p 0[k +; i] nbr has decreased. Stabilization time all processors verifying () hold the B 1 guard during the rst round in REG 0 i;1, all of them perform this action. After one round, no processor veries (): REG i is reached. Theorem 4.1 8i [0 k+1], REG i is an attractor for true and REG 0 i is an attractor for true. Proof: REG 0 is attractor for true (lemma 4.). 8i [0 k + 1], if REG i is closed then REG 0 i is attractor for REG i (lemma 4.5). 8i ]0 k + 1], if REG 0 i;1 is closed then REG i is attractor for REG 0 i;1 (lemma 4.6). According to the theorem.1, REG 0 0, REG 1, REG 0 1, REG, REG 0, ::: REG k+1, REG 0 k+1 are the attractors for true. Lemma 4.7 From REG 0 k+1, any computation will eventually reach adeadlock conguration. The deadlock conguration is reached in one round. Proof: In REG 0 k+1, the array F of a processor never change its value (observation 4.1): the action A 1 and B 1 cannot be performed. A processor can only update its Ld variable according to its F variable: The action that updates its variable (A, B,orB 3 ) will be performed at most one time. In a no-deadlock conguration of REG 0 k+1, processors that need to update their Ld variable verify an action guard. After a round, no processor need to update their Ld variable: a deadlock conguration is reached. 8
9 5 Correctness In the previous section, we have proven that whatever the computation performs, a deadlock conguration is reached that belong to REG 0 k+1. In this section, we will prove that in a deadlock conguration of REG 0 k+1, one only one processor is elected: the processor having the smallest id-value. Observation 5.1 Let c be adeadlock conguration of REG 0 k+1. In c, the array F of any processor of SI contains only id-values of processors in the ring (processors that belongs to SI). The processor having the smallest id-value in the ring (processor that belongs to SI)is a leader in c. Lemma 5.1 Let c be a deadlock conguration of REG 0 k+1. In c, the array F of any processor of SI contains all id-values of processors in the ring that belongs to SI. Proof: Let R be a k-bounded ring. Let p be a processor of SI. Call S the size of SI. S k + (SI contains at most k + processors). (F p [k +1] :::F p [k +; S]) is the list of id-values of S previous processors of SI in the ring (see observation 4.1). Thus, F p contains all id-values of processors in the ring that belongs to SI. Theorem 5.1 Let c be adeadlock conguration of REG 0 k+1. In c, there is one and only one leader. Proof: In c, there is at least one leader (see observation 5.1). In c, the array F of any processor of SI contains all id-values of processors in the ring that belongs to SI (lemma 5.1). Only the processor of SI having the smallest id-value is a leader. Notice that there is only one legitimate conguration on a ring. 6 Conclusion Theorem 6.1 The algorithm 3.1 requires only constant register space. Proof: In the algorithm 3.1, the eld variables of a processor p are Ld p and F p. Thus, the register space required by the algorithm 3.1 is :(k +) k+ states. We have proven that the algorithm 3.1 is a a self-stabilizing leader election algorithm on unidirectional k-bounded rings. The algorithm 3.1 is a silent one: the legitimate conguration is deadlock one. Moreover, the register space required by the algorithm 3.1 is constant whatever is the ring size. Theorem 6. Whatever is the initial conguration, the system stabilizes in at most (k +)N +1 rounds. Proof: Whatever the initial conguration, REG 0 is reached in one round (lemma 4.). From any conguration of REG i, REG 0 i is reached in at most N ; 1 rounds (lemma 4.5). Whatever the current conguration of REG 0 i;1, REG i is reached in one round (lemma 4.6). According to lemma 4. and 4.5, REG 0 0 is reached in at most N rounds. Whatever the current conguration of REG 0 i;1, REG 0 i is reached in N rounds (lemma 4.6 and 4.5). Thus REG 0 k+1 is reached in at most (k +)N rounds. Whatever the current conguration of REG 0 k+1, the deadlock conguration is reached in at most one round. According to the theorem 5.1, this conguration is legitimate. 9
10 References [AB97] Y Afek and A Bremler. Self-stabilizing unidirectional network algorithms by powersupply. In Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA97), pages 111{10, [AG93] A Arora and MG Gouda. Distributed reset. In FSTTCS90 Proceedings of the 10th Conference on Foundations of Software Technology and Theoretical Computer Science, Springer-Verlag LNCS:47, pages 316{39, [AG94] A Arora and MG Gouda. Distributed reset. IEEE Transactions on Computers, 43(9):106{1038, [AKY90] [BGM89] [BJ98] [DGS96] [Dij74] [Dol93] [GG96] [GH96] [GM91] [ILS95] Y Afek, S Kutten, and M Yung. Memory-ecient self-stabilization on general networks. In WDAG90 Distributed Algorithms 4th International Workshop Proceedings, Springer- Verlag LNCS:486, pages 15{8, JE Burns, MG Gouda, and RE Miller. On relaxing interleaving assumptions. In Proceedings of the MCC Workshop on Self-Stabilizing Systems, MCC Technical Report No. STP , J. Beauquier and C. Johnen. Deterministic and self-stabilizing leader election protocol. Technical report, Laboratoire de Recherche en Informatique, Universite Paris-Sud, S Dolev, MG Gouda, and M Schneider. Memory requirements for silent stabilization. In PODC96 Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, pages 7{34, EW Dijkstra. Self stabilizing systems in spite of distributed control. Communications of the Association of the Computing Machinery, 17:643{644, S Dolev. Optimal time self-stabilization in dynamic systems. In WDAG93 Distributed Algorithms 7th International Workshop Proceedings, Springer-Verlag LNCS:75, pages 160{173, S Ghosh and A Gupta. An exercise in fault-containment: self-stabilizing leader election. Information Processing Letters, 59:81{88, MG Gouda and FF Haddix. The stabilizing token ring in three bits. Journal of Parallel and Distributed Computing, 35:43{48, MG Gouda and N Multari. Stabilizing communication protocols. IEEE Transactions on Computers, 40:448{458, G Itkis, C Lin, and J Simon. Deterministic, constant space, self-stabilizing leader election on uniform rings. In WDAG95 Distributed Algorithms 9th International Workshop Proceedings, Springer-Verlag LNCS:97, pages 88{30, [JABD97] C Johnen, G Alari, J Beauquier, and AK Datta. Self-stabilizing depth-rst token passing on rooted networks. In WDAG97 Distributed Algorithms 11th International Workshop Proceedings, Springer-Verlag LNCS:130, pages 60{74, [Joh97] C Johnen. Memory-ecient self-stabilizing algorithm to construct BFS spanning trees. In Proceedings of the Third Workshop on Self-Stabilizing Systems, pages 15{140. Carleton University Press,
11 [MOY96] [Pet97] [PV97] [Vil97] A Mayer, R Ostrovsky, and M Yung. Self-stabilizing algorithms for synchronous unidirectional rings. In Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (SODA96), pages 564{573, F. Petit. Highly space ecient self-stabilizing depth-rst token circulation for trees. In V. Villain A. Bui, M. Bui, editor, On Principles Of DIstributed Systems, OPODIS'97, pages 1{36. Hermes, F Petit and V Villain. Color optimal self-stabilizing depth-rst token circulation. In I-SPAN'97, Third International Symposium on Parallel Architectures, Algorithms and Networks Proceedings, IEEE Computer Society Press. IEEE Computer Society Press, To appear. V. Villain. A new lower bound for self-stabilizing mutual exclusion algorithms. Technical Report RR97-17, LaRIA, University of Picardie Jules Verne, France,
Self-Stabilizing Depth-First Token Circulation In Arbitrary. Rooted Networks. Vincent Villain 3
Self-Stabilizing Depth-First Token Circulation In Arbitrary Rooted Networks Ajoy K. Datta, 1 Colette Johnen, 2 Franck Petit, 3 Vincent Villain 3 1 Department of Computer Science, University of Nevada,
More information1. Introduction Robustness is one of the most important requirements of modern distributed systems. Various types of faults are likely to occur at var
Self-Stabilizing Depth-First Token Circulation In Arbitrary Rooted Networks Ajoy K. Datta, 1 Colette Johnen, 2 Franck Petit, 3 Vincent Villain 3 1 Department of Computer Science, University of Nevada,
More informationSnap-Stabilizing PIF and Useless Computations
Snap-Stabilizing PIF and Useless Computations Alain Cournier Stéphane Devismes Vincent Villain LaRIA, CNRS FRE 2733 Université de Picardie Jules Verne, Amiens (France) Abstract A snap-stabilizing protocol,
More informationA Snap-Stabilizing DFS with a Lower Space Requirement
A Snap-Stabilizing DFS with a Lower Space Requirement Alain Cournier, Stéphane Devismes, and Vincent Villain LaRIA, CNRS FRE 2733, Université de Picardie Jules Verne, Amiens (France) {cournier, devismes,
More informationSnap-Stabilizing Depth-First Search on Arbitrary Networks
The Author 006. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org Advance Access
More informationFast self-stabilizing k-independent dominating set construction Labri Technical Report RR
Fast self-stabilizing k-independent dominating set construction Labri Technical Report RR-1472-13 Colette Johnen Univ. Bordeaux, LaBRI, UMR 5800, F-33400 Talence, France Abstract. We propose a fast silent
More informationA Self-Stabilizing Minimal Dominating Set Algorithm with Safe Convergence
A Self-Stabilizing Minimal Dominating Set Algorithm with Safe Convergence Hirotsugu Kakugawa and Toshimitsu Masuzawa Department of Computer Science Graduate School of Information Science and Technology
More information1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007
Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can
More informationSelf-Stabilizing Silent Disjunction in an Anonymous Network
Self-Stabilizing Silent Disjunction in an Anonymous Network Ajoy K. Datta 1, Stéphane Devismes 2, and Lawrence L. Larmore 1 1 Department of Computer Science, University of Nevada Las Vegas, USA 2 VERIMAG
More informationFault Masking in Tri-redundant Systems
Fault Masking in Tri-redundant Systems Mohamed G. Gouda 1, Jorge A. Cobb 2, and Chin-Tser Huang 3 1 Department of Computer Sciences The University of Texas at Austin gouda@cs.utexas.edu 2 Department of
More informationOn Equilibria of Distributed Message-Passing Games
On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu
More informationIntroduction to Self-Stabilization. Maria Potop-Butucaru, Franck Petit and Sébastien Tixeuil LiP6/UPMC
Introduction to Self-Stabilization Maria Potop-Butucaru, Franck Petit and Sébastien Tixeuil LiP6/UPMC Self-stabilization 101 Example U 0 = a U n+1 = U n 2 if U n is even U n+1 = 3U n+1 2 if U n is odd
More informationA Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set
A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set Sayaka Kamei and Hirotsugu Kakugawa Tottori University of Environmental Studies Osaka University Dept. of
More informationCombining Shared Coin Algorithms
Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence
More information6.852: Distributed Algorithms Fall, Class 24
6.852: Distributed Algorithms Fall, 2009 Class 24 Today s plan Self-stabilization Self-stabilizing algorithms: Breadth-first spanning tree Mutual exclusion Composing self-stabilizing algorithms Making
More informationPreserving the Fault-Containment of Ring Protocols Executed on Trees
The Computer Journal Advance Access published November 21, 2008 # The Author 2008. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions,
More informationTime Optimal Asynchronous Self-stabilizing Spanning Tree
Time Optimal Asynchronous Self-stabilizing Spanning Tree Janna Burman and Shay Kutten Dept. of Industrial Engineering & Management Technion, Haifa 32000, Israel. bjanna@tx.technion.ac.il, kutten@ie.technion.ac.il
More informationMaximum Metric Spanning Tree made Byzantine Tolerant
Algorithmica manuscript No. (will be inserted by the editor) Maximum Metric Spanning Tree made Byzantine Tolerant Swan Dubois Toshimitsu Masuzawa Sébastien Tixeuil Received: date / Accepted: date Abstract
More informationA Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 1709-1718 (2008) A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems JI-CHERNG LIN, TETZ C. HUANG, CHENG-PIN
More informationSelf-Stabilizing Byzantine Asynchronous Unison
Self-Stabilizing Byzantine Asynchronous Unison Swan Dubois 1,3 Maria Gradinariu Potop-Butucaru 1,4 Mikhail Nesterenko 2,5 Sébastien Tixeuil 1,6 Abstract We explore asynchronous unison in the presence of
More informationFrom self- to self-stabilizing with service guarantee 1-hop weight-based clustering
From self- to self-stabilizing with service guarantee 1-hop weight-based clustering Colette Johnen and Fouzi Mekhaldi LaBRI, University of Bordeaux, CNRS. F-33405 Talence Cedex, France Abstract. We propose
More informationDynamic FTSS in Asynchronous Systems: the Case of Unison
Dynamic FTSS in Asynchronous Systems: the Case of Unison Swan Dubois, Maria Potop-Butucaru, Sébastien Tixeuil To cite this version: Swan Dubois, Maria Potop-Butucaru, Sébastien Tixeuil. Dynamic FTSS in
More informationChengdian Lin. University of Chicago. Abstract
Deterministic, Constant Space, Self-Stabilizing Leader Election on Uniform Rings Gene Itkis Technion and Boston Univ. itkis@cs.technion.ac.il Chengdian Lin University of Chicago lin@cs.uchicago.edu Janos
More information{},{a},{a,c} {},{c} {c,d}
Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au
More informationEnsuring Average Recovery with Adversarial Scheduler
Ensuring Average Recovery with Adversarial Scheduler Jingshu Chen, Mohammad Roohitavaf, and Sandeep S. Kulkarni Michigan State University, US {chenji15, roohitav, sandeep}@cse.msu.edu Abstract In this
More informationLeader Election in Asymmetric Labeled Unidirectional Rings
Leader Election in Asymmetric Labeled Unidirectional Rings Karine Altisen Ajoy K. Datta Stéphane Devismes Anaïs Durand Lawrence L. Larmore Univ. Grenoble Alpes, CNRS, Grenoble INP, VERIMAG, 38000 Grenoble,
More informationFigure 1. Solution to dining-philosophers with malicious crashes
Dining Philosophers that Tolerate Malicious Crashes Mikhail Nesterenko Λ Department of Computer Science, Kent State University, Kent, OH 44242, mikhail@cs.kent.edu Anish Arora y Dept. of Computer and Information
More informationarxiv: v1 [cs.dc] 3 Oct 2011
A Taxonomy of aemons in Self-Stabilization Swan ubois Sébastien Tixeuil arxiv:1110.0334v1 cs.c] 3 Oct 2011 Abstract We survey existing scheduling hypotheses made in the literature in self-stabilization,
More informationOn Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus
On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,
More informationSelf-Stabilizing Small k-dominating Sets
Self-Stabilizing Small k-dominating Sets Ajoy K. Datta, Stéphane Devismes, Karel Heurtefeux, Lawrence L. Larmore, Yvan Rivierre Verimag Research Report n o TR-2011-6 January 11, 2012 Reports are downloadable
More informationComputer Science Technical Report
Computer Science Technical Report Synthesizing Self-Stabilization Through Superposition and Backtracking Alex Klinkhamer and Ali Ebnenasir Michigan Technological University Computer Science Technical Report
More informationNader H. Bshouty Lisa Higham Jolanta Warpechowska-Gruca. Canada. (
Meeting Times of Random Walks on Graphs Nader H. Bshouty Lisa Higham Jolanta Warpechowska-Gruca Computer Science University of Calgary Calgary, AB, T2N 1N4 Canada (e-mail: fbshouty,higham,jolantag@cpsc.ucalgary.ca)
More informationStabilizing Dining with Failure Locality 1
Stabilizing Dining with Failure Locality 1 Hyun Chul Chung 1,, Srikanth Sastry 2,, and Jennifer L. Welch 1, 1 Texas A&M University, Department of Computer Science & Engineering {h0c8412,welch}@cse.tamu.edu
More informationStabilizing Time-Adaptive Protocols. February 8, Abstract
Stabilizing Time-Adaptive Protocols Shay Kutten Dept. of Industrial Engineering & Management The Technion and IBM T.J. Watson Research Center Boaz Patt-Shamir y College of Computer Science Northeastern
More informationSection 6 Fault-Tolerant Consensus
Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.
More informationOn the generalized dining philosophers problem
On the generalized dining philosophers problem Oltea Mihaela Herescu Catuscia Palamidessi Department of Computer Science and Engineering, The Pennsylvania State University Pond Lab, University Park, PA
More informationElectronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim
Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free
More informationTime Free Self-Stabilizing Local Failure Detection
Research Report 33/2004, TU Wien, Institut für Technische Informatik July 6, 2004 Time Free Self-Stabilizing Local Failure Detection Martin Hutle and Josef Widder Embedded Computing Systems Group 182/2
More informationin (n log 2 (n + 1)) time by performing about 3n log 2 n key comparisons and 4 3 n log 4 2 n element moves (cf. [24]) in the worst case. Soon after th
The Ultimate Heapsort Jyrki Katajainen Department of Computer Science, University of Copenhagen Universitetsparken 1, DK-2100 Copenhagen East, Denmark Abstract. A variant of Heapsort named Ultimate Heapsort
More informationVerifying Randomized Distributed Algorithms with PRISM
Verifying Randomized Distributed Algorithms with PRISM Marta Kwiatkowska, Gethin Norman, and David Parker University of Birmingham, Birmingham B15 2TT, United Kingdom {M.Z.Kwiatkowska,G.Norman,D.A.Parker}@cs.bham.ac.uk
More informationMaximizable Routing Metrics
Maximizable Routing Metrics Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, USA gouda@cs.utexas.edu Marco Schneider SBC Technology Resources
More informationWojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.
A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,
More informationSymmetric Rendezvous in Graphs: Deterministic Approaches
Symmetric Rendezvous in Graphs: Deterministic Approaches Shantanu Das Technion, Haifa, Israel http://www.bitvalve.org/~sdas/pres/rendezvous_lorentz.pdf Coauthors: Jérémie Chalopin, Adrian Kosowski, Peter
More informationBounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.
Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist
More information1 Lamport s Bakery Algorithm
Com S 6 Spring Semester 2009 Algorithms for Multiprocessor Synchronization Lecture 3: Tuesday, 27th January 2009 Instructor: Soma Chaudhuri Scribe: Neeraj Khanolkar Lamport s Bakery Algorithm Algorithm
More informationConsistent Fixed Points and Negative Gain
2009 International Conference on Parallel and Distributed Computing, Applications and Technologies Consistent Fixed Points and Negative Gain H. B. Acharya The University of Texas at Austin acharya @ cs.utexas.edu
More informationL R I SELF-STABILIZING SPANNING TREE ALGORITHM FOR LARGE SCALE SYSTEMS HERAULT T / LEMARINIER P / PERES O / PILARD L / BEAUQUIER J
L R I SELF-STABILIZING SPANNING TREE ALGORITHM FOR LARGE SCALE SYSTEMS HERAULT T / LEMARINIER P / PERES O / PILARD L / BEAUQUIER J Unité Mixte de Recherche 8623 CNRS-Université Paris Sud LRI 08/2006 Rapport
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationTHE WEAKEST FAILURE DETECTOR FOR SOLVING WAIT-FREE, EVENTUALLY BOUNDED-FAIR DINING PHILOSOPHERS. A Dissertation YANTAO SONG
THE WEAKEST FAILURE DETECTOR FOR SOLVING WAIT-FREE, EVENTUALLY BOUNDED-FAIR DINING PHILOSOPHERS A Dissertation by YANTAO SONG Submitted to the Office of Graduate Studies of Texas A&M University in partial
More informationCan an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model?
Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model? Jaap-Henk Hoepman Department of Computer Science, University of Twente, the Netherlands hoepman@cs.utwente.nl
More informationA Superstabilizing log(n)-approximation Algorithm for Dynamic Steiner Trees
A Superstabilizing log(n)-approximation Algorithm for Dynamic Steiner Trees Lélia Blin c,b, Maria Potop-Butucaru a,b,, Stephane Rovedakis d, a Univ. Pierre & Marie Curie - Paris 6, b LIP6-CNRS UMR 7606,
More informationDegradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #
Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine
More informationcachan.fr/publis/ Accepted for publication in Theoretical Computer Science
http://www.lsv.ens cachan.fr/publis/ Accepted for publication in Theoretical Computer Science A Polynomial -Bisimilar Normalization for Reset Petri Nets Catherine Dufourd y Alain Finkel y Abstract Reset
More informationGenuine atomic multicast in asynchronous distributed systems
Theoretical Computer Science 254 (2001) 297 316 www.elsevier.com/locate/tcs Genuine atomic multicast in asynchronous distributed systems Rachid Guerraoui, Andre Schiper Departement d Informatique, Ecole
More informationconst =Λ for simplicity, we assume N =2 L Λ= L = log N; =Λ (depth of arbitration tree) + 1 = O(log N) Λ= Tsize =2 L 1=N 1 =Λ size of arbitration tree
A Space- and Time-efcient Local-spin Spin Lock Yong-Jik Kim and James H. Anderson Department of Computer Science University of North Carolina at Chapel Hill March 2001 Abstract A simple ce transformation
More informationSimultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus
Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus Yehuda Afek 1, Eli Gafni 2, Sergio Rajsbaum 3, Michel Raynal 4, and Corentin Travers 4 1 Computer Science Department, Tel-Aviv
More informationRendezvous and Election of Mobile Agents: Impact of Sense of Direction
Rendezvous and Election of Mobile Agents: Impact of Sense of Direction Lali Barrière Paola Flocchini Pierre Fraigniaud Nicola Santoro Abstract Consider a collection of r identical asynchronous mobile agents
More informationDistributed Algorithms
Distributed Algorithms December 17, 2008 Gerard Tel Introduction to Distributed Algorithms (2 nd edition) Cambridge University Press, 2000 Set-Up of the Course 13 lectures: Wan Fokkink room U342 email:
More information1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general
Interleaving Schemes for Multidimensional Cluster Errors Mario Blaum IBM Research Division 650 Harry Road San Jose, CA 9510, USA blaum@almaden.ibm.com Jehoshua Bruck California Institute of Technology
More informationLocality Lower Bounds
Chapter 8 Locality Lower Bounds In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in log n + O(1) rounds. 8.1
More informationChapter 2 Source Models and Entropy. Any information-generating process can be viewed as. computer program in executed form: binary 0
Part II Information Theory Concepts Chapter 2 Source Models and Entropy Any information-generating process can be viewed as a source: { emitting a sequence of symbols { symbols from a nite alphabet text:
More informationAtomic m-register operations
Atomic m-register operations Michael Merritt Gadi Taubenfeld December 15, 1993 Abstract We investigate systems where it is possible to access several shared registers in one atomic step. We characterize
More informationSyntax: form ::= A: lin j E: lin ::= 3 lin j lin ^ lin j :lin j bool lin lin is a temporal formula dened over a global sequence. bool is true in g if
Introduction 1 Goals of the lecture: Weak Conjunctive Predicates Logic for global predicates Weak conjunctive algorithm References: Garg and Waldecker 94 Syntax: form ::= A: lin j E: lin ::= 3 lin j lin
More informationSome remarks on the Shannon capacity of odd cycles Bruno Codenotti Ivan Gerace y Giovanni Resta z Abstract We tackle the problem of estimating the Sha
Some remarks on the Shannon capacity of odd cycles Bruno Codenotti Ivan Gerace y Giovanni Resta z Abstract We tackle the problem of estimating the Shannon capacity of cycles of odd length. We present some
More informationVariations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM Wan Fokkink (Vrije Universiteit, Section Theoretical Computer Science CWI, Embedded Systems Group Amsterdam, The
More informationOptimal Resilience Asynchronous Approximate Agreement
Optimal Resilience Asynchronous Approximate Agreement Ittai Abraham, Yonatan Amit, and Danny Dolev School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel {ittaia, mitmit,
More informationAllocate-On-Use Space Complexity of Shared-Memory Algorithms
Allocate-On-Use Space Complexity of Shared-Memory Algorithms James Aspnes Bernhard Haeupler Alexander Tong Philipp Woelfel DISC 2018 Asynchronous shared memory model Processes: p 1 p 2 p 3 p n Objects:
More informationSub-Logarithmic Test-and-Set Against a Weak Adversary
Sub-Logarithmic Test-and-Set Against a Weak Adversary Dan Alistarh 1 and James Aspnes 2 1 EPFL 2 Yale University Abstract. A randomized implementation is given of a test-and-set register with O(log log
More informationDistributed Consensus
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement
More informationA Brief Introduction to Model Checking
A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:
More informationCounterexamples to witness conjectures. Notations Let E be the set of admissible constant expressions built up from Z; + ;?;;/; exp and log. Here a co
Counterexamples to witness conjectures Joris van der Hoeven D pt. de Math matiques (b t. 45) Universit Paris-Sud 91405 Orsay CEDEX France August 15, 003 Consider the class of exp-log constants, which is
More informationClaude Marche. Bat 490, Universite Paris-Sud. Abstract
The Word Problem of ACD-Ground theories is Undecidable Claude Marche Laboratoire de Recherche en Informatique (UA 410 CNRS) Bat 490, Universite Paris-Sud 91405 ORSAY CEDEX, FRANCE E-mail: marche@lri.lri.fr
More informationNon-preemptive multiprocessor scheduling of strict periodic systems with precedence constraints
Non-preemptive multiprocessor scheduling of strict periodic systems with precedence constraints Liliana Cucu, Yves Sorel INRIA Rocquencourt, BP 105-78153 Le Chesnay Cedex, France liliana.cucu@inria.fr,
More informationDecentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication
Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly
More informationMaximum Metric Spanning Tree made Byzantine Tolerant
Maximum Metric Spanning Tree made Byzantine Tolerant Swan Dubois Toshimitsu Masuzawa Sébastien Tixeuil Abstract Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed
More informationWait-Free Consensus. James Aspnes. July 24, School of Computer Science. Carnegie Mellon University. Pittsburgh, PA 15213
Wait-Free Consensus James Aspnes July 24, 1992 CMU-CS-92-164 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Submitted in partial fulllment of the requirements for the degree
More informationEventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony Antonio FERNÁNDEZ Ernesto JIMÉNEZ Michel RAYNAL LADyR, GSyC, Universidad Rey Juan Carlos, 28933
More informationThe Expressiveness of Silence: Tight Bounds for Synchronous Communication of. Information Using Bits and Silence. Una-May O'Reilly and Nicola Santoro
The Expressiveness of Silence: Tight Bounds for Synchronous Communication of Information Using Bits and Silence Una-May O'Reilly and Nicola Santoro School of Comper Science, Carleton University Ottawa,
More informationL R I SELF-STABILIZING COUNTING IN MOBILE SENSOR NETWORKS BEAUQUIER J / CLEMENT J / MESSIKA S / ROSAZ L / ROZOY B
L R I SELF-STABILIZING COUNTING IN MOBILE SENSOR NETWORKS BEAUQUIER J / CLEMENT J / MESSIKA S / ROSAZ L / ROZOY B Unité Mixte de Recherche 8623 CNRS-Université Paris Sud LRI 03/2007 Rapport de Recherche
More information6. Conclusion 23. T. R. Allen and D. A. Padua. Debugging fortran on a shared memory machine.
6. Conclusion 23 References [AP87] T. R. Allen and D. A. Padua. Debugging fortran on a shared memory machine. In Proc. International Conf. on Parallel Processing, pages 721{727, 1987. [Dij65] E. W. Dijkstra.
More information1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal
Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department of omputer and Information Science The Ohio State University olumbus, OH 43210 (email: fmanivann,singhalg@cis.ohio-state.edu)
More informationTUM{INFO{10-I /1.{FI Alle Rechte vorbehalten Nachdruck auch auszugsweise verboten c1998 SFB 342 Methoden und Werkzeuge fur die Nutzung parallele
TECHNISCHE UNIVERSIT AT M U N C H E N INSTITUT F UR INFORMATIK Sonderforschungsbereich 342: Methoden und Werkzeuge fur die Nutzung paralleler Rechnerarchitekturen Lossy Counter Machines Richard Mayr TUM-I9827
More information1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal
TR No. OSU-ISR-5/96-TR33, Dept. of omputer and Information Science, The Ohio State University. Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department
More informationComputer Science Technical Report
Computer Science Technical Report Swarm Synthesis of Convergence for Symmetric Protocols Ali Ebnenasir and Aly Farahat Michigan Technological University Computer Science Technical Report CS-TR-11-02 May
More informationConvergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel
Convergence Complexity of Optimistic Rate Based Flow Control Algorithms Yehuda Afek y Yishay Mansour z Zvi Ostfeld x Computer Science Department, Tel-Aviv University, Israel 69978. December 12, 1997 Abstract
More informationAbstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced
Primary Partition \Virtually-Synchronous Communication" harder than Consensus? Andre Schiper and Alain Sandoz Departement d'informatique Ecole Polytechnique Federale de Lausanne CH-1015 Lausanne (Switzerland)
More informationDartmouth Computer Science Technical Report TR Constant-RMR Abortable Reader-Priority Reader-Writer. Algorithm
Dartmouth Computer Science Technical Report TR2011-685 Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm Nan Zheng Thesis Advisor: Prasad Jayanti June 2, 2011 Abstract The concurrent reader-writer
More informationIntegrating External and Internal Clock Synchronization. Christof Fetzer and Flaviu Cristian. Department of Computer Science & Engineering
Integrating External and Internal Clock Synchronization Christof Fetzer and Flaviu Cristian Department of Computer Science & Engineering University of California, San Diego La Jolla, CA 9093?0114 e-mail:
More informationLower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures
Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Xianbing Wang 1, Yong-Meng Teo 1,2, and Jiannong Cao 3 1 Singapore-MIT Alliance, 2 Department of Computer Science,
More informationSynchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors
Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors Michel RAYNAL, Julien STAINER Institut Universitaire de France IRISA, Université de Rennes, France Message adversaries
More informationConstructing Resiliant Communication Infrastructure for Runtime Environments
Constructing Resiliant Communication Infrastructure for Runtime Environments George BOSILCA a, Camille COTI b, Thomas HERAULT b, Pierre LEMARINIER a and Jack DONGARRA a a University of Tennessee Knoxville
More informationDiagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E.
In CADE-1 Workshop on Visual Reasoning, New Brunswick, NJ, July 1996. Diagram-based Formalisms for the Verication of Reactive Systems Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas
More informationAsynchronous cellular automata for pomsets. 2, place Jussieu. F Paris Cedex 05. Abstract
Asynchronous cellular automata for pomsets without auto-concurrency Manfred Droste Institut fur Algebra Technische Universitat Dresden D-01062 Dresden droste@math.tu-dresden.de Paul Gastin LITP, IBP Universite
More informationIntroducing Speculation in Self-Stabilization
Introducing Speculation in Self-Stabilization An Application to Mutual Exclusion ABSTRACT Swan Dubois École Polytechnique Fédérale de Lausanne LPD, Station 14 1015 Lausanne, Switzerland swan.dubois@epfl.ch
More informationarxiv: v3 [cs.dc] 25 Apr 2018
Practically-Self-Stabilizing Virtual Synchrony Shlomi Dolev Chryssis Georgiou Ioannis Marcoullis Elad M. Schiller arxiv:1502.05183v3 [cs.dc] 25 Apr 2018 Abstract The virtual synchrony abstraction was proven
More informationQuantum Algorithms for Leader Election Problem in Distributed Systems
Quantum Algorithms for Leader Election Problem in Distributed Systems Pradeep Sarvepalli pradeep@cs.tamu.edu Department of Computer Science, Texas A&M University Quantum Algorithms for Leader Election
More informationLogical Time. 1. Introduction 2. Clock and Events 3. Logical (Lamport) Clocks 4. Vector Clocks 5. Efficient Implementation
Logical Time Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction 2. Clock and Events 3. Logical (Lamport) Clocks 4. Vector Clocks 5. Efficient Implementation 2013 ACM Turing Award:
More informationAnother Glance at the Alpern-Schneider. Characterization of Safety andliveness in. Concurrent Executions. Abstract
Another Glance at the Alpern-Schneider Characterization of Safety andliveness in Concurrent Executions H.Peter Gumm Abstract In order to derive a result such as the Alpern-Schneider theorem characterizing
More information29 Linear Programming
29 Linear Programming Many problems take the form of optimizing an objective, given limited resources and competing constraints If we can specify the objective as a linear function of certain variables,
More informationThe Leader Election Protocol (IEEE 1394)
The Leader Election Protocol (IEEE 1394) J.R. Abrial, D. Cansell, D. Méry July 2002 This Session - Background :-) - An informal presentation of the protocol :-) - Step by step formal design :- - Short
More information