Lower Bound on the Step Complexity of Anonymous Binary Consensus
|
|
- Chester Jordan
- 5 years ago
- Views:
Transcription
1 Lower Bound on the Step Complexity of Anonymous Binary Consensus Hagit Attiya 1, Ohad Ben-Baruch 2, and Danny Hendler 3 1 Department of Computer Science, Technion, hagit@cs.technion.ac.il 2 Department of Computer-Science, Ben-Gurion University of the Negev, bbohad@gmail.com 3 Department of Computer-Science, Ben-Gurion University of the Negev, hendlerd@cs.bgu.ac.il Abstract. Obstruction-free consensus, ensuring that a process running solo will eventually terminate, is at the core of practical ways to solve consensus, e.g., by using randomization or failure detectors. An obstructionfree consensus algorithm may not terminate in many executions, but it must terminate whenever a process runs solo. Such an algorithm can be evaluated by its solo step complexity, which bounds the worst case number of steps taken by a process running alone, from any configuration, until it decides. This paper presents a lower bound of Ω(log n) on the solo step complexity of obstruction-free binary anonymous consensus. The proof constructs a sequence of executions in which more and more distinct variables are about to be written to, and then uses the backtracking covering technique to obtain a single execution in which many variables are accessed. 1 Introduction Consensus is an essential coordination mechanism for distributed systems: processes start with inputs from some domain and have to decide on the same output value, which is the input of some process. In asynchronous distributed systems, a consensus algorithm cannot ensure termination regardless of the way processes steps are interleaved. It is possible, however, to solve obstruction-free consensus, ensuring that a process running solo will eventually terminate. This progress property is at the core of practical ways to solve consensus, e.g., by using randomization or failure detectors. The feasibility and usefulness of obstruction-free consensus raise the important question of the resources, especially in terms of space and time, needed for solving it. An obstruction-free consensus algorithm may not terminate in many executions, and therefore, its worst-case time complexity measured over all executions is unbounded. However, since an obstruction-free consensus algorithm terminates whenever a process runs solo, i.e., without interleaving of steps This work is supported by the Israel Science Foundation (grant 1749/14). The second and third authors are also supported by the Lynne and William Center for Computing Science at Ben-Gurion University.
2 by other processes, it makes sense to evaluate its time complexity by counting the worst case number of steps taken by a process running alone, from any configuration, until it decides. This measure, called the solo step complexity [3], is formally defined in Section 2. Our Contribution: Our main result is a lower bound of Ω(log n) on the solo step complexity of obstruction-free binary anonymous consensus, where the domain of input values is {0, 1}. The first part of the proof is a construction of a sequence of executions in which more and more distinct variables are about to be written to. 4 Each of these variables must be read in some execution in the sequence, but not necessarily all in the same execution. To obtain a single solo execution in which many variables are accessed, we employ the backtracking covering technique [1,3, 6] to get an Ω(log n) lower bound for the solo step complexity of obstruction-free anonymous binary consensus. This is the first lower bound on the step complexity of a one-shot problem with inputs from a domain of constant size. As we show, the lower bound also holds for solo-fast algorithms [3, 10], in which a process only reads and writes when it runs solo, but may resort to any other primitives, including compare&swap or even general read-modify-write operations, when it encounters contention. log m log log m Related Work: Attiya et al. [3] define solo step complexity and solo-fast algorithms and prove an Ω(log n) lower bound for the space and solo step complexity of solo-fast implementations of perturbable objects. These proofs also employ the backtracking covering technique. However, the proofs hold for long-lived objects, while our lower bound is for the one-shot consensus problem. On the other hand, they do not assume that the implementation is anonymous. Adopt-Commit objects capture an inherent part of obstruction-free and randomized consensus. Aspnes and Ellen [2] prove an Ω(min{n, }) lower bound on the space and solo step complexity of anonymous Adopt-Commit objects, with input domain of size m. Since a consensus algorithm implies an implementation of an Adopt-Commit object, the same lower bounds hold for anonymous m-valued consensus. However, the bounds degenerate for binary consensus, leaving open the question of the step complexity for binary consensus, with or without an anonymity assumption. Our paper gives the first answer to this question. Aspnes and Ellen [2] also present an anonymous Adopt-Commit algorithm log log m log m whose solo step complexity is in O(min{n, }), matching their lower bound. This implies an O(1) upper bound for the solo step complexity of binary Adopt- Commit. Recent work by Capdevielle et al. [5] improves these results to bound the solo write complexity of binary anonymous consensus, i.e., the number of writes executed when a process runs solo. They show a lower bound of Ω(min{ n, log log m log m }) 4 A by-product of this part is a very simple proof of an Ω( n) lower bound for the space complexity of obstruction-free anonymous binary consensus [7, 11] (now obsolete, due to [12]).
3 problem lower bound upper bound m-valued adopt-commit Ω(min{ log n, log m }) [2] O(n) log log n log log m anonymous m-valued adoptcommit Ω(min{ log m n, }) [2, 5] O(min{ log m n, }) [2, 5] log log m log log m anonymous obstruction-free follows from above O(n) [3] m-valued consensus obstruction-free anonymous Ω(log n) (this paper) follows from above binary consensus Table 1: Lower and upper bounds for the solo step complexity of adopt-commit and consensus. on the solo write complexity of anonymous m-valued consensus. They present algorithms with a matching solo write complexity. An obstruction-free consensus algorithm with O(n) solo step complexity is implied by the results of [3]. A solo-fast consensus algorithm is presented in [10]. The Janus algorithm [4] solves obstruction-free anonymous consensus with O( n) writes and O(n) accesses to shared variables on the solo path, regardless of the number of possible values, m. Table 1 compares our results and known results. Organization: The model we use and required definitions are provided in Section 2. Our lower bound proofs appear in Section 3, and we conclude with a short discussion in Section 4. 2 Model of Computation We use a standard model of an anonymous asynchronous shared memory system. A set P of n > 1 processes p 0,..., p n 1 communicate by applying primitive operations (primitives), e.g., reads, writes and read-modify-write, to shared variables. No bound is assumed on the size of a shared variable (i.e., the number of distinct values it can take). An algorithm is a collection of deterministic state machines, one for each process. The algorithm also assigns initial values to the shared variables. Processes are anonymous, that is, they do not have access to process-identifiers and consequently, the steps they perform when executing their algorithms depend only on their initial inputs and on the responses they receive from the operations they apply. A configuration specifies the value of each shared variable and the state of each process. In an initial configuration, all shared variables have their initial values and all processes are in their initial states. Each step of process p i consists of some local computation and one shared memory event, which is a primitive applied to a shared variable and the corresponding response. A block write is a contiguous sequence of write events, each by a different process.
4 An execution fragment is a (possibly infinite) sequence of events, that result from interleaving the steps taken by processes, according to their state machines. For any finite execution fragment α and any execution fragment α, the execution fragment αα is the concatenation of α and α ; in this case α is called an extension of α. An execution is an execution fragment that starts from an initial configuration; the configuration at the end of the execution is reached by applying the events of the execution one by one starting from the initial configuration. If C is the configuration at the end of an execution α, we say that α leads to C. If another execution α starts from C, we sometimes write that α starts from α instead of writing that it starts from C. We denote the configuration reached after executing α starting from C by Cα. Two executions are indistinguishable to a process p, if p issues the same sequence of events and gets the same responses from these events in both executions. We denote by α p the sequence of events issued by p in α. Let α be an execution and let p i, p j be two processes. We say that p i, p j are clones in α (or simply clones if α is understood from the context) if they start with the same input and if α p i = α p j. An execution fragment α is Q-solo, for a non-empty set of processes Q P, if only processes in Q have events in α. If Q = {q}, we say that α is q-solo instead of {q}-solo. Unless stated otherwise, a q-solo extension from an execution α (for some process q) refers to the q-solo extension of α in which q completes its operation. A consensus object supports a single decide operation that receives an input value from some domain D. In this work, we consider binary consensus objects, for which D = {0, 1}. Decide operations by different processes must return the same output value, which must be one of the inputs. A process p participates in an execution fragment α if p has an event in α. We say that α is step-contention free for p if the events of α p are contiguous in α. Also, α is step-contention free if α is step-contention free for all processes. A process p is eventually step-contention free in α, if either p returns in α or if some suffix of α is p-solo. An algorithm is obstruction-free if every process that is eventually stepcontention free eventually returns [9]. This requirement is equivalent to solo termination [7]. Assume that p is eventually step-contention free in an execution α of an obstruction-free algorithm. Then p s solo step complexity in α is the number of steps p performs in the p-solo suffix of α until it returns. Since the algorithm is obstruction-free, this number is well-defined. The solo step complexity of the algorithm is the supremum of this number over all processes and executions. An algorithm is solo-fast if processes only apply reads and writes in stepcontention free executions but can apply additional primitives in other executions.
5 α block write γ r-solo run returns v block write γ r-solo run returns v' Fig. 1: An (α, γ)-modifying event e. 3 Lower Bound Proof The lower bound on the solo step complexity of obstruction-free consensus is proved by constructing a sequence of executions. In these executions, events applied by an operation of one process influence the response of an operation of another process. Roughly speaking, since the latter process needs to return a different value, it must be able to distinguish between the different executions, implying that it must read an increasing number of variables. Throughout the proof, p denotes a process with input 0 that has yet to run; such a process exists as long as not all of the processes participate in the execution. In addition, for any execution α, we can extend α by letting a clone of p run in order to obtain β, and then we can let another clone of p run starting from β. Although in both cases we use a clone of p, we run different processes, one starting from α with input 0, and one starting from β with input 0, where in both cases, these are processes that did not participate in the execution before. Our proofs generalize the notion of a modifying event, introduced in [8]. Let α be an execution and q be a process participating in α. We define q s solo-valency after α to be the response returned by q in a q-solo execution that extends α and ends when q completes its decide operation. We let S(α, p) denote this response. Definition 1. Let γ be a set of write events about to be applied by a set of processes R after an execution α. Let r, q / R be two processes participating in α and let e denote the event that q is about to apply after α. We say that e is an (α, γ)-modifying event for r if S(αγ, p) S(αeγ, p). We say that e is an (α, γ)- visible event for r if the sequences of events performed in the r-solo executions from αγ and from αeγ differ. We say that e is a γ-modifying event for r (a γ-visible event for p) when α can be understood from the context. Figure 1 illustrates the effect of a modifying event e. Informally, an event is an (α, γ)-modifying event for p if, when executed after α, it changes the response of a p-solo execution that follows the block write γ. An event is an (α, γ)-visible event for p if, when executed after α, p reads a different value from some variable in a solo execution that follows γ, but p s response may or may not change. Observation 1 An (α, γ)-visible event for p is a write event applied to a variable other than those to which the events of γ are applied, which is read in a p-solo extension of αeγ.
6 Proof. Let e be an (α, γ)-visible event. If e is not as specified by the observation, then p cannot distinguish between αγ and αeγ in a solo execution, which implies that the p-solo executions after αγ and after αeγ are identical. This contradicts Definition 1. Observation 2 A modifying event is a visible event. Proof. If e is not a visible event then, from Definition 1, the sequences of events performed in the p-solo extensions of αγ and of αeγ are identical. In particular, p returns the same responses in these two executions. This contradicts Definition 1. We now define the notion of a visible sequence of executions {α i γ i } L i=1, which is central to our proof. The i th execution ends with a block write γ i, to i distinct variables. The key requirement is that, for all i and u {0, 1}, there is an extension of α i in which a process qi u p returns u while γ i is still pending. Letting v denote p s solo-valency after α i γ i, this allows us to construct the next sequence execution by deploying qi v until it is about to perform a γ i-visible event for p. Definition 2. A visible sequence of length L is a sequence of executions {α i γ i } L i=1 such that the following requirements hold: 1. At most 1 2 i(i + 1) processes participate in α i. 2. γ i is a block write by i different processes to i different variables. 3. For v {0, 1}, there exists a process q v i p and a block write γv i γ i, such that S(α i γ v i, qv i ) = v. Moreover, the (i + 1) th visible execution is constructed from the i th visible execution as follows: Let S(α i γ i, p) = v and let q i and γ γ i be such that S(α i γ, q i ) = v. Let β denote the q i -solo extension from α i γ (in which q i returns v) and let β = β e i β, where e i is the first γ i -visible event for p in β. Then α i+1 = α i γβ and γ i+1 = e i γ i, where the events of γ are re-issued in γ i+1 by new clone processes. Figure 2 illustrates the manner in which execution α i+1 γ i+1 is constructed from α i γ i. We now prove that any anonymous consensus algorithm has a visible sequence of length approximately n. This sequence will be used in order to obtain the step complexity lower bound, using the backtracking covering technique. Lemma 1. Let A be an obstruction-free anonymous binary consensus algorithm, then A has a visible sequence of length Ω( n). Proof. The construction of the visible sequence is inductive. In the i th step of the induction, we construct execution α i γ i. Throughout the proof, we fix process p to be some process with input 0. We assume that at least n/2 of the processes have input 0 and at least n/2 of them have input 1.
7 Let C 0 be an initial configuration. For the base case, let q1 1 be a process with input 1. Let α denote a q1-solo 1 execution starting from C 0. Clearly, q1 1 must write in the course of α to a variable that is read by a p-solo execution from C 0. Let α 1 denote the prefix of α up until q1 s 1 first such write event, denoted e. Let γ 1 = e, then γ 1 is a block write of size 1. Let q1 0 p be a process with input 0. Process q1 0 is a clone of p in C 0. By setting γ1 0 to be the empty sequence of events, a q1-solo 0 extension from α 1 γ1 0 returns 0 (as would a p-solo execution), whereas by setting γ1 1 = {e}, a q1-solo 1 extension from α 1 γ1 1 returns 1, implying that Requirements 2 and 3 of Definition 2 hold. In addition, exactly one process participates in α 1, implying that Requirement 1 also holds for the base case. For the induction step, consider an execution α i γ i that satisfies Requirements 1-3 of Definition 2. Let C i = C 0 α i and let S(α i γ i, p) = v. From Requirement 3 of the induction hypothesis, there exist qi v (which will play the role of q i in the construction of Definition 2 ) and γi v γ i (which will play the role of γ) such that S(α i γi v, qv i ) = v. Let β denote the qv i -solo extension of α iγi v. Since the algorithm is anonymous, we can use clones after α i for processes in γi v so that the block write γ i can be performed after the γi v block write. Process p returns v in a p-solo extension of α i γi vγ i (which is indistinguishable to p from α i γ i ) but returns v in a p-solo extension of α i γi vβγ i, hence, qi v must perform a γ i -modifying event e for p in β. Consequently, from Observation 2, qi v performs a γ i -visible event for p in β. Thus, the γ i -visible event e i specified by Definition 2 exists. As specified by Definition 2, let β = β e i β, α i+1 = α i γi vβ and γ i+1 = e i γ i. Since e i is a γ i -visible event, from Observation 1, it is a write event to a variable not covered by γ i. Hence, γ i+1 is a block write by i + 1 different processes to i + 1 different variables. Therefore, Requirement 2 holds. A qi v-solo extension of α i+1e i returns v (as this is a continuation of α i γi vβ e i ), thus by taking qi+1 v = qv i and γi+1 v = {e i}, we get that qi+1 v returns v when running solo after α i+1 γi+1 v. Let qv i+1 p be a process with input 0 that does not α i+1 γ i+1 α i γ β' by q i e i γ i Fig. 2: The inductive execution construction of Definition 2. Process q i is designated as q v i+1 with corresponding γ v i+1 = {e i}; a clone of p is designated as q v i+1 with corresponding γ v i+1 = γ i (see the proof of Lemma 1).
8 participate in α i+1 γ i+1. qi+1 v is a clone of p in α i. Hence, a qi+1 v -solo extension of α i+1 γ i returns v (as would a p-solo execution). Thus, by taking γi+1 v = γ i we get that qi+1 v returns v when running solo after α i+1γi+1 v. Therefore, Requirement 3 holds. Since γi v i, we employ at most i + 1 new clones in order to extend α i and obtain α i+1. By the induction hypothesis, at most 1 2i(i+1) processes participate in α i, and hence, at most 1 2 (i + 1)(i + 2) processes participate in α i+1. Even if all the processes that participate in α i have the same input, as long as i < n/2 there is a sufficient number of processes to construct α i+1 γ i+1. It follows that our construction may proceed for at least n/2 iterations. Since every obstruction-free anonymous binary consensus algorithm has a visible sequence of length Ω( n), Requirement 2 of Definition 2 implies: Corollary 1. Let A be an obstruction-free read/write anonymous binary consensus algorithm, then A uses Ω( n) distinct shared variables. To conclude the lower bound proof, we now show that any algorithm with a visible sequence of length L has an execution that reaches a configuration C, such that a solo run by process p starting at C reads at least log 2 L different variables. Let A be an algorithm that has a visible sequence {α i γ i } L i=1. Let e i denote the event used in Definition 2 to construct the (i+1) th visible execution, that is, γ i+1 = e i γ i. Also, let φ i denote the p-solo extension from α i γ i. Our goal is to prove that in one of the solo extensions φ i, p reads a large set of variables. Let π i denote the sequence of distinct variables read by p in φ i, in the order of their first read in φ i. If all the variables read in φ i are always read also in φ i+1, then, since we know that e i writes to a variable not covered by γ i that is read in the course of φ i+1, the size of π i is always at least i, so that π L is of size at least L. However, this is not necessarily the case, as it may happen that reading the value written by e i causes p to backtrack and avoid reading some of the variables of π i, thus making π i+1 shorter than π i. The backtracking covering technique [1,3,6] is used to derive a step complexity lower bound even when the latter scenario occurs for some i. The technique associates with each sequence π i a binary number Ψ i. The most significant bit of Ψ i is 1 if the first variable read by p in φ i is covered by γ i and 0 otherwise. The second most significant bit is 1 if the second variable read by p in φ i (if it exists) is covered and 0 otherwise, and so on. If we assume (towards a contradiction) that all sequences φ i are of length smaller than L, then every sequence π i, i {1,..., L}, may be represented by a Ψ i that is a log 2 L-digit number. The basic idea underlying the proof is that a variable v read in π i may be absent from π i+1 (that is, p backtracks from the read of v) only if the write in e i is to a variable that precedes v in π i. The simple intuition is that p avoids reading v in φ i+1 although it reads it in φ i, only if it reads from some variable v that precedes v in φ i different values in φ i and φ i+1.
9 In terms of the values of Ψ, this implies that a less significant bit of Ψ may be flipped from 1 to 0 only if a more significant bit of Ψ is flipped from 0 to 1. 5 If no digits are flipped, then all the variables read in φ i are read also in φ i+1 (that is, there is no backtracking) but a variable not covered by γ i is covered be e i, hence the value of Ψ grows as well. It follows that function Ψ is monotonically increasing. Since it increases L times, it cannot be that all sequences π i are represented by numbers with fewer than log 2 L binary bits, hence, at least one of the executions φ i reads at least log 2 L variables. We formalize these arguments in the proof of the following lemma. Lemma 2. Let A be an algorithm that has a visible sequence of executions of length L. Then A has an execution in which some process accesses at least log 2 L different variables in the course of a solo execution. Proof. We prove that one of the p-solo execution fragments φ i accesses at least log 2 L different variables. For simplicity, and without loss of generality, we assume that L is an integral power of 2 and let s = log 2 L 1. We define a monotone increasing progress function Ψ i as follows: Ψ i is a (log 2 L)-bit number, where the j th bit is 1 if and only if φ i accesses at least j variables and the j th variable (in the order of first variable-accesses) is covered by γ i. Thus, the j th bit of Ψ i is 0 if either φ i accesses fewer than j variables or, otherwise, if the j th variable accessed in φ i is not covered by γ i. If there exists an i such that π i > s then we are done. Otherwise π i s for all i, hence, for all i {1,..., L}, every variable of π i has a corresponding bit of Ψ i. Recall the construction of α i+1 from α i by Lemma 1. The construction was done by extending α i with write steps to some of the variables covered by γ i (while keeping these variables covered by clone processes). The construction then proceeded by a q i -solo execution until q i was about to perform a write step e i to an uncovered variable. In terms of the value of Ψ, event e i may flip some of the bits of Ψ i from 1 to 0, if the corresponding variables are not accessed in φ i+1. However, this may happen only if e i covers an earlier variable, that is, if e i covers a variable that corresponds to a more significant bit of Ψ, and thus Ψ i+1 > Ψ i. To proceed with the corresponding formal argument, let Ψ i [j] denote the j th (in left to right order) bit of Ψ i : Ψ i = s 2 s j Ψ i [j] j=0. We now show that Ψ i+1 > Ψ i for all i {1,..., L 1}. To see this, recall that the i + 1 sequence execution is constructed by extending α i with execution fragment γβ e i, where β e i is a q i -solo execution such that e i is its first γ i -visible 5 Note that once a variable becomes covered in the executions we construct for our proofs, it remains covered, so a bit of Ψ may be flipped from 1 to 0 only if the corresponding variable was read in φ i and is no longer read in φ i+1.
10 event for p. From Definition 1, e i is the first write step by q i to a variable u not covered by γ i that is accessed in the course of a solo execution by p after α i γ i. Hence, u appears in π i. Let k be the index of u in π i. Variable u was not covered before by γ i, therefore Ψ i [k] = 0. For every j < k, Ψ i [j] = Ψ i+1 [j] because e i is the first write by q i to a variable not covered by γ i, and therefore, e i does not change any of the bits corresponding to the variables that precede u in π i : if any such variable was covered by γ i, then it is also covered by γ i+1. Moreover, e i causes bit k of Ψ i to flip from 0 to 1, since it covers the k th variable accessed in φ i (which is also the k th variable accessed in φ i+1 ). We get: Ψ i+1 = s 2 s j Ψ i+1 [j] j=0 k 1 = 2 s j Ψ i+1 [j] + 2 s k + j=0 k 1 2 s j Ψ i+1 [j] + 2 s k j=0 k 1 > 2 s j Ψ i+1 [j] + j=0 Ψ i s j=k+1 s j=k+1 2 s j 2 s j Ψ i+1 [j] Using the last inequality and the fact that Ψ 1 > 0 (as γ 1 covers a variable accessed in φ 1 ) we conclude that Ψ L L. However, Ψ is a (log L)-bit number and therefore cannot exceed L 1. This is a contradiction. Thus, there must be an i such that π i > s, as required. Theorem 1. The solo step complexity of any read/write obstruction-free anonymous consensus algorithm is Ω(log n). Proof. From Lemma 1, any read/write obstruction-free anonymous algorithm for binary consensus has a visible sequence of executions of length Ω( n). The theorem now follows from Lemma 2. Unlike read/write algorithms, solo-fast algorithms are allowed to perform stronger synchronization operations (such as compare-and-swap or fetch-andadd) in the face of step contention. We now strengthen Theorem 1 by showing that it holds also for solo-fast implementations. This would have been immediate if the executions we construct to prove Theorem 1 were step-contention free, but this is not the case. To see this, consider the construction of α i+1 in Definition 2. A new process q i runs solo after α i γ until about to perform its first γ i -visible event e i, which is used to extend the block write. If and when e i is eventually executed (as part of a block write γ associated with some later process q j, j > i), the execution may have already been extended by steps of processes other than q i, making q i s execution non step-contention free.
11 Though not step-contention free, it is easy to show that all the events of the executions in a visible sequence are issued by processes that are unaware of step contention. It follows that these executions may be constructed also for solo-fast implementations. A formal proof follows. Let α be a step-contention free execution for some process p and let α be an execution that is indistinguishable to p from α. Let e be the event that p is about to perform after α, then we say that e is issued while p is unaware of step contention. This notion was defined in [3]. Lemma 3. Let α = α i γ i be an execution of a visible sequence, then all the events of α are issued by processes that are unaware of step contention. Proof. (Sketch.) We consider the events performed by processes that participate in α. The proof proceeds by case analysis on the sets of participating processes. 1. Processes deployed by the inductive construction. Let q be a process that is deployed in the i th step of the inductive construction as q i (see Definition 2). When q first joins the execution (either as process q1 1 in the base case or as a clone of process p named qi+1 v, see the proof of Lemma 1), it runs solo until about to perform a γ i -visible event, e i. If e i is not a modifying event, then q is designated as qi+1 v and e i is designated as γi+1 v (see the proof of Lemma 1). Process q is then deployed also in the next inductive construction step, after its step e i is executed (as part of γ i+1, see Definition 2). Eventually, either the construction terminates or there is a step j > i of the inductive construction when q (now called q j in Definition 2) is about to execute a visible event, e j, which is also a modifying event. This is the last event executed by q in the construction. Apart from clone processes that run in lockstep with q, no events by other processes are interleaved within its steps. Thus, all the events of this set of processes are issued when they are unaware of step contention. 2. Clones for processes that execute an event in γi v (see the proof of Lemma 1), for 1 i < L. Each clone runs in lockstep with its respective original process (and possibly also with the steps of additional clones) and performs exactly the same steps, until the original process executes an event e i which is part of γi v, for some 1 i < L and v {0, 1}. Then, the clone s last event (which is identical to e i ) becomes part of γ i+1. Hence, also the events of these processes are issued when they are unaware of step contention. It follows from the above case analysis that all participating processes run solo or in lockstep with their clones until they are about to perform their last event, hence they all issue their events when they are unaware of step contention. Corollary 2. Let A be a solo-fast obstruction-free anonymous binary consensus algorithm. Then the solo step complexity of A is Ω(log n). Proof. A visible sequence of executions of A can be constructed as prescribed by Lemma 1 as long as all processes may only perform reads and writes. From
12 Lemma 3, all the events in these executions are by processes that are unaware of step contention, hence they may only perform reads and writes. Process p itself runs solo as it executes φ i after visible execution i (see the proof of Lemma 1), for i {1,..., L}, hence it encounters no step contention. 4 Discussion This paper presents the first lower bound, of Ω(log n), for the solo step complexity of obstruction-free anonymous binary consensus. Previously, there were no nontrivial lower bounds on the time complexity of obstruction-free binary consensus. This improves our understanding of the time complexity of obstructionfree consensus, which has been lagging behind our understanding of its space complexity. Recently, the question of the space complexity of binary obstructionfree consensus (with solo termination) has been largely settled, showing that Ω(n) shared variables are necessary [12]. An obvious open question is to remove the anonymity assumption, possibly exploiting ideas from the recent lower bound on the space complexity of consensus [12]. Another direction is to improve the lower bound, with or without the anonymity assumption, or to find a matching upper bound. References 1. Aspnes, J., Attiya, H., Censor-Hillel, K., Hendler, D.: Lower bounds for restricteduse objects. In: SPAA. pp (2012) 2. Aspnes, J., Ellen, F.: Tight bounds for adopt-commit objects. Theory of Computing Systems 55(3), (2013) 3. Attiya, H., Guerraoui, R., Hendler, D., Kuznetsov, P.: The complexity of obstruction-free implementations. J. ACM 56(4) (2009) 4. Bouzid, Z., Sutra, P., Travers, C.: Anonymous agreement: The Janus algorithm. In: OPODIS. pp (2011) 5. Capdevielle, C., Johnen, C., Kuznetsov, P., Milani, A.: Brief announcement: On the uncontended complexity of anonymous consensus. In: DISC. p. 667 (2015) 6. Ellen, F., Hendler, D., Shavit, N.: On the inherent sequentiality of concurrent objects. SIAM J. Comput. 41(3), (2012) 7. Fich, F., Herlihy, M., Shavit, N.: On the space complexity of randomized synchronization. J. ACM 45(5), (1998) 8. Hendler, D., Shavit, N.: Solo-valency and the cost of coordination. Distributed Computing 21(1), (2008) 9. Herlihy, M., Luchangco, V., Moir, M.: Obstruction-free synchronization: Doubleended queues as an example. In: ICDCS. pp (2003) 10. Luchangco, V., Moir, M., Shavit, N.: On the uncontended complexity of consensus. In: DISC. pp (2003) 11. Zhu, L.: Brief announcement: Tight space bounds for memoryless anonymous consensus. In: DISC. pp (2015) 12. Zhu, L.: A tight space bound for consensus. In: STOC (2016), to appear
Lower Bounds for Restricted-Use Objects
Lower Bounds for Restricted-Use Objects James Aspnes Keren Censor-Hillel Hagit Attiya Danny Hendler March 13, 2016 Abstract Concurrent objects play a key role in the design of applications for multi-core
More informationLower Bounds for Restricted-Use Objects
Lower Bounds for Restricted-Use Objects James Aspnes Department of Computer Science, Yale University aspnes@cs.yale.edu Keren Censor-Hillel Computer Science and Artificial Intelligence Laboratory, MIT
More informationNontrivial and Universal Helping for Wait-Free Queues and Stacks
Nontrivial and Universal Helping for Wait-Free Queues and Stacks Hagit Attiya 1, Armando Castañeda 2, and Danny Hendler 3 1 Technion 2 UNAM 3 BGU Abstract This paper studies two approaches to formalize
More informationValency Arguments CHAPTER7
CHAPTER7 Valency Arguments In a valency argument, configurations are classified as either univalent or multivalent. Starting from a univalent configuration, all terminating executions (from some class)
More informationCombining Shared Coin Algorithms
Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence
More informationComplexity Tradeoffs for Read and Update Operations
Complexity Tradeoffs for Read and Update Operations Danny Hendler Department of Computer-Science Ben-Gurion University hendlerd@cs.bgu.ac.il Vitaly Khait Department of Computer-Science Ben-Gurion University
More informationarxiv: v1 [cs.dc] 9 Feb 2015
Why Transactional Memory Should Not Be Obstruction-Free Petr Kuznetsov 1 Srivatsan Ravi 2 1 Télécom ParisTech 2 TU Berlin arxiv:1502.02725v1 [cs.dc] 9 Feb 2015 Abstract Transactional memory (TM) is an
More informationSub-Logarithmic Test-and-Set Against a Weak Adversary
Sub-Logarithmic Test-and-Set Against a Weak Adversary Dan Alistarh 1 and James Aspnes 2 1 EPFL 2 Yale University Abstract. A randomized implementation is given of a test-and-set register with O(log log
More informationConsensus and Universal Construction"
Consensus and Universal Construction INF346, 2015 So far Shared-memory communication: safe bits => multi-valued atomic registers atomic registers => atomic/immediate snapshot 2 Today Reaching agreement
More informationCan an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model?
Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model? Jaap-Henk Hoepman Department of Computer Science, University of Twente, the Netherlands hoepman@cs.utwente.nl
More informationDistributed Computing in Shared Memory and Networks
Distributed Computing in Shared Memory and Networks Class 2: Consensus WEP 2018 KAUST This class Reaching agreement in shared memory: Consensus ü Impossibility of wait-free consensus 1-resilient consensus
More informationLOWER BOUNDS FOR RANDOMIZED CONSENSUS UNDER A WEAK ADVERSARY
LOWER BOUNDS FOR RANDOMIZED CONSENSUS UNDER A WEAK ADVERSARY HAGIT ATTIYA AND KEREN CENSOR-HILLEL Abstract. This paper studies the inherent trade-off between termination probability and total step complexity
More informationA modular approach to shared-memory consensus, with applications to the probabilistic-write model
A modular approach to shared-memory consensus, with applications to the probabilistic-write model James Aspnes Yale University July 28th, 2010 Randomized consensus Problem definition Known bounds Probabilistic-write
More informationAtomic snapshots in O(log 3 n) steps using randomized helping
Atomic snapshots in O(log 3 n) steps using randomized helping James Aspnes Keren Censor-Hillel September 7, 2018 Abstract A randomized construction of single-writer snapshot objects from atomic registers
More informationFinally the Weakest Failure Detector for Non-Blocking Atomic Commit
Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Rachid Guerraoui Petr Kouznetsov Distributed Programming Laboratory EPFL Abstract Recent papers [7, 9] define the weakest failure detector
More informationAn O(sqrt(n)) space bound for obstruction-free leader election
An O(sqrt(n)) space bound for obstruction-free leader election George Giakkoupis, Maryam Helmi, Lisa Higham, Philipp Woelfel To cite this version: George Giakkoupis, Maryam Helmi, Lisa Higham, Philipp
More informationOn the weakest failure detector ever
On the weakest failure detector ever The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Guerraoui, Rachid
More informationThe Space Complexity of Unbounded Timestamps!
The Space Complexity of Unbounded Timestamps! Faith Ellen, University of Toronto! Panagiota Fatourou, University of Ioannina! Eric Ruppert, York University! Timestamp System! a set of timestamps U! two
More informationOn the weakest failure detector ever
Distrib. Comput. (2009) 21:353 366 DOI 10.1007/s00446-009-0079-3 On the weakest failure detector ever Rachid Guerraoui Maurice Herlihy Petr Kuznetsov Nancy Lynch Calvin Newport Received: 24 August 2007
More informationA Time Complexity Lower Bound for Randomized Implementations of Some Shared Objects (Preliminary Version)
A Time Complexity Lower Bound for Randomized Implementations of Some Shared Objects (Preliminary Version) Prasad Jayanti Department of Computer Science Dartmouth College Hanover, NH 03755 prasad@cs.dartmouth.edu
More informationThe Las-Vegas Processor Identity Problem (How and When to Be Unique)
The Las-Vegas Processor Identity Problem (How and When to Be Unique) Shay Kutten Department of Industrial Engineering The Technion kutten@ie.technion.ac.il Rafail Ostrovsky Bellcore rafail@bellcore.com
More informationFault-Tolerant Consensus
Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process
More informationAtomic m-register operations
Atomic m-register operations Michael Merritt Gadi Taubenfeld December 15, 1993 Abstract We investigate systems where it is possible to access several shared registers in one atomic step. We characterize
More informationLower Bounds on the Amortized Time Complexity of Shared Objects
Lower Bounds on the Amortized Time Complexity of Shared Objects Hagit Attiya 1 and Arie Fouren 2 1 Department of Computer Science, Technion, Haifa 32000, Israel hagit@cs.technion.ac.il 2 Faculty of Business
More information2 Plain Kolmogorov Complexity
2 Plain Kolmogorov Complexity In this section, we introduce plain Kolmogorov Complexity, prove the invariance theorem - that is, the complexity of a string does not depend crucially on the particular model
More informationAn O(1) RMRs Leader Election Algorithm
An O(1) RMRs Leader Election Algorithm Wojciech Golab Danny Hendler Philipp Woelfel Department of Department of Department of Computer Science Computer Science Computer Science University of Toronto Ben-Gurion
More informationI R I S A P U B L I C A T I O N I N T E R N E THE NOTION OF VETO NUMBER FOR DISTRIBUTED AGREEMENT PROBLEMS
I R I P U B L I C A T I O N I N T E R N E N o 1599 S INSTITUT DE RECHERCHE EN INFORMATIQUE ET SYSTÈMES ALÉATOIRES A THE NOTION OF VETO NUMBER FOR DISTRIBUTED AGREEMENT PROBLEMS ROY FRIEDMAN, ACHOUR MOSTEFAOUI,
More informationSimultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus
Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus Yehuda Afek 1, Eli Gafni 2, Sergio Rajsbaum 3, Michel Raynal 4, and Corentin Travers 4 1 Computer Science Department, Tel-Aviv
More informationSection 6 Fault-Tolerant Consensus
Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.
More informationInformation-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation
Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Viveck R. Cadambe EE Department, Pennsylvania State University, University Park, PA, USA viveck@engr.psu.edu Nancy Lynch
More informationImplementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links
Implementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links Jialin Zhang Tsinghua University zhanggl02@mails.tsinghua.edu.cn Wei Chen Microsoft Research Asia weic@microsoft.com
More informationOn the time and space complexity of randomized test-and-set
On the time and space complexity of randomized test-and-set George Giakkoupis, Philipp Woelfel To cite this version: George Giakkoupis, Philipp Woelfel. On the time and space complexity of randomized test-and-set.
More informationFast Randomized Test-and-Set and Renaming
Fast Randomized Test-and-Set and Renaming Dan Alistarh 1, Hagit Attiya 1,2, Seth Gilbert 1,3, Andrei Giurgiu 1, and Rachid Guerraoui 1 1 Ecole Polytechnique Fédérale de Lausanne, Lausanne, Switzerland
More informationStructuring Unreliable Radio Networks
Structuring Unreliable Radio Networks Keren Censor-Hillel Seth Gilbert Fabian Kuhn Nancy Lynch Calvin Newport August 25, 2013 Abstract In this paper we study the problem of building a constant-degree connected
More informationFaster Randomized Consensus With an Oblivious Adversary
Faster Randomized Consensus With an Oblivious Adversary James Aspnes Yale University aspnes@cs.yale.edu ABSTRACT Two new algorithms are given for randomized consensus in a shared-memory model with an oblivious
More informationA Modular Approach to Shared-Memory Consensus, with Applications to the Probabilistic-Write Model
A Modular Approach to Shared-Memory Consensus, with Applications to the Probabilistic-Write Model James Aspnes Department of Computer Science Yale University New Haven, USA aspnes@cs.yale.edu ABSTRACT
More informationShared Memory vs Message Passing
Shared Memory vs Message Passing Carole Delporte-Gallet Hugues Fauconnier Rachid Guerraoui Revised: 15 February 2004 Abstract This paper determines the computational strength of the shared memory abstraction
More informationOnline Learning, Mistake Bounds, Perceptron Algorithm
Online Learning, Mistake Bounds, Perceptron Algorithm 1 Online Learning So far the focus of the course has been on batch learning, where algorithms are presented with a sample of training data, from which
More informationWeakening Failure Detectors for k-set Agreement via the Partition Approach
Weakening Failure Detectors for k-set Agreement via the Partition Approach Wei Chen 1, Jialin Zhang 2, Yu Chen 1, Xuezheng Liu 1 1 Microsoft Research Asia {weic, ychen, xueliu}@microsoft.com 2 Center for
More informationReading the Linearizability paper of Herlihy and Wing
Reading the Linearizability paper of Herlihy and Wing Uri Abraham May 28, 2013 Abstract We read Herlihy and Wing important paper on the concept of linearizability, and reconstruct that text in the Tarskian
More informationAxioms of Kleene Algebra
Introduction to Kleene Algebra Lecture 2 CS786 Spring 2004 January 28, 2004 Axioms of Kleene Algebra In this lecture we give the formal definition of a Kleene algebra and derive some basic consequences.
More informationLocality Lower Bounds
Chapter 8 Locality Lower Bounds In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in log n + O(1) rounds. 8.1
More informationAllocate-On-Use Space Complexity of Shared-Memory Algorithms
Allocate-On-Use Space Complexity of Shared-Memory Algorithms James Aspnes 1 Yale University Department of Computer Science Bernhard Haeupler Carnegie Mellon School of Computer Science Alexander Tong 2
More informationDistributed Consensus
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement
More informationAlgorithms for MDPs and Their Convergence
MS&E338 Reinforcement Learning Lecture 2 - April 4 208 Algorithms for MDPs and Their Convergence Lecturer: Ben Van Roy Scribe: Matthew Creme and Kristen Kessel Bellman operators Recall from last lecture
More informationImproved High-Order Conversion From Boolean to Arithmetic Masking
Improved High-Order Conversion From Boolean to Arithmetic Masking Luk Bettale 1, Jean-Sébastien Coron 2, and Rina Zeitoun 1 1 IDEMIA, France luk.bettale@idemia.com, rina.zeitoun@idemia.com 2 University
More informationLecture 4. 1 Circuit Complexity. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz
Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 4 1 Circuit Complexity Circuits are directed, acyclic graphs where nodes are called gates and edges are called
More informationLower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures
Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Xianbing Wang 1, Yong-Meng Teo 1,2, and Jiannong Cao 3 1 Singapore-MIT Alliance, 2 Department of Computer Science,
More informationFootnotes to Linear Algebra (MA 540 fall 2013), T. Goodwillie, Bases
Footnotes to Linear Algebra (MA 540 fall 2013), T. Goodwillie, Bases November 18, 2013 1 Spanning and linear independence I will outline a slightly different approach to the material in Chapter 2 of Axler
More informationLecture Notes on Inductive Definitions
Lecture Notes on Inductive Definitions 15-312: Foundations of Programming Languages Frank Pfenning Lecture 2 September 2, 2004 These supplementary notes review the notion of an inductive definition and
More informationSettling Time Reducibility Orderings
Settling Time Reducibility Orderings by Clinton Loo A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Pure Mathematics
More informationAnalyzing Contention and Backoff in Asynchronous Shared Memory
Analyzing Contention and Backoff in Asynchronous Shared Memory ABSTRACT Naama Ben-David Carnegie Mellon University nbendavi@cs.cmu.edu Randomized backoff protocols have long been used to reduce contention
More informationRandomized Protocols for Asynchronous Consensus
Randomized Protocols for Asynchronous Consensus Alessandro Panconesi DSI - La Sapienza via Salaria 113, piano III 00198 Roma, Italy One of the central problems in the Theory of (feasible) Computation is
More informationThe Weakest Failure Detector to Solve Mutual Exclusion
The Weakest Failure Detector to Solve Mutual Exclusion Vibhor Bhatt Nicholas Christman Prasad Jayanti Dartmouth College, Hanover, NH Dartmouth Computer Science Technical Report TR2008-618 April 17, 2008
More informationarxiv: v1 [cs.dc] 2 Jul 2015
Publications Internes de l IRISA ISSN : 2102-6327 PI 2027 January 2015 arxiv:1507.00474v1 [cs.dc] 2 Jul 2015 Anonymous Obstruction-free (n, k)-set Agreement with n k + 1 Atomic Read/Write Registers Zohir
More informationCISC 876: Kolmogorov Complexity
March 27, 2007 Outline 1 Introduction 2 Definition Incompressibility and Randomness 3 Prefix Complexity Resource-Bounded K-Complexity 4 Incompressibility Method Gödel s Incompleteness Theorem 5 Outline
More informationCommunication-Efficient Randomized Consensus
Communication-Efficient Randomized Consensus Dan Alistarh 1, James Aspnes 2, Valerie King 3, and Jared Saia 4 1 Microsoft Research, Cambridge, UK. Email: dan.alistarh@microsoft.com 2 Yale University, Department
More informationNotes on Computer Theory Last updated: November, Circuits
Notes on Computer Theory Last updated: November, 2015 Circuits Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Circuits Boolean circuits offer an alternate model of computation: a non-uniform one
More informationOn the correlation of parity and small-depth circuits
Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract
More informationSynchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors
Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors Michel RAYNAL, Julien STAINER Institut Universitaire de France IRISA, Université de Rennes, France Message adversaries
More informationarxiv: v1 [cs.dc] 4 Oct 2018
Distributed Reconfiguration of Maximal Independent Sets Keren Censor-Hillel 1 and Mikael Rabie 2 1 Department of Computer Science, Technion, Israel, ckeren@cs.technion.ac.il 2 Aalto University, Helsinki,
More informationContinued fractions for complex numbers and values of binary quadratic forms
arxiv:110.3754v1 [math.nt] 18 Feb 011 Continued fractions for complex numbers and values of binary quadratic forms S.G. Dani and Arnaldo Nogueira February 1, 011 Abstract We describe various properties
More informationStatic-Priority Scheduling. CSCE 990: Real-Time Systems. Steve Goddard. Static-priority Scheduling
CSCE 990: Real-Time Systems Static-Priority Scheduling Steve Goddard goddard@cse.unl.edu http://www.cse.unl.edu/~goddard/courses/realtimesystems Static-priority Scheduling Real-Time Systems Static-Priority
More informationLimiting Negations in Non-Deterministic Circuits
Limiting Negations in Non-Deterministic Circuits Hiroki Morizumi Graduate School of Information Sciences, Tohoku University, Sendai 980-8579, Japan morizumi@ecei.tohoku.ac.jp Abstract The minimum number
More informationStochastic Submodular Cover with Limited Adaptivity
Stochastic Submodular Cover with Limited Adaptivity Arpit Agarwal Sepehr Assadi Sanjeev Khanna Abstract In the submodular cover problem, we are given a non-negative monotone submodular function f over
More informationLecture 6: Communication Complexity of Auctions
Algorithmic Game Theory October 13, 2008 Lecture 6: Communication Complexity of Auctions Lecturer: Sébastien Lahaie Scribe: Rajat Dixit, Sébastien Lahaie In this lecture we examine the amount of communication
More informationSingular Failures of GCH and Level by Level Equivalence
Singular Failures of GCH and Level by Level Equivalence Arthur W. Apter Department of Mathematics Baruch College of CUNY New York, New York 10010 USA and The CUNY Graduate Center, Mathematics 365 Fifth
More informationChapter 3 Deterministic planning
Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions
More informationAhlswede Khachatrian Theorems: Weighted, Infinite, and Hamming
Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Yuval Filmus April 4, 2017 Abstract The seminal complete intersection theorem of Ahlswede and Khachatrian gives the maximum cardinality of
More information1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds
1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds Amos Beimel Department of Computer Science Ben Gurion University Be er Sheva, Israel Eran Omri Department of Computer
More informationCS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms
CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden November 5, 2014 1 Preamble Previous lectures on smoothed analysis sought a better
More information5 + 9(10) + 3(100) + 0(1000) + 2(10000) =
Chapter 5 Analyzing Algorithms So far we have been proving statements about databases, mathematics and arithmetic, or sequences of numbers. Though these types of statements are common in computer science,
More informationDistributed Deterministic Graph Coloring
Distributed Deterministic Graph Coloring Michael Elkin Ben-Gurion University + 1 The Model Unweighted undirected graph G = (V, E). Vertices host processors. Processors communicate over edges of G. Communication
More informationTECHNICAL REPORT YL DISSECTING ZAB
TECHNICAL REPORT YL-2010-0007 DISSECTING ZAB Flavio Junqueira, Benjamin Reed, and Marco Serafini Yahoo! Labs 701 First Ave Sunnyvale, CA 94089 {fpj,breed,serafini@yahoo-inc.com} Bangalore Barcelona Haifa
More informationLecture Notes on Inductive Definitions
Lecture Notes on Inductive Definitions 15-312: Foundations of Programming Languages Frank Pfenning Lecture 2 August 28, 2003 These supplementary notes review the notion of an inductive definition and give
More informationCS505: Distributed Systems
Cristina Nita-Rotaru CS505: Distributed Systems. Required reading for this topic } Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson for "Impossibility of Distributed with One Faulty Process,
More informationAllocate-On-Use Space Complexity of Shared-Memory Algorithms
1 2 3 4 5 6 7 8 9 10 Allocate-On-Use Space Complexity of Shared-Memory Algorithms James Aspnes 1 Yale University Department of Computer Science Bernhard Haeupler Carnegie Mellon School of Computer Science
More information3.1 Asymptotic notation
3.1 Asymptotic notation The notations we use to describe the asymptotic running time of an algorithm are defined in terms of functions whose domains are the set of natural numbers N = {0, 1, 2,... Such
More informationDiagnosis of Repeated/Intermittent Failures in Discrete Event Systems
Diagnosis of Repeated/Intermittent Failures in Discrete Event Systems Shengbing Jiang, Ratnesh Kumar, and Humberto E. Garcia Abstract We introduce the notion of repeated failure diagnosability for diagnosing
More informationSimple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems
Simple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems Xianbing Wang, Yong-Meng Teo, and Jiannong Cao Singapore-MIT Alliance E4-04-10, 4 Engineering Drive 3, Singapore 117576 Abstract
More informationAn $Omega(n log n)$ Lower Bound on the Cost of Mutual Exclusion Rui Fan and Nancy Lynch
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2008-047 July 23, 2006 An $Omega(n log n)$ Lower Bound on the Cost of Mutual Exclusion Rui Fan and Nancy Lynch massachusetts
More informationarxiv: v1 [cs.dc] 3 Oct 2011
A Taxonomy of aemons in Self-Stabilization Swan ubois Sébastien Tixeuil arxiv:1110.0334v1 cs.c] 3 Oct 2011 Abstract We survey existing scheduling hypotheses made in the literature in self-stabilization,
More informationModels for representing sequential circuits
Sequential Circuits Models for representing sequential circuits Finite-state machines (Moore and Mealy) Representation of memory (states) Changes in state (transitions) Design procedure State diagrams
More informationA Realistic Look At Failure Detectors
A Realistic Look At Failure Detectors C. Delporte-Gallet, H. Fauconnier, R. Guerraoui Laboratoire d Informatique Algorithmique: Fondements et Applications, Université Paris VII - Denis Diderot Distributed
More informationLecture 5: February 21, 2017
COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication
More informationTree sets. Reinhard Diestel
1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked
More informationByzantine Agreement in Polynomial Expected Time
Byzantine Agreement in Polynomial Expected Time [Extended Abstract] Valerie King Dept. of Computer Science, University of Victoria P.O. Box 3055 Victoria, BC, Canada V8W 3P6 val@cs.uvic.ca ABSTRACT In
More informationAre Lock-Free Concurrent Algorithms Practically Wait-Free?
Are Lock-Free Concurrent Algorithms Practically Wait-Free? Dan Alistarh MSR Cambridge dan.alistarh@microsoft.com Keren Censor-Hillel Technion ckeren@cs.technion.ac.il Nir Shavit MIT & Tel-Aviv University
More informationOptimal and Player-Replaceable Consensus with an Honest Majority Silvio Micali and Vinod Vaikuntanathan
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2017-004 March 31, 2017 Optimal and Player-Replaceable Consensus with an Honest Majority Silvio Micali and Vinod Vaikuntanathan
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More informationAsymmetric Communication Complexity and Data Structure Lower Bounds
Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey
More informationAdaptive Matrix Vector Product
Adaptive Matrix Vector Product Santosh S. Vempala David P. Woodruff November 6, 2016 Abstract We consider the following streaming problem: given a hardwired m n matrix A together with a poly(mn)-bit hardwired
More informationCS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms
CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden March 9, 2017 1 Preamble Our first lecture on smoothed analysis sought a better theoretical
More informationThe Extended BG-Simulation and the Characterization of t-resiliency
The Extended BG-Simulation and the Characterization of t-resiliency Eli Gafni November 17, 2008 Abstract A distributed task T on n processors is an input/output relation between a collection of processors
More informationRecovery Based on Kolmogorov Complexity in Underdetermined Systems of Linear Equations
Recovery Based on Kolmogorov Complexity in Underdetermined Systems of Linear Equations David Donoho Department of Statistics Stanford University Email: donoho@stanfordedu Hossein Kakavand, James Mammen
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationOn the Impossibility of Black-Box Truthfulness Without Priors
On the Impossibility of Black-Box Truthfulness Without Priors Nicole Immorlica Brendan Lucier Abstract We consider the problem of converting an arbitrary approximation algorithm for a singleparameter social
More informationUniversal probability-free conformal prediction
Universal probability-free conformal prediction Vladimir Vovk and Dusko Pavlovic March 20, 2016 Abstract We construct a universal prediction system in the spirit of Popper s falsifiability and Kolmogorov
More informationVisual Cryptography Schemes with Optimal Pixel Expansion
Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi
More informationFailure detectors Introduction CHAPTER
CHAPTER 15 Failure detectors 15.1 Introduction This chapter deals with the design of fault-tolerant distributed systems. It is widely known that the design and verification of fault-tolerent distributed
More information