) sm i [x][y].sn est le nombre d'écritures effectuées par p y dans mem[y] simulées jusque là par q x et (2) sm i [x] ,
Pour cela, il extrait de sm i [1..t + 1][y] la valeur écrite par le simulateur q s le plus avancé dans sa simulation de p y . Ceci est exprimé dans les lignes 02-03. operation sim_snapshot i,j () : (01) smi ? MEM .snapshot() : (02) for each y : 1 ? y ? n : do inputi[y] = smi[s][y].value (03) where ?x : 1 ? x ? t + 1 : smi[s][y].sn ? smi[x][y].sn end for ; (04) snap_sni[j] ? snap_sni[j] + 1 ; let snapsn = snap_sni[j] ; (05) enter_mutex ; SAFE _AG[j, snapsn].propose i (inputi) ; exit_mutex, ) res ? SAFE _AG[j, snapsn].decidei() (07) return(res) ,
j, snapsn] est utilisé par un simulateur q i quand il simule son snapsn-ième invocation mem.snapshot() pour le processus simulé p j pour 1 ? j ? t + 1. (Comme nous le verrons, quand t + 1 < j ? n, la simulation de mem.snapshot( ,
snapsn][1] est de contenir la valeur qui doit être renvoyée pour la snapsnième invocation mem.snapshot() par le processus simulé p j si le propriétaire q j est désigné comme gagnant par l'objet ARBIT ER[j, snapsn] correspondant. Si le propriétaire q j n'est pas le gagnant ,
son représentant canonique est la tâche n, m, ?, u ? -GSB telle que la tâche n, m, ?, u ? ? 1-GSB n'est pas ?-ancrée. Une définition similaire s'applique aux tâches u-ancrées. Une tâche qui n'est ni u-ancrée ni ?-ancrée, ou qui est (?, u)-ancrée, est son propre représentant ,
La tâche 6, 3, 1, 4-GSB, qui est ?-ancrée, est la représentante des trois tâches associées à l'ensemble noyau {-GSB, qui n'est pas ancrée, est sa propre représentante : c'est la seule tâche associée à l'ensemble noyau {, Quand on considère la table 6.1, il y a sept représentants canoniques. Ces tâches canoniques sont représentées dans la figure 6.1 où " A ? B " signifie " A inclut strictement B " . Remarquons que la tâche représentante 6 n'est pas ancrée, p.3, 2003. ,
Comme n ? ?(m ? 1) ? u + 1, il existe un vecteur (avec m entrées) dont la première entrée est égale à u + 1 qui est un vecteur noyau de la tâche n, m, ?, u + 1-GSB. Mais comme u + 1 > u, ce vecteur ne peut pas être un vecteur noyau de la tâche n, m, ?, u-GSB. La tâche n, m, ?, u-GSB ne peut donc pas être ?-ancrée ,
Le raisonnement est similaire à celui du théorème 6 ,
borne supérieure sur le nombre de processus qui peuvent décider chaque valeur Si au plus u processus décident chaque valeur, alors nécessairement moins de u ? processus décident chaque valeur, et donc chaque vecteur de sortie de la tâche n, m, ?, u-GSB T est aussi un vecteur de sortie de la tâche n, m, ? ,
Le raisonnement est similaire à celui du lemme 6 ,
(n + 1)-renommage (c'est-à-dire la tâche n, n + 1, 0, 1-GSB) de manière sans attente en utilisant des registres et une solution à la tâche du (n ? 1)-slot (c'est-à-dire la tâche n, n ? 1, 1, 2-GSB). L'objet qui résout la tâche n, n ? 1, 1, 2-GSB utilisé dans l'algorithme est noté KS . Il fournit aux processus une seule opération notée slot_request n?1 ( ,
Si il n'observe aucun autre processus avec le même numéro de slot, ce numéro de slot devient son nouvel identifiant. (lignes 03-04) Dans le cas contraire, les propriétés de l'objet KS impliquent qu'il y a exactement un autre processus p j qui a le même numéro de slot (ligne 05) Les processus p i et p j sont alors en compétition pour un nouvel identifiant. De plus, il est possible que p j considère déjà son numéro de slot comme son nouvel identifiant. Le processus p i résout ce conflit selon l'ordre entre son identité et celle de p j : si l ,
n+1} sont des conséquences directes du texte de l'algorithme. Nous nous concentrons donc sur la démonstration du fait que deux processus ne peuvent pas obtenir le même nouvel identifiant. À cause des propriétés de l'objet KS , n ? 2 obtiennent des slots uniques parmi [1..n ? 1]. Soient p x et p y les processus qui reçoivent le même slot s. La démonstration se base sur le fait que les invocations snapshot( ,
Weak Symmetry Breaking) peut être résolue de manière sans-attente pour certaines valeurs de n, mais n'ont pas donné d'algorithme permettant de le faire. Il serait intéressant de découvrir un tel algorithme ; cela permettrait de résoudre le (2n ? 2)-renommage non adaptatif (tâche n, 2n ? 2, 0, 1-GSB) [61] pour ces valeurs particulières de n. Les tâches GSB définies dans ce document ne sont pas adaptatives, p.1 ,
Atomic snapshots of shared memory, Journal of the ACM, vol.40, issue.4, pp.873-890, 1993. ,
DOI : 10.1145/153724.153741
Tight Group Renaming on Groups of Size g Is Equivalent to g-Consensus, Proc. 23rd Int'l Symposium on Distributed Computing (DISC'09), Springer Verlag LNCS #5805, pp.111-126, 2009. ,
DOI : 10.1007/978-3-642-04355-0_14
Common2 Extended to Stacks and Unbounded Concurrency, Proc. 25th ACM Symposium on Principles of Distributed Computing, pp.218-227, 2006. ,
DOI : 10.1007/s00446-007-0023-3
Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus, Proc. 8th Int'l Conference on Distributed Computing and Networking (ICDCN'06), pp.331-341, 2006. ,
DOI : 10.1007/11947950_36
The k-simultaneous consensus problem, Distributed Computing, vol.29, issue.5, 2010. ,
DOI : 10.1007/s00446-009-0090-8
URL : https://hal.archives-ouvertes.fr/inria-00543100
Long-lived adaptive collect with applications, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), pp.262-272, 1999. ,
DOI : 10.1109/SFFCS.1999.814598
A completeness theorem for a class of synchronization objects, Proceedings of the twelfth annual ACM symposium on Principles of distributed computing , PODC '93, pp.159-170, 1993. ,
DOI : 10.1145/164051.164071
A pleasant stroll through the land of infinitely many creatures, ACM SIGACT News, vol.35, issue.2, pp.36-59, 2004. ,
DOI : 10.1145/992287.992298
Composite Registers, Proc. 9th ACM Symposium on Principles of Distributed Computing (PODC'90), pp.15-29, 1990. ,
DOI : 10.1007/bf02242703
Multi-writer composite registers, Distributed Computing, pp.175-195, 1994. ,
DOI : 10.1007/BF02280833
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.3621
Local and Global Properties in Networks of Processors, Proc. 12th ACM Symposium on Theory of Computing (STOC'80, pp.82-93, 1980. ,
Efficient and Robust Sharing of Memory in Message-Passing Systems, Journal of Algorithms, vol.34, issue.1, pp.109-127, 2000. ,
DOI : 10.1006/jagm.1999.1025
Needed, ACM SIGACT News, vol.39, issue.1, pp.59-61, 2008. ,
DOI : 10.1145/1360443.1360457
Sharing Memory Robustly in Message Passing Systems, Journal of the ACM, vol.42, issue.1, pp.121-132, 1995. ,
Renaming in an asynchronous environment, Journal of the ACM, vol.37, issue.3, pp.524-548, 1990. ,
DOI : 10.1145/79147.79158
Polynomial and Adaptive Long-lived (2p ? 1)-Renaming, Proc. 14th Int'l Symposium on Distributed Computing (DISC'00), pp.149-163, 2000. ,
DOI : 10.1007/3-540-40026-5_10
Algorithms adapting to point contention, Journal of the ACM, vol.50, issue.4, pp.444-468, 2003. ,
DOI : 10.1145/792538.792541
An Adaptive Collect Algorithm with Applications. Distributed Computing, pp.87-96, 2002. ,
DOI : 10.1007/s004460100067
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8262
Computing in Totally Anonymous Asynchronous Shared Memory Systems, Information and Computation, vol.173, issue.2, pp.162-183, 2002. ,
DOI : 10.1006/inco.2001.3119
Partial snapshot objects, Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, SPAA '08, pp.336-343, 2008. ,
DOI : 10.1145/1378533.1378591
URL : http://infoscience.epfl.ch/record/120525
) Operations, SIAM Journal on Computing, vol.27, issue.2, pp.319-340, 1998. ,
DOI : 10.1137/S0097539795279463
The Combinatorial Structure of Wait-Free Solvable Tasks, SIAM Journal on Computing, vol.31, issue.4, pp.1286-1313, 2002. ,
DOI : 10.1137/S0097539797330689
Distributed Computing : Fundamentals, Simulations and Advanced Topics, p.414, 2004. ,
DOI : 10.1002/0471478210
A simple proof of the necessity of the failure detector ?? to implement an atomic register in asynchronous message-passing systems, Information Processing Letters, vol.110, issue.4, pp.153-157, 2010. ,
DOI : 10.1016/j.ipl.2009.11.011
URL : https://hal.archives-ouvertes.fr/inria-00543125
-resilient asynchronous computations, Proceedings of the twenty-fifth annual ACM symposium on Theory of computing , STOC '93, pp.91-100, 1993. ,
DOI : 10.1145/167088.167119
URL : https://hal.archives-ouvertes.fr/hal-00896459
Immediate atomic snapshots and fast renaming, Proceedings of the twelfth annual ACM symposium on Principles of distributed computing , PODC '93, pp.41-51, 1993. ,
DOI : 10.1145/164051.164056
The Implication of the Borowsky-Gafni Simulation on the Set Consensus Hierarchy, 1993. ,
The BG distributed simulation algorithm, Distributed Computing, vol.14, issue.3, pp.127-146, 2001. ,
DOI : 10.1007/PL00008933
New combinatorial topology upper and lower bounds for renaming, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, pp.295-304, 2008. ,
DOI : 10.1145/1400751.1400791
A Study of the Wait-free Solvability of Weak Symmetry Breaking and Renaming, Posgrado en Ciencia e Ingeniería de la Computación, 2010. ,
Renaming Is Weaker Than Set Agreement But for Perfect Renaming: A Map of Sub-consensus Tasks, Proceedings of the 10th International Latin American Symposium on Theoretical Informatics, 2012. ,
DOI : 10.1007/978-3-642-29344-3_13
The renaming problem in shared memory systems: An introduction, Computer Science Review, vol.5, issue.3, 1960. ,
DOI : 10.1016/j.cosrev.2011.04.001
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996. ,
DOI : 10.1145/226643.226647
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.498
More Choices Allow More Faults: Set Consensus Problems in Totally Asynchronous Systems, Information and Computation, vol.105, issue.1, pp.132-158, 1993. ,
DOI : 10.1006/inco.1993.1043
The weakest failure detector for solving consensus, Journal of the ACM, vol.43, issue.4, pp.685-722, 1996. ,
DOI : 10.1145/234533.234549
Understanding the Set Consensus Partial Order using the Borowsky-Gafni Simulation, Proc. 10th Int'l Workshop on Distributed Algorithms (WDAG'96, pp.362-379, 1996. ,
DOI : 10.1007/3-540-61769-8_23
Distributed snapshots: determining global states of distributed systems, ACM Transactions on Computer Systems, vol.3, issue.1, pp.63-75, 1985. ,
DOI : 10.1145/214451.214456
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.7694
Read Invisibility, Virtual World Consistency and Probabilistic Permissiveness are Compatible, Proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing Springer-Verlag LNCS #7016, pp.244-257, 2011. ,
DOI : 10.1007/978-3-642-24650-0_21
URL : https://hal.archives-ouvertes.fr/hal-00646902
Towards a universal construction for transaction-based multiprocess programs, Proceedings of the 13th International Conference on Distributed Computing and Networking Springer-Verlag LNCS #7129, pp.61-75, 2012. ,
DOI : 10.1016/j.tcs.2012.09.011
URL : https://hal.archives-ouvertes.fr/inria-00576755
Tight Failure Detection Bounds on Atomic Object Implementations, Article 22, 2010. ,
The weakest failure detectors to solve certain fundamental problems in distributed computing, Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing , PODC '04, pp.338-346, 2004. ,
DOI : 10.1145/1011767.1011818
The disagreement power of an adversary. Distributed Computing, pp.137-147, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00376981
Solution of a problem in concurrent programming control, Communications of the ACM, vol.8, issue.9, p.569, 1965. ,
DOI : 10.1145/365559.365617
Reaching approximate agreement in the presence of faults, Journal of the ACM, vol.33, issue.3, pp.499-516, 1986. ,
DOI : 10.1145/5925.5931
Bit complexity of breaking and achieving symmetry in chains and rings, Journal of the ACM, vol.55, issue.1, 2008. ,
DOI : 10.1145/1326554.1326557
How Hard Is It to Take a Snapshot, Proc. 31th Conference on Current Trends in Theory and Practice of Computer Science (SOFTSEM'05), pp.28-37, 2005. ,
Transactions are back---but are they the same?, ACM SIGACT News, vol.39, issue.1, pp.47-58, 2008. ,
DOI : 10.1145/1360443.1360456
Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985. ,
DOI : 10.1145/3149.214121
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6760
Round-by-round Fault Detectors : Unifying Synchrony and Asynchrony, Proc. 17th ACM Symposium on Principles of Distributed Computing (PODC'98), pp.143-152, 1998. ,
DOI : 10.1145/277697.277724
Renaming with k-Set-Consensus: An Optimal Algorithm into n + k ??? 1 Slots, Proc. 10th Int'l Conference On Principles Of Distributed Systems (OPODIS'06), Springer Verlag LNCS #4305, pp.36-44, 2006. ,
DOI : 10.1007/11945529_4
The 01-Exclusion Families of Tasks, Proc. 12th In'l Conference on Principles of Distributed Systems (OPODIS'08, pp.246-258, 2008. ,
The extended BG-simulation and the characterization of t-resiliency, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009. ,
DOI : 10.1145/1536414.1536428
Simulating Few by Many Unpublished manuscript, 2009. ,
N-Consensus is the Second Strongest Object for N???+???1 Processes, Proc. 11th Int'l Conference On Principle Of Distributed Systems, pp.260-273, 2007. ,
DOI : 10.1007/978-3-540-77096-1_19
On Set Consensus Numbers, Proc. 23th Int'l Symposium on on Distributed Computing (DISC'09), Springer Verlag LNCS #5805, pp.35-47, 2009. ,
DOI : 10.1007/s00446-011-0142-8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.619.2024
From adaptive renaming to set agreement, Theoretical Computer Science, vol.410, issue.14, pp.1328-1335, 2009. ,
DOI : 10.1016/j.tcs.2008.05.016
URL : https://hal.archives-ouvertes.fr/hal-00432970
Subconsensus Tasks: Renaming Is Weaker Than Set Agreement, Proc. 20th Int'l Symposium on Distributed Computing (DISC'06), LNCS #4167, pp.329-338, 2006. ,
DOI : 10.1007/11864219_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.4954
The Committee Decision Problem, Proc. Latin American Theoretical Informatics Symposium (LATIN'06, pp.502-514, 2006. ,
DOI : 10.1007/11682462_47
URL : https://hal.archives-ouvertes.fr/inria-00000290
From adaptive renaming to set agreement, 26th IEEE Symposium on Reliable Distributed Systems (SRDS'07), pp.93-102, 2007. ,
DOI : 10.1016/j.tcs.2008.05.016
URL : https://hal.archives-ouvertes.fr/hal-00432970
Weighted voting for replicated data, Proceedings of the seventh symposium on Operating systems principles , SOSP '79, pp.150-172, 1979. ,
DOI : 10.1145/800215.806583
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.6256
On the correctness of transactional memory, Proceedings of the 13th ACM SIGPLAN Symposium on Principles and practice of parallel programming , PPoPP '08, pp.175-184, 2008. ,
DOI : 10.1145/1345206.1345233
The Weakest Failure Detectors to Boost Obstruction- Freedom. Distributed Computing, pp.415-433, 2008. ,
Failure detectors as type boosters, Distributed Computing, vol.30, issue.4, pp.343-358, 2008. ,
DOI : 10.1007/s00446-007-0043-z
URL : http://dx.doi.org/10.1007/s00446-007-0043-z
From Unreliable Objects to Reliable Objects: The Case of Atomic Registers and Consensus, 9th Int'l Conference on Parallel Computing Technologies (PaCT'07), Springer LNCS #4671, pp.47-61, 2007. ,
DOI : 10.1007/978-3-540-73940-1_5
Wait-free synchronization, ACM Transactions on Programming Languages and Systems, vol.13, issue.1, pp.124-149, 1991. ,
DOI : 10.1145/114005.102808
Distributed computing and the multicore revolution, ACM SIGACT News, vol.39, issue.1, pp.62-72, 2008. ,
DOI : 10.1145/1360443.1360458
Obstruction-free synchonization : double-ended queues as an example, Proc. 23th Int'l IEEE Conference on Distributed Computing Systems, pp.522-529, 2003. ,
DOI : 10.1109/icdcs.2003.1203503
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.180.1070
On the decidability of distributed decision tasks, Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing , PODC '96, pp.589-598, 1997. ,
DOI : 10.1145/248052.248110
Algebraic spans, Mathematical Structures in Computer Science, vol.10, issue.4, pp.549-573, 2000. ,
DOI : 10.1017/S0960129500003170
A classification of wait-free loop agreement tasks, Theoretical Computer Science, vol.291, issue.1, pp.55-77, 2003. ,
DOI : 10.1016/S0304-3975(01)00396-6
The topological structure of asynchronous computability, Journal of the ACM, vol.46, issue.6, pp.858-923, 1999. ,
DOI : 10.1145/331524.331529
The Art of Mutiprocessor Programming, p.508, 2008. ,
Linearizability: a correctness condition for concurrent objects, ACM Transactions on Programming Languages and Systems, vol.12, issue.3, pp.463-492, 1990. ,
DOI : 10.1145/78969.78972
Help when needed, but no more: Efficient read/write partial snapshot, Journal of Parallel and Distributed Computing, vol.72, issue.1, pp.1-12, 2012. ,
DOI : 10.1016/j.jpdc.2011.08.005
URL : https://hal.archives-ouvertes.fr/inria-00440392
Virtual world consistency: A condition for STM systems (with a versatile protocol with invisible read operations), Theoretical Computer Science, vol.444, 2011. ,
DOI : 10.1016/j.tcs.2012.04.037
A liveness condition for concurrent objects: x-wait-freedom, Concurrency and Computation: Practice and Experience, vol.32, issue.2, pp.2154-2166, 2011. ,
DOI : 10.1002/cpe.1741
URL : https://hal.archives-ouvertes.fr/hal-00646908
Software transactional memories: an??approach??for??multicore programming, The Journal of Supercomputing, vol.10, issue.2, pp.203-215, 2011. ,
DOI : 10.1007/s11227-010-0388-0
URL : https://hal.archives-ouvertes.fr/inria-00440382
The Universe of Symmetry Breaking Tasks, Proceedings of the 18th International Colloquium on Structural Information and Communication Complexity Springer-Verlag LNCS #6796, pp.66-77, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00560453
The weakest failure detector to implement a register in asynchronous systems with hybrid communication, Proceedings of the 13th International Symposium on Stabilization , Safety, and Security of Distributed Systems Springer-Verlag LNCS #6976, pp.268-282, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00646899
A Simple Snapshot Algorithm for Multicore Systems, 2011 5th Latin-American Symposium on Dependable Computing, pp.17-24, 2011. ,
DOI : 10.1109/LADC.2011.11
URL : https://hal.archives-ouvertes.fr/inria-00505233
The multiplicative power of consensus numbers, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, pp.26-35, 2010. ,
DOI : 10.1145/1835698.1835705
URL : https://hal.archives-ouvertes.fr/inria-00543130
The multiplicative power of consensus numbers, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, 2010. ,
DOI : 10.1145/1835698.1835705
URL : https://hal.archives-ouvertes.fr/inria-00543130
On asymmetric progress conditions, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, pp.55-64, 2010. ,
DOI : 10.1145/1835698.1835709
URL : https://hal.archives-ouvertes.fr/inria-00486977
The x-Wait-Freedom Progress Condition, Proceedings of the 16th International Euro-Par Conference, pp.584-595, 2010. ,
DOI : 10.1007/978-3-642-15277-1_55
URL : https://hal.archives-ouvertes.fr/inria-00454386
On Adaptive Renaming under Eventually Limited Contention, Proceedings of the 12th International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp.377-387, 2010. ,
DOI : 10.1007/978-3-642-16023-3_31
URL : https://hal.archives-ouvertes.fr/inria-00543135
Visiting Gafni???s Reduction Land: From the BG Simulation to the Extended BG Simulation, Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp.369-383, 2009. ,
DOI : 10.1007/978-3-642-05118-0_26
Help When Needed, But No More : Efficient Read/Write Partial Snapshot, Proceedings of the 23rd International Symposium on Distributed Computing, pp.142-156, 2009. ,
DOI : 10.1016/j.jpdc.2011.08.005
URL : https://hal.archives-ouvertes.fr/inria-00440392
Software Transactional Memories : An Approach for Multicore Programming, Proceedings of the 10th International Conference on Parallel Computing Technologies, pp.26-40, 2009. ,
DOI : 10.1007/978-3-642-03275-2_4
URL : https://hal.archives-ouvertes.fr/inria-00440382
A Versatile STM Protocol with Invisible Read Operations That Satisfies the Virtual World Consistency Condition, Proceedings of the 16th International Colloquium on Structural Information and Communication Complexity, pp.266-280, 2009. ,
DOI : 10.1007/s004460050065
URL : https://hal.archives-ouvertes.fr/inria-00440375
Trying to Unify the LL/SC Synchronization Primitive and the Notion of a Timed Register, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, 2012. ,
DOI : 10.1109/AINA.2012.35
Linear Time Snapshots Using Multi-writer Multireader Registers, Proc. 8th Int'l Workshop on Distributed Algorithms (WDAG'94), pp.130-140, 1994. ,
DOI : 10.1007/bfb0020429
Disjoint-access-parallel implementations of strong shared memory primitives, Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing , PODC '94, pp.151-160, 1994. ,
DOI : 10.1145/197917.198079
An Optimal Multiwriter Snapshot Algorithm, Proc. 37th ACM Symposium on Theory of Computing (STOCS'05), pp.723-732, 2005. ,
DOI : 10.1145/1060590.1060697
On interprocess communication, Distributed Computing, vol.21, issue.2, pp.77-101, 1986. ,
DOI : 10.1007/BF01786227
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.1038
The part-time parliament, ACM Transactions on Computer Systems, vol.16, issue.2, pp.133-169, 1998. ,
DOI : 10.1145/279227.279229
Memory Requirements for Agreement Among Unreliable Asynchronous Processes, of Advances in Comp. Research, pp.163-183, 1987. ,
Distributed Algorithms, 1996. ,
Extended impossibility results for asynchronous complete networks, Information Processing Letters, vol.26, issue.3, pp.141-151, 1987. ,
DOI : 10.1016/0020-0190(87)90052-4
Exploring Gafni???s Reduction Land: From ?? k to Wait-Free Adaptive $(2p-\lceil\frac{p}{k}\rceil)$ -Renaming Via k-Set Agreement, Proc. 20th Int'l Symposium on Distributed Computing (DISC'09), pp.1-15, 2006. ,
DOI : 10.1007/11864219_1
Narrowing power vs efficiency in synchronous set agreement: Relationship, algorithms and lower bound, Theoretical Computer Science, vol.411, issue.1, pp.58-69, 2010. ,
DOI : 10.1016/j.tcs.2009.09.002
Failure Detectors and the Wait-free Hierarchy, Proc. 14th ACM Symposium on Principles of Distributed Computing (PODC'95, pp.100-109, 1995. ,
The Serializability of Concurrent Updates, Journal of the ACM, vol.26, issue.4, pp.631-653, 1979. ,
Failure Mode Assumptions and Assumption Coverage. 22nd Int'l Symposium on Fault-Tolerant Computing (FTCS-22), pp.386-395, 1992. ,
DOI : 10.1007/978-3-642-79789-7_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.5363
Locks Considered Harmful: A Look at Non-traditional Synchronization, Proc. 6th Int'l Workshop on Software Technologies for Future Embedded and Ubiquitous Computing Systems (SEUS'08), pp.369-380, 2008. ,
DOI : 10.1007/11945529_2
Communication and Agreement Abstractions for Fault-Tolerant Asynchronous Distributed Systems, Synthesis Lectures on Distributed Computing Theory, vol.1, issue.1, 2010. ,
DOI : 10.2200/S00236ED1V01Y201004DCT002
URL : https://hal.archives-ouvertes.fr/inria-00543036
In Search of the Holy Grail: Looking for the Weakest Failure Detector for Wait-Free Set Agreement, Proc. 10th Int'l Conference on Principles of Distributed Systems (OPODIS'06), pp.1-17, 2006. ,
DOI : 10.1007/11945529_2
URL : https://hal.archives-ouvertes.fr/inria-00089977
-set agreement is impossible, Proceedings of the twenty-fifth annual ACM symposium on Theory of computing , STOC '93, pp.1449-1483, 2000. ,
DOI : 10.1145/167088.167122
URL : https://hal.archives-ouvertes.fr/hal-00192526
Tight bounds for shared memory symmetric mutual exclusion problems, Proceedings of the eighth annual ACM Symposium on Principles of distributed computing , PODC '89, pp.177-192, 1989. ,
DOI : 10.1145/72981.72993
Software Transactional Memory, Distributed Computing, pp.99-116, 1997. ,
Synchronization Algorithms and Concurrent Programming, 2006. ,
Contention-Sensitive Data Structure and Algorithms, Proc. 23th Int'l Symposium on Distributed Computing (DISC'09), Springer Verlag LNCS #5805, pp.157-171, 2009. ,
On the Computational Power of Shared Objects, Proc. 13th Int'l Conference On Principle Of Distributed Systems, pp.270-284, 2009. ,
DOI : 10.1007/978-3-642-10877-8_22
The Computational Structure of Progress Conditions, Proc. 24th Int'l Symposium on Distributed Computing (DISC'10), pp.221-235, 2010. ,
DOI : 10.1007/978-3-642-15763-9_23