[图书][B] Distributed computing through combinatorial topology
Distributed Computing Through Combinatorial Topology describes techniques for analyzing
distributed algorithms based on award winning combinatorial topology research. The …
distributed algorithms based on award winning combinatorial topology research. The …
Power and limits of distributed computing shared memory models
What can and cannot be computed in a distributed system is a complex function of the
system's communication model, timing model, and failure model. Considering a canonical …
system's communication model, timing model, and failure model. Considering a canonical …
[HTML][HTML] A topological perspective on distributed network algorithms
More than two decades ago, combinatorial topology was shown to be useful for analyzing
distributed fault-tolerant algorithms in shared memory systems and in message passing …
distributed fault-tolerant algorithms in shared memory systems and in message passing …
Distributed programming with tasks
E Gafni, S Rajsbaum - Principles of Distributed Systems: 14th International …, 2010 - Springer
In round-by-round models of distributed computing processes run in a sequence of
(synchronous or asynchronous) rounds. The advantage of the round-by-round approach is …
(synchronous or asynchronous) rounds. The advantage of the round-by-round approach is …
A generalized asynchronous computability theorem
We consider the models of distributed computation defined as subsets of the runs of the
iterated immediate snapshot model. Given a task T and a model M, we provide topological …
iterated immediate snapshot model. Given a task T and a model M, we provide topological …
Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors
M Raynal, J Stainer - Proceedings of the 2013 ACM symposium on …, 2013 - dl.acm.org
A message adversary is a daemon that suppresses messages in round-based message-
passing synchronous systems in which no process crashes. A property imposed on a …
passing synchronous systems in which no process crashes. A property imposed on a …
The topology of shared-memory adversaries
M Herlihy, S Rajsbaum - Proceedings of the 29th ACM SIGACT-SIGOPS …, 2010 - dl.acm.org
Failure patterns in modern parallel and distributed system are not necessarily uniform. The
notion of an adversary scheduler is a natural way to extend the classical wait-free and t …
notion of an adversary scheduler is a natural way to extend the classical wait-free and t …
Recursion in distributed computing
E Gafni, S Rajsbaum - Stabilization, Safety, and Security of Distributed …, 2010 - Springer
The benefits of developing algorithms via recursion are well known. However, little use of
recursion has been done in distributed algorithms, in spite of the fact that recursive …
recursion has been done in distributed algorithms, in spite of the fact that recursive …
Iterated Shared Memory Models: (Invited Talk)
S Rajsbaum - Latin American Symposium on Theoretical Informatics, 2010 - Springer
In centralized computing we can compute a function composing a sequence of elementary
functions, where the output of the i-th function in the sequence is the input to the i+ 1-st …
functions, where the output of the i-th function in the sequence is the input to the i+ 1-st …
Read-write memory and k-set consensus as an affine task
The wait-free read-write memory model has been characterized as an iterated\emph
{Immediate Snapshot}(IS) task. The IS task is\emph {affine}---it can be defined as a (sub) set …
{Immediate Snapshot}(IS) task. The IS task is\emph {affine}---it can be defined as a (sub) set …