Results 1  10
of
93
METARING  a full duplex ring with fairness and spatial reuse
 In Proc. IEEE INFOCOM
, 1990
"... ..."
Symmetry Breaking In Distributed Networks
 Information and Computation
, 1981
"... Given a ring of n processors it is required to design the processors such that they will be able to choose a leader (a uniquely designated processor) by sending messages along the ring. If the processors are indistinguishable then there exists no deterministic algorithm to solve the problem. To over ..."
Abstract

Cited by 72 (0 self)
 Add to MetaCart
Given a ring of n processors it is required to design the processors such that they will be able to choose a leader (a uniquely designated processor) by sending messages along the ring. If the processors are indistinguishable then there exists no deterministic algorithm to solve the problem. To overcome this difficulty, probabilistic algorithms are proposed. The algorithms may run forever but they terminate within finite time on the average. For the synchronous case several algorithms are presented: The simplest requires, on the average, the transmission of no more than 2.442n bits and O (n) time. More sophisticated algorithms trade time for communication complexity. If the processors work asynchronously then on the average O (nlogn) bits are transmitted. In the above cases the size of the ring was assumed to be known to all the processors. If the size is not known then finding it may be done only with high probability: any algorithm may yield incorrect results (with nonzero probabilit...
Computing on anonymous networks, part I: characterizing the solvable cases
 IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED COMPUTING
, 1996
"... In anonymous networks, the processors do not have identity numbers. We investigate the following representative problems on anonymous networks: (a) the leader election problem, (b) the edge election problem, (c) the spanning tree construction problem, and (d) the topology recognition problem. On a g ..."
Abstract

Cited by 67 (3 self)
 Add to MetaCart
In anonymous networks, the processors do not have identity numbers. We investigate the following representative problems on anonymous networks: (a) the leader election problem, (b) the edge election problem, (c) the spanning tree construction problem, and (d) the topology recognition problem. On a given network, the above problems may or may not be solvable, depending on the amount of information about the attributes of the network made available to the processors. Some possibilities are: (1) no network attribute information at all is available, (2) an upper bound on the number of processors in the network is available, (3) the exact number of processors in the network is available, and (4) the topology of the network is available. In terms of a new graph property called “symmetricity, ” in each of the four cases (1)–(4) above, we characterize the class of networks on which each of the four problems (a)–(d) is solvable. We then relate the symmetricity of a network to its 1 and 2factors.
Kodkod: A relational model finder
 In Tools and Algorithms for Construction and Analysis of Systems (TACAS
, 2007
"... Abstract. The key design challenges in the construction of a SATbased relational model finder are described, and novel techniques are proposed to address them. An efficient model finder must have a mechanism for specifying partial solutions, an effective symmetry detection and breaking scheme, and ..."
Abstract

Cited by 60 (4 self)
 Add to MetaCart
Abstract. The key design challenges in the construction of a SATbased relational model finder are described, and novel techniques are proposed to address them. An efficient model finder must have a mechanism for specifying partial solutions, an effective symmetry detection and breaking scheme, and an economical translation from relational to boolean logic. These desiderata are addressed with three new techniques: a symmetry detection algorithm that works in the presence of partial solutions, a sparsematrix representation of relations, and a compact representation of boolean formulas inspired by boolean expression diagrams and reduced boolean circuits. The presented techniques have been implemented and evaluated, with promising results. 1
An O(n log n) Unidirectional Distributed Algorithm for Extrema Finding in a Circle
 JOURNAL OF ALGORITHMS
, 1982
"... In this paper we present algorithms, which given a circular arrangement of n uniquely numbered processes, determine the maximum number in a distributive manner. We begin with a simple unidirectional algorithm, in which the number of messages passed is bounded by 2n log n + 0(n). By making several im ..."
Abstract

Cited by 57 (2 self)
 Add to MetaCart
In this paper we present algorithms, which given a circular arrangement of n uniquely numbered processes, determine the maximum number in a distributive manner. We begin with a simple unidirectional algorithm, in which the number of messages passed is bounded by 2n log n + 0(n). By making several improvements to the simple algorithm, we obtain a unidirectional algorithm in which the number of messages passed is bounded by 1.5n logn + 0(n). These algorithms disprove Hirschberg and Sinclair's'conjecture that 0(n²) is a lower bound on the number of messages passed in undirectional algorithms for this problem. At the end of the paper we indicate how our methods can be used to improve an algorithm due to Peterson, to obtain a unidirectional algorithm using at most 1.356n log n + 0(n) messages. This is the best bound so far on the number of messages passed in both the bidirectional and unidirectional cases.
Electing a Leader in a Synchronous Ring
, 1987
"... The problem of electing a leader in a synchronous ring of n processon is considered. Both positive and negative results are obtained. On the one hand, if processor IDs are chosen from some countable set, then there is an algorithm that uses only O(n) messages in the wont case. On the other hand, any ..."
Abstract

Cited by 51 (2 self)
 Add to MetaCart
The problem of electing a leader in a synchronous ring of n processon is considered. Both positive and negative results are obtained. On the one hand, if processor IDs are chosen from some countable set, then there is an algorithm that uses only O(n) messages in the wont case. On the other hand, any algorithm that is restricted to use only comparisons of IDs requires fl(n log n) messages in the worst case. Alternatively, if the number of rounds is required to be bounded by some t in the wont case, and lDs are chosen from any set having at least f(n, t) elements, for a certain very fastgrowing functionf then any algorithm requires fl(n log n) messages in the wont case.
FailAwareness in Timed Asynchronous Systems
, 2003
"... We address the problem of the impossibility of implementing synchronous faulttolerant service specifications in asynchronous distributed systems. We introduce a method for weakening a synchronous service specification so that it becomes implementable in "timed" asynchronous systems, that ..."
Abstract

Cited by 45 (15 self)
 Add to MetaCart
We address the problem of the impossibility of implementing synchronous faulttolerant service specifications in asynchronous distributed systems. We introduce a method for weakening a synchronous service specification so that it becomes implementable in "timed" asynchronous systems, that is, asynchronous systems in which processes have access to local hardware clocks. The method (1) adds to a service interface an exception indicator so that a client knows at any time if a server is currently providing its standard "synchronous" semantics or some other specified exceptional semantics, (2) the standard behavior provided when the exception indicator does not signal an exception is "similar" to the original synchronous service behavior, and (3) a server has to provide its standard semantics whenever the underlying communication and process services exhibit "synchronous behavior ". To illustrate our method, we show how the specification of a synchronous datagram service and an internal clock synchronization service can be transformed into a failaware service specification. Further illustrations of the usefulness of failaware services are provided by describing a railway crossing service and a failaware weak group membership service.
A UNITYstyle Programming Logic for Shared Dataspace Programs
, 2003
"... The term shared dataspace refers to the general class of programming languages in which the principal means of communication among the concurrent components of programs is a common, contentaddressable data structure called a dataspace. In the programming language and artificial intelligence comm ..."
Abstract

Cited by 28 (14 self)
 Add to MetaCart
The term shared dataspace refers to the general class of programming languages in which the principal means of communication among the concurrent components of programs is a common, contentaddressable data structure called a dataspace. In the programming language and artificial intelligence communities, there is considerable interest in such languages, e.g., logicbased languages, production rule systems, and the Linda language. However, these languages have not been the subject of extensive program verification research. This paper specifies a proof system for a shared dataspace programming notation called Swarma programming logic similar in style to that of UNITY. The paper then uses the proof system to reason about a Swarm program to label the equalintensity regions of a digital image.
Mixed Programming Metaphors in a Shared Dataspace Model of Concurrency
 IEEE Transactions on Software Engineering
, 2003
"... The term shared dataspace refers to the general class of models and languages in which the principal means of communication is a common, contentaddressable data structure called a dataspace. Swarm is a simple language we have used as a vehicle for the investigation of the shared dataspace approa ..."
Abstract

Cited by 26 (10 self)
 Add to MetaCart
The term shared dataspace refers to the general class of models and languages in which the principal means of communication is a common, contentaddressable data structure called a dataspace. Swarm is a simple language we have used as a vehicle for the investigation of the shared dataspace approach to concurrent computation. It is the first shared dataspace language to have an associated assertionalstyle proof system. An important feature of Swarm is its ability to bring a variety of programming paradigms under a single, unified model. In a series of related examples we explore Swarm's capacity to express sharedvariable, messagepassing, and rulebased computations; to specify synchronous and asynchronous processing modes; and to accommodate highly dynamic program and data structures. Several illustrations make use of a programming construct unique to Swarm, the synchrony relation, and explain how this feature can be used to construct dynamically structured, partially synchronous computations. The paper has three parts: an overview the Swarm programming notation, an examination of Swarm programming strategies via a series of related example programs, and a discussion of the distinctive features of the shared dataspace model. A formal operational model for Swarm is presented in an appendix.
The wakeup problem
 SIAM Journal on Computing
, 1996
"... We study a new problem, the wakeup problem, that seems to be fundamental in distributed computing. We present efficient solutions to the problem and show how these solutions can be used to solve the consensus problem, the leader election problem, and other related problems. The main question we try ..."
Abstract

Cited by 24 (5 self)
 Add to MetaCart
We study a new problem, the wakeup problem, that seems to be fundamental in distributed computing. We present efficient solutions to the problem and show how these solutions can be used to solve the consensus problem, the leader election problem, and other related problems. The main question we try to answer is, how much memory is needed to solve the wakeup problem? We assume a model that captures important properties of real systems that have been largely ignored by previous work on cooperative problems.