Proceedings of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing 2010
DOI: 10.1145/1835698.1835802
|View full text |Cite
|
Sign up to set email alerts
|

A modular approach to shared-memory consensus, with applications to the probabilistic-write model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…For example, a content-oblivious adversary [Cha96] or value-oblivious adversary [Aum97] is restricted from seeing the values contained in registers or pending write operations and from observing the internal states of processes directly. A location-oblivious adversary [Asp12b] can distinguish between values and the types of pending operations, but can't discriminate between pending operations based one which register they are operating on. These classes of adversaries are modeled by imposing an equivalence relation on partial executions and insisting that the adversary make the same choice of processes to go next in equivalent situations.…”
Section: Role Of the Adversary In Randomized Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, a content-oblivious adversary [Cha96] or value-oblivious adversary [Aum97] is restricted from seeing the values contained in registers or pending write operations and from observing the internal states of processes directly. A location-oblivious adversary [Asp12b] can distinguish between values and the types of pending operations, but can't discriminate between pending operations based one which register they are operating on. These classes of adversaries are modeled by imposing an equivalence relation on partial executions and insisting that the adversary make the same choice of processes to go next in equivalent situations.…”
Section: Role Of the Adversary In Randomized Algorithmsmentioning
confidence: 99%
“…A later paper by Aspnes and Censor [AC09] showed that it was also possible to get an O(n) bound on individual step complexity. For weak adversaries, the best known upper bound on individual step complexity was O(log n) for a long time [Cha96, Aum97, Asp12b], with an O(n) bound on total step complexity for some models [Asp12b]. More recent work has lowered the bound to O(log log n), under the assumption of an oblivious adversary [Asp12a].…”
Section: Historymentioning
confidence: 99%
“…In task T1, processes proceed in asynchronous rounds aiming at writing a single non-⊥ value to D. An adopt-commit object and a safe agreement object denoted respectively AC[r] and SA[r] are associated with each round r. Following a standard design pattern, e.g., [3,24], the processes that enter round r first try to reach agreement by accessing the safe agreement object SA[r] (line 9) and then check whether agreement has been achieved using the adopt-commit object AC[r] (line 14).…”
Section: Termination Every Operation Performed By a Non-faulty Procementioning
confidence: 99%
“…A ratifier, or adopt-commit, object [13] is a one-shot shared object that encapsulates the safety property of a round. Hence, from a high-level perspective, the alpha of consensus can be seen as successive (consistent) calls to adopt-commit objects (see [2] or [6,Fig.5]). Our notion of racing, introduced in Section 3.3, aims at further abstracting how processes iteratively access such objects.…”
Section: Related Workmentioning
confidence: 99%
“…We base our construction on two novel abstractions: a grafarius and a racing. A grafarius is close to the more common notion of ratifier, or adopt-commit object [2,13]. A racing object encapsulates the behavior of algorithms that repeatedly access new objects to progress.…”
Section: Introductionmentioning
confidence: 99%