2017
DOI: 10.1007/s00446-017-0301-7
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous obstruction-free (n, k)-set agreement with $$n-k+1$$ n - k + 1 atomic read/write registers

Abstract: The k-set agreement problem is a generalization of the consensus problem. Namely, assuming each process proposes a value, each non-faulty process has to decide a value such that each decided value was proposed, and no more than k different values are decided. This is a hard problem in the sense that it cannot be solved in asynchronous systems as soon as k or more processes may crash. One way to circumvent this impossibility consists in weakening its termination property, requiring that a process terminates (de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 25 publications
(20 citation statements)
references
References 42 publications
0
20
0
Order By: Relevance
“…last1i ← (cti = n); (4) release(idi); % realizes an implicit broadcast of cti % (5) if (last1i) (6) then for each x ∈ {1, · · · , m} do SM i[x] ← DESA(x) end for % the permutation for pi is: ∀ y ∈ {1, · · · , m}: map i (y) = y % .BIT still contains its initial value 0, ensures that when the last process (say p k ) that entered the second critical section exits it, it knows that all the processes have computed their mapping function, and no process that executes the "repeat" loop of line 16 can exit it.…”
Section: Proof Of the Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…last1i ← (cti = n); (4) release(idi); % realizes an implicit broadcast of cti % (5) if (last1i) (6) then for each x ∈ {1, · · · , m} do SM i[x] ← DESA(x) end for % the permutation for pi is: ∀ y ∈ {1, · · · , m}: map i (y) = y % .BIT still contains its initial value 0, ensures that when the last process (say p k ) that entered the second critical section exits it, it knows that all the processes have computed their mapping function, and no process that executes the "repeat" loop of line 16 can exit it.…”
Section: Proof Of the Algorithmmentioning
confidence: 99%
“…Anonymous memory. While the notion of process anonymity has been studied for a long time from an algorithmic and computability point of view, both in message-passing systems (e.g., [2,5,21]) and shared memory systems (e.g., [4,6,11]), the notion of memory anonymity has been introduced only very recently in [20]. (See [18] for an introductory survey on process and memory anonymity).…”
Section: Introductionmentioning
confidence: 99%
“…Memory anonymity. While the notion of process anonymity has been studied for a long time from an algorithmic and computability point of view, both in message-passing systems (e.g., [1,4,17]) and shared memory systems (e.g., [3,5,8]), the notion of memory anonymity has been introduced only very recently by [15]. (See also [11] for an introductory survey on process and memory anonymity.…”
Section: Anonymous Memorymentioning
confidence: 99%
“…There are algorithms that solve n-consensus using n registers [AH90, BRS15,Zhu15]. This is tight by the recent result of [EGZ18], which shows a lower bound of n registers for binary consensus among n processes and, hence, for n-consensus.…”
Section: Our Resultsmentioning
confidence: 97%