2001
DOI: 10.1007/3-540-45414-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Stable Leader Election

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
111
0
2

Year Published

2005
2005
2012
2012

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 94 publications
(113 citation statements)
references
References 11 publications
0
111
0
2
Order By: Relevance
“…Here, the privacy-preserving transformation is simply a mean of its inputs (raw data from sources) and we can see that this particular transformation satisfies Equation (1). What is significant, is that Equation (1) establishes a relationship between the transformed value, and obfuscated raw data from sources.…”
Section: Preliminariesmentioning
confidence: 97%
See 1 more Smart Citation
“…Here, the privacy-preserving transformation is simply a mean of its inputs (raw data from sources) and we can see that this particular transformation satisfies Equation (1). What is significant, is that Equation (1) establishes a relationship between the transformed value, and obfuscated raw data from sources.…”
Section: Preliminariesmentioning
confidence: 97%
“…For secure communication among sources, a group key will need to be established [12]. To reliably elect a leader, a communication-efficient stable leader election protocol can be used [1].…”
Section: Protocol Detailsmentioning
confidence: 99%
“…Most leader election algorithms are, however, oblivious to the application needs and elect a leader based on its id, e.g., the highest id in the alive-set of each process [9], or the next id when incrementing a counter [1,5]. In fact, leader election has been proposed as a service for multiple applications at the same time [9,18].…”
Section: Related Workmentioning
confidence: 99%
“…Many existing leader election algorithms rely on the identifiers of servers to select a leader [1,9,11]. While designing ZooKeeper, however, one initial requirement regarding leader election was the ability to elect the server with the longest history of state updates among a quorum of servers.…”
Section: Introductionmentioning
confidence: 99%
“…It has long been held that failure detectors encapsulate partial synchrony. More precisely, a failure detector D encapsulates a partially synchronous system model M if and only if the following two conditions hold: (1) every problem solvable in an asynchronous system augmented with D is also solvable in system model M, and (2) every problem solvable in system model M is also solvable in an asynchronous system augmented with D. As such, if D encapsulates M, then D is substitutable for M because any problem solvable in M is also solvable in asynchrony augmented with D. Alternatively (and informally), the notion of encapsulation by a failure detector may be viewed synonymously with the notion of mutual reducibility; that is, a failure detector D encapsulates a system model M if and only if (1) there exists an algorithm that implements D in system model M, and (2) there exists an asynchronous algorithm that queries D and implements a 'virtual' system that satisfies the properties of M.…”
Section: Introductionmentioning
confidence: 99%