DOI: 10.1007/978-3-540-69733-6_48
|View full text |Cite
|
Sign up to set email alerts
|

The Iterated Restricted Immediate Snapshot Model

Abstract: Abstract:In the Iterated Immediate Snapshot model (IIS ) the memory consists of a sequence of one-shot Immediate Snapshot (IS ) objects. Each IS object can be accessed with an operation that atomically writes a value and returns a snapshot of its contents. Each process can access each IS object at most once. Processes access the sequence of IS objects, one-by-one, asynchronously, in a wait-free manner; any number of processes can crash. It has been shown by Borowsky and Gafni and others that this model is very… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
1

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 31 publications
(33 citation statements)
references
References 37 publications
0
32
1
Order By: Relevance
“…In this model, set agreement and consensus are impossible. Rajsbaum et al [23,24] propose a family of models called IRIS that are weaker than the IIS model. This family is parameterized by a property PR C on the snapshot values that a process can obtain in a round.…”
Section: Related Workmentioning
confidence: 99%
“…In this model, set agreement and consensus are impossible. Rajsbaum et al [23,24] propose a family of models called IRIS that are weaker than the IIS model. This family is parameterized by a property PR C on the snapshot values that a process can obtain in a round.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, fairness guarantees may be preserved despite processes sending at most one message (instead of an arbitrary but finite number of messages) per step. [16], and other parametric oracles like the ones in [34,38,42]). If it turns out that all oracles that output process ids do encapsulate fairness, then such a result provides us with a clean hierarchy of fairness-based system models that mirrors the extended Chandra-Toueg hierarchy.…”
Section: Discussionmentioning
confidence: 99%
“…The notion of 'capturing the power' of a failure detector is explored in [37,38] for shared-memory systems. The focus of [37,38] is on failure detectors with limited scope accuracy [42]; limited scope accuracy is a version of weak accuracy wherein a correct process need not be trusted by all other processes but only by a subset of the processes that are ostensibly 'near' the correct process.…”
Section: Weakest Models For Failure Detectors In Shared Memorymentioning
confidence: 99%
“…Suppose Weakest Failure Detectors and Partial Synchrony. Failure detectors are often viewed as distributed objects that encode information about the temporal constraints on computation and communication necessary for their implementation; the popular perception is that several failure detectors are substitutable for partial synchrony in distributed systems [19,21,20]. Therefore, if a failure detector D is the weakest to solve a problem P , then a natural question follows: is the synchronism encoded in the outputs of D the minimal synchronism necessary to solve P in a crashprone partially synchronous system?…”
Section: Background and Motivationmentioning
confidence: 99%