On the road to the weakest failure detector for k -set agreement in message-passing systems
In the k -set agreement problem, each process (in a set of n processes) proposes a value and has to decide a proposed value in such a way that at most k different values are decided. While this problem can easily be solved in asynchronous systems prone to t process crashes when k > t , it cannot...
Saved in:
| Published in | Theoretical computer science Vol. 412; no. 33; pp. 4273 - 4284 |
|---|---|
| Main Authors | , |
| Format | Journal Article Conference Proceeding |
| Language | English |
| Published |
Oxford
Elsevier B.V
29.07.2011
Elsevier |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0304-3975 1879-2294 |
| DOI | 10.1016/j.tcs.2010.11.007 |
Cover
| Abstract | In the
k
-set agreement problem, each process (in a set of
n
processes) proposes a value and has to decide a proposed value in such a way that at most
k
different values are decided. While this problem can easily be solved in asynchronous systems prone to
t
process crashes when
k
>
t
, it cannot be solved when
k
≤
t
. For several years, the failure-detector-based approach has been investigated to circumvent this impossibility. While the weakest failure detector class to solve the
k
-set agreement problem in read/write shared memory systems has recently been discovered (PODC 2009), the situation is different in message-passing systems where the weakest failure detector classes are known only for the extreme cases
k
=
1
(consensus) and
k
=
n
−
1
(set agreement).
This paper presents four contributions whose aim is to help pave the way to discover the weakest failure detector class for
k
-set agreement in message-passing systems. These contributions are the following. (a) The first is a new failure detector class, denoted
Π
k
, that is such that
Π
1
=
Σ
×
Ω
(the weakest class for
k
=
1
), and
Π
n
−
1
=
L
(the weakest class for
k
=
n
−
1
). (b) The second is an investigation of the structure of
Π
k
that shows that
Π
k
is the combination of two failure detector classes
Σ
k
(that is new) and
Ω
k
(they generalize the previous “quorums” and “eventual leaders” failure detector classes, respectively). (c) The third contribution concerns
Σ
k
that is shown to be a necessary requirement (as far as information on failure is concerned) to solve the
k
-set agreement problem in message-passing systems. (d) Finally, the last contribution is a
Π
n
−
1
-based algorithm that solves the
(
n
−
1
)
-set agreement problem. This algorithm provides us with a new algorithmic insight on the way the
(
n
−
1
)
-set agreement problem can be solved in asynchronous message-passing systems. It is hoped that these contributions will help discover the weakest failure detector class for
k
-set agreement in message-passing systems. |
|---|---|
| AbstractList | In the k -set agreement problem, each process (in a set of n processes) proposes a value and has to decide a proposed value in such a way that at most k different values are decided. While this problem can easily be solved in asynchronous systems prone to t process crashes when k > t , it cannot be solved when k less than or equal to t . For several years, the failure-detector-based approach has been investigated to circumvent this impossibility. While the weakest failure detector class to solve the k -set agreement problem in read/write shared memory systems has recently been discovered (PODC 2009), the situation is different in message-passing systems where the weakest failure detector classes are known only for the extreme cases k = 1 (consensus) and k = n - 1 (set agreement). This paper presents four contributions whose aim is to help pave the way to discover the weakest failure detector class for k -set agreement in message-passing systems. These contributions are the following. (a) The first is a new failure detector class, denoted capital pi k , that is such that capital pi 1 = capital sigma Omega (the weakest class for k = 1 ), and capital pi n - 1 = L (the weakest class for k = n - 1 ). (b) The second is an investigation of the structure of capital pi k that shows that capital pi k is the combination of two failure detector classes capital sigma k (that is new) and Omega k (they generalize the previous "quorums" and "eventual leaders" failure detector classes, respectively). (c) The third contribution concerns capital sigma k that is shown to be a necessary requirement (as far as information on failure is concerned) to solve the k -set agreement problem in message-passing systems. (d) Finally, the last contribution is a capital pi n - 1 -based algorithm that solves the ( n - 1 ) -set agreement problem. This algorithm provides us with a new algorithmic insight on the way the ( n - 1 ) -set agreement problem can be solved in asynchronous message-passing systems. It is hoped that these contributions will help discover the weakest failure detector class for k -set agreement in message-passing systems. In the k -set agreement problem, each process (in a set of n processes) proposes a value and has to decide a proposed value in such a way that at most k different values are decided. While this problem can easily be solved in asynchronous systems prone to t process crashes when k > t , it cannot be solved when k ≤ t . For several years, the failure-detector-based approach has been investigated to circumvent this impossibility. While the weakest failure detector class to solve the k -set agreement problem in read/write shared memory systems has recently been discovered (PODC 2009), the situation is different in message-passing systems where the weakest failure detector classes are known only for the extreme cases k = 1 (consensus) and k = n − 1 (set agreement). This paper presents four contributions whose aim is to help pave the way to discover the weakest failure detector class for k -set agreement in message-passing systems. These contributions are the following. (a) The first is a new failure detector class, denoted Π k , that is such that Π 1 = Σ × Ω (the weakest class for k = 1 ), and Π n − 1 = L (the weakest class for k = n − 1 ). (b) The second is an investigation of the structure of Π k that shows that Π k is the combination of two failure detector classes Σ k (that is new) and Ω k (they generalize the previous “quorums” and “eventual leaders” failure detector classes, respectively). (c) The third contribution concerns Σ k that is shown to be a necessary requirement (as far as information on failure is concerned) to solve the k -set agreement problem in message-passing systems. (d) Finally, the last contribution is a Π n − 1 -based algorithm that solves the ( n − 1 ) -set agreement problem. This algorithm provides us with a new algorithmic insight on the way the ( n − 1 ) -set agreement problem can be solved in asynchronous message-passing systems. It is hoped that these contributions will help discover the weakest failure detector class for k -set agreement in message-passing systems. |
| Author | Bonnet, François Raynal, Michel |
| Author_xml | – sequence: 1 givenname: François surname: Bonnet fullname: Bonnet, François email: Francois.Bonnet@irisa.fr – sequence: 2 givenname: Michel surname: Raynal fullname: Raynal, Michel email: Michel.Raynal@irisa.fr, raynal@irisa.fr |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=24400976$$DView record in Pascal Francis https://inria.hal.science/hal-00649311$$DView record in HAL |
| BookMark | eNp9kc1u3CAUhVGVSp2kfYDu2FRqF55cDDa2uoqitqk0UjbtqgtE8PWEiQ1TLpMob1_cibLIIkiIv-_A5ZxTdhJiQMY-ClgLEO35bp0drWtY1mINoN-wleh0X9V1r07YCiSoSva6ecdOiXZQWqPbFftzHXi-RZ6iHXiO_-cPaO-QMh-tnw4J-YAZXY6Jj6Xf8Yowc7tNiDOGzH3gMxLZLVZ7S-TDltMjZZzpPXs72onww9N4xn5___br8qraXP_4eXmxqZzsVa5ueonYIYKSqtVSWXQ4gBICb2wLrulQOZSDbjoxjm05bVSHooa2s3UtFcoz9uV4762dzD752aZHE603Vxcbs-wBtKqXQtyLwn4-svsU_x7KL83syeE02YDxQEa0WkgNpZKCfnpCLTk7jckG5-n5gVopgF4vnDhyLkWihOMzIsAs4ZidKeGYJRwjRKlGF41-oXE-2-xjyKm4_qry61GJxdF7j8mQ8xiKZT6VlMwQ_Svqf3n3qn0 |
| CODEN | TCSCDI |
| CitedBy_id | crossref_primary_10_1016_j_tcs_2018_02_019 crossref_primary_10_1093_comjnl_bxy041 crossref_primary_10_1109_TPDS_2013_77 |
| Cites_doi | 10.1137/S0097539796307698 10.1145/234533.234549 10.1145/226643.226647 10.1007/s00446-007-0043-z 10.1145/331524.331529 10.1145/167088.167119 10.1145/355483.355489 10.1145/1734213.1734216 10.1007/s00446-008-0064-2 10.1016/S0304-3975(97)00303-4 10.1006/inco.1993.1043 10.1007/s00446-005-0141-8 |
| ContentType | Journal Article Conference Proceeding |
| Copyright | 2010 Elsevier B.V. 2015 INIST-CNRS Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: 2010 Elsevier B.V. – notice: 2015 INIST-CNRS – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | 6I. AAFTH AAYXX CITATION IQODW 7SC 8FD JQ2 L7M L~C L~D 1XC |
| DOI | 10.1016/j.tcs.2010.11.007 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Pascal-Francis Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Mathematics Computer Science Applied Sciences |
| EISSN | 1879-2294 |
| EndPage | 4284 |
| ExternalDocumentID | oai:HAL:hal-00649311v1 24400976 10_1016_j_tcs_2010_11_007 S0304397510006183 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 123 1B1 1RT 1~. 1~5 29Q 4.4 457 4G. 5VS 6I. 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABAOU ABBOA ABEFU ABFNM ABJNI ABMAC ABTAH ABVKL ABXDB ABYKQ ACAZW ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADMUD AEBSH AEKER AENEX AEXQZ AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ARUGR ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q G8K GBLVA GBOLZ HVGLF HZ~ IHE IXB J1W KOM LG9 M26 M41 MHUIS MO0 N9A NCXOZ O-L O9- OAUVE OK1 OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SCC SDF SDG SES SEW SPC SPCBC SSV SSW SSZ T5K TAE TN5 WH7 WUQ XJT YNT ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO ADVLN AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD ABPIF ABPTK IQODW 7SC 8FD JQ2 L7M L~C L~D 1XC |
| ID | FETCH-LOGICAL-c394t-b93ee8ee04346734aeced0411eba60c58e4ce3d7581ff6aec548e12068a2234e3 |
| IEDL.DBID | .~1 |
| ISSN | 0304-3975 |
| IngestDate | Tue Oct 14 20:40:56 EDT 2025 Sun Sep 28 10:49:08 EDT 2025 Sun Oct 22 16:03:30 EDT 2023 Wed Oct 01 03:58:12 EDT 2025 Thu Apr 24 23:09:24 EDT 2025 Fri Feb 23 02:16:38 EST 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 33 |
| Keywords | Message-passing systems Failure detectors Reduction Quorums k -set agreement Asynchronous systems Eventual leaders Wait-freedom Computer theory Algorithmics Algorithm Failures Consensus Message passing k-set agreement Shared memory systems Failure |
| Language | English |
| License | http://www.elsevier.com/open-access/userlicense/1.0 CC BY 4.0 Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MeetingName | Stabilization, Safety, and Security of Distributed Systems (SSS 2009) |
| MergedId | FETCHMERGED-LOGICAL-c394t-b93ee8ee04346734aeced0411eba60c58e4ce3d7581ff6aec548e12068a2234e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S0304397510006183 |
| PQID | 1671370346 |
| PQPubID | 23500 |
| PageCount | 12 |
| ParticipantIDs | hal_primary_oai_HAL_hal_00649311v1 proquest_miscellaneous_1671370346 pascalfrancis_primary_24400976 crossref_primary_10_1016_j_tcs_2010_11_007 crossref_citationtrail_10_1016_j_tcs_2010_11_007 elsevier_sciencedirect_doi_10_1016_j_tcs_2010_11_007 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2011-07-29 |
| PublicationDateYYYYMMDD | 2011-07-29 |
| PublicationDate_xml | – month: 07 year: 2011 text: 2011-07-29 day: 29 |
| PublicationDecade | 2010 |
| PublicationPlace | Oxford |
| PublicationPlace_xml | – name: Oxford |
| PublicationTitle | Theoretical computer science |
| PublicationYear | 2011 |
| Publisher | Elsevier B.V Elsevier |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier |
| References | M. Raynal Raynal, Travers (br000125) 2006; vol. #4305 Saks, Zaharoglou (br000140) 2000; 29 Chen, Zhang, Chen, Liu (br000040) 2007; vol. #4731 resilient asynchronous computations, in: Proc. 25th ACM Symposium on Theory of Computation, STOC’93, San Diego, CA, 1993, pp. 91–100. Herlihy, Shavit (br000090) 1999; 46 Zielinski (br000145) 2008 Mostéfaoui, Raynal (br000115) 2001 Mostéfaoui, Rajsbaum, Raynal, Travers (br000105) 2008; 21 Neiger (br000120) 1995 Delporte-Gallet, Fauconnier, Guerraoui (br000050) 2010; 57 Delporte-Gallet, Fauconnier, Guerraoui, Hadzilacos, Kouznetsov, Toueg (br000055) 2004 Mostéfaoui, Raynal (br000110) 2000 Fernandez Anta, Rajsbaum, Travers (br000070) 2009 Lo, Hadzilacos (br000095) 1994; vol. #857 Bouzid, Travers (br000015) 2010; vol. #6490 Raynal, Travers (br000130) 2006 Chandra, Hadzilacos, Toueg (br000025) 1996; 43 Manabe, Baldoni, Raynal, Aoyagia (br000100) 1998; 193 Delporte-Gallet, Fauconnier, Guerraoui (br000045) 2008 Guerraoui, Kouznetsov (br000080) 2008; 20 Delporte-Gallet, Fauconnier, Guerraoui, Tielmann (br000065) 2009; vol. #5805 Herlihy, Penso (br000085) 2005; 18 Afek, Gafni, Rajsbaum, Raynal, Travers (br000005) 2006; vol. #4308 Chaudhuri, Herlihy, Lynch, Tuttle (br000035) 2000; 47 Chandra, Toueg (br000020) 1996; 43 Chaudhuri (br000030) 1993; 105 Gafni, Kuznetzov (br000075) 2009 E. Borowsky, E. Gafni, Generalized FLP impossibility results for Delporte-Gallet, Fauconnier, Guerraoui, Tielmann (br000060) 2008; vol. #5218 anti-Omega, in: Rump Session at 26th ACM Symposium on Principles of Distributed Computing, PODC’07, 2007. Herlihy (10.1016/j.tcs.2010.11.007_br000085) 2005; 18 Mostéfaoui (10.1016/j.tcs.2010.11.007_br000110) 2000 Guerraoui (10.1016/j.tcs.2010.11.007_br000080) 2008; 20 Chandra (10.1016/j.tcs.2010.11.007_br000020) 1996; 43 Delporte-Gallet (10.1016/j.tcs.2010.11.007_br000060) 2008; vol. #5218 Zielinski (10.1016/j.tcs.2010.11.007_br000145) 2008 Bouzid (10.1016/j.tcs.2010.11.007_br000015) 2010; vol. #6490 Gafni (10.1016/j.tcs.2010.11.007_br000075) 2009 Lo (10.1016/j.tcs.2010.11.007_br000095) 1994; vol. #857 Fernandez Anta (10.1016/j.tcs.2010.11.007_br000070) 2009 Delporte-Gallet (10.1016/j.tcs.2010.11.007_br000045) 2008 Chandra (10.1016/j.tcs.2010.11.007_br000025) 1996; 43 Chen (10.1016/j.tcs.2010.11.007_br000040) 2007; vol. #4731 Herlihy (10.1016/j.tcs.2010.11.007_br000090) 1999; 46 10.1016/j.tcs.2010.11.007_br000010 Chaudhuri (10.1016/j.tcs.2010.11.007_br000035) 2000; 47 Raynal (10.1016/j.tcs.2010.11.007_br000125) 2006; vol. #4305 10.1016/j.tcs.2010.11.007_br000135 Delporte-Gallet (10.1016/j.tcs.2010.11.007_br000050) 2010; 57 Neiger (10.1016/j.tcs.2010.11.007_br000120) 1995 Manabe (10.1016/j.tcs.2010.11.007_br000100) 1998; 193 Delporte-Gallet (10.1016/j.tcs.2010.11.007_br000055) 2004 Afek (10.1016/j.tcs.2010.11.007_br000005) 2006; vol. #4308 Delporte-Gallet (10.1016/j.tcs.2010.11.007_br000065) 2009; vol. #5805 Mostéfaoui (10.1016/j.tcs.2010.11.007_br000105) 2008; 21 Mostéfaoui (10.1016/j.tcs.2010.11.007_br000115) 2001 Chaudhuri (10.1016/j.tcs.2010.11.007_br000030) 1993; 105 Saks (10.1016/j.tcs.2010.11.007_br000140) 2000; 29 Raynal (10.1016/j.tcs.2010.11.007_br000130) 2006 |
| References_xml | – start-page: 55 year: 2008 end-page: 64 ident: br000145 article-title: Anti-omega: the weakest failure detector for set agreement publication-title: Proc. 27th ACM Symposium on Principles of Distributed Computing, PODC’08 – start-page: 83 year: 2009 end-page: 91 ident: br000075 article-title: The weakest failure detector for solving publication-title: Proc. 28th ACM Symposium on Principles of Distributed Computing, PODC’09 – reference: M. Raynal, – volume: vol. #4731 start-page: 123 year: 2007 end-page: 138 ident: br000040 article-title: Weakening failure detectors for publication-title: Proc. 21th Int’l Symposium on Distributed Computing, DISC’07 – volume: 21 start-page: 201 year: 2008 end-page: 222 ident: br000105 article-title: On the computability power and the robustness of set agreement-oriented failure detector classes publication-title: Distributed Computing – start-page: 267 year: 2006 end-page: 274 ident: br000130 article-title: Synchronous set agreement: a concise guided tour (including a new algorithm and a list of open problems) publication-title: Proc. 12th IEEE Pacific Rim Int’l Symposium on Dependable Computing, PRDC’06 – volume: 20 start-page: 343 year: 2008 end-page: 358 ident: br000080 article-title: Failure detectors as types boosters publication-title: Distributed Computing – volume: 57 year: 2010 ident: br000050 article-title: Tight failure detection bounds on atomic object implementations publication-title: Journal of the ACM – start-page: 143 year: 2000 end-page: 152 ident: br000110 publication-title: Proc. 19th ACM Symposium on Principles of Distributed Computing, PODC’00 – start-page: 100 year: 1995 end-page: 109 ident: br000120 article-title: Failure detectors and the wait-free hierarchy publication-title: 14th ACM Symposium on Principles of Distributed Computing, PODC’95 – reference: E. Borowsky, E. Gafni, Generalized FLP impossibility results for – volume: 46 start-page: 858 year: 1999 end-page: 923 ident: br000090 article-title: The topological structure of asynchronous computability publication-title: Journal of the ACM – start-page: 290 year: 2009 end-page: 291 ident: br000070 article-title: Weakest failure detectors with an edge-laying simulation publication-title: BA in Proc. 28th ACM Symposium on Principles of Distributed Computing, PODC’09 – volume: vol. #5805 start-page: 8 year: 2009 end-page: 21 ident: br000065 article-title: The disagreement power of an adversary publication-title: Proc. 23th Int’l Symposium on Distributed Computing, DISC’09 – start-page: 85 year: 2008 end-page: 94 ident: br000045 article-title: Sharing is harder than agreeing publication-title: Proc. 27th ACM Symposium on Principles of Distributed Computing, PODC’08 – start-page: 338 year: 2004 end-page: 346 ident: br000055 article-title: The weakest failure detectors to solve certain fundamental problems in distributed computing publication-title: Proc. 23th ACM Symposium on Principles of Distributed Computing, PODC’04 – volume: vol. #5218 start-page: 109 year: 2008 end-page: 120 ident: br000060 article-title: The weakest failure detector for message passing set-agreement publication-title: Proc. 22th Int’l Symposium on Distributed Computing, DISC’08 – volume: 105 start-page: 132 year: 1993 end-page: 158 ident: br000030 article-title: More publication-title: Information and Computation – reference: -resilient asynchronous computations, in: Proc. 25th ACM Symposium on Theory of Computation, STOC’93, San Diego, CA, 1993, pp. 91–100. – volume: vol. #857 start-page: 280 year: 1994 end-page: 295 ident: br000095 article-title: Using failure detectors to solve consensus in asynchronous shared-memory systems publication-title: Proc. 8th Int’l Workshop on Distributed Algorithms, WDAG’94, now DISC – volume: 29 start-page: 1449 year: 2000 end-page: 1483 ident: br000140 article-title: Wait-free publication-title: SIAM Journal on Computing – volume: vol. #4305 start-page: 1 year: 2006 end-page: 17 ident: br000125 article-title: In search of the Holy Grail: looking for the weakest failure detector for wait-free set agreement publication-title: Proc. 10th Int’l Conference On Principles Of Distributed Systems, OPODIS’06 – volume: 47 start-page: 912 year: 2000 end-page: 943 ident: br000035 article-title: Tight bounds for publication-title: Journal of the ACM – start-page: 291 year: 2001 end-page: 297 ident: br000115 article-title: Randomized set agreement publication-title: Proc. 13th ACM Symposium on Parallel Algorithms and Architectures, SPAA’01 – volume: 43 start-page: 685 year: 1996 end-page: 722 ident: br000025 article-title: The weakest failure detector for solving consensus publication-title: Journal of the ACM – volume: vol. #6490 start-page: 190 year: 2010 end-page: 205 ident: br000015 article-title: (Anti- publication-title: Proc. 12th Int’l Conference on Principles of Distributed Systems, OPODIS’10 – volume: 18 start-page: 157 year: 2005 end-page: 166 ident: br000085 article-title: Tight bounds for publication-title: Distributed Computing – volume: vol. #4308 start-page: 331 year: 2006 end-page: 341 ident: br000005 article-title: Simultaneous consensus tasks: a tighter characterization of set consensus publication-title: Proc. 8th Int’l Conference on Distributed Computing and Networking, ICDCN’06 – reference: -anti-Omega, in: Rump Session at 26th ACM Symposium on Principles of Distributed Computing, PODC’07, 2007. – volume: 43 start-page: 225 year: 1996 end-page: 267 ident: br000020 article-title: Unreliable failure detectors for reliable distributed systems publication-title: Journal of the ACM – volume: 193 start-page: 97 year: 1998 end-page: 112 ident: br000100 publication-title: Theoretical Computer Science – volume: vol. #4308 start-page: 331 year: 2006 ident: 10.1016/j.tcs.2010.11.007_br000005 article-title: Simultaneous consensus tasks: a tighter characterization of set consensus – start-page: 290 year: 2009 ident: 10.1016/j.tcs.2010.11.007_br000070 article-title: Weakest failure detectors with an edge-laying simulation – volume: vol. #6490 start-page: 190 year: 2010 ident: 10.1016/j.tcs.2010.11.007_br000015 article-title: (Anti-Ωk×Σk)-based k-set agreement algorithms – volume: 29 start-page: 1449 issue: 5 year: 2000 ident: 10.1016/j.tcs.2010.11.007_br000140 article-title: Wait-free k-set agreement is impossible: the topology of public knowledge publication-title: SIAM Journal on Computing doi: 10.1137/S0097539796307698 – volume: 43 start-page: 685 issue: 4 year: 1996 ident: 10.1016/j.tcs.2010.11.007_br000025 article-title: The weakest failure detector for solving consensus publication-title: Journal of the ACM doi: 10.1145/234533.234549 – volume: vol. #5218 start-page: 109 year: 2008 ident: 10.1016/j.tcs.2010.11.007_br000060 article-title: The weakest failure detector for message passing set-agreement – start-page: 100 year: 1995 ident: 10.1016/j.tcs.2010.11.007_br000120 article-title: Failure detectors and the wait-free hierarchy – volume: vol. #4305 start-page: 1 year: 2006 ident: 10.1016/j.tcs.2010.11.007_br000125 article-title: In search of the Holy Grail: looking for the weakest failure detector for wait-free set agreement – volume: 43 start-page: 225 issue: 2 year: 1996 ident: 10.1016/j.tcs.2010.11.007_br000020 article-title: Unreliable failure detectors for reliable distributed systems publication-title: Journal of the ACM doi: 10.1145/226643.226647 – volume: 20 start-page: 343 year: 2008 ident: 10.1016/j.tcs.2010.11.007_br000080 article-title: Failure detectors as types boosters publication-title: Distributed Computing doi: 10.1007/s00446-007-0043-z – volume: 46 start-page: 858 issue: 6 year: 1999 ident: 10.1016/j.tcs.2010.11.007_br000090 article-title: The topological structure of asynchronous computability publication-title: Journal of the ACM doi: 10.1145/331524.331529 – volume: vol. #857 start-page: 280 year: 1994 ident: 10.1016/j.tcs.2010.11.007_br000095 article-title: Using failure detectors to solve consensus in asynchronous shared-memory systems – ident: 10.1016/j.tcs.2010.11.007_br000010 doi: 10.1145/167088.167119 – start-page: 291 year: 2001 ident: 10.1016/j.tcs.2010.11.007_br000115 article-title: Randomized set agreement – volume: vol. #4731 start-page: 123 year: 2007 ident: 10.1016/j.tcs.2010.11.007_br000040 article-title: Weakening failure detectors for k-set agreement via the partition approach – volume: 47 start-page: 912 issue: 5 year: 2000 ident: 10.1016/j.tcs.2010.11.007_br000035 article-title: Tight bounds for k-set agreement publication-title: Journal of the ACM doi: 10.1145/355483.355489 – volume: 57 issue: 4 year: 2010 ident: 10.1016/j.tcs.2010.11.007_br000050 article-title: Tight failure detection bounds on atomic object implementations publication-title: Journal of the ACM doi: 10.1145/1734213.1734216 – volume: 21 start-page: 201 issue: 3 year: 2008 ident: 10.1016/j.tcs.2010.11.007_br000105 article-title: On the computability power and the robustness of set agreement-oriented failure detector classes publication-title: Distributed Computing doi: 10.1007/s00446-008-0064-2 – ident: 10.1016/j.tcs.2010.11.007_br000135 – start-page: 83 year: 2009 ident: 10.1016/j.tcs.2010.11.007_br000075 article-title: The weakest failure detector for solving k-set agreeemnt – volume: vol. #5805 start-page: 8 year: 2009 ident: 10.1016/j.tcs.2010.11.007_br000065 article-title: The disagreement power of an adversary – volume: 193 start-page: 97 issue: 1–2 year: 1998 ident: 10.1016/j.tcs.2010.11.007_br000100 article-title: k-arbiter: a aafe and general scheme for h-out of-k mutual exclusion publication-title: Theoretical Computer Science doi: 10.1016/S0304-3975(97)00303-4 – start-page: 85 year: 2008 ident: 10.1016/j.tcs.2010.11.007_br000045 article-title: Sharing is harder than agreeing – start-page: 267 year: 2006 ident: 10.1016/j.tcs.2010.11.007_br000130 article-title: Synchronous set agreement: a concise guided tour (including a new algorithm and a list of open problems) – volume: 105 start-page: 132 year: 1993 ident: 10.1016/j.tcs.2010.11.007_br000030 article-title: More choices allow more faults: set consensus problems in totally asynchronous systems publication-title: Information and Computation doi: 10.1006/inco.1993.1043 – start-page: 143 year: 2000 ident: 10.1016/j.tcs.2010.11.007_br000110 article-title: k-set agreement with limited accuracy failure detectors – start-page: 338 year: 2004 ident: 10.1016/j.tcs.2010.11.007_br000055 article-title: The weakest failure detectors to solve certain fundamental problems in distributed computing – volume: 18 start-page: 157 issue: 2 year: 2005 ident: 10.1016/j.tcs.2010.11.007_br000085 article-title: Tight bounds for k-set agreement with limited scope accuracy failure detectors publication-title: Distributed Computing doi: 10.1007/s00446-005-0141-8 – start-page: 55 year: 2008 ident: 10.1016/j.tcs.2010.11.007_br000145 article-title: Anti-omega: the weakest failure detector for set agreement |
| SSID | ssj0000576 |
| Score | 2.019784 |
| Snippet | In the
k
-set agreement problem, each process (in a set of
n
processes) proposes a value and has to decide a proposed value in such a way that at most
k... In the k -set agreement problem, each process (in a set of n processes) proposes a value and has to decide a proposed value in such a way that at most k... |
| SourceID | hal proquest pascalfrancis crossref elsevier |
| SourceType | Open Access Repository Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 4273 |
| SubjectTerms | [formula omitted]-set agreement Algorithmics. Computability. Computer arithmetics Algorithms Applied sciences Asynchronous systems Computer Science Computer science; control theory; systems Crashes Detectors Distributed, Parallel, and Cluster Computing Eventual leaders Exact sciences and technology Failure Failure detectors Message-passing systems Miscellaneous Quorums Reduction Roads Theoretical computing Wait-freedom |
| Title | On the road to the weakest failure detector for k -set agreement in message-passing systems |
| URI | https://dx.doi.org/10.1016/j.tcs.2010.11.007 https://www.proquest.com/docview/1671370346 https://inria.hal.science/hal-00649311 |
| Volume | 412 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1879-2294 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000576 issn: 0304-3975 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier Free Content customDbUrl: eissn: 1879-2294 dateEnd: 20211101 omitProxy: true ssIdentifier: ssj0000576 issn: 0304-3975 databaseCode: IXB dateStart: 19750601 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier Science Direct Journals customDbUrl: eissn: 1879-2294 dateEnd: 20211012 omitProxy: true ssIdentifier: ssj0000576 issn: 0304-3975 databaseCode: ACRLP dateStart: 19950109 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect customDbUrl: eissn: 1879-2294 dateEnd: 20211012 omitProxy: true ssIdentifier: ssj0000576 issn: 0304-3975 databaseCode: AIKHN dateStart: 19950109 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) customDbUrl: eissn: 1879-2294 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000576 issn: 0304-3975 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1879-2294 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000576 issn: 0304-3975 databaseCode: AKRWK dateStart: 19750601 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LTtwwcAT0Aqra8lK3j5WLOFUKG8eOszkuqGiBAgeKtBIHy0kmsNBmVyS0t347M3lshVpx6C127MSaseftGYBdmZO6RpzVCzk4TBvpPJeQIBfEzig_DiIT8m3k0zMzvtTHk3CyBAfdXRgOq2xpf0PTa2rd9gxaaA7m0-nggp16xE1DWfPhIWf81DriKgZ7v_-EeZA80vgr2QNAozvPZh3jVaVlE93FiTy5ouy_edPyDQdJvpy7kuCWNwUv_qLdNUM6fAOvWklSjJrFrsMSFhvwuqvSINpDuwFrp4vMrOUmXJ0XgprifuYyUc3q51_o7ugHIndTDlIXGVa1LV-QQCvuhFdiJRzp5bUlUUwL8YPrplyjR0tlU4No0kGXW3B5-OXbwdhrCyx4qYp15SWxQhwiEhyJXirtkKDuaykxccZPwyHqFFVGKoXMc0NvSb1BGfhm6Eiq0Ki2YaWYFfgWhFMpShOHIbpYOx0laPwMgwQxMFmi8x74HWht2mYf5yIY320XZnZrCRuWsUFaiSVs9ODzYsq8Sb3x3GDd4cs-2T-WWMNz03YIt4vPc67t8eir5T4W1mIl5U_Zg_4T1C-Gk2jE92BMDz51e8HS6WSXiytw9lBaaSKpiKhq8-7_FvgeVhsrdkTH5wOsVPcP-JHEoCrp1_u8Dy9GRyfjM2odTfYfAbboBp8 |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED914wEmNGAwUTaGQTwhZY1jx2kep4mpQDse6KRJPFhOcmHdIK2WbHvjb99dPooqUB94y4edWHf23e985zuA9zInc400qxdycJg20nkuISAXxM4oPw4iE_Jp5MmpGZ3pz-fheQ-Ou7MwHFbZyv5GptfSun0yaKk5WMxmg2_s1CNtGspaDw_VBjzQYRCxBXb4-0-cBwGSxmHJLgBq3rk26yCvKi2b8C7O5MklZf-tnDYuOEry8cKVRLi8qXjxl_CuNdLJU9huoaQ4akb7DHpY7MCTrkyDaFftDmxNlqlZy-fw_Wsh6FZcz10mqnl9fYfuin4gcjfjKHWRYVVv5gtCtOJKeCVWwpFhXm8lilkhfnHhlB_o0VB5r0E0-aDLF3B28nF6PPLaCgteqmJdeUmsEIeIREgSmEo7JLL7WkpMnPHTcIg6RZWRTSHz3NBbsm9QBr4ZOoIVGtUubBbzAl-CcCpFaeIwRBdrp6MEjZ9hkCAGJkt03ge_I61N2_TjXAXjp-3izC4tccMyN8gsscSNPnxYdlk0uTfWNdYdv-zKBLKkG9Z1e0e8XX6ek22PjsaWnzFai5WUt7IPByusXzYnbMQHYUwf3nZzwdLyZJ-LK3B-U1ppIqlIqmrz6v8G-AYejqaTsR1_Ov2yB4-aLe2I1tI-bFbXN_iaMFGVHNRz_h6LXgcw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Theoretical+computer+science&rft.atitle=On+the+road+to+the+weakest+failure+detector+for+k-set+agreement+in+message-passing+systems&rft.au=BONNET%2C+Fran%C3%A7ois&rft.au=RAYNAL%2C+Michel&rft.date=2011-07-29&rft.pub=Elsevier&rft.issn=0304-3975&rft.eissn=1879-2294&rft.volume=412&rft.issue=33&rft.spage=4273&rft.epage=4284&rft_id=info:doi/10.1016%2Fj.tcs.2010.11.007&rft.externalDBID=n%2Fa&rft.externalDocID=24400976 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0304-3975&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0304-3975&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0304-3975&client=summon |