首页 > 最新文献

Distributed Computing最新文献

英文 中文
Distributed computations in fully-defective networks 全缺陷网络中的分布式计算
4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-06-19 DOI: 10.1007/s00446-023-00452-2
Keren Censor-Hillel, Shir Cohen, Ran Gelles, Gal Sela
We address fully-defective asynchronous networks, in which all links are subject to an unlimited number of alteration errors, implying that all messages in the network may be completely corrupted. Despite the possible intuition that such a setting is too harsh for any reliable communication, we show how to simulate any algorithm for a noiseless setting over any fully-defective setting, given that the network is 2-edge connected. We prove that if the network is not 2-edge connected, no non-trivial computation in the fully-defective setting is possible. The key structural property of 2-edge-connected graphs that we leverage is the existence of an oriented (non-simple) cycle that goes through all nodes (Robbins, Am. Math. Mon., 1939). The core of our technical contribution is presenting a construction of such a Robbins cycle in fully-defective networks, and showing how to communicate over it despite total message corruption. These are obtained in a content-oblivious manner, since nodes must ignore the content of received messages.
我们解决了完全有缺陷的异步网络,其中所有链接都受到无限数量的更改错误的影响,这意味着网络中的所有消息都可能完全损坏。尽管可能直观地认为这种设置对于任何可靠的通信都过于苛刻,但我们展示了如何在任何完全有缺陷的设置上模拟无噪声设置的任何算法,假设网络是2边连接的。我们证明了如果网络不是2边连接的,在完全缺陷设置下不可能进行非平凡计算。我们利用的2边连通图的关键结构属性是存在一个经过所有节点的有向(非简单)循环(Robbins, Am。数学。星期一,1939)。我们技术贡献的核心是在完全有缺陷的网络中构造这样一个罗宾斯循环,并展示如何在完全消息损坏的情况下通过它进行通信。这些都是以内容无关的方式获得的,因为节点必须忽略接收到的消息的内容。
{"title":"Distributed computations in fully-defective networks","authors":"Keren Censor-Hillel, Shir Cohen, Ran Gelles, Gal Sela","doi":"10.1007/s00446-023-00452-2","DOIUrl":"https://doi.org/10.1007/s00446-023-00452-2","url":null,"abstract":"We address fully-defective asynchronous networks, in which all links are subject to an unlimited number of alteration errors, implying that all messages in the network may be completely corrupted. Despite the possible intuition that such a setting is too harsh for any reliable communication, we show how to simulate any algorithm for a noiseless setting over any fully-defective setting, given that the network is 2-edge connected. We prove that if the network is not 2-edge connected, no non-trivial computation in the fully-defective setting is possible. The key structural property of 2-edge-connected graphs that we leverage is the existence of an oriented (non-simple) cycle that goes through all nodes (Robbins, Am. Math. Mon., 1939). The core of our technical contribution is presenting a construction of such a Robbins cycle in fully-defective networks, and showing how to communicate over it despite total message corruption. These are obtained in a content-oblivious manner, since nodes must ignore the content of received messages.","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135336673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Four shades of deterministic leader election in anonymous networks 匿名网络中确定性领导人选举的四种阴影
4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-31 DOI: 10.1007/s00446-023-00451-3
Barun Gorain, Avery Miller, Andrzej Pelc
Leader election is one of the fundamental problems in distributed computing: a single node, called the leader, must be specified. This task can be formulated either in a weak way, where one node outputs leader and all other nodes output non-leader, or in a strong way, where all nodes must also learn which node is the leader. If the nodes of the network have distinct identifiers, then such an agreement means that all nodes have to output the identifier of the elected leader. For anonymous networks, the strong version of leader election requires that all nodes must be able to find a path to the leader, as this is the only way to identify it. In this paper, we study variants of deterministic leader election in arbitrary anonymous networks. Leader election is impossible in some anonymous networks, regardless of the allocated amount of time, even if nodes know the entire map of the network. This is due to possible symmetries in the network. However, even in networks in which it is possible to elect a leader knowing the map, the task may be still impossible without any initial knowledge, regardless of the allocated time. On the other hand, for any network in which leader election (weak or strong) is possible knowing the map, there is a minimum time, called the election index, in which this can be done. We consider four formulations of leader election discussed in the literature in the context of anonymous networks: one is the weak formulation, and the three others specify three different ways of finding the path to the leader in the strong formulation. Our aim is to compare the amount of initial information needed to accomplish each of these “four shades” of leader election in minimum time. Following the framework of algorithms with advice, this information (a single binary string) is provided to all nodes at the start by an oracle knowing the entire network. The length of this string is called the size of advice. We show that the size of advice required to accomplish leader election in the weak formulation in minimum time is exponentially smaller than that needed for any of the strong formulations. Thus, if the required amount of advice is used as a measure of the difficulty of the task, the weakest version of leader election in minimum time is drastically easier than any version of the strong formulation in minimum time.
Leader选举是分布式计算的基本问题之一:必须指定一个称为Leader的节点。这个任务可以用弱的方式来表述,其中一个节点输出领导者,所有其他节点输出非领导者,或者用强的方式来表述,其中所有节点也必须知道哪个节点是领导者。如果网络的节点具有不同的标识符,那么这样的协议意味着所有节点都必须输出选出的领导者的标识符。对于匿名网络,强版本的领导者选举要求所有节点必须能够找到通往领导者的路径,因为这是识别领导者的唯一方法。本文研究了任意匿名网络中确定性领导者选举的变体。在某些匿名网络中,无论分配多少时间,即使节点知道网络的整个地图,也不可能进行Leader选举。这是由于网络中可能存在的对称性。然而,即使在网络中有可能选出一个知道地图的领导者,在没有任何初始知识的情况下,无论分配的时间如何,任务仍然是不可能完成的。另一方面,对于任何知道地图可以选举领导人(弱或强)的网络,存在一个最小时间,称为选举指数,在这个时间内可以完成选举。我们考虑了匿名网络背景下文献中讨论的领导者选举的四种表述:一种是弱表述,另外三种是在强表述中找到领导者路径的三种不同方式。我们的目的是比较在最短时间内完成这“四种色调”的领导人选举所需的初始信息量。遵循带建议的算法框架,该信息(单个二进制字符串)由了解整个网络的oracle在开始时提供给所有节点。这个字符串的长度称为advice的大小。我们表明,在最短时间内完成弱公式中领导人选举所需的建议大小比任何强公式所需的建议大小都要小得多。因此,如果将建议的数量作为任务难度的衡量标准,那么在最短时间内选出领导人的最弱版本要比在最短时间内选出强版本容易得多。
{"title":"Four shades of deterministic leader election in anonymous networks","authors":"Barun Gorain, Avery Miller, Andrzej Pelc","doi":"10.1007/s00446-023-00451-3","DOIUrl":"https://doi.org/10.1007/s00446-023-00451-3","url":null,"abstract":"Leader election is one of the fundamental problems in distributed computing: a single node, called the leader, must be specified. This task can be formulated either in a weak way, where one node outputs leader and all other nodes output non-leader, or in a strong way, where all nodes must also learn which node is the leader. If the nodes of the network have distinct identifiers, then such an agreement means that all nodes have to output the identifier of the elected leader. For anonymous networks, the strong version of leader election requires that all nodes must be able to find a path to the leader, as this is the only way to identify it. In this paper, we study variants of deterministic leader election in arbitrary anonymous networks. Leader election is impossible in some anonymous networks, regardless of the allocated amount of time, even if nodes know the entire map of the network. This is due to possible symmetries in the network. However, even in networks in which it is possible to elect a leader knowing the map, the task may be still impossible without any initial knowledge, regardless of the allocated time. On the other hand, for any network in which leader election (weak or strong) is possible knowing the map, there is a minimum time, called the election index, in which this can be done. We consider four formulations of leader election discussed in the literature in the context of anonymous networks: one is the weak formulation, and the three others specify three different ways of finding the path to the leader in the strong formulation. Our aim is to compare the amount of initial information needed to accomplish each of these “four shades” of leader election in minimum time. Following the framework of algorithms with advice, this information (a single binary string) is provided to all nodes at the start by an oracle knowing the entire network. The length of this string is called the size of advice. We show that the size of advice required to accomplish leader election in the weak formulation in minimum time is exponentially smaller than that needed for any of the strong formulations. Thus, if the required amount of advice is used as a measure of the difficulty of the task, the weakest version of leader election in minimum time is drastically easier than any version of the strong formulation in minimum time.","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135195866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Near-optimal distributed dominating set in bounded arboricity graphs 有界树性图的近最优分布支配集
4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-15 DOI: 10.1007/s00446-023-00447-z
Michal Dory, Mohsen Ghaffari, Saeed Ilchi
Abstract We describe a simple deterministic $$O( varepsilon ^{-1} log Delta )$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:msup> <mml:mi>ε</mml:mi> <mml:mrow> <mml:mo>-</mml:mo> <mml:mn>1</mml:mn> </mml:mrow> </mml:msup> <mml:mo>log</mml:mo> <mml:mi>Δ</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> round distributed algorithm for $$(2alpha +1)(1 + varepsilon )$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mo>(</mml:mo> <mml:mn>2</mml:mn> <mml:mi>α</mml:mi> <mml:mo>+</mml:mo> <mml:mn>1</mml:mn> <mml:mo>)</mml:mo> <mml:mo>(</mml:mo> <mml:mn>1</mml:mn> <mml:mo>+</mml:mo> <mml:mi>ε</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> approximation of minimum weighted dominating set on graphs with arboricity at most $$alpha $$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mi>α</mml:mi> </mml:math> . Here $$Delta $$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mi>Δ</mml:mi> </mml:math> denotes the maximum degree. We also show a lower bound proving that this round complexity is nearly optimal even for the unweighted case, via a reduction from the celebrated KMW lower bound on distributed vertex cover approximation (Kuhn et al. in JACM 63:116, 2016). Our algorithm improves on all the previous results (that work only for unweighted graphs) including a randomized $$O(alpha ^2)$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:msup> <mml:mi>α</mml:mi> <mml:mn>2</mml:mn> </mml:msup> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> approximation in $$O(log n)$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:mo>log</mml:mo> <mml:mi>n</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> rounds (Lenzen et al. in International symposium on distributed computing, Springer, 2010), a deterministic $$O(alpha log Delta )$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:mi>α</mml:mi> <mml:mo>log</mml:mo> <mml:mi>Δ</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> approximation in $$O(log Delta )$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:mo>log</mml:mo> <mml:mi>Δ</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> rounds (Lenzen et al. in international symposium on distributed computing, Springer, 2010), a deterministic $$O(alpha )$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:mi>α</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> approximation in $$O(log ^2 Delta )$$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow> <mml:mi>O</mml:mi> <mml:mo>(</mml:mo> <mml:msup> <mml:mo>log</mml:mo> <mml:mn>2</mml:mn> </mml:msup> <mml:mi>Δ</mml:mi> <mml:mo>)</mml:mo> </mml:mrow> </mml:math> rounds (implici
摘要描述了一种简单的确定性$$O( varepsilon ^{-1} log Delta )$$ O (ε - 1 log Δ)轮分布算法,用于求解最大限为$$alpha $$ α的图上的最小加权支配集的$$(2alpha +1)(1 + varepsilon )$$ (2 α + 1) (1 + ε)逼近。其中$$Delta $$ Δ表示最大度。我们还展示了一个下界,通过减少分布式顶点覆盖近似上著名的KMW下界(Kuhn等人在JACM 63:116, 2016),证明即使在未加权的情况下,这种轮复杂度也几乎是最优的。我们的算法改进了之前的所有结果(仅适用于未加权的图),包括$$O(log n)$$ O (log n)轮的随机$$O(alpha ^2)$$ O (α 2)近似(Lenzen等人在分布式计算国际研讨会上,Springer, 2010), $$O(log Delta )$$ O (log Δ)轮的确定性$$O(alpha log Delta )$$ O (α log Δ)近似(Lenzen等人在分布式计算国际研讨会上,Springer, 2010),在$$O(log ^2 Delta )$$ O (log 2 Δ)轮中的确定性$$O(alpha )$$ O (α)近似(隐含在Bansal等人的Inform Process Lett 122:21 - 24,2017中);进行第17届离散算法研讨会(SODA), 2006年),以及$$O(alpha log n)$$ O (α log n)轮的随机$$O(alpha )$$ O (α)近似(Morgan等人在第35届国际分布式计算研讨会上,2021年)。我们还提供了一个随机的$$O(alpha log Delta )$$ O (α log Δ)轮分布算法,该算法将近似因子提高到$$alpha (1+o(1))$$ α (1 + O(1))。如果每个节点被限制进行多项式时间计算,我们的近似因子在一阶上是紧密的,因为它是NP-hard实现$$alpha - 1 - varepsilon $$ α - 1- ε近似(Bansal et al. in Inform Process Lett 122:21- 24,2017)。
{"title":"Near-optimal distributed dominating set in bounded arboricity graphs","authors":"Michal Dory, Mohsen Ghaffari, Saeed Ilchi","doi":"10.1007/s00446-023-00447-z","DOIUrl":"https://doi.org/10.1007/s00446-023-00447-z","url":null,"abstract":"Abstract We describe a simple deterministic $$O( varepsilon ^{-1} log Delta )$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mi&gt;O&lt;/mml:mi&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:msup&gt; &lt;mml:mi&gt;ε&lt;/mml:mi&gt; &lt;mml:mrow&gt; &lt;mml:mo&gt;-&lt;/mml:mo&gt; &lt;mml:mn&gt;1&lt;/mml:mn&gt; &lt;/mml:mrow&gt; &lt;/mml:msup&gt; &lt;mml:mo&gt;log&lt;/mml:mo&gt; &lt;mml:mi&gt;Δ&lt;/mml:mi&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; round distributed algorithm for $$(2alpha +1)(1 + varepsilon )$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:mn&gt;2&lt;/mml:mn&gt; &lt;mml:mi&gt;α&lt;/mml:mi&gt; &lt;mml:mo&gt;+&lt;/mml:mo&gt; &lt;mml:mn&gt;1&lt;/mml:mn&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:mn&gt;1&lt;/mml:mn&gt; &lt;mml:mo&gt;+&lt;/mml:mo&gt; &lt;mml:mi&gt;ε&lt;/mml:mi&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; approximation of minimum weighted dominating set on graphs with arboricity at most $$alpha $$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mi&gt;α&lt;/mml:mi&gt; &lt;/mml:math&gt; . Here $$Delta $$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mi&gt;Δ&lt;/mml:mi&gt; &lt;/mml:math&gt; denotes the maximum degree. We also show a lower bound proving that this round complexity is nearly optimal even for the unweighted case, via a reduction from the celebrated KMW lower bound on distributed vertex cover approximation (Kuhn et al. in JACM 63:116, 2016). Our algorithm improves on all the previous results (that work only for unweighted graphs) including a randomized $$O(alpha ^2)$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mi&gt;O&lt;/mml:mi&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:msup&gt; &lt;mml:mi&gt;α&lt;/mml:mi&gt; &lt;mml:mn&gt;2&lt;/mml:mn&gt; &lt;/mml:msup&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; approximation in $$O(log n)$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mi&gt;O&lt;/mml:mi&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:mo&gt;log&lt;/mml:mo&gt; &lt;mml:mi&gt;n&lt;/mml:mi&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; rounds (Lenzen et al. in International symposium on distributed computing, Springer, 2010), a deterministic $$O(alpha log Delta )$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mi&gt;O&lt;/mml:mi&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:mi&gt;α&lt;/mml:mi&gt; &lt;mml:mo&gt;log&lt;/mml:mo&gt; &lt;mml:mi&gt;Δ&lt;/mml:mi&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; approximation in $$O(log Delta )$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mi&gt;O&lt;/mml:mi&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:mo&gt;log&lt;/mml:mo&gt; &lt;mml:mi&gt;Δ&lt;/mml:mi&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; rounds (Lenzen et al. in international symposium on distributed computing, Springer, 2010), a deterministic $$O(alpha )$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mi&gt;O&lt;/mml:mi&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:mi&gt;α&lt;/mml:mi&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; approximation in $$O(log ^2 Delta )$$ &lt;mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"&gt; &lt;mml:mrow&gt; &lt;mml:mi&gt;O&lt;/mml:mi&gt; &lt;mml:mo&gt;(&lt;/mml:mo&gt; &lt;mml:msup&gt; &lt;mml:mo&gt;log&lt;/mml:mo&gt; &lt;mml:mn&gt;2&lt;/mml:mn&gt; &lt;/mml:msup&gt; &lt;mml:mi&gt;Δ&lt;/mml:mi&gt; &lt;mml:mo&gt;)&lt;/mml:mo&gt; &lt;/mml:mrow&gt; &lt;/mml:math&gt; rounds (implici","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135140602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Termination of amnesiac flooding 终止失忆症洪水
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-01 DOI: 10.1007/s00446-023-00448-y
W. Hussak, Amitabh Trehan
{"title":"Termination of amnesiac flooding","authors":"W. Hussak, Amitabh Trehan","doi":"10.1007/s00446-023-00448-y","DOIUrl":"https://doi.org/10.1007/s00446-023-00448-y","url":null,"abstract":"","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"36 1","pages":"193-207"},"PeriodicalIF":1.3,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43486783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue on DISC 2019 DISC 2019特刊
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-27 DOI: 10.1007/s00446-023-00445-1
H. Attiya
{"title":"Special issue on DISC 2019","authors":"H. Attiya","doi":"10.1007/s00446-023-00445-1","DOIUrl":"https://doi.org/10.1007/s00446-023-00445-1","url":null,"abstract":"","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"36 1","pages":"1"},"PeriodicalIF":1.3,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47517761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Set-Linearizable Implementations from Read/Write Operations: Sets, Fetch &Increment, Stacks and Queues with Multiplicity 从读/写操作设置可线性化的实现:集、获取和增量、堆栈和具有多重性的队列
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-12-07 DOI: 10.1007/s00446-022-00440-y
Armando Castañeda, S. Rajsbaum, M. Raynal
{"title":"Set-Linearizable Implementations from Read/Write Operations: Sets, Fetch &Increment, Stacks and Queues with Multiplicity","authors":"Armando Castañeda, S. Rajsbaum, M. Raynal","doi":"10.1007/s00446-022-00440-y","DOIUrl":"https://doi.org/10.1007/s00446-022-00440-y","url":null,"abstract":"","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"36 1","pages":"89-106"},"PeriodicalIF":1.3,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45367692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue on DISC 2020 DISC 2020特刊
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-10-25 DOI: 10.1007/s00446-022-00438-6
H. Attiya
{"title":"Special issue on DISC 2020","authors":"H. Attiya","doi":"10.1007/s00446-022-00438-6","DOIUrl":"https://doi.org/10.1007/s00446-022-00438-6","url":null,"abstract":"","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"35 1","pages":"475 - 475"},"PeriodicalIF":1.3,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42150171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making Byzantine consensus live 让拜占庭式的共识活下去
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-02 DOI: 10.1007/s00446-022-00432-y
Manuel Bravo, G. Chockler, Alexey Gotsman
{"title":"Making Byzantine consensus live","authors":"Manuel Bravo, G. Chockler, Alexey Gotsman","doi":"10.1007/s00446-022-00432-y","DOIUrl":"https://doi.org/10.1007/s00446-022-00432-y","url":null,"abstract":"","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"35 1","pages":"503 - 532"},"PeriodicalIF":1.3,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47671898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Extending the wait-free hierarchy to multi-threaded systems 将无等待层次结构扩展到多线程系统
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-01 DOI: 10.1007/s00446-022-00425-x
Matthieu Perrin, A. Mostéfaoui, Grégoire Bonin, Ludmila Courtillat-Piazza
{"title":"Extending the wait-free hierarchy to multi-threaded systems","authors":"Matthieu Perrin, A. Mostéfaoui, Grégoire Bonin, Ludmila Courtillat-Piazza","doi":"10.1007/s00446-022-00425-x","DOIUrl":"https://doi.org/10.1007/s00446-022-00425-x","url":null,"abstract":"","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"35 1","pages":"375-398"},"PeriodicalIF":1.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"51906619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PerformERL: a performance testing framework for erlang PerformERL: erlang的性能测试框架
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-01 DOI: 10.1007/s00446-022-00429-7
W. Cazzola, Francesco Cesarini, Luca Tansini
{"title":"PerformERL: a performance testing framework for erlang","authors":"W. Cazzola, Francesco Cesarini, Luca Tansini","doi":"10.1007/s00446-022-00429-7","DOIUrl":"https://doi.org/10.1007/s00446-022-00429-7","url":null,"abstract":"","PeriodicalId":50569,"journal":{"name":"Distributed Computing","volume":"35 1","pages":"439 - 454"},"PeriodicalIF":1.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42509173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Distributed Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1