skip to main content
10.1145/1978582.1978603acmotherconferencesArticle/Chapter ViewAbstractPublication PagesewdcConference Proceedingsconference-collections
research-article

k-bounded set objects in eventually synchronous distributed systems with churn and continuous accesses

Authors Info & Claims
Published:11 May 2011Publication History

ABSTRACT

This paper introduces a "k-bounded set object", namely a shared object with limited memory that allows processes to add and remove values as well as take a snapshot of its content. The interest of the k-bounded set lies in the fact that it can be used to program useful abstractions for dynamic distributed systems, such as an eventual participant detector.

References

  1. Aguilera M. K., Keidar I., Malkhi D., Shraer A. Dynamic atomic storage without consensus in proceedings of 28<sup>th</sup> Annual ACM Symposium on Principles of Distributed Computing 2009, 17--25 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Baldoni R., Bonomi S., Kermarrec A. M., Raynal M., Implementing a Register in a Dynamic Distributed System. in Proc. 29th IEEE Int'l Conference on Distributed Computing Systems, IEEE Press, pp. 639--647, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baldoni R., Bonomi S., Raynal M., Value-based Sequential Consistency for Set Objects in Dynamic Distributed Systems Proceedings of Euro-Par 2010 - Parallel Processing, 16th International Euro-Par Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Baldoni R., Bonomi S., Raynal M., Set Objects in Eventually Synchronous Distributed Systems with Churn and Continuous Accesses MIDLAB Tec. Report 1/2010 http://www.dis.uniromal.it/~ midlab/articoliGoogle ScholarGoogle Scholar
  5. Cavin D., Sasson Y., Shiper A. Consensus with Unknown Participants or Fundamental Self-Organization In Proceedings of the 3rd International Conference on AD-HOC Networks & Wireless (ADHOC-NOW) 2004.Google ScholarGoogle Scholar
  6. Chandra T. and Toueg S., Unreliable Failure Detectors for Reliable Distributed Systems. JACM, 43(2):225--267, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Delporte-Gallet C., Fauconnier H. Two Consensus Algorithms with Atomic Registers and Failure Detector Ω. 10th Int'l Conf. on Distr. Commuting and Networking Springer-Verlag, LNCS 5408, pp 251--262, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dwork C., Lynch N. and Stockmeyer L., Consensus in the Presence of Partial Synchrony. JACM, 35(2):288--323, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Friedman R., Raynal M. and Travers C., Abstractions for Implementing Atomic Objects in Distributed Systems. 9th Int'l Conference on Principles of Distributed Systems, LNCS #3974, pp. 73--87, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Greve, F. and Tixeuil, S. Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown Networks Proceeding of 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN):, pp. 82--91 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ko S., Hoque I. and Gupta I., Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols. Proc. 27th IEEE Int'l Symposium on Reliable Distributed Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lynch, N. and Shvartsman A., RAMBO: A Reconfigurable Atomic Memory Service for Dynamic Networks. Proc. 16th Int'l Symposium on Distributed Computing, Springer-Verlag LNCS #2508, pp. 173--190, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Tucci Piergiovanni S. and Baldoni R. Connectivity in Eventually Quiescent Dynamic Distributed Systems Third Latin-American Symposium on Dependable Computing, LNCS, 38--56, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. k-bounded set objects in eventually synchronous distributed systems with churn and continuous accesses

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            EWDC '11: Proceedings of the 13th European Workshop on Dependable Computing
            May 2011
            106 pages
            ISBN:9781450302845
            DOI:10.1145/1978582

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 May 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader