Sciweavers

WDAG
2005
Springer
90views Algorithms» more  WDAG 2005»
13 years 9 months ago
Proving Atomicity: An Assertional Approach
Atomicity (or linearizability) is a commonly used consistency criterion for distributed services and objects. Although atomic object implementations are abundant, proving that algo...
Gregory Chockler, Nancy A. Lynch, Sayan Mitra, Jos...
WDAG
2005
Springer
85views Algorithms» more  WDAG 2005»
13 years 9 months ago
Time and Space Lower Bounds for Implementations Using k-CAS
This paper presents lower bounds on the time- and space-complexity of implementations that use the k compare-and-swap (k-CAS) synchronization primitives. We prove that the use of ...
Hagit Attiya, Danny Hendler
WDAG
2005
Springer
102views Algorithms» more  WDAG 2005»
13 years 9 months ago
Computing with Reads and Writes in the Absence of Step Contention
Hagit Attiya, Rachid Guerraoui, Petr Kouznetsov
WDAG
2005
Springer
74views Algorithms» more  WDAG 2005»
13 years 9 months ago
On the Availability of Non-strict Quorum Systems
Abstract. Allowing read operations to return stale data with low probability has been proposed as a means to increase availability in quorums systems. Existing solutions that allow...
Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi
WDAG
2005
Springer
101views Algorithms» more  WDAG 2005»
13 years 9 months ago
Keeping Denial-of-Service Attackers in the Dark
Abstract. We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with so...
Gal Badishi, Amir Herzberg, Idit Keidar
WDAG
2005
Springer
102views Algorithms» more  WDAG 2005»
13 years 9 months ago
Papillon: Greedy Routing in Rings
We study greedy routing over n nodes placed in a ring, with the distance between two nodes defined to be the clockwise or the absolute distance between them along the ring. Such ...
Ittai Abraham, Dahlia Malkhi, Gurmeet Singh Manku
WDAG
2005
Springer
98views Algorithms» more  WDAG 2005»
13 years 9 months ago
Compact Routing for Graphs Excluding a Fixed Minor
Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
WDAG
2005
Springer
88views Algorithms» more  WDAG 2005»
13 years 9 months ago
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage
We analyze the problem of efficient distributed storage of information in a message-passing environment where both less than one third of the servers, as well as an arbitrary num...
Christian Cachin, Stefano Tessaro