Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

The Las-Vegas Processor Identity Problem (How and When to Be Unique)

Identifieur interne : 009E16 ( Main/Exploration ); précédent : 009E15; suivant : 009E17

The Las-Vegas Processor Identity Problem (How and When to Be Unique)

Auteurs : Shay Kutten [Israël] ; Rafail Ostrovsky [Colombie] ; Boaz Patt-Shamir [Israël]

Source :

RBID : ISTEX:7C9C3945A6CE5BA85176B67E9F7F38B3D70685A9

English descriptors

Abstract

Abstract: We study the classical problem of assigning unique identifiers to identical concurrent processes. In this paper, we consider the asynchronous shared memory model, and the correctness requirement is that upon termination of the algorithm, the processes must have unique IDs always. Our results include tight characterization of the problem in several respects. We call a protocol solving this task Las Vegas if it has finite expected termination time. Our main positive result is the first Las-Vegas protocol that solves the problem. The protocol terminates in O(logn) expected asychronous rounds, using O(n) shared memory space, where n is the number of participating processes. The new protocol improves on all previous solutions simultaneously in running time (exponentially), probability of termination (to 1), and space requirement. The protocol works under the assumption that the asynchronous schedule is oblivious, i.e., independent of the actual unfolding execution. On the negative side, we show that there is no finite-state Las-Vegas protocol for the problem if the schedule may depend on the history of the shared memory (an adaptive schedule). We also show that any Las-Vegas protocol must know n in advance (which implies that crash faults cannot be tolerated) and that the running time is Ω(logn). For the case of an arbitrary (nonoblivious) adversarial schedule, we present a Las-Vegas protocol that uses O(n) unbounded registers. For the read-modify-write model, we present a constant-space deterministic algorithm.

Url:
DOI: 10.1006/jagm.2000.1110


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">The Las-Vegas Processor Identity Problem (How and When to Be Unique)</title>
<author>
<name sortKey="Kutten, Shay" sort="Kutten, Shay" uniqKey="Kutten S" first="Shay" last="Kutten">Shay Kutten</name>
</author>
<author>
<name sortKey="Ostrovsky, Rafail" sort="Ostrovsky, Rafail" uniqKey="Ostrovsky R" first="Rafail" last="Ostrovsky">Rafail Ostrovsky</name>
</author>
<author>
<name sortKey="Patt Shamir, Boaz" sort="Patt Shamir, Boaz" uniqKey="Patt Shamir B" first="Boaz" last="Patt-Shamir">Boaz Patt-Shamir</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:7C9C3945A6CE5BA85176B67E9F7F38B3D70685A9</idno>
<date when="2000" year="2000">2000</date>
<idno type="doi">10.1006/jagm.2000.1110</idno>
<idno type="url">https://api.istex.fr/ark:/67375/6H6-3P78NXL9-7/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001D04</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001D04</idno>
<idno type="wicri:Area/Istex/Curation">001C83</idno>
<idno type="wicri:Area/Istex/Checkpoint">002069</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">002069</idno>
<idno type="wicri:doubleKey">0196-6774:2000:Kutten S:the:las:vegas</idno>
<idno type="wicri:Area/Main/Merge">00A397</idno>
<idno type="wicri:Area/Main/Curation">009E16</idno>
<idno type="wicri:Area/Main/Exploration">009E16</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">The Las-Vegas Processor Identity Problem (How and When to Be Unique)</title>
<author>
<name sortKey="Kutten, Shay" sort="Kutten, Shay" uniqKey="Kutten S" first="Shay" last="Kutten">Shay Kutten</name>
<affiliation wicri:level="1">
<country wicri:rule="url">Israël</country>
<wicri:regionArea>Department of Industrial Engineering, The Technion, Haifa, 3200</wicri:regionArea>
<wicri:noRegion>3200</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Ostrovsky, Rafail" sort="Ostrovsky, Rafail" uniqKey="Ostrovsky R" first="Rafail" last="Ostrovsky">Rafail Ostrovsky</name>
<affiliation wicri:level="1">
<country wicri:rule="url">Colombie</country>
<wicri:regionArea>Telcordia Technologies, MCC-IC357B, 445 South Street, Morristown, New Jersey, 07960-6348</wicri:regionArea>
<wicri:noRegion>07960-6348</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Patt Shamir, Boaz" sort="Patt Shamir, Boaz" uniqKey="Patt Shamir B" first="Boaz" last="Patt-Shamir">Boaz Patt-Shamir</name>
<affiliation wicri:level="1">
<country wicri:rule="url">Israël</country>
<wicri:regionArea>Department of Electrical Engineering-Systems, Tel-Aviv University, Tel Aviv, 69978</wicri:regionArea>
<wicri:noRegion>69978</wicri:noRegion>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Journal of Algorithms</title>
<title level="j" type="abbrev">YJAGM</title>
<idno type="ISSN">0196-6774</idno>
<imprint>
<publisher>ELSEVIER</publisher>
<date type="published" when="2000">2000</date>
<biblScope unit="volume">37</biblScope>
<biblScope unit="issue">2</biblScope>
<biblScope unit="page" from="468">468</biblScope>
<biblScope unit="page" to="494">494</biblScope>
</imprint>
<idno type="ISSN">0196-6774</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0196-6774</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="Teeft" xml:lang="en">
<term>Academic press</term>
<term>Active processes</term>
<term>Adaptive</term>
<term>Adaptive adversaries</term>
<term>Adaptive adversary</term>
<term>Adaptive schedule</term>
<term>Additional time units</term>
<term>Adversary</term>
<term>Algorithm</term>
<term>Algorithm halts</term>
<term>Annual symposium</term>
<term>Asynchronous</term>
<term>Children subroutine</term>
<term>Colliding</term>
<term>Colliding processes</term>
<term>Complete iteration</term>
<term>Computer science</term>
<term>Correct value</term>
<term>Corresponding values</term>
<term>Counter value</term>
<term>Current value</term>
<term>Deterministic protocol</term>
<term>Different values</term>
<term>Dirty memory model</term>
<term>Dynamic algorithm</term>
<term>Dynamic model</term>
<term>Fair schedule</term>
<term>First access</term>
<term>First tree</term>
<term>Global</term>
<term>Global state</term>
<term>Global states</term>
<term>High probability</term>
<term>Impossibility</term>
<term>Impossibility result</term>
<term>Impossibility results</term>
<term>Inductive step</term>
<term>Initial contents</term>
<term>Initial state</term>
<term>Initialized</term>
<term>Ious schedule</term>
<term>Iteration</term>
<term>Kutten</term>
<term>Last process</term>
<term>Lemma</term>
<term>Local image</term>
<term>Local memory</term>
<term>Local state</term>
<term>Local states</term>
<term>Long time</term>
<term>Markov</term>
<term>Markov chain</term>
<term>Markov chains</term>
<term>Markov graph</term>
<term>Memory access</term>
<term>Memory model</term>
<term>Monte carlo</term>
<term>Morgan kaufmann</term>
<term>Negative results</term>
<term>Next state</term>
<term>Next step</term>
<term>Node</term>
<term>Oblivious adversary</term>
<term>Ostrovsky</term>
<term>Other process</term>
<term>Other processes</term>
<term>Other words</term>
<term>Positive probability</term>
<term>Primitive elements</term>
<term>Probabilistic function</term>
<term>Process claims</term>
<term>Process proceeds</term>
<term>Processor</term>
<term>Processor identity problem</term>
<term>Protocol</term>
<term>Random choices</term>
<term>Randomized protocols</term>
<term>Registers model</term>
<term>Same output value</term>
<term>Same state</term>
<term>Second tree</term>
<term>Simple fact</term>
<term>Simple property</term>
<term>Single process</term>
<term>Single step</term>
<term>Source node</term>
<term>Space requirement</term>
<term>Summation tree</term>
<term>Terminal component</term>
<term>Termination</term>
<term>Termination detection</term>
<term>Termination detection algorithm</term>
<term>Time unit</term>
<term>Time units</term>
<term>Total number</term>
<term>Transition function</term>
<term>Transition specification</term>
<term>Unbounded registers</term>
<term>Unique values</term>
<term>Uniqueness requirement</term>
</keywords>
</textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We study the classical problem of assigning unique identifiers to identical concurrent processes. In this paper, we consider the asynchronous shared memory model, and the correctness requirement is that upon termination of the algorithm, the processes must have unique IDs always. Our results include tight characterization of the problem in several respects. We call a protocol solving this task Las Vegas if it has finite expected termination time. Our main positive result is the first Las-Vegas protocol that solves the problem. The protocol terminates in O(logn) expected asychronous rounds, using O(n) shared memory space, where n is the number of participating processes. The new protocol improves on all previous solutions simultaneously in running time (exponentially), probability of termination (to 1), and space requirement. The protocol works under the assumption that the asynchronous schedule is oblivious, i.e., independent of the actual unfolding execution. On the negative side, we show that there is no finite-state Las-Vegas protocol for the problem if the schedule may depend on the history of the shared memory (an adaptive schedule). We also show that any Las-Vegas protocol must know n in advance (which implies that crash faults cannot be tolerated) and that the running time is Ω(logn). For the case of an arbitrary (nonoblivious) adversarial schedule, we present a Las-Vegas protocol that uses O(n) unbounded registers. For the read-modify-write model, we present a constant-space deterministic algorithm.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Colombie</li>
<li>Israël</li>
</country>
</list>
<tree>
<country name="Israël">
<noRegion>
<name sortKey="Kutten, Shay" sort="Kutten, Shay" uniqKey="Kutten S" first="Shay" last="Kutten">Shay Kutten</name>
</noRegion>
<name sortKey="Patt Shamir, Boaz" sort="Patt Shamir, Boaz" uniqKey="Patt Shamir B" first="Boaz" last="Patt-Shamir">Boaz Patt-Shamir</name>
</country>
<country name="Colombie">
<noRegion>
<name sortKey="Ostrovsky, Rafail" sort="Ostrovsky, Rafail" uniqKey="Ostrovsky R" first="Rafail" last="Ostrovsky">Rafail Ostrovsky</name>
</noRegion>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 009E16 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 009E16 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:7C9C3945A6CE5BA85176B67E9F7F38B3D70685A9
   |texte=   The Las-Vegas Processor Identity Problem (How and When to Be Unique)
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022