Sharing memory robustly in message-passing systems
Journal of the ACM (JACM)
Bounded Concurrent Time-Stamping
SIAM Journal on Computing
Resource Bounds for Self-Stabilizing Message-Driven Protocols
SIAM Journal on Computing
Crash Resilient Communication in Dynamic Networks
IEEE Transactions on Computers
ACM Transactions on Computer Systems (TOCS)
Self-stabilization
Self-Stabilization by Local Checking and Global Reset (Extended Abstract)
WDAG '94 Proceedings of the 8th International Workshop on Distributed Algorithms
Dijkstra's Self-Stabilizing Algorithm in Unsupportive Environments
WSS '01 Proceedings of the 5th International Workshop on Self-Stabilizing Systems
Theoretical Computer Science
Distributed Computing: Fundamentals, Simulations and Advanced Topics
Distributed Computing: Fundamentals, Simulations and Advanced Topics
Distributed Computing
Empire of colonies: Self-stabilizing and self-organizing distributed algorithm
Theoretical Computer Science
Fault-Tolerant Implementations of Regular Registers by Safe Registers with Applications to Networks
ICDCN '09 Proceedings of the 10th International Conference on Distributed Computing and Networking
Implementing a Register in a Dynamic Distributed System
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
Spanders: distributed spanning expanders
Proceedings of the 2010 ACM Symposium on Applied Computing
Stabilizing data-link over non-FIFO channels with optimal fault-resilience
Information Processing Letters
When consensus meets self-stabilization
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Hi-index | 0.00 |
A fault-tolerant and stabilizing simulation of an atomic register is presented. The simulation works in asynchronous message-passing systems, and allows a minority of processes to crash. The simulation stabilizes in a pragmatic manner, by reaching a long execution in which it runs correctly. A key element in the simulation is a new combinatorial construction of a bounded labeling scheme accommodating arbitrary labels, including those not generated by the scheme itself.