What Can Be Implemented Anonymously?
نویسندگان
چکیده
The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? What if processes do not have unique identifiers or do not wish to divulge them for reasons of privacy? We consider asynchronous shared-memory systems that are anonymous. The shared memory contains only the most common type of shared objects, read/write registers. We investigate, for the first time, what can be implemented deterministically in this model when processes can fail. We give anonymous algorithms for some fundamental problems: timestamping, snapshots and consensus. Our solutions to the first two are wait-free and the third is obstruction-free. We also show that a shared object has an obstruction-free implementation if and only if it satisfies a simple property called idempotence. To prove the sufficiency of this condition, we give a universal construction that implements any idempotent object.
منابع مشابه
Design and Validation of a Conceptual Model for Narrowing the Gap between Intended, Implemented, and Attained Curricula in the Public Education System in Iran
Abstract: The present research aimed at developing and validating a conceptual model for narrowing the gap between intended, implemented, and attained curricula in the public education system in Iran. Two fundamental questions guided this investigation: what model can be developed to reduce the gap between the three mentioned curricula? To what extent does the proposed model gain the approval? ...
متن کاملAdaptive User Profiles in Pervasive Advertising Environments
Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how information about the users’ interests can be gathered. Users can deliberately and explicitly provide this information or user’s shopping behaviors can be analyzed implicitly. We implemented an advertising platform to simulate an ad...
متن کاملPrivacy and forensics investigation process: The ERPINA protocol
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allows an honest user communicating anonymously with a Server through a PET, while the identity of a dishonest user is revealed. Prior research failed to distinguish objectively between an honest user and an attacker; and a...
متن کاملPANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts
PANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts http://www.pancan.org/section_research/resources_for_scientists/form_funding_experiences.php Have you struggled to receive grants from the NCI or other federal institutions? Have you been successful? We’re looking for information to help us understand what is working well for pa...
متن کاملPANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts
PANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts http://www.pancan.org/section_research/resources_for_scientists/form_funding_experiences.php Have you struggled to receive grants from the NCI or other federal institutions? Have you been successful? We’re looking for information to help us understand what is working well for pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005