What Can Be Implemented Anonymously?

نویسندگان

  • Rachid Guerraoui
  • Eric Ruppert
چکیده

The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? What if processes do not have unique identifiers or do not wish to divulge them for reasons of privacy? We consider asynchronous shared-memory systems that are anonymous. The shared memory contains only the most common type of shared objects, read/write registers. We investigate, for the first time, what can be implemented deterministically in this model when processes can fail. We give anonymous algorithms for some fundamental problems: timestamping, snapshots and consensus. Our solutions to the first two are wait-free and the third is obstruction-free. We also show that a shared object has an obstruction-free implementation if and only if it satisfies a simple property called idempotence. To prove the sufficiency of this condition, we give a universal construction that implements any idempotent object.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Validation of a Conceptual Model for Narrowing the Gap between Intended, Implemented, and Attained Curricula in the Public Education System in Iran

Abstract: The present research aimed at developing and validating a conceptual model for narrowing the gap between intended, implemented, and attained curricula in the public education system in Iran. Two fundamental questions guided this investigation: what model can be developed to reduce the gap between the three mentioned curricula? To what extent does the proposed model gain the approval? ...

متن کامل

Adaptive User Profiles in Pervasive Advertising Environments

Nowadays modern advertising environments try to provide more efficient ads by targeting costumers based on their interests. Various approaches exist today as to how information about the users’ interests can be gathered. Users can deliberately and explicitly provide this information or user’s shopping behaviors can be analyzed implicitly. We implemented an advertising platform to simulate an ad...

متن کامل

Privacy and forensics investigation process: The ERPINA protocol

The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allows an honest user communicating anonymously with a Server through a PET, while the identity of a dishonest user is revealed. Prior research failed to distinguish objectively between an honest user and an attacker; and a...

متن کامل

PANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts

PANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts http://www.pancan.org/section_research/resources_for_scientists/form_funding_experiences.php Have you struggled to receive grants from the NCI or other federal institutions? Have you been successful? We’re looking for information to help us understand what is working well for pa...

متن کامل

PANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts

PANCREATIC CANCER ACTION NETWORK AND COMMUNITY NEWS Share your federal funding experiences: Help our advocacy efforts http://www.pancan.org/section_research/resources_for_scientists/form_funding_experiences.php Have you struggled to receive grants from the NCI or other federal institutions? Have you been successful? We’re looking for information to help us understand what is working well for pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005