Theory of Computing and Systems
DOI: 10.1007/bfb0035176
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Timestamping made simple

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(38 citation statements)
references
References 9 publications
0
38
0
Order By: Relevance
“…Unlike the Bakery algorithm (and ours), the algorithm in [1] is not symmetric: process p i only reads the values of the lower processes. It is possible to replace the unbounded timestamps of the Bakery algorithm (i.e., taking a number) with bounded timestamps, as defined in [22] and constructed in [16,17,20], however the resulting algorithm will be rather complex, when the price of implementing bounded timestamps is taken into account.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike the Bakery algorithm (and ours), the algorithm in [1] is not symmetric: process p i only reads the values of the lower processes. It is possible to replace the unbounded timestamps of the Bakery algorithm (i.e., taking a number) with bounded timestamps, as defined in [22] and constructed in [16,17,20], however the resulting algorithm will be rather complex, when the price of implementing bounded timestamps is taken into account.…”
Section: Related Workmentioning
confidence: 99%
“…The proof of their algorithm leverages the axiomatic proof in this paper by arguing that the executions of their algorithm are a subset of the executions of our algorithm. In [GLS92], Gawlick, Lynch, and Shavit introduce a streamlined version of our CTSS algorithm based on the use of an atomic snapshot primitive [AAD*89, And89a]. A snapshot primitive allows a process P i to update the ith memory location, or snap the memory, that is, collect an "instantaneous" view of all n shared-memory locations.…”
Section: Thus the Node L [C]mentioning
confidence: 99%
“…A simple solution based on transforming the unbounded protocol of Vitanyi and Awerbuch [VA86] using our construction (see [Sha90,G92]) has the same space complexity of the [PB87,Sch88] algorithm, yet it has a better time complexity-O(n) memory accesses for a write, O(n log n) for a read, as compared with O(n 2 ) for either in the former solutions. Our implementation is the only known bounded construction of an MRMW atomic register from single-writer multireader (SWMR) atomic registers where the implementation of the MRMW read operation does not require a process to perform an SWMR write.…”
mentioning
confidence: 99%
“…To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SPAA'08, June [14][15][16]2008, Munich, Germany. Copyright 2008 ACM 978-1-59593-973-9/08/06 ...$5.00.…”
Section: Introductionmentioning
confidence: 99%
“…The snapshot object has proved to be an enormously useful abstraction. It has been used as a building block for solving many other problems, including approximate agreement [11], timestamping [16], randomized consensus [6,7] as well as several concurrent object constructions [8,17]. It could also be used in garbage collection, debugging distributed programs and storing checkpoints for data recovery.…”
Section: Introductionmentioning
confidence: 99%