1986
DOI: 10.1145/12485.12491
|View full text |Cite
|
Sign up to set email alerts
|

Efficient solutions to the replicated log and dictionary problems

Abstract: We propose efficient algorithms to maintain a replicated dictionary using a log in an unreliable network. A non-serializable approach is used to achieve high concurrency. The solutions are resilient to both node and communication failures. Optimizations are developed for networks which are not completely connected.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
53
0

Year Published

1998
1998
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(54 citation statements)
references
References 5 publications
1
53
0
Order By: Relevance
“…The size of the logical clocks can be reduced by modifying the system model and making simplifying assumptions, such as those made previously for vector clocks [17,22]. The size of the clocks can also be reduced by making approximations to the accurate clock value, along the lines of earlier approximations [12,19,23,24] made previously for vector and matrix clocks. These options provide directions for future research.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The size of the logical clocks can be reduced by modifying the system model and making simplifying assumptions, such as those made previously for vector clocks [17,22]. The size of the clocks can also be reduced by making approximations to the accurate clock value, along the lines of earlier approximations [12,19,23,24] made previously for vector and matrix clocks. These options provide directions for future research.…”
Section: Discussionmentioning
confidence: 99%
“…Although the size of each clock and timestamp of dimension α is n α integers, this can be reduced by making certain assumptions on the message communication pattern, the partial order (H, ≺), logical network topology, and on the reliable and ordered message delivery, using schemes similar to those used by Singhal and Kshemkalyani [22] and by Meldal, Sankar, and Vera [17]. Certain optimizations of matrix clocks that do not compute the accurate matrix clock but some approximation of it were described by Krishnakumar and Bernstein [12], Ruget [19], Torres-Rojas and Ahamad [23], and Wuu and Bernstein [24]. Similar techniques can be used for α-dimensional clocks if accuracy can be sacrificed.…”
Section: Fig 2 the Example Execution For Clk 3 (3-dimensional Clockmentioning
confidence: 99%
See 2 more Smart Citations
“…We also discussed how the algorithm can be adapted to various special situations outside the scope of Problem 1. In the face of network failures, techniques from [25] can be adapted for log management to maintain causal consistency.…”
Section: Discussionmentioning
confidence: 99%