Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing - PODC '96 1996
DOI: 10.1145/248052.248057
|View full text |Cite
|
Sign up to set email alerts
|

Fault-containing self-stabilizing algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
101
0

Year Published

1999
1999
2013
2013

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 116 publications
(101 citation statements)
references
References 13 publications
0
101
0
Order By: Relevance
“…When any change in the link status is detected, each node takes decisions based on the local knowledge in such a way that information regarding topological changes is automatically diffused across the network. Examples of these protocols include the Self-Stabilizing Shortest Path Spanning Tree (SS-SPST) [10] [11], the Energy-aware SS-SPST (SS-SPST-E) [17] and the Breadth First Spanning Tree (BFST) [8] [9] protocols. Although these protocols may reduce the volume of the control messages, they may incur higher end-to-end delay due to a slower diffusion of local changes across the network.…”
Section: Proactive Protocols With Pmls and Truls (Pp+bt)mentioning
confidence: 99%
“…When any change in the link status is detected, each node takes decisions based on the local knowledge in such a way that information regarding topological changes is automatically diffused across the network. Examples of these protocols include the Self-Stabilizing Shortest Path Spanning Tree (SS-SPST) [10] [11], the Energy-aware SS-SPST (SS-SPST-E) [17] and the Breadth First Spanning Tree (BFST) [8] [9] protocols. Although these protocols may reduce the volume of the control messages, they may incur higher end-to-end delay due to a slower diffusion of local changes across the network.…”
Section: Proactive Protocols With Pmls and Truls (Pp+bt)mentioning
confidence: 99%
“…During this phase, there is no guarantee of safety. Several approaches have been introduced to offer more stringent guarantees during the stabilization phase, e.g., fault-containment [7], superstabilization [4], time-adaptivity [12], and safe convergence [9].…”
Section: Introductionmentioning
confidence: 99%
“…Intuitively, the reason for that is that reset-based stabilization is too "twitchy": the slightest disturbance to the consistency of the system may trigger a systemwide service outage (or "hiccup") for a non-negligible amount of time, which is clearly undesirable. In response to this shortcoming, a new approach, called adaptive protocols, has recently taken the focus of attention in this research area [23,18,22,21,3]. Informally, a stabilizing system is called adaptive if its recovery time depends on the severity of the fault, measured by the number of processors whose state was corrupted.…”
Section: Introductionmentioning
confidence: 99%
“…-Recovery time, which consists of the following two measures [18,21]. Output stabilization is the time it takes until the outputs stabilize to correct values after a fault; and state stabilization, which is the time until the system completely recovers internally from a fault (meaning that it is prepared to sustain another fault).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation