2019
DOI: 10.2200/s00908ed1v01y201903dct015
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Distributed Self-Stabilizing Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
31
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(32 citation statements)
references
References 104 publications
1
31
0
Order By: Relevance
“…Algorithms under test. We have implemented the following self-stabilizing algorithms: a token circulation for rooted unidirectional rings assuming a distributed daemon (DTR [8]); a breadth first search spanning tree construction for rooted networks assuming a distributed daemon (BFS [2]); a depth first search spanning tree construction for rooted networks assuming a distributed daemon (DFS [6]); a coloring algorithm for anonymous networks assuming a locally central daemon (COL [13]); a synchronous unison for anonymous networks assuming a synchronous daemon (SYN [3]); and Algorithm 1 (ASY [7]). All these algorithms can be found in the SASA gitlab repository.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Algorithms under test. We have implemented the following self-stabilizing algorithms: a token circulation for rooted unidirectional rings assuming a distributed daemon (DTR [8]); a breadth first search spanning tree construction for rooted networks assuming a distributed daemon (BFS [2]); a depth first search spanning tree construction for rooted networks assuming a distributed daemon (DFS [6]); a coloring algorithm for anonymous networks assuming a locally central daemon (COL [13]); a synchronous unison for anonymous networks assuming a synchronous daemon (SYN [3]); and Algorithm 1 (ASY [7]). All these algorithms can be found in the SASA gitlab repository.…”
Section: Resultsmentioning
confidence: 99%
“…The first stage is made of the atomic and synchronous execution of all activated nodes (1-a), followed by the evaluation of which nodes are enabled in the next step (1-b). 4 At the second stage, a daemon nondeterministically chooses among the enabled nodes which ones should be activated at the next step (2). Overall, this can be viewed as a reactive program (Stage (1)) that runs in closed-loop with its environment (Stage (2)), where the outputs (resp.…”
Section: Connection To the Synchrone Reactive Toolboxmentioning
confidence: 99%
“…The stabilization time of a randomized (self-stabilizing) algorithm on a given graph is a random variable and one typically aims towards bounding it in expectation and whp. 4 The schedule { } ≥0 is said to be synchronous if = for all ∈ Z ≥0 which means that ( ) = for = 0, 1, . .…”
Section: Computational Modelmentioning
confidence: 99%
“…When it comes to recovering from transient faults, the agreed upon concept for fault tolerance is self-stabilization. Introduced in the seminal paper of Dijkstra [14], an algorithm is self-stabilizing if it is guaranteed to converge to a correct output from any (possibly faulty) initial configuration [4,15].…”
Section: Introductionmentioning
confidence: 99%
“…Different algorithms and control strategies are widely studied and adopted to improve the efficiency of the distributed control (Xiao et al, 2019) and its natural features of error tolerance (Raynal, 2018). Specific algorithms have been used, including clock synchronization theories (Dalwadi and Padole, 2017) and self-stabilization algorithm (Altisen et al, 2019), to ensure the information consistency and control stability, which are very precise and complicated to realize in some real scenarios as for controllable power loads. Therefore, the distributed control strategy is prominent in large-scale collaborations at the current stage.…”
Section: Introductionmentioning
confidence: 99%