2013
DOI: 10.15803/ijnc.3.1_116
|View full text |Cite
|
Sign up to set email alerts
|

Self-Stabilizing Small k-Dominating Sets

Abstract: A self-stabilizing algorithm, after transient faults hit the system and place it in some arbitrary global state, causes the system to recover in finite time without external (e.g., human) intervention. In this paper, we give a distributed asynchronous silent self-stabilizing algorithm for finding a minimal k-dominating set of at most n k+1 processes in an arbitrary identified network of size n. We give a transformer that allows our algorithm to work under an unfair daemon, the weakest scheduling assumption. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…There are a variety of techniques to compose two or more self-stabilizing algorithms in the literature [9,10,2,13,4,14,15], such as fair-composition [10] and parallel composition [9], but none of them enables an unbounded number of repetitions of the same algorithm, such as ours.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…There are a variety of techniques to compose two or more self-stabilizing algorithms in the literature [9,10,2,13,4,14,15], such as fair-composition [10] and parallel composition [9], but none of them enables an unbounded number of repetitions of the same algorithm, such as ours.…”
Section: Related Workmentioning
confidence: 99%
“…Thereafter, r begins a top-down color-3-wave in the same way as a color-1-wave (L 12 ). A process changes its (1,4), (2,0), (2,1), (2,3), (2,4), (3,0), (3,1), (4,1), (4,2)…”
Section: Algorithm Loop(a E P)mentioning
confidence: 99%
See 1 more Smart Citation
“…The protocol of [6] requires O(log(n) + k.log(n/k)) bits per node. The protocol of [5] builds competitive kdominating sets : the obtained dominating set contains at most 1+ (n−1)/(k+1) nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Starting from an arbitrary configuration, a silent algorithm converges within finite time to a configuration from which all communication variables are constant. This class of self-stabilizing algorithms is important, as self-stabilizing algorithms building distributed data structures (such as spanning tree or clustering) often achieve the silent property, and these silent self-stabilizing data structures are widely used as basic building blocks for more complex self-stabilizing solutions, e.g., [19,20].Using a usual proof scheme, the certified proof consists of two main parts, one dealing with termination and the other with partial correctness.For the termination part, we developed tools on potential functions and termination at a fine-grained level. Precisely, we define a potential function as a multiset containing a local potential per node.…”
mentioning
confidence: 99%