1985
DOI: 10.1109/tse.1985.231861
|View full text |Cite
|
Sign up to set email alerts
|

Synchronized Distributed Termination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

1987
1987
2012
2012

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…However, in a finite computation only information about a bounded region in the network can be gathered. The algorithm by Szymanski, Shy, and Prywes [23] does this for a region of pre-specified diameter; the assumption is necessary that a bound of the diameter of the entire network is known. This implies, that termination detection, unlike symmetry breaking, is possible in every graph, but provided some knowledge.…”
Section: Second Step: An Election Algorithm For a Family Of Labelled mentioning
confidence: 99%
“…However, in a finite computation only information about a bounded region in the network can be gathered. The algorithm by Szymanski, Shy, and Prywes [23] does this for a region of pre-specified diameter; the assumption is necessary that a bound of the diameter of the entire network is known. This implies, that termination detection, unlike symmetry breaking, is possible in every graph, but provided some knowledge.…”
Section: Second Step: An Election Algorithm For a Family Of Labelled mentioning
confidence: 99%
“…We give algorithms based on the composition of an algorithm by Szymanski, Shy, and Prywes (Szymanski et al, 1985) with the Chandy-Lamport (Chandy and Lamport, 1985) algorithm which enable each process to detect an instant where all processes have obtained their local snapshot and to evaluate global predicates anonymously. registerVariable("label end", label); setTerminated(true); end Algorithm 1: Example of a broadcast algorithm written in Java using the API of ViSiDiA.…”
Section: Debugging Distributed Algorithmsmentioning
confidence: 99%
“…More precisely, it requires that all processes certify, in a finite computation, that they have completed the computation of the local snapshot. The algorithm by Szymanski, Shy, and Prywes (the SSP algorithm for short) (Szymanski et al, 1985) does this for a region of pre-specified diameter; the assumption is necessary that an upper bound of the diameter of the entire network is known by each process (note that the network size also suffices). In the sequel this upper bound is denoted by β and we assume that each process knows it.…”
Section: Termination Detection Of the Chandy-lamport Snapshot Algorithmmentioning
confidence: 99%
“…This algorithm is a combination of an election algorithm for symmetric minimal graphs presented in [CM07] and a generalization of an algorithm of Szymanski, Shy and Prywes (the SSP algorithm for short) [SSP85]. The algorithm described in [CM07] is based on an enumeration algorithm presented by Mazurkiewicz in a different model [Maz97] where each computation step involves some synchronization between adjacent processes.…”
Section: A General Algorithmmentioning
confidence: 99%
“…In this case, all kinds of terminations are equivalent: what can be computed with implicit termination can be computed with global termination detection. In the literature, one can found different algorithms to detect global termination provided that there exists a leader [DS80], that processes have unique ids [Mat87], or that processes know a bound on the diameter of the network [SSP85]. A characterization of tasks computable with global termination detection is presented in [CGMT07].…”
Section: Introductionmentioning
confidence: 99%