2004
DOI: 10.1007/s00446-003-0105-9
|View full text |Cite
|
Sign up to set email alerts
|

The power of logical clock abstractions

Abstract: Vector and matrix clocks are extensively used in asynchronous distributed systems. This paper asks, "how does the clock abstraction generalize?" To address this problem, the paper motivates and proposes logical clocks of arbitrary dimensions. It then identifies and explores the conceptual link between such clocks and knowledge. It establishes the necessary and sufficient conditions on the size and dimension of clocks required to attain any specified level of knowledge about the timestamp of the most recent sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2005
2005
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…The state s i,x refers to the local state of P i after P i executes event e i,x , but before e i,x+1 is executed. Execution of a distributed program can be modeled as a communication graph G = (U, E), where each vertex in U refers to an event, and each edge (u, v) in E refers to the precedence relation from event u to v [9,11,12]. In the communication graph, each edge (e i,x , e i,x+1 ) in E refers to the state s i,x .…”
Section: Distributed Computationmentioning
confidence: 99%
See 1 more Smart Citation
“…The state s i,x refers to the local state of P i after P i executes event e i,x , but before e i,x+1 is executed. Execution of a distributed program can be modeled as a communication graph G = (U, E), where each vertex in U refers to an event, and each edge (u, v) in E refers to the precedence relation from event u to v [9,11,12]. In the communication graph, each edge (e i,x , e i,x+1 ) in E refers to the state s i,x .…”
Section: Distributed Computationmentioning
confidence: 99%
“…Furthermore, by definition (see Definitions 3 and 4), the above equation can be rewritten as ⇔ (c c t ) (t) and (c t d) (t) ⇔ c ≺ F t (c t ) and R t (c t ) ≺ d (9) That is, every checkpoint c in the second area has new Z-paths to every checkpoint d, where d is the checkpoint having Z-paths from c t (i.e. R t (c t ) ≺ d) (see Fig.…”
Section: Lemma 6 the Z-path C C Exists In H T If And Only If C Is T-rmentioning
confidence: 99%
“…Matrix clocks, too, have been optimized [7,30,14] and generalized [18]. We leave for (interesting) future work the question of whether agreement events such as the ones we are proposing could be generalized along similar lines.…”
Section: Related Workmentioning
confidence: 99%
“…Since we verified the latter policy using traditional testing, these scenarios are already covered. On the other hand, any additional component beyond the three we use would not generate situations that cannot be mapped to a distributed execution with three components [43]. We checked property (1) using a setting without time constraints.…”
Section: B Assessing Loupe's Implementationmentioning
confidence: 99%