1999
DOI: 10.1145/331524.331529
|View full text |Cite
|
Sign up to set email alerts
|

The topological structure of asynchronous computability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
602
0
2

Year Published

2002
2002
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 411 publications
(608 citation statements)
references
References 9 publications
4
602
0
2
Order By: Relevance
“…Then, with Theorem 2, k-set agreement for k + 1 processes can be implemented in B n k and with Theorem 6 it follows that k-set agreement can be implemented in B k+1 k . A contradiction to [1][2][3]. Thus, ¬D(A n , B n k ) which means by Theorem 3 that k-set agreement can be implemented in A n .…”
Section: Robustness Against the Number Of Processesmentioning
confidence: 90%
See 1 more Smart Citation
“…Then, with Theorem 2, k-set agreement for k + 1 processes can be implemented in B n k and with Theorem 6 it follows that k-set agreement can be implemented in B k+1 k . A contradiction to [1][2][3]. Thus, ¬D(A n , B n k ) which means by Theorem 3 that k-set agreement can be implemented in A n .…”
Section: Robustness Against the Number Of Processesmentioning
confidence: 90%
“…Since a * ∈ A, Alg has to terminate. D(A, B k ), then k-set agreement cannot be implemented in A, since it is impossible in B k [1][2][3]. If D(A, B k ), then k-set agreement cannot be implemented in A.…”
Section: Consider the Adversaries Frommentioning
confidence: 99%
“…The set-agreement problem [1] has no deterministic solution in asynchronous systems where any number of processes can fail by crashing [2,3,4] and the remaining processes have no information about such failures. With failure detection however, the impossibility can be circumvented [5].…”
Section: Introductionmentioning
confidence: 99%
“…The latter are a common model for interprocess communication through shared memory as discussed briefly in Section I. For details see [23], [25] and for use and motivation in distributed protocols see [8], [9], [19].…”
Section: Preliminariesmentioning
confidence: 99%