The Hash History Approach for Reconciling Mutual Inconsistency

نویسندگان

  • ByungHoon Kang
  • Robert Wilensky
  • John Kubiatowicz
چکیده

We introduce the hash history mechanism for capturing dependencies among distributed replicas. Hash histories, consisting of a directed graph of version hashes, are independent of the number of active nodes but dependent on the rate and number of modifications. We present the basic hash history scheme and discuss mechanisms for trimming the history over time. We simulate the efficacy of hash histories on several large CVS traces. Our results highlight a useful property of the hash history: the ability to recognize when two different non-commutative operations produce the same output, thereby reducing false conflicts and increasing the rate of convergence. We call these events coincidental equalities and demonstrate that their recognition can greatly reduce the time to global convergence.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Perspective of Mutual Recognition;Challenges and Mechanisms for Implementing it in the Area of European :::::::::union::::::::: Criminal Law

Abstract: Creation of new criminal law in the European ::::::::union:::::::: has led to an approximation of the criminal law of member states to each other. Compliance with this obligation for EU member states is due to the provisions of the Treaty of Lisbon. Main approach of the Treaty of Lisbon is to resort to the option of harmonizing the criminal laws of the member states, which is a new ch...

متن کامل

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags

Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most pervasive computing technologies in history. This presents a number of advantages, but also opens a huge number of security problems that need to be addressed before its successful deployment. Many proposals have recently appeared, but all of them are based on RFID tags ...

متن کامل

transaction cost and Time inconsistency in consumption- Savings behavior(experimental approach)

Empirical and experimental studies demonstrate that the rates of time preferences are smaller in long run in comparison with that of short run. In other word individuals are present bias; and it is one of the reasons that the saving is less than its optimal level. The aim of this study is to examine if the dearth of sufficient information results in time inconsistency in individual decisions fo...

متن کامل

Dfpd 00/th/52 an Order Parameter Reconciling Abelian and Center Dominance in Su(2) Yang–mills Theory

We analyze previously proposed order parameters for the confinement deconfinement transition in lattice SU(2) Yang–Mills theory, defined as vacuum expectation value (v.e.v.) of monopole fields in abelian projection gauges. We show that they exhibit some inconsistency in the treatment of small scales, due to a violation of Dirac quantization condition for fluxes. We propose a new order parameter...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003