The Hash History Approach for Reconciling Mutual Inconsistency
نویسندگان
چکیده
We introduce the hash history mechanism for capturing dependencies among distributed replicas. Hash histories, consisting of a directed graph of version hashes, are independent of the number of active nodes but dependent on the rate and number of modifications. We present the basic hash history scheme and discuss mechanisms for trimming the history over time. We simulate the efficacy of hash histories on several large CVS traces. Our results highlight a useful property of the hash history: the ability to recognize when two different non-commutative operations produce the same output, thereby reducing false conflicts and increasing the rate of convergence. We call these events coincidental equalities and demonstrate that their recognition can greatly reduce the time to global convergence.
منابع مشابه
Perspective of Mutual Recognition;Challenges and Mechanisms for Implementing it in the Area of European :::::::::union::::::::: Criminal Law
Abstract: Creation of new criminal law in the European ::::::::union:::::::: has led to an approximation of the criminal law of member states to each other. Compliance with this obligation for EU member states is due to the provisions of the Treaty of Lisbon. Main approach of the Treaty of Lisbon is to resort to the option of harmonizing the criminal laws of the member states, which is a new ch...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملM2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags
Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most pervasive computing technologies in history. This presents a number of advantages, but also opens a huge number of security problems that need to be addressed before its successful deployment. Many proposals have recently appeared, but all of them are based on RFID tags ...
متن کاملtransaction cost and Time inconsistency in consumption- Savings behavior(experimental approach)
Empirical and experimental studies demonstrate that the rates of time preferences are smaller in long run in comparison with that of short run. In other word individuals are present bias; and it is one of the reasons that the saving is less than its optimal level. The aim of this study is to examine if the dearth of sufficient information results in time inconsistency in individual decisions fo...
متن کاملDfpd 00/th/52 an Order Parameter Reconciling Abelian and Center Dominance in Su(2) Yang–mills Theory
We analyze previously proposed order parameters for the confinement deconfinement transition in lattice SU(2) Yang–Mills theory, defined as vacuum expectation value (v.e.v.) of monopole fields in abelian projection gauges. We show that they exhibit some inconsistency in the treatment of small scales, due to a violation of Dirac quantization condition for fluxes. We propose a new order parameter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003