Fault-Tolerant Implementations of Regular Registers by Safe Registers with Applications to Networks
نویسندگان
چکیده
We present the first wait-free and self-stabilizing implementation of a single-writer/single-reader regular register by single-writer/single-reader safe registers. The construction is in two steps: one implements a regular register using 1-regular registers, and the other implements a 1-regular register using saferegisters. In both steps, if the initial register is bounded then the implementation uses only bounded registers.
منابع مشابه
Fault-tolerant Implementations of regular Registers by safe Registers in Link Model
A network that uses locally shared registers can be modelled by a graph where nodes represent processors and there is an edge between two nodes if and only if the corresponding processors communicate directly by reading or writing registers shared between them. Two variants are defined by A variant of the model assumes that registers are singlewriter/single-reader and are located on the edges (...
متن کاملScalable Quantum Networks Based on Few-qubit Registers
We describe and analyze a hybrid approach to scalable quantum computation based on an optically connected network of few-qubit quantum registers. We show that probabilistically connected ̄ve-qubit quantum registers su±ce for deterministic, fault-tolerant quantum computation even when state preparation, measurement, and entanglement generation all have substantial errors. We discuss requirements ...
متن کاملBounds on the Costs of Register Implementations
A fundamental aspect of any concurrent system is how processes communicate with each other. Ultimately, all communication involves concurrent reads and writes of shared memory cells, or registers. The stronger the guarantees provided by a register, the more useful it is to the user, but the harder it may be to implement in practice. Thus it is of interest to determine which types of registers c...
متن کاملFault-Tolerant Implementations of the Atomic-State Communication Model in Weaker Networks
There is a proliferation of models for distributed computing, consisting of both shared memory and message passing paradigms. Di erent communities adopt di erent variants as the \standard" model for their research setting. Since subtle changes in the communication model can result in signi cant changes to the solvability/unsolvability or to the complexity of various problems, it becomes imperat...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009