๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Time- and Space-Efficient Randomized Consensus

โœ Scribed by J. Aspnes


Book ID
102968465
Publisher
Elsevier Science
Year
1993
Tongue
English
Weight
751 KB
Volume
14
Category
Article
ISSN
0196-6774

No coin nor oath required. For personal study only.

โœฆ Synopsis


A protocol is presented which solves the randomized consensus problem [9] for shared memory. The protocol uses a total of (O\left(p^{2}+n\right)) worst-case expected increment, decrement, and read operations on a set of three shared (O(\log n))-bit counters, where (p) is the number of active processors and (n) is the total number of processors. It requires less space than previous polynomial-time consensus protocols [6, 7], and is faster when not all of the processors participate in the protocol. A modified version of the protocol yields a weak shared coin whose bias is guaranteed to be in the range (1 / 2 \pm \epsilon) regardless of scheduler behavior, and which is the first such protocol for the shared-memory model to guarantee that all processors agree on the outcome of the coin. (19493 Academic Press, Inc.


๐Ÿ“œ SIMILAR VOLUMES


Time and space efficient net extractor
โœ Surendra Nahar; Sartaj Sahni ๐Ÿ“‚ Article ๐Ÿ“… 1988 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 963 KB
Time-efficient state space search
โœ Alexander Reinefeld; Peter Ridinger ๐Ÿ“‚ Article ๐Ÿ“… 1994 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 628 KB

We present two time-efficient state space algorithms for searching minimax trees. Because they are based on SSS\* and Dual\*, both dominate Alpha-Beta on a node count basis. Moreover, one of them is always faster in searching random trees, even when the leaf node evaluation time is negligible. The f

Space and time-efficient hashing of garb
โœ Agesen, Ole ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 80 KB

The hashCode() method found in the Java TM programming language, and similar methods in other languages, map an arbitrary object to an integer value that is constant for the lifetime of the object. We review existing implementations of the hash operation, specifying the kinds of memory systems for w