Sciweavers

WDAG
2005
Springer

What Can Be Implemented Anonymously?

14 years 4 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? What if processes do not have unique identifiers or do not wish to divulge them for reasons of privacy? We consider asynchronous shared-memory systems that are anonymous. The shared memory contains only the most common type of shared objects, read/write registers. We investigate, for the first time, what can be implemented deterministically in this model when processes can fail. We give anonymous algorithms for some fundamental problems: timestamping, snapshots and consensus. Our solutions to the first two are wait-free and the third is obstruction-free. We also show that a shared object has an obstruction-free implementation if and only if it satisfies a simple property called idempotence. To prove the sufficiency of this condition, we give a universal construction that implements any idempotent object.
Rachid Guerraoui, Eric Ruppert
Added 28 Jun 2010
Updated 28 Jun 2010
Type Conference
Year 2005
Where WDAG
Authors Rachid Guerraoui, Eric Ruppert
Comments (0)