Fault-tolerant broadcast is a fundamental service in distributed systems, by which processes can communicate with each other consistently and reliably. It has two main forms: Reli...
Adaptive security is a strong corruption model that captures “hacking” attacks where an external attacker breaks into parties’ machines in the midst of a protocol execution....
We introduce the study of the ant colony house-hunting problem from a distributed computing perspective. When an ant colony’s nest becomes unsuitable due to size constraints or ...
The history of distributed computing is full of trade-offs between safety and liveness. For instance, one of the most celebrated results in the field, namely the impossibility of...
Memory reclamation for sequential or lock-based data structures is typically easy. However, memory reclamation for lock-free data structures is a significant challenge. Automatic...
In its classical form, a consistent replicated service requires all replicas to witness the same evolution of the service state. Assuming a message-passing environment with a majo...
Swan Dubois, Rachid Guerraoui, Petr Kuznetsov, Fra...
Consider a point-to-point network in which nodes are connected by directed links. This paper proves tight necessary and sufficient conditions on the underlying communication graph...
This paper studies the question of how to run many distributed algorithms, solving independent problems, together as fast as possible. Suppose that we want to run distributed algo...