Preface |
|
ix | |
|
|
1 | (6) |
|
|
|
|
7 | (6) |
|
|
13 | (6) |
|
3.1 Chandy-Lamport algorithm |
|
|
14 | (1) |
|
|
15 | (4) |
|
|
19 | (8) |
|
|
19 | (4) |
|
|
23 | (1) |
|
|
24 | (3) |
|
|
27 | (10) |
|
|
27 | (2) |
|
5.2 Bracha-Toueg algorithm |
|
|
29 | (8) |
|
|
37 | (10) |
|
6.1 Dijkstra-Scholten algorithm |
|
|
38 | (1) |
|
6.2 Weight-throwing algorithm |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (5) |
|
|
47 | (6) |
|
|
47 | (3) |
|
7.2 Garbage collection implies termination detection |
|
|
50 | (1) |
|
|
51 | (2) |
|
|
53 | (20) |
|
8.1 Chandy-Misra algorithm |
|
|
53 | (2) |
|
8.2 Merlin-Segall algorithm |
|
|
55 | (3) |
|
|
58 | (3) |
|
8.4 Frederickson's algorithm |
|
|
61 | (4) |
|
|
65 | (2) |
|
8.6 Routing on the Internet |
|
|
67 | (6) |
|
|
73 | (14) |
|
|
73 | (4) |
|
9.2 Tree election algorithm |
|
|
77 | (2) |
|
9.3 Echo algorithm with extinction |
|
|
79 | (1) |
|
9.4 Minimum spanning trees |
|
|
80 | (7) |
|
|
87 | (14) |
|
10.1 Impossibility of election in anonymous rings |
|
|
87 | (1) |
|
10.2 Probabilistic algorithms |
|
|
88 | (1) |
|
10.3 Itai-Rodeh election algorithm for rings |
|
|
89 | (2) |
|
10.4 Echo algorithm with extinction for anonymous networks |
|
|
91 | (2) |
|
10.5 Computing the size of an anonymous ring is impossible |
|
|
93 | (1) |
|
10.6 Itai-Rodeh ring size algorithm |
|
|
94 | (2) |
|
10.7 Election in IEEE 1394 |
|
|
96 | (5) |
|
|
101 | (10) |
|
11.1 A simple synchronizer |
|
|
101 | (1) |
|
11.2 Awerbuch's synchronizer |
|
|
102 | (3) |
|
11.3 Bounded delay networks with local clocks |
|
|
105 | (1) |
|
11.4 Election in anonymous rings with bounded expected delay |
|
|
106 | (5) |
|
|
111 | (10) |
|
12.1 Impossibility of 1-crash consensus |
|
|
112 | (1) |
|
12.2 Bracha-Toueg crash consensus algorithm |
|
|
113 | (2) |
|
|
115 | (1) |
|
12.4 Consensus with a weakly accurate failure detector |
|
|
116 | (1) |
|
12.5 Chandra-Toueg algorithm |
|
|
116 | (5) |
|
|
121 | (14) |
|
13.1 Bracha-Toueg Byzantine consensus algorithm |
|
|
121 | (4) |
|
13.2 Mahaney-Schneider synchronizer |
|
|
125 | (2) |
|
13.3 Lamport-Shostak-Pease broadcast algorithm |
|
|
127 | (3) |
|
13.4 Lamport-Shostak-Pease authentication algorithm |
|
|
130 | (5) |
|
|
135 | (10) |
|
14.1 Ricart-Agrawala algorithm |
|
|
135 | (2) |
|
|
137 | (3) |
|
14.3 Agrawal-El Abbadi algorithm |
|
|
140 | (5) |
|
|
|
|
145 | (2) |
|
|
147 | (14) |
|
16.1 Peterson's algorithm |
|
|
147 | (3) |
|
|
150 | (2) |
|
16.3 N registers are required |
|
|
152 | (1) |
|
|
152 | (1) |
|
16.5 Test-and-test-and-set lock |
|
|
153 | (2) |
|
|
155 | (6) |
|
|
161 | (10) |
|
17.1 Sense-reversing barrier |
|
|
161 | (1) |
|
17.2 Combining tree barrier |
|
|
162 | (3) |
|
|
165 | (3) |
|
17.4 Dissemination barrier |
|
|
168 | (3) |
|
|
171 | (10) |
|
18.1 Dijkstra's token ring for mutual exclusion |
|
|
171 | (4) |
|
18.2 Arora-Gouda spanning tree algorithm |
|
|
175 | (2) |
|
18.3 Afek-Kutten-Yung spanning tree algorithm |
|
|
177 | (4) |
|
|
181 | (12) |
|
|
181 | (1) |
|
|
182 | (6) |
|
19.3 Resource access control |
|
|
188 | (5) |
Pseudocode Descriptions |
|
193 | (28) |
References |
|
221 | (4) |
Index |
|
225 | |