Muutke küpsiste eelistusi

E-raamat: Distributed Algorithms, second edition

(Vrije Universiteit Amsterdam)
  • Formaat: EPUB+DRM
  • Sari: Distributed Algorithms
  • Ilmumisaeg: 02-Mar-2018
  • Kirjastus: MIT Press
  • Keel: eng
  • ISBN-13: 9780262345521
  • Formaat - EPUB+DRM
  • Hind: 47,97 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Sari: Distributed Algorithms
  • Ilmumisaeg: 02-Mar-2018
  • Kirjastus: MIT Press
  • Keel: eng
  • ISBN-13: 9780262345521

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The new edition of a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models.

This book offers students and researchers a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models. It avoids mathematical argumentation, often a stumbling block for students, teaching algorithmic thought rather than proofs and logic. This approach allows the student to learn a large number of algorithms within a relatively short span of time. Algorithms are explained through brief, informal descriptions, illuminating examples, and practical exercises. The examples and exercises allow readers to understand algorithms intuitively and from different perspectives. Proof sketches, arguing the correctness of an algorithm or explaining the idea behind fundamental results, are also included. The algorithms presented in the book are for the most part "classics," selected because they shed light on the algorithmic design of distributed systems or on key issues in distributed computing and concurrent programming.

This second edition has been substantially revised. A new chapter on distributed transaction offers up-to-date treatment of database transactions and the important evolving area of transactional memory. A new chapter on security discusses two exciting new topics: blockchains and quantum cryptography. Sections have been added that cover such subjects as rollback recovery, fault-tolerant termination detection, and consensus for shared memory. An appendix offers pseudocode descriptions of many algorithms. Solutions and slides are available for instructors.

Distributed Algorithms can be used in courses for upper-level undergraduates or graduate students in computer science, or as a reference for researchers in the field.

Preface xi
1 Introduction
1(2)
2 Preliminaries
3(12)
2.1 Mathematical Notions
3(2)
2.2 Message Passing
5(5)
2.3 Shared Memory
10(2)
2.4 Exercises
12(3)
3 Snapshots
15(8)
3.1 Chandy-Lamport Algorithm
16(1)
3.2 Lai-Yang Algorithm
17(1)
3.3 Peterson-Kearns Rollback Recovery Algorithm
18(3)
3.4 Exercises
21(2)
4 Waves
23(8)
4.1 Traversal Algorithms
23(3)
4.2 Tree Algorithm
26(2)
4.3 Echo Algorithm
28(1)
4.4 Exercises
29(2)
5 Deadlock Detection
31(10)
5.1 Wait-for Graphs
31(1)
5.2 Bracha-Toueg Algorithm
32(7)
5.3 Exercises
39(2)
6 Termination Detection
41(10)
6.1 Dijkstra-Scholten Algorithm
42(1)
6.2 Rana's Algorithm
43(2)
6.3 Safra's Algorithm
45(1)
6.4 Weight Throwing
46(1)
6.5 Fault-Tolerant Weight Throwing
47(2)
6.6 Exercises
49(2)
7 Garbage Collection
51(6)
7.1 Reference Counting
51(3)
7.2 Garbage Collection Implies Termination Detection
54(1)
7.3 Tracing
54(1)
7.4 Exercises
55(2)
8 Routing
57(18)
8.1 Chandy-Misra Algorithm
57(2)
8.2 Merlin-Segall Algorithm
59(3)
8.3 Toueg's Algorithm
62(2)
8.4 Frederickson's Algorithm
64(4)
8.5 Packet Switching
68(2)
8.6 Routing on the Internet
70(1)
8.7 Exercises
71(4)
9 Election
75(14)
9.1 Election in Rings
75(4)
9.2 Tree Election Algorithm
79(1)
9.3 Echo Algorithm with Extinction
80(1)
9.4 Minimum Spanning Trees
81(5)
9.5 Exercises
86(3)
10 Anonymous Networks
89(12)
10.1 Impossibility of Election in Anonymous Rings
89(1)
10.2 Probabilistic Algorithms
90(1)
10.3 Itai-Rodeh Election Algorithm for Rings
91(1)
10.4 Echo Algorithm with Extinction for Anonymous Networks
92(2)
10.5 Computing the Size of an Anonymous Ring Is Impossible
94(1)
10.6 Itai-Rodeh Ring Size Algorithm
95(2)
10.7 Election in IEEE 1394
97(1)
10.8 Exercises
98(3)
11 Synchronous Networks
101(8)
11.1 Awerbuch's Synchronizer
101(3)
11.2 Bounded Delay Networks with Local Clocks
104(1)
11.3 Election in Anonymous Rings with Bounded Expected Delay
105(3)
11.4 Exercises
108(1)
12 Consensus with Crash Failures
109(12)
12.1 Impossibility of 1-Crash Consensus
110(1)
12.2 Bracha-Toueg Crash Consensus Algorithm
111(2)
12.3 Failure Detectors
113(1)
12.4 Consensus with a Weakly Accurate Failure Detector
114(1)
12.5 Chandra-Toueg Algorithm
114(3)
12.6 Consensus for Shared Memory
117(1)
12.7 Exercises
118(3)
13 Consensus with Byzantine Failures
121(14)
13.1 Bracha-Toueg Byzantine Consensus Algorithm
121(4)
13.2 Mahaney-Schneider Synchronizer
125(2)
13.3 Lamport-Shostak-Pease Broadcast Algorithm
127(3)
13.4 Lamport-Shostak-Pease Authentication Algorithm
130(2)
13.5 Exercises
132(3)
14 Mutual Exclusion
135(22)
14.1 Ricart-Agrawala Algorithm
136(1)
14.2 Raymond's Algorithm
137(3)
14.3 Agrawal--El Abbadi Algorithm
140(2)
14.4 Peterson's Algorithm
142(3)
14.5 Bakery Algorithm
145(2)
14.6 Fischer's Algorithm
147(1)
14.7 Test-and-Test-and-Set Lock
148(1)
14.8 Queue Locks
149(4)
14.9 Exercises
153(4)
15 Barriers
157(10)
15.1 Sense-Reversing Barrier
157(1)
15.2 Combining Tree Barrier
158(3)
15.3 Tournament Barrier
161(2)
15.4 Dissemination Barrier
163(2)
15.5 Exercises
165(2)
16 Distributed Transactions
167(10)
16.1 Serialization
168(3)
16.2 Two- and Three-Phase Commit Protocols
171(2)
16.3 Transactional Memory
173(3)
16.4 Exercises
176(1)
17 Self-Stabilization
177(10)
17.1 Dijkstra's Token Ring for Mutual Exclusion
177(3)
17.2 Arora-Gouda Spanning Tree Algorithm
180(3)
17.3 Afek-Kutten-Yung Spanning Tree Algorithm
183(2)
17.4 Exercises
185(2)
18 Security
187(14)
18.1 Basic Techniques
187(4)
18.2 Blockchains
191(3)
18.3 Quantum Cryptography
194(4)
18.4 Exercises
198(3)
19 Online Scheduling
201(10)
19.1 Jobs
201(1)
19.2 Schedulers
202(5)
19.3 Resource Access Control
207(2)
19.4 Exercises
209(2)
A Appendix: Pseudocode Descriptions
211(30)
A.1 Chandy-Lamport Snapshot Algorithm
212(1)
A.2 Lai-Yang Snapshot Algorithm
212(2)
A.3 Cidon's Depth-First Search Algorithm
214(1)
A.4 Tree Algorithm
215(1)
A.5 Echo Algorithm
215(1)
A.6 Shavit-Francez Termination Detection Algorithm
216(1)
A.7 Rana's Termination Detection Algorithm
217(1)
A.8 Safra's Termination Detection Algorithm
218(1)
A.9 Weight-Throwing Termination Detection Algorithm
219(1)
A.10 Chandy-Misra Routing Algorithm
220(1)
A.11 Merlin-Segall Routing Algorithm
221(1)
A.12 Toueg's Routing Algorithm
222(1)
A.13 Frederickson's Breadth-First Search Algorithm
223(2)
A.14 Dolev-Klawe-Rodeh Election Algorithm
225(1)
A.15 Gallager-Humblet-Spira Minimum Spanning Tree Algorithm
226(3)
A.16 IEEE 1394 Election Algorithm
229(1)
A.17 Awerbuch's Synchronizer
230(1)
A.18 Ricart-Agrawala Mutual Exclusion Algorithm
231(1)
A.19 Raymond's Mutual Exclusion Algorithm
232(2)
A.20 Agrawal--El Abbadi Mutual Exclusion Algorithm
234(1)
A.21 MCS Queue Lock
235(1)
A.22 CLH Queue Lock with Timeouts
236(1)
A.23 Afek-Kutten-Yung Spanning Tree Algorithm
237(4)
References 241(6)
Index 247