Asynchrony from synchrony

26Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A synchronous message passing complete network with an adversary that may purge messages is used to precisely model tasks that are read-write wait-free computable. In the past, adversaries that reduce the computational power of a system as they purge messages were studied in the context of their ability to foil consensus. This paper considers the other extreme. It characterizes the limits on the power of message-adversary so that it cannot foil the solution of tasks which are read-write wait-free solvable but can foil the solution of any task that is not read-write wait-free solvable. Put another way, we study the weakest message-adversary which allows for solving any task that is solvable wait-free in the read-write model. A remarkable side-benefit of this characterization is a simple, as simple as can be, derivation of the Herlihy-Shavit condition that equates the wait-free read-write model with a subdivided-simplex. We show how each step in the computation inductively takes a subdivided-simplex and further subdivides it in the simplest way possible, making the characterization of read-write wait-free widely accessible. © Springer-Verlag 2013.

Cite

CITATION STYLE

APA

Afek, Y., & Gafni, E. (2013). Asynchrony from synchrony. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7730 LNCS, pp. 225–239). https://doi.org/10.1007/978-3-642-35668-1_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free