Revisiting the weakest failure detector for uniform reliable broadcast, DISC '99: Proceedings of the thirteenth International Symposium on Distributed Computing, pp.13-33, 1999. ,
A note on reliable full-duplex transmission over half-duplex links, Communications of the ACM, vol.12, issue.5, pp.260-261, 1969. ,
DOI : 10.1145/362946.362970
Simulating crash failures with many faulty processors (extended abstract), 6th International Workshop on Distributed Algorithms (WDAG '92), pp.166-184, 1992. ,
Consensus with Unknown Participants or Fundamental Self-Organization, Lecture Notes in Computer Science, vol.3158, pp.135-148 ,
DOI : 10.1007/978-3-540-28634-9_11
The weakest failure detector for solving consensus, Journal of the ACM, vol.43, issue.4, pp.685-722, 1996. ,
DOI : 10.1145/234533.234549
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996. ,
A Simple and Efficient Randomized Byzantine Agreement Algorithm, IEEE Transactions on Software Engineering, vol.11, issue.6, pp.531-539, 1985. ,
DOI : 10.1109/TSE.1985.232245
A realistic look at failure detectors, Proceedings International Conference on Dependable Systems and Networks, pp.345-353, 2002. ,
DOI : 10.1109/DSN.2002.1028919
The weakest failure detectors to solve certain fundamental problems in distributed computing, Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing , PODC '04, pp.338-346, 2004. ,
DOI : 10.1145/1011767.1011818
Mutual exclusion in asynchronous systems with failure detectors, Journal of Parallel and Distributed Computing, vol.65, issue.4, pp.492-505, 2005. ,
DOI : 10.1016/j.jpdc.2004.11.008
URL : https://hal.archives-ouvertes.fr/hal-00130799
On the minimal synchronism needed for distributed consensus, Journal of the ACM, vol.34, issue.1, pp.77-97, 1987. ,
DOI : 10.1145/7531.7533
Consensus in the presence of partial synchrony, Journal of the ACM, vol.35, issue.2, pp.288-323, 1988. ,
DOI : 10.1145/42282.42283
The weakest failure detector to solve nonuniform consensus, Distributed Computing, vol.11, issue.1, pp.335-359, 2007. ,
DOI : 10.1007/s00446-006-0019-4
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony, International Conference on Dependable Systems and Networks (DSN'06), pp.166-178, 2006. ,
DOI : 10.1109/DSN.2006.34
Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985. ,
DOI : 10.1145/3149.214121
Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown Networks, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), pp.82-91, 2007. ,
DOI : 10.1109/DSN.2007.61
URL : https://hal.archives-ouvertes.fr/inria-00123020
The weakest failure detectors to boost obstruction-freedom, DISC '06: Proceedings of the twentieth International Symposium on Distributed Computing, pp.399-412, 2006. ,
The generic consensus service, IEEE Transactions on Software Engineering, vol.27, issue.1, pp.29-41, 2001. ,
DOI : 10.1109/32.895986
A modular approach to fault-tolerant broadcasts and related problems, 1994. ,
A knowledge-theoretic analysis of uniform distributed coordination and failure detectors, Eighteenth Annual ACM Symposium on Principles of Distributed Computing (PODC '99), pp.73-82, 1999. ,
Data link layer: two impossibility results, Proceedings of the seventh annual ACM Symposium on Principles of distributed computing , PODC '88, pp.149-170, 1988. ,
DOI : 10.1145/62546.62572
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3509
In Search of the Holy Grail: Looking for the Weakest Failure Detector for Wait-Free Set Agreement, Lecture Notes in Computer Science, vol.4305, pp.3-19, 2006. ,
DOI : 10.1007/11945529_2
URL : https://hal.archives-ouvertes.fr/inria-00089977
A data transfer protocol, Computer Networks (1976), vol.1, issue.2, pp.99-110, 1976. ,
DOI : 10.1016/0376-5075(76)90015-5
Anti-omega: the weakest failure detector for set agreement, 2007. ,
{?,m i?1 } where m i?1 is the (i ? 1) th message broadcasted by p, except p that sets Mes p [p] to m i where m i is the i th message it broadcasts ,
{?,m k?1 } where m k?1 is the (k ? 1) th message broadcasted by p, except p that sets Mes p [p] to m k where m k is the k th message it broadcasts ,
Mes p [p] is set to m when p starts its k th broadcast. Then, (i) Mes p [p] remains equal to m until p terminates the broadcast and, from the termination of the broadcast to the start of the next one ,
And so, it has suspected q or it has wait a Decide, ?? message or a Start message from q. If q is suspected in the (i ? 1) th R-PROPOSED(?) by the failure detector of p, q remains suspected in the i th R-PROPOSED(?) and so p does not send messages to q. If it has wait a Decide, ?? message or a Start message from q, by induction assumption part 2 and 3 this message can only send by q during the (i ? 1) th R-PROPOSED(?) And so q has finished all j th R-PROPOSED with j < i ? 1 and has executed the i ? 1 th R-PROPOSED(?) until at least Line 13, contradicting the assumption. To conclude the proof of the first part we have to show that no message R-x, ?? sent by process p while executed the first R-PROPOSED(v) ,