M. K. Aguilera, S. Toueg, and B. Deianov, Revisiting the weakest failure detector for uniform reliable broadcast, DISC '99: Proceedings of the thirteenth International Symposium on Distributed Computing, pp.13-33, 1999.

K. A. Bartlett, R. A. Scantlebury, and P. T. Wilkinson, A note on reliable full-duplex transmission over half-duplex links, Communications of the ACM, vol.12, issue.5, pp.260-261, 1969.
DOI : 10.1145/362946.362970

A. Rida, G. Bazzi, and . Neiger, Simulating crash failures with many faulty processors (extended abstract), 6th International Workshop on Distributed Algorithms (WDAG '92), pp.166-184, 1992.

D. Cavin, Y. Sasson, and A. Schiper, Consensus with Unknown Participants or Fundamental Self-Organization, Lecture Notes in Computer Science, vol.3158, pp.135-148
DOI : 10.1007/978-3-540-28634-9_11

V. Tushar-deepak-chandra, S. Hadzilacos, and . Toueg, The weakest failure detector for solving consensus, Journal of the ACM, vol.43, issue.4, pp.685-722, 1996.
DOI : 10.1145/234533.234549

T. Deepak, C. , and S. Toueg, Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996.

B. Chor and B. A. Coan, A Simple and Efficient Randomized Byzantine Agreement Algorithm, IEEE Transactions on Software Engineering, vol.11, issue.6, pp.531-539, 1985.
DOI : 10.1109/TSE.1985.232245

C. Delporte-gallet, H. Fauconnier, and R. Guerraoui, A realistic look at failure detectors, Proceedings International Conference on Dependable Systems and Networks, pp.345-353, 2002.
DOI : 10.1109/DSN.2002.1028919

C. Delporte-gallet, H. Fauconnier, R. Guerraoui, V. Hadzilacos, P. Kouznetsov et al., The weakest failure detectors to solve certain fundamental problems in distributed computing, Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing , PODC '04, pp.338-346, 2004.
DOI : 10.1145/1011767.1011818

C. Delporte-gallet, H. Fauconnier, R. Guerraoui, and P. Kouznetsov, Mutual exclusion in asynchronous systems with failure detectors, Journal of Parallel and Distributed Computing, vol.65, issue.4, pp.492-505, 2005.
DOI : 10.1016/j.jpdc.2004.11.008

URL : https://hal.archives-ouvertes.fr/hal-00130799

D. Dolev, C. Dwork, and L. J. Stockmeyer, On the minimal synchronism needed for distributed consensus, Journal of the ACM, vol.34, issue.1, pp.77-97, 1987.
DOI : 10.1145/7531.7533

C. Dwork, N. A. Lynch, and L. J. Stockmeyer, Consensus in the presence of partial synchrony, Journal of the ACM, vol.35, issue.2, pp.288-323, 1988.
DOI : 10.1145/42282.42283

J. Eisler, V. Hadzilacos, and S. Toueg, The weakest failure detector to solve nonuniform consensus, Distributed Computing, vol.11, issue.1, pp.335-359, 2007.
DOI : 10.1007/s00446-006-0019-4

A. Fernández, E. Jiménez, and M. Raynal, Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony, International Conference on Dependable Systems and Networks (DSN'06), pp.166-178, 2006.
DOI : 10.1109/DSN.2006.34

M. J. Fischer, N. A. Lynch, and M. Paterson, Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985.
DOI : 10.1145/3149.214121

F. Greve and S. Tixeuil, Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown Networks, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), pp.82-91, 2007.
DOI : 10.1109/DSN.2007.61

URL : https://hal.archives-ouvertes.fr/inria-00123020

R. Guerraoui, M. Kapalka, and P. Kouznetsov, The weakest failure detectors to boost obstruction-freedom, DISC '06: Proceedings of the twentieth International Symposium on Distributed Computing, pp.399-412, 2006.

R. Guerraoui and A. Schiper, The generic consensus service, IEEE Transactions on Software Engineering, vol.27, issue.1, pp.29-41, 2001.
DOI : 10.1109/32.895986

V. Hadzilacos and S. Toueg, A modular approach to fault-tolerant broadcasts and related problems, 1994.

Y. Joseph, A. Halpern, and . Ricciardi, A knowledge-theoretic analysis of uniform distributed coordination and failure detectors, Eighteenth Annual ACM Symposium on Principles of Distributed Computing (PODC '99), pp.73-82, 1999.

N. A. Lynch, Y. Mansour, and A. Fekete, Data link layer: two impossibility results, Proceedings of the seventh annual ACM Symposium on Principles of distributed computing , PODC '88, pp.149-170, 1988.
DOI : 10.1145/62546.62572

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3509

M. Raynal and C. Travers, In Search of the Holy Grail: Looking for the Weakest Failure Detector for Wait-Free Set Agreement, Lecture Notes in Computer Science, vol.4305, pp.3-19, 2006.
DOI : 10.1007/11945529_2

URL : https://hal.archives-ouvertes.fr/inria-00089977

V. Stenning, A data transfer protocol, Computer Networks (1976), vol.1, issue.2, pp.99-110, 1976.
DOI : 10.1016/0376-5075(76)90015-5

P. Zielinski, Anti-omega: the weakest failure detector for set agreement, 2007.

. Mes-j, {?,m i?1 } where m i?1 is the (i ? 1) th message broadcasted by p, except p that sets Mes p [p] to m i where m i is the i th message it broadcasts

. Mes-j, {?,m k?1 } where m k?1 is the (k ? 1) th message broadcasted by p, except p that sets Mes p [p] to m k where m k is the k th message it broadcasts

@. and =. P. First, Mes p [p] is set to m when p starts its k th broadcast. Then, (i) Mes p [p] remains equal to m until p terminates the broadcast and, from the termination of the broadcast to the start of the next one

R. Before-executing-the-i-th, And so, it has suspected q or it has wait a Decide, ?? message or a Start message from q. If q is suspected in the (i ? 1) th R-PROPOSED(?) by the failure detector of p, q remains suspected in the i th R-PROPOSED(?) and so p does not send messages to q. If it has wait a Decide, ?? message or a Start message from q, by induction assumption part 2 and 3 this message can only send by q during the (i ? 1) th R-PROPOSED(?) And so q has finished all j th R-PROPOSED with j < i ? 1 and has executed the i ? 1 th R-PROPOSED(?) until at least Line 13, contradicting the assumption. To conclude the proof of the first part we have to show that no message R-x, ?? sent by process p while executed the first R-PROPOSED(v)