D. Angluin, Local and global properties in networks of processors (Extended Abstract), Proceedings of the twelfth annual ACM symposium on Theory of computing , STOC '80, pp.82-93, 1980.
DOI : 10.1145/800141.804655

D. Angluin, J. Aspnes, Z. Diamadi, M. J. Fischer, and R. Peralta, Computation in networks of passively mobile finite-state sensors, Distributed Computing, vol.13, issue.4, pp.235-253, 2006.
DOI : 10.1007/s00446-005-0138-3

J. Aspnes, A modular approach to shared-memory consensus, with applications to the probabilistic-write model, Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp.460-467, 2010.

H. Attiya and M. Snir, Better computing on the anonymous ring, Journal of Algorithms, vol.12, issue.2, pp.204-238, 1991.
DOI : 10.1016/0196-6774(91)90002-G

H. Attiya, M. Snir, and M. K. Warmuth, Computing on an anonymous ring, Journal of the ACM, vol.35, issue.4, pp.845-875, 1988.
DOI : 10.1145/48014.48247

M. Ben-or, Another advantage of free choice (Extended Abstract), Proceedings of the second annual ACM symposium on Principles of distributed computing , PODC '83, pp.27-30, 1983.
DOI : 10.1145/800221.806707

F. Bonnet and M. Raynal, The Price of Anonymity, Proceedings of the 23rd International Symposium on Distributed Computing (DISC), pp.341-355, 2009.
DOI : 10.1145/2019591.2019592

URL : https://hal.archives-ouvertes.fr/inria-00348302

F. Bonnet and M. Raynal, Anonymous Asynchronous Systems: The Case of Failure Detectors, Proceedings of the 24th International Symposium Distributed Computing (DISC), pp.206-220, 2010.
DOI : 10.1007/978-3-642-15763-9_22

URL : https://hal.archives-ouvertes.fr/inria-00452799

F. Bonnet and M. Raynal, Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.206-213, 2010.
DOI : 10.1109/AINA.2010.19

URL : https://hal.archives-ouvertes.fr/inria-00426674

V. Tushar-deepak-chandra, S. Hadzilacos, and . Toueg, The weakest failure detector for solving consensus, Journal of the ACM, vol.43, issue.4, pp.685-722, 1996.
DOI : 10.1145/234533.234549

T. Deepak, C. , and S. Toueg, Unreliable failure detectors for reliable distributed systems, J. ACM, vol.43, issue.2, pp.225-267, 1996.

T. Chothia and K. Chatzikokolakis, A Survey of Anonymous Peer-to-Peer File-Sharing, Proceedings Workshops on Embedded and Ubiquitous Computing (EUC), pp.744-755, 2005.
DOI : 10.1007/11596042_77

C. Delporte-gallet, H. Fauconnier, and R. Guerraoui, Tight failure detection bounds on atomic object implementations, J. ACM, vol.57, issue.4, p.2010

C. Delporte-gallet, H. Fauconnier, R. Guerraoui, V. Hadzilacos, P. Kouznetsov et al., The weakest failure detectors to solve certain fundamental problems in distributed computing, Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing , PODC '04, pp.338-346, 2004.
DOI : 10.1145/1011767.1011818

C. Delporte-gallet, H. Fauconnier, R. Guerraoui, and A. Tielmann, The Weakest Failure Detector for Message Passing Set-Agreement, Proceedings of the 22nd International Symposium on Distributed Computing (DISC), pp.109-120, 2008.
DOI : 10.1007/978-3-540-87779-0_8

URL : https://hal.archives-ouvertes.fr/hal-00260000

C. Delporte-gallet, H. Fauconnier, and A. Tielmann, Fault-Tolerant Consensus in Unknown and Anonymous Networks, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.368-375, 2009.
DOI : 10.1109/ICDCS.2009.36

URL : https://hal.archives-ouvertes.fr/hal-00369280

C. Dwork, N. Lynch, and L. Stockmeyer, Consensus in the presence of partial synchrony, Journal of the ACM, vol.35, issue.2, pp.288-323, 1988.
DOI : 10.1145/42282.42283

M. J. Fischer, N. A. Lynch, and M. Paterson, Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985.
DOI : 10.1145/3149.214121

C. Felix, R. Freiling, P. Guerraoui, and . Kuznetsov, The failure detector abstraction, ACM Comput. Surv, vol.43, issue.2, p.9, 2011.

R. Friedman, A. Mostéfaoui, and M. Raynal, Intersecting Sets: a Basic Abstraction for Asynchronous Agreement Problems, 11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), pp.15-22, 2005.
DOI : 10.1109/PRDC.2005.37

A. Mostéfaoui, S. Rajsbaum, M. Raynal, and C. Travers, On the computability power and the robustness of set agreement-oriented failure detector classes, Distributed Computing, pp.201-222, 2008.
DOI : 10.1007/s00446-008-0064-2

A. Mostéfaoui and M. Raynal, Leader-based consensus. Parallel Processing Letters, pp.95-107, 2001.

M. Yamashita and T. Kameda, Computing on an anonymous network, Proceedings of the seventh annual ACM Symposium on Principles of distributed computing , PODC '88, pp.69-89, 1996.
DOI : 10.1145/62546.62568

M. Yamashita and T. Kameda, Computing on an anonymous network, Proceedings of the seventh annual ACM Symposium on Principles of distributed computing , PODC '88, pp.90-96, 1996.
DOI : 10.1145/62546.62568

J. Yang, G. Neiger, and E. Gafni, Structured derivations of consensus algorithms for failure detectors Take V ? ? V such that ?v ? V : S(v, G) ? V ? and V ? is minimal According to property (d4) of G, ?k i > 0 such that V (p i , k i ) Since p i is correct it holds that ?k > k i : V (p i , k) ? V (G). Hence, according to property (d3) of G, it holds that ?k > k i : (V (p i, Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing (PODC) V (p i , k)) ? E(G). But we showed that ?v ? V ? : (v, V (p i , k i )) ? E(G). By transitivity (d2) of G, we get: ?k ? k i : ?v ? V ? : (v, V (p i , k)) ? E(G), pp.297-306, 1998.

?. V. Since-?v, It follows that: ?k ? k i : ?v ? V : ?x ? S(v, G) : (x, V (p i , k)) ? E(G) This implies according to rule (r3) of Definition D.4 that: ?k ? k i

Y. Since, Hence (ii) implies that, ). It follows that (ii ? ) ?x ? S(u, Y ) : (x, w) ? E(Y )

E. Lemma, Given S a multiset, let 1 x S denote the multiplicity of x in S. Given u = (p u , stateU ) and v = (p v , stateV ) any two

E. Lemma, X)), for every permutation of processes identities ?, if ?(u), ?(v), )), then (?(u), ?(v)) ? E(M(X))

. Proof, Let u = (p u , s u ), v = (p v , s v ) We distinguish between the case in which (i)

. Hence, according to rule (r3) of Definition D.4, we have

E. Lemma, Let Y, X two subgraphs of G such that X

E. Corollary, Let X a (closed) subgraph of G. If

X. Let and G. Subgraph, We say that v 2 ? V (X) is U -stable in M(X)