Local and global properties in networks of processors (Extended Abstract), Proceedings of the twelfth annual ACM symposium on Theory of computing , STOC '80, pp.82-93, 1980. ,
DOI : 10.1145/800141.804655
Computation in networks of passively mobile finite-state sensors, Distributed Computing, vol.13, issue.4, pp.235-253, 2006. ,
DOI : 10.1007/s00446-005-0138-3
A modular approach to shared-memory consensus, with applications to the probabilistic-write model, Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp.460-467, 2010. ,
Better computing on the anonymous ring, Journal of Algorithms, vol.12, issue.2, pp.204-238, 1991. ,
DOI : 10.1016/0196-6774(91)90002-G
Computing on an anonymous ring, Journal of the ACM, vol.35, issue.4, pp.845-875, 1988. ,
DOI : 10.1145/48014.48247
Another advantage of free choice (Extended Abstract), Proceedings of the second annual ACM symposium on Principles of distributed computing , PODC '83, pp.27-30, 1983. ,
DOI : 10.1145/800221.806707
The Price of Anonymity, Proceedings of the 23rd International Symposium on Distributed Computing (DISC), pp.341-355, 2009. ,
DOI : 10.1145/2019591.2019592
URL : https://hal.archives-ouvertes.fr/inria-00348302
Anonymous Asynchronous Systems: The Case of Failure Detectors, Proceedings of the 24th International Symposium Distributed Computing (DISC), pp.206-220, 2010. ,
DOI : 10.1007/978-3-642-15763-9_22
URL : https://hal.archives-ouvertes.fr/inria-00452799
Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.206-213, 2010. ,
DOI : 10.1109/AINA.2010.19
URL : https://hal.archives-ouvertes.fr/inria-00426674
The weakest failure detector for solving consensus, Journal of the ACM, vol.43, issue.4, pp.685-722, 1996. ,
DOI : 10.1145/234533.234549
Unreliable failure detectors for reliable distributed systems, J. ACM, vol.43, issue.2, pp.225-267, 1996. ,
A Survey of Anonymous Peer-to-Peer File-Sharing, Proceedings Workshops on Embedded and Ubiquitous Computing (EUC), pp.744-755, 2005. ,
DOI : 10.1007/11596042_77
Tight failure detection bounds on atomic object implementations, J. ACM, vol.57, issue.4, p.2010 ,
The weakest failure detectors to solve certain fundamental problems in distributed computing, Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing , PODC '04, pp.338-346, 2004. ,
DOI : 10.1145/1011767.1011818
The Weakest Failure Detector for Message Passing Set-Agreement, Proceedings of the 22nd International Symposium on Distributed Computing (DISC), pp.109-120, 2008. ,
DOI : 10.1007/978-3-540-87779-0_8
URL : https://hal.archives-ouvertes.fr/hal-00260000
Fault-Tolerant Consensus in Unknown and Anonymous Networks, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.368-375, 2009. ,
DOI : 10.1109/ICDCS.2009.36
URL : https://hal.archives-ouvertes.fr/hal-00369280
Consensus in the presence of partial synchrony, Journal of the ACM, vol.35, issue.2, pp.288-323, 1988. ,
DOI : 10.1145/42282.42283
Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985. ,
DOI : 10.1145/3149.214121
The failure detector abstraction, ACM Comput. Surv, vol.43, issue.2, p.9, 2011. ,
Intersecting Sets: a Basic Abstraction for Asynchronous Agreement Problems, 11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), pp.15-22, 2005. ,
DOI : 10.1109/PRDC.2005.37
On the computability power and the robustness of set agreement-oriented failure detector classes, Distributed Computing, pp.201-222, 2008. ,
DOI : 10.1007/s00446-008-0064-2
Leader-based consensus. Parallel Processing Letters, pp.95-107, 2001. ,
Computing on an anonymous network, Proceedings of the seventh annual ACM Symposium on Principles of distributed computing , PODC '88, pp.69-89, 1996. ,
DOI : 10.1145/62546.62568
Computing on an anonymous network, Proceedings of the seventh annual ACM Symposium on Principles of distributed computing , PODC '88, pp.90-96, 1996. ,
DOI : 10.1145/62546.62568
Structured derivations of consensus algorithms for failure detectors Take V ? ? V such that ?v ? V : S(v, G) ? V ? and V ? is minimal According to property (d4) of G, ?k i > 0 such that V (p i , k i ) Since p i is correct it holds that ?k > k i : V (p i , k) ? V (G). Hence, according to property (d3) of G, it holds that ?k > k i : (V (p i, Proceedings of the 17th Annual ACM Symposium on Principles of Distributed Computing (PODC) V (p i , k)) ? E(G). But we showed that ?v ? V ? : (v, V (p i , k i )) ? E(G). By transitivity (d2) of G, we get: ?k ? k i : ?v ? V ? : (v, V (p i , k)) ? E(G), pp.297-306, 1998. ,
It follows that: ?k ? k i : ?v ? V : ?x ? S(v, G) : (x, V (p i , k)) ? E(G) This implies according to rule (r3) of Definition D.4 that: ?k ? k i ,
Hence (ii) implies that, ). It follows that (ii ? ) ?x ? S(u, Y ) : (x, w) ? E(Y ) ,
Given S a multiset, let 1 x S denote the multiplicity of x in S. Given u = (p u , stateU ) and v = (p v , stateV ) any two ,
X)), for every permutation of processes identities ?, if ?(u), ?(v), )), then (?(u), ?(v)) ? E(M(X)) ,
Let u = (p u , s u ), v = (p v , s v ) We distinguish between the case in which (i) ,
according to rule (r3) of Definition D.4, we have ,
Let Y, X two subgraphs of G such that X ,
Let X a (closed) subgraph of G. If ,
We say that v 2 ? V (X) is U -stable in M(X) ,