| 
		        
			        |  |  
			        |  |  
					| Авторизация |  
					|  |  
			        |  |  
			        | Поиск по указателям |  
			        | 
 |  
			        |  |  
			        |  |  
			        |  |  
                    |  |  
			        |  |  
			        |  |  |  | 
		|  |  
                    | Dolev S. — Self-Stabilization |  
                    |  |  
			        |  |  
                    | Предметный указатель |  
                    | |  25 
  10 14 Abello, J.      186
 Abu-Amara, H.      172
 Adaptive self-stabilization      97
 Adjustment      143 148
 Afek, Y.      55 119 120 134 172
 Aggarwal, S.      120
 Aggregate step      16 22
 Agreement      143 147
 Alphabet      180 181 184
 Alternating-bit algorithm      47 49—51 53 57 58 119
 Anagnostou, E.      120 158
 Anonymous processors      71 110
 Anonymous system      11 38 120 123
 Antonoiu, G.      54
 Aperiodic sequence      119 184 185
 Arora, A.      54 55 134 157 172
 arrow      144 145
 Asynchronous round      9
 Asynchronous system      5 8 9 28 73 82 98 106 121 137 155 158
 Atomic step      7 21 26 27 31 40 41 45 81
 Attiya, H.      69
 Attractor      34 35
 Average convergence time      168 169
 Awerbuch, B.      55 120 134 158 172 186
 Baratz, A.      68
 Barbosa, V.C.      69
 Bartlett, K.      55 119
 Bastani, F.B.      158 172
 Beauquier, J.      54 134 158
 Behind relation      145
 Broadcast      97
 Brown, G.M.      55 119
 Bums, J.E.      55 120
 Byzantine faults      63 135—137 146 147 150 153 157
 Central daemon      16 20—22 27 32 33 38 39 71—74 91 92 120 173
 Chen, N.S.      54
 Chinese remainder counter      154
 Chinese remainder theorem      154
 Cidon, I.      69
 Circular execution      79 81
 Client algorithm      23 24 27 131 153
 Coan, B.      172
 Coarse atomicity      39 40
 Cobb, J.A.      69
 coin toss      39 40
 Coin-toss      11
 Collin, Z.      54
 Combined probability      37 40
 Communication deadlock      75
 Communication graph      5 10 12 14 24 27—29 42 44 55 72 107 111 115 119 128 140 148 166
 Communication link      5 6 27 47 48 63 73 75 92 124 126
 Communication operation      7 10 14
 Communication register      6 7 10—12 16 21 23 42 44 72 110 121 132 147 175 178
 Communication-adaptive      97
 Complexity measures      9
 Computation power      173
 Computation step      7 14 17 19 71 75 77 78 121 122
 Computational model      5
 Computer      5 6 21 45
 Computer program      5 6
 concurrent      7 78 81
 Configuration, initial      10
 Configuration, non-legal      67
 Configuration, pseudostabilized      84 183—185
 Configuration, safe      9
 Connected component      90
 Consistency monitoring      123 128 129
 Convergecast      87 96 97
 Convergence stairs      34 35 55
 Corruption of a region      170
 Corruption of bit      49
 Corruption of frame      57 61
 Corruption of information      57
 Corruption of memory      66 169
 Corruption of memory device      66
 Corruption of message      8 47
 Corruption of program code      66
 Corruption of state      164
 Corruption of system consistency      125
 Corruption of variable      150
 Costello, A.      69
 Couvreur, J.M.      120
 CYCLE      10
 Data-link algorithm      24 47 49 58 61 62 64 68 74 76 82 99—102 104 124 132
 Data-link layer      49 57 59
 Data-link procedure      49
 Data-link service      24 104
 Data-link task      53 74
 Datta, A.K.      55 69
 Debest, X.A.      69
 Delaet, S.      134
 Deliver      49
 Diameter      29 42 89 90 97 98 110 120 122 126—129 138 140 167 170 173
 Digital clock      4 137—142 147 151 157 158
 Dijkstra, E.W.      1 3 4 16—21 55 71 72 76 90 91 119 173
 Distributed daemon      71 72 119
 Distributed input      27 121
 distributed system      5—7 12 28 90—92 128 135 156 157 170 173
 Dolev, D.      157
 Dolev, S.      4 54 55 69 119 120 134 157 158 172 186
 Dynamic algorithm      159 160
 Dynamic networks      172
 Dynamic system      90 97 110 159—161 164
 El-Yaniv, R.      120
 Environment step      8
 Error-detection code      8 47 49 57 61 168—170 172
 execution      7
 Execution, circular      80
 Execution, fair      8 9 17—19 23 26 35 36 39 45 76 77 81 89 91 100 101 104 105 108 130 156 175 177 178
 Execution, legal      78
 Execution, synchronous      9
 Fair composition      22—24 27 55 72 107 130 131 133 153
 Fair execution      133
 Fairness      8 102 175
 fault      1 57 67 68 135
 Fault containment      159 166 172
 Fault models      135
 Fault tolerance      3
 Fault types      63
 Fault, crash model      135
 Fault, detection      126 128 129 134
 Fault, transient      1 3 4 42 72 82 124 125
 FETCH      49
 Fine atomicity      41
 Fischer, M.J.      157
 Flatebo, M.      55 69
 Floating distance      14
 Floating identifier      34 35
 Floating output      27—31 55 122 123 180
 Floating output variables      28
 Floating tuple      94 96 114
 Frame      47—19
 Francez, N.      120
 Frequently Asked Questions      66
 Fujiwara, H.      172
 Gafni, E.      172
 Gallager, R.G.      120
 General stabilizer      123
 Ghosh, S.      69 157 172
 Goldberg, J.      157
 Gopal, A.S.      158
 Gopal, I.      69
 Gouda, M.G.      54 55 69 119 120 134 157 172 186
 Green, M.W.      157
 Gupta, A.      172
 Hadzilacos, V.      120 158
 Halpern, J.Y.      157
 Herman, T.      55 157 172
 
 | Hopcroft, J.E.      173 181 Howell, R.R.      186
 Hsu, S.C.      55
 Huang, S.T.      54 55
 Identical processors      11
 Initial state      1
 Input register      178
 Interleaving      7 11 36 71 121
 Israeli, A.      54 55 119 120 172 186
 Itkis, G.      134 186
 Jayaram, M.      69
 Johnen, C.      54
 Kanevsky, A.      172
 Katayama, Y.      172
 Katz, S.      172
 Kekkonen-Moneta, S.      158
 Kessels, J.L.W.      55
 Knuth, D.E.      154 155
 Kruijer, H.S.M.      120
 Kulkarni, S.S.      172
 Kutten, S.      55 69 120 134 158 172
 Lamport, L.      3 4 55 69 157
 Legal behavior      9 22 37 45
 Legal configuration      54
 Legal execution      9 23 30 32 45 46
 Levin, L.      134 186
 Levitt, K.N.      157
 Lin, C.      157
 Linearize      86
 Local computation      7 10 11 13 14 78
 Local stabilization      159 168
 Local stabilizer      172
 Lock step      137
 Loss of frame      57
 Loss of message      8 47
 Luck’s strategy      36 37 40 41 84 113 115 152
 Lynch, N.      157
 Malicious adversary      136
 Malicious fault      168
 Mansour, Y.      55 120 158
 Masuzawa, T.      158 172
 Maximal matching      32
 Mayer, A.      186
 Melliar-Smith, P.M.      157
 Memory-adaptive      97
 Merritt, M.      157
 Message corruption      160
 Message delivery, at least once      68
 Message delivery, at most once      65
 Message delivery, exactly once      65
 Message passing      5—8 10 24 28 42 71 73 74 85 93 98 99 119 124 132 147
 Miller, R.E.      55
 Missing label concept      18 65 108
 Moran, S.      54 55 119 120 172 186
 Multari, N.      55 119
 Mutual exclusion      1 3 4 9 16 17 20—22 24—27 54 55 67 72 73 76 90—92 119—121 172 173
 Napping faults      143 144
 Neighborhood resemblance      41 42 55
 Network layer      49 51 57—60 74
 Non-malicious fault      168 169
 Ofek, Y.      186
 Ostrovsky, R.      134 186
 Outley, E.      69
 Output register      178
 Pachl, J.      120
 Papatriantafilou, M.      158
 Parallel composition      153
 Parlati, G.      55
 Passage predicate      159 161 163 171
 Patt-Shamir, B.      55 120 134 158 172
 Pease, M.      157
 Pemmaraju, S.V.      172
 Periodic sequence      184
 Perry, K.J.      158 172
 Physical layer      49
 Pingpong execution      58
 Potential function      31
 Pradhan, D.K.      69
 Probability of configuration      168
 Process      5 21 125
 Processor      5—7
 Processor, speed      6
 Processor, state      14
 PROGRAM      5 13 17
 Program counter      5 13 14 26 29 66 176 177
 Program flaws      136
 Program statements      7
 Program, corrupted      66
 Program, hardwired      66
 Program, uncorrupted      66
 Pseudo-self-stabilization      46 47 84
 PuLSE      8
 Pulse of global clock      8
 Pumping technique      59 60 62
 Pyramid      129 134 169 170
 Pyramid, corruption      170
 QUEUE      6 8 49 51 59 65 75 77 82 111 114 115 118
 Queue controller      182 184 186
 Queue machine      181 186
 Queue, FIFO      5 6
 RADIUS      126—128 134
 Random function      11 36 37 39 54 114 122
 Random-access memory      66
 ranking      87 119 123
 Read only memory      66
 Read/write atomicity      21 24 25 72 73
 Repair      123 164 167—169 171
 Reset      102 123 124 128 130 148 150 151 169 171 179—181
 Resynchronous stabilizer      121 122
 Rosen, A.      172
 Rosier, L.E.      186
 round      9
 Round, asynchronous      9
 Safe configuration      9
 Scantlebury, R.      55 119
 Schedule, fair      41
 Scheduler      11 16 20 24 27 37 38 41 71 152
 Scheduler, fair      11
 Scheduler-luck game      36 41 55 84 152
 Schneider, M.      55 69
 Scissors, paper, stone      145
 Segall, A.      68 120
 Self-stabilization composition      22
 Self-stabilization in applications      69
 Self-stabilization motivation      57
 Self-stabilization paradigm      1
 Self-stabilization property      1
 Self-stabilization requirements      9 54
 Self-stabilization, pseudo      45
 Self-stabilization, randomized      11
 Self-stabilizing algorithm      1 3
 Self-stabilizing BFS      12
 Self-stabilizing computing      173
 Self-stabilizing definition      9
 Self-stabilizing distributed algorithm      1
 Self-stabilizing end-to-end      24
 Self-stabilizing first algorithm      4
 Self-stabilizing fixed output      28 31
 Self-stabilizing for systems      4
 Self-stabilizing paradigms      5
 Self-stabilizing property      10
 Self-stabilizing solution      2
 Self-stabilizing synchronizer      31
 Self-stabilizing system      1
 Self-stabilizing, non-terminating      10
 Self-stabilizing, randomized      42
 Server algorithm      23 24 26 27 131 153
 Shared memory      5—8 10 12 38 42 71 73 85 93 98 119
 Shostak, R.E.      157
 Silent self-stabilization      42 54 55 98 125
 
 | 
 |  |  |  | Реклама |  |  |  |  |  |