skip to main content
Skip header Section
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)October 2006
Publisher:
  • Wiley-Interscience
  • 605 Third Avenue New York, NY
  • United States
ISBN:978-0-471-71997-7
Published:01 October 2006
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Cicerone S, Di Fonso A, Di Stefano G and Navarra A (2023). The geodesic mutual visibility problem, Pervasive and Mobile Computing, 95:C, Online publication date: 1-Oct-2023.
  2. Kumar M, Molla A and Sivasubramaniam S Improved Deterministic Leader Election in Diameter-Two Networks Algorithms and Complexity, (323-335)
  3. ACM
    Cicerone S, Di Fonso A, Di Stefano G and Navarra A The Geodesic Mutual Visibility Problem for Oblivious Robots: the case of Trees Proceedings of the 24th International Conference on Distributed Computing and Networking, (150-159)
  4. Bin M and Parisini T (2021). A distributed methodology for approximate uniform global minimum sharing, Automatica (Journal of IFAC), 131:C, Online publication date: 1-Sep-2021.
  5. ACM
    Raynal M (2021). Distributed Computability, ACM SIGACT News, 52:2, (92-110), Online publication date: 14-Jun-2021.
  6. Pandurangan G, Peleg D and Scquizzato M (2020). Message lower bounds via efficient network synchronization, Theoretical Computer Science, 810:C, (82-95), Online publication date: 2-Mar-2020.
  7. Demertzis A, Oikonomou K and Stavrakakis I (2019). Evaluation of a proposed minimum path impotence routing policy in wireless sensor networks, Ad Hoc Networks, 94:C, Online publication date: 1-Nov-2019.
  8. ACM
    Kadjouh N, Bounceur A, Tari A, Lagadec L, Euler R and Bezoui M A New Leader Election Algorithm based on the WBS Algorithm Dedicated to Smart-cities Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, (1-5)
  9. Casteigts A, Métivier Y, Robson J and Zemmari A (2019). Deterministic Leader Election Takes $$\Theta (D + \log n)$$?(D+logn) Bit Rounds, Algorithmica, 81:5, (1901-1920), Online publication date: 1-May-2019.
  10. Das S, Focardi R, Luccio F, Markou E and Squarcina M (2019). Gathering of robots in a ring with mobile faults, Theoretical Computer Science, 764:C, (42-60), Online publication date: 11-Apr-2019.
  11. Becchetti L, Clementi A, Natale E, Pasquale F and Posta G (2019). Self-stabilizing repeated balls-into-bins, Distributed Computing, 32:1, (59-68), Online publication date: 1-Feb-2019.
  12. ACM
    Both A, Duckham M and Worboys M (2018). Identifying Surrounds and Engulfs Relations in Mobile and Coordinate-Free Geosensor Networks, ACM Transactions on Spatial Algorithms and Systems, 4:2, (1-21), Online publication date: 30-Jun-2018.
  13. Cicerone S, Di Stefano G and Navarra A (2018). Gathering of robots on meeting-points, Distributed Computing, 31:1, (1-50), Online publication date: 1-Feb-2018.
  14. ACM
    Chatterjee S, Pandurangan G and Robinson P The Complexity of Leader Election Proceedings of the 19th International Conference on Distributed Computing and Networking, (1-10)
  15. ACM
    Viseras A, Karolj V and Merino L An asynchronous distributed constraint optimization approach to multi-robot path planning with complex constraints Proceedings of the Symposium on Applied Computing, (268-275)
  16. Di Stefano G and Navarra A (2017). Optimal gathering of oblivious robots in anonymous graphs and its application on trees and rings, Distributed Computing, 30:2, (75-86), Online publication date: 1-Apr-2017.
  17. Paul G Revisiting Democratic Mining in Bitcoins Proceedings of the 11th International Conference on Information Systems Security - Volume 9478, (161-170)
  18. ACM
    Duckham M, Zhong X and Toohey K (2015). Challenges to using decentralized spatial algorithms in the field, SIGSPATIAL Special, 7:2, (14-21), Online publication date: 17-Sep-2015.
  19. ACM
    Becchetti L, Clementi A, Natale E, Pasquale F and Posta G Self-Stabilizing Repeated Balls-into-Bins Proceedings of the 27th ACM symposium on Parallelism in Algorithms and Architectures, (332-339)
  20. ACM
    Kutten S, Pandurangan G, Peleg D, Robinson P and Trehan A (2015). On the Complexity of Universal Leader Election, Journal of the ACM, 62:1, (1-27), Online publication date: 2-Mar-2015.
  21. ACM
    Nanongkai D Distributed approximation algorithms for weighted shortest paths Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (565-573)
  22. ACM
    Both A, Kuhn W and Duckham M Spatiotemporal Braitenberg vehicles Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (74-83)
  23. ACM
    Kutten S, Pandurangan G, Peleg D, Robinson P and Trehan A On the complexity of universal leader election Proceedings of the 2013 ACM symposium on Principles of distributed computing, (100-109)
  24. Friedetzky T, Gąsieniec L, Gorry T and Martin R Observe and remain silent (communication-less agent location discovery) Proceedings of the 37th international conference on Mathematical Foundations of Computer Science, (407-418)
  25. Schneider J and Wattenhofer R Trading bit, message, and time complexity of distributed algorithms Proceedings of the 25th international conference on Distributed computing, (51-65)
  26. Guan L and Duckham M Decentralized reasoning about gradual changes of topological relationships between continuously evolving regions Proceedings of the 10th international conference on Spatial information theory, (126-147)
  27. ACM
    Kranakis E, Krizanc D and Morin P (2011). Randomized rendezvous with limited memory, ACM Transactions on Algorithms, 7:3, (1-12), Online publication date: 1-Jul-2011.
  28. Métivier Y, Robson J, Saheb-Djahromi N and Zemmari A (2011). An optimal bit complexity randomized distributed MIS algorithm, Distributed Computing, 23:5-6, (331-340), Online publication date: 1-Apr-2011.
  29. Nussbaum D and Santoro N On the message complexity of global computations Proceedings of the 14th international conference on Principles of distributed systems, (427-442)
  30. ACM
    Wu Q, Mampilly D and Wolf T Distributed runtime load-balancing for software routers on homogeneous many-core processors Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow, (1-6)
  31. ACM
    Duckham M, Jeong M, Li S and Renz J Decentralized querying of topological relations between regions without using localization Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, (414-417)
  32. Israeli A, McCubbins M, Paturi R and Vattani A Low memory distributed protocols for 2-coloring Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems, (303-318)
  33. Calzolai F and Loreti M Simulation and analysis of distributed systems in klaim Proceedings of the 12th international conference on Coordination Models and Languages, (122-136)
  34. Rajsbaum S Iterated shared memory models Proceedings of the 9th Latin American conference on Theoretical Informatics, (407-416)
  35. Focardi R and Luccio F Secure upgrade of hardware security modules in bank networks Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security, (95-110)
  36. Schumacher A and Haanpää H Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic Partitioning Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (640-654)
  37. ACM
    Cortés H, García M, Hernández J, Hernández M, Pérez-Cordoba E and Ramos E Development of a distributed system applied to teaching and learning Proceedings of the 8th ACM SIGPLAN workshop on ERLANG, (41-50)
  38. Yves M, Robson J, Nasser S and Zemmari A An optimal bit complexity randomized distributed MIS algorithm (extended abstract) Proceedings of the 16th international conference on Structural Information and Communication Complexity, (323-337)
  39. Arantes G, França F and Martinhon C (2009). Randomized generation of acyclic orientations upon anonymous distributed systems, Journal of Parallel and Distributed Computing, 69:3, (239-246), Online publication date: 1-Mar-2009.
  40. Kranakis E, Krizanc D and Morin P Randomized rendez-vous with limited memory Proceedings of the 8th Latin American conference on Theoretical informatics, (605-616)
  41. Haddar M, Kacem A, Métivier Y, Mosbah M and Jmaiel M Proving distributed algorithms for mobile agents Proceedings of the 9th international conference on Distributed computing and networking, (286-291)
  42. Dieudonné Y and Petit F Deterministic leader election in anonymous sensor networks without common coordinated system Proceedings of the 11th international conference on Principles of distributed systems, (132-142)
  43. Dieudonné Y and Petit F Deterministic Leader Election in Anonymous Sensor Networks Without Common Coordinated System Principles of Distributed Systems, (132-142)
  44. Flocchini P, Enriquez T, Pagli L, Prencipe G and Santoro N Distributed computation of all node replacements of a minimum spanning tree Proceedings of the 13th international Euro-Par conference on Parallel Processing, (598-607)
  45. Kranakis E and Krizanc D An algorithmic theory of mobile agents Proceedings of the 2nd international conference on Trustworthy global computing, (86-97)
Contributors

Recommendations

Burkhard Englert

Despite the attention distributed computing has received in recent years, designing and analyzing a distributed system is still a very difficult task. Because of inherent asynchrony, limited local knowledge, and partial failures, it is challenging to gain a good understanding of a proposed system. On the other hand, the multiplicity and variety of distributed systems and their widespread differences make it desirable to describe a more general distributed computing universe where one abstracts away the system-specific details. In this exciting new textbook, Santoro follows this approach. At first glance, this book appears to be one of the standard textbooks on distributed algorithms, but a closer look reveals several features that distinguish it from other books with similar intentions. Namely, the book, using solely the message-passing paradigm, is based on a fully reactive computational model. This means that any entity in the system responds only to external events. These external events may be the arrival of a message, the ringing of the alarm clock, or a so-called spontaneous impulse. I agree with the author that this approach makes learning easier since it simplifies explanations and allows instructors to present the material in a natural way. As an added benefit, all protocols presented in the book and all answers to exercise problems are immediately programmable; as a result, it is possible to integrate experimental analysis into the coursework. The book is suitable for advanced undergraduate students, but probably will find its true audience among graduate students and other researchers who want to learn how to solve distributed computing problems. It begins in chapter 1 with an introduction to the distributed computing environment, where the author defines the model he uses throughout the book. In the first few pages, the reader can sense that this book is not simply a collection of research papers written in the area over the last few decades. The book is a pleasure to read right from the beginning. The style of presentation makes it obvious that students are the intended target audience. Because of the clarity of its presentation and its casual, yet precise and rigorous style, there is a good chance that students who need to learn this material will actually want to read the book. In the second chapter, the author moves on to some basic problems and protocols. This is followed by a long and thorough chapter on the problem of symmetry breaking (election) in distributed systems. The author discusses the problem in many different contexts. The fourth chapter deals with the efficiency of distributed communication, namely message routing and shortest paths. The next chapter discusses problems that arise in the context of distributed sets of data. In the first five chapters, all computation is assumed to take place in an asynchronous distributed system. In the sixth chapter, problems that arise in synchronous systems are introduced. Chapter 7 is another long and thorough chapter dealing with the issue of computing in the presence of faults. In chapter 8, the author addresses problems of detecting stable properties, such as deadlock or termination. In chapter 9, the book’s last, problems that require continuous computation, such as computing logical time and distributed mutual exclusion, are briefly discussed. This appears to be the weakest chapter in the book. Readers may be put off by the brief discussion that these important problems receive. On the other hand, this treatment is consistent with the philosophy of the rest of the book, which aims to teach readers how to solve distributed computing problems and not be an encyclopedia of research results. As such, the book is very well thought-out and implemented. The author uses his many years of teaching experience to present this difficult material in a way that makes the reader want to solve distributed computing problems. I believe that if this book receives the attention it deserves, it will become a classic textbook in distributed computing theory. It has the potential to educate, motivate, and enable current and future students and researchers to effectively solve distributed computing problems. Extending its reach, its style of presentation and language are also very appropriate for today’s system programmers or communication software engineers and developers—it is not just another book about the principles of distributed computation. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.