Recoverable and Detectable Self-Implementations of Swap

Tomer Lev Lehman, Hagit Attiya, Danny Hendler

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Recoverable algorithms tolerate failures and recoveries of processes by using non-volatile memory. Of particular interest are self-implementations of key operations, in which a recoverable operation is implemented from its non-recoverable counterpart (in addition to reads and writes). This paper presents two self-implementations of the swap operation. One works in the system-wide failures model, where all processes fail and recover together, and the other in the independent failures model, where each process crashes and recovers independently of the other processes. Both algorithms are wait-free in crash-free executions, but their recovery code is blocking. We prove that this is inherent for the independent failures model. The impossibility result is proved for implementations of distinguishable operations using interfering functions, and in particular, it applies to a recoverable self-implementation of swap.

Original languageEnglish
Title of host publication27th International Conference on Principles of Distributed Systems, OPODIS 2023
EditorsAlysson Bessani, Xavier Defago, Junya Nakamura, Koichi Wada, Yukiko Yamauchi
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959773089
DOIs
StatePublished - 1 Jan 2024
Event27th International Conference on Principles of Distributed Systems, OPODIS 2023 - Tokyo, Japan
Duration: 6 Dec 20238 Dec 2023

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume286
ISSN (Print)1868-8969

Conference

Conference27th International Conference on Principles of Distributed Systems, OPODIS 2023
Country/TerritoryJapan
CityTokyo
Period6/12/238/12/23

Keywords

  • Multi-core algorithms
  • detectablitly
  • non-volatile memory
  • persistent memory
  • recoverable objects

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Recoverable and Detectable Self-Implementations of Swap'. Together they form a unique fingerprint.

Cite this