Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Marijana Lazić"'
Publikováno v:
Logical Methods in Computer Science, Vol Volume 19, Issue 1 (2023)
Threshold guards are a basic primitive of many fault-tolerant algorithms that solve classical problems in distributed computing, such as reliable broadcast, two-phase commit, and consensus. Moreover, threshold guards can be found in recent blockchain
Externí odkaz:
https://doaj.org/article/108d81d8efd84c74b43f1fa7438e852f
Publikováno v:
Formal Techniques for Distributed Objects, Components, and Systems
Lecture Notes in Computer Science
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE)
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.189-207, ⟨10.1007/978-3-030-50086-3_11⟩
Lecture Notes in Computer Science-Formal Techniques for Distributed Objects, Components, and Systems
Formal Techniques for Distributed Objects, Components, and Systems-FORTE 2020
Formal Techniques for Distributed Objects, Components, and Systems ISBN: 9783030500856
FORTE
Lecture Notes in Computer Science
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE)
40th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2020, Valletta, Malta. pp.189-207, ⟨10.1007/978-3-030-50086-3_11⟩
Lecture Notes in Computer Science-Formal Techniques for Distributed Objects, Components, and Systems
Formal Techniques for Distributed Objects, Components, and Systems-FORTE 2020
Formal Techniques for Distributed Objects, Components, and Systems ISBN: 9783030500856
FORTE
Threshold guards are a basic primitive of many fault-tolerant algorithms that solve classical problems of distributed computing, such as reliable broadcast, two-phase commit, and consensus. Moreover, threshold guards can be found in recent blockchain
Publikováno v:
VMCAI 2021-22nd International Conference on Verification, Model Checking, and Abstract Interpretation
VMCAI 2021-22nd International Conference on Verification, Model Checking, and Abstract Interpretation, Jan 2021, Copenhagen, Denmark. pp.219-239, ⟨10.1007/978-3-030-67067-2_11⟩
Lecture Notes in Computer Science ISBN: 9783030670665
VMCAI
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Verification, Model Checking, and Abstract Interpretation
Verification, Model Checking, and Abstract Interpretation
VMCAI 2021-22nd International Conference on Verification, Model Checking, and Abstract Interpretation, Jan 2021, Copenhagen, Denmark. pp.219-239, ⟨10.1007/978-3-030-67067-2_11⟩
Lecture Notes in Computer Science ISBN: 9783030670665
VMCAI
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Verification, Model Checking, and Abstract Interpretation
Verification, Model Checking, and Abstract Interpretation
International audience; Weak adversaries are a way to model the uncertainty due to asynchrony in randomized distributed algorithms. They are a standard notion in correctness proofs for distributed algorithms, and express the property that the adversa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7436db3e6a99de82137b752c4bc47cf4
https://hal.inria.fr/hal-03150397
https://hal.inria.fr/hal-03150397
Publikováno v:
Journal of Logical and Algebraic Methods in Programming
In this paper we study the solvability of the equality negation task in a simple wait-free model where two processes communicate by reading and writing shared variables or exchanging messages. In this task, the two processes start with a private inpu
Publikováno v:
Formal Methods in System Design. 51:270-307
Automatic verification of threshold-based fault-tolerant distributed algorithms (FTDA) is challenging: FTDAs have multiple parameters that are restricted by arithmetic conditions, the number of processes and faults is parameterized, and the algorithm
Publikováno v:
International Journal on Software Tools for Technology Transfer. 23:823-823
A correction to this paper has been published: https://doi.org/10.1007/s10009-021-00612-4
Publikováno v:
CONCUR 2019-30th International Conference on Concurrency Theory
CONCUR 2019-30th International Conference on Concurrency Theory, Aug 2019, Amsterdam, Netherlands. pp.1-16, ⟨10.4230/LIPIcs.CONCUR.2019.33⟩
International Journal on Software Tools for Technology Transfer
International Journal on Software Tools for Technology Transfer, Springer Verlag, 2021, 23, pp.797-821. ⟨10.1007/s10009-020-00603-x⟩
International Journal on Software Tools for Technology Transfer, 2021, 23, pp.797-821. ⟨10.1007/s10009-020-00603-x⟩
30th International Conference on Concurrency Theory (CONCUR 2019)
CONCUR 2019-30th International Conference on Concurrency Theory, Aug 2019, Amsterdam, Netherlands. pp.1-16, ⟨10.4230/LIPIcs.CONCUR.2019.33⟩
International Journal on Software Tools for Technology Transfer
International Journal on Software Tools for Technology Transfer, Springer Verlag, 2021, 23, pp.797-821. ⟨10.1007/s10009-020-00603-x⟩
International Journal on Software Tools for Technology Transfer, 2021, 23, pp.797-821. ⟨10.1007/s10009-020-00603-x⟩
30th International Conference on Concurrency Theory (CONCUR 2019)
International audience; Randomized fault-tolerant distributed algorithms pose a number of challenges for automated verification: (i) parameterization in the number of processes and faults, (ii) randomized choices and probabilistic properties, and (ii
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8fccafbdf2ff7912fb73bd9d3c483908
Publikováno v:
Computer Aided Verification-31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part II
Computer Aided Verification ISBN: 9783030255428
CAV (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Aided Verification
Computer Aided Verification ISBN: 9783030255428
CAV (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Aided Verification
Verification of fault-tolerant distributed protocols is an immensely difficult task. Often, in these protocols, thresholds on set cardinalities are used both in the process code and in its correctness proof, e.g., a process can perform an action only
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::118c5dd2cfb1838b3e66819f355165c9
Autor:
Tamara Živković, Saša Adamović, Miloš Dobrojević, Dragan Cvetković, Josef Widder, Hana Stefanovic, Branimir Jakšić, Goran Bjelobaba, Nataša Krstić, Ana Savić, Dejan Masliković, Miloš Krstić, Slađan Stanković, Dragan Savic, Zoran Gaćinović, Nikola Pavlović, Ratko Ivković, Marijana Lazić, Ivana Milošević, Radosav Veselinović, Dunja Adžić, Miodrag Živković, Branislav Popkonstantinović, Mirko Milošević, Petar Lj. Spalevic, Jovan Zlatanović, Mladen Opačić, Jovana Radojković, Cezara Drăgoi, Mladen Veinović, Ivana Cvetkovic, Marina Marjanović Jakovljević, Milos S. Stankovic, Misa Stojicevic
Publikováno v:
Proceedings of the International Scientific Conference - Sinteza 2018.
Publikováno v:
Proceedings of the International Scientific Conference - Sinteza 2018.