skip to main content
10.1145/41840.41841acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article
Free access

Epidemic algorithms for replicated database maintenance

Published: 01 December 1987 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    Karl Abrahamson, Andrew Addler, Lisa Higham. David Kirkpatrick Probabilistic Solitude Verification on a Ring. Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing. Calgary, Alberta, Canada. 1986. Pages 161-173.]]
    [2]
    Baruch Awerbuch and Shilnon Even. Efficient and Reliable Broadcast is Achievable in an Eventually Counected Network. Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing. Vancouver, B.C., Canada. 1984, Pages 278-281,]]
    [3]
    Norman T. J. Bailey. The Mathematical Theory of Infectious Disease and its Applications (second edition). Hafner Press, Second Edition, 1975.]]
    [4]
    M. Ben-Or. Another Advantage of Free Choice. Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing. Montreal, Quebec, Canada. 1983.]]
    [5]
    M. Ben-Or Fast Asynchronous Byzantine Agreement. Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing. Minaki, Ontario, Canada. 1985, Pages 149-151.]]
    [6]
    A. D. Birrell, R. Levin, R. M. Needham. and M. D. Schroeder. Grapevine, An Exercise in Distributed Computing. Communications of the ACM 25(4):260-274. 1982.]]
    [7]
    K. M. Chandy and L. Lamport. Distributed Snapshots: Determining Global States of Distributed Systems. ACM Transactions on Computing Systems 3(1):63-75 1985]]
    [8]
    J. C. Frauenthal. Mathematical Modeling jin Epidemiology. Pages 12-24. Springer-Verlag. 1980.]]
    [9]
    D.K. Gifford, Weighted Voting for Replicated Data. Proceedings of the Seventh Symposium on Operating systems Principles ACM SIGOPS. Pacific Grove. California. 1979. Pages 150-159.]]
    [10]
    P. R. Johnson and R. H. Thomas. The Maintenance of Duplicate Databases. Bolt Beranek and Newman Inc. Arpanet Request for Comments (RFC) 677 . 1975.]]
    [11]
    Butler W. Lampson. Designing a Global Name Service. Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing. Calgary. Alberta. Canada. 1986. Pages 1-10.]]
    [12]
    P. Mockapetris. The domain name system. Proceedigns IFIP 6.5 International Symposium on Computer messaging. Nottingham. England. May 1984. Also available as: USC Information Sciences Institute, Report ISI/RS-84-133. June 1984.]]
    [13]
    Derek C. Oppen and Yogen K. Dalai. The Clearinghouse: A Docentralized Agent for Locating Named Objects in a Distributed Environment. Xerox Technical Report: OPD-T8103, 1981.]]
    [14]
    Boris Pittel. On Spreading a Rumor. SIAM Journal of Applied Mathematics 47(1):213-223, 1987.]]
    [15]
    Michael O. Rabin. Randomized Byzantine Generals. 24th Annual Symposium on Foundations of Computer Science. IEEE Computer Society, 1983, Pages 403-409.]]
    [16]
    S. K. Sarin and N. A. Lynch. Discarding Obsolete Information in a Replicated Database, System. IEEE Transactions on Software Engineering SE-13(1):39- 47 1987.]]

    Cited By

    View all
    • (2024)Secure solution for decentralized federated learning with blockchainSCIENTIA SINICA Informationis10.1360/SSI-2023-0083Online publication date: 26-Jan-2024
    • (2024)Estuary: A Low Cross-Shard Blockchain Sharding Protocol Based on State SplittingIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.335163235:3(405-420)Online publication date: Mar-2024
    • (2024)Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement LearningIEEE Transactions on Mobile Computing10.1109/TMC.2023.332329623:6(6563-6578)Online publication date: Jun-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    PODC '87: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
    December 1987
    304 pages
    ISBN:089791239X
    DOI:10.1145/41840
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 December 1987

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    PODC87
    Sponsor:
    PODC87: Sixth Annual ACM Symposium on Principles of Distributed Computing
    August 10 - 12, 1987
    British Columbia, Vancouver, Canada

    Acceptance Rates

    Overall Acceptance Rate 740 of 2,477 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)955
    • Downloads (Last 6 weeks)58

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Secure solution for decentralized federated learning with blockchainSCIENTIA SINICA Informationis10.1360/SSI-2023-0083Online publication date: 26-Jan-2024
    • (2024)Estuary: A Low Cross-Shard Blockchain Sharding Protocol Based on State SplittingIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.335163235:3(405-420)Online publication date: Mar-2024
    • (2024)Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement LearningIEEE Transactions on Mobile Computing10.1109/TMC.2023.332329623:6(6563-6578)Online publication date: Jun-2024
    • (2024)Optimizing Gossiping for Asynchronous Fault-Prone IoT Networks With Memory and Battery ConstraintsIEEE Access10.1109/ACCESS.2023.334902112(4701-4715)Online publication date: 2024
    • (2024)A blockchain-based framework for federated learning with privacy preservation in power load forecastingKnowledge-Based Systems10.1016/j.knosys.2023.111338284(111338)Online publication date: Jan-2024
    • (2024)Security attacks in Opportunistic Mobile Networks: A systematic literature reviewJournal of Network and Computer Applications10.1016/j.jnca.2023.103782221(103782)Online publication date: Jan-2024
    • (2024)Early adapting to trends: self-stabilizing information spread using passive communicationDistributed Computing10.1007/s00446-024-00462-8Online publication date: 22-Feb-2024
    • (2024)SDN-Based Efficient Consortium Blockchain Network Architecture for Grid Information AuthenticationProceedings of the 13th International Conference on Computer Engineering and Networks10.1007/978-981-99-9247-8_39(393-401)Online publication date: 4-Jan-2024
    • (2024)An Improved Hashgraph Consensus Algorithm Based on Sharding TechnologyBlockchain Technology and Application10.1007/978-981-97-3203-6_5(87-104)Online publication date: 23-Jun-2024
    • (2024)Asymptotically Optimal Message Dissemination with Applications to BlockchainsAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58734-4_3(64-95)Online publication date: 1-May-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media