Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Process-commutative distributed objects: From cryptocurrencies to Byzantine-Fault-Tolerant CRDTs
Theoretical Computer Science (TCSC), Volume 1017, Issue Chttps://doi.org/10.1016/j.tcs.2024.114794AbstractThis paper explores the territory that lies between best-effort Byzantine-Fault-Tolerant Conflict-free Replicated Data Types (BFT CRDTs) and totally ordered distributed ledgers, such as those implemented by Blockchains. It formally characterizes ...
Highlights- We introduce PCOs, a novel class of distributed objects combining Strong Eventual Consistency and Pipeline Consistency.
- We present a generic algorithm that implements any PCO, and works both in a crash and Byzantine fault model.
- ...
- research-articleNovember 2024
Chess is hard even for a single player
Theoretical Computer Science (TCSC), Volume 1015, Issue Chttps://doi.org/10.1016/j.tcs.2024.114726AbstractWe introduce a generalization of “Solo Chess”, a single-player variant of the game that can be played on chess.com. The standard version of the game is played on a regular 8 × 8 chessboard by a single player, with only white pieces, using the ...
Highlights
- We formalize computational questions based on the game of Solo Chess.
- We study special cases of Solo Chess: for instance, by restricting the dimensions of the board and/or the nature of pieces involved in the game.
- We study ...
-
- research-articleNovember 2024
Resource efficient stabilization for local tasks despite unknown capacity links
Theoretical Computer Science (TCSC), Volume 1013, Issue Chttps://doi.org/10.1016/j.tcs.2024.114744AbstractSelf-stabilizing protocols enable distributed systems to recover correct behavior starting from any arbitrary configuration. In particular, when processors communicate by message passing and the communication links are unbounded, fake messages ...
- research-articleNovember 2024
Towards a general methodology for formal verification on spiking neural P systems
Theoretical Computer Science (TCSC), Volume 1011, Issue Chttps://doi.org/10.1016/j.tcs.2024.114705AbstractP systems are non-deterministic, parallel and distributed models of computation inspired by the behaviour and structure of living cells. Spiking neural P systems synthesise the connections that exist between neurons in the human brain, using ...
- research-articleSeptember 2024
A local search approach to protocol verification
Theoretical Computer Science (TCSC), Volume 1008, Issue Chttps://doi.org/10.1016/j.tcs.2024.114675AbstractVerification of parameterized protocols is of great interest in the area of formal verification, mainly due to the practical importance of such systems. Explicit-state model checking is an essential approach in which states for a system are ...
- research-articleMarch 2024
Deterministic rendezvous in infinite trees
Theoretical Computer Science (TCSC), Volume 984, Issue Chttps://doi.org/10.1016/j.tcs.2023.114313AbstractThe rendezvous task calls for two mobile agents, starting from different nodes of a network modeled as a graph to meet at the same node. Agents have different labels which are integers from a set { 1 , … , L }. They wake up at possibly different ...
- research-articleMarch 2024
Self-stabilizing 2-minimal dominating set algorithms based on loop composition
Theoretical Computer Science (TCSC), Volume 983, Issue Chttps://doi.org/10.1016/j.tcs.2023.114314AbstractGiven a graph G = ( V , E ), a 2-minimal dominating set (2-MDS) of G is a minimal dominating set D ⊆ V such that D ∖ { p i , p j } ∪ { p z } is not a dominating set for any nodes p i , p j ∈ D (p i ≠ p j) and p z ∉ D. We propose two silent self-...
- research-articleMarch 2024
Computational complexity of jumping block puzzles
Theoretical Computer Science (TCSC), Volume 983, Issue Chttps://doi.org/10.1016/j.tcs.2023.114292AbstractIn the context of computational complexity of puzzles, the sliding block puzzles play an important role. Depending on the rules and set of pieces, the sliding block puzzles can be polynomial-time solvable, NP-complete, or PSPACE-complete. On the ...