#### Filter Results:

#### Publication Year

1993

2014

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Yehuda Afek, Hagit Attiya, Arie Fouren, Gideon Stupp, Dan Touitou
- PODC
- 1999

Two implementations of an adaptive, wait-free, and long-lived renaming task in the read/write shared memory model are presented. Implementations of long-lived and adaptive objects were previously known only in the much stronger model of load-linked and store-conditional (i.e., read-modify-write) shared memory. In read/write shared-memory only one-shot… (More)

A distributed algorithm is adaptive if the worst case step complexity of its operations is bounded by a function of the number of processes that are concurrently active during the operation (rather than a function of N, the total number of processes, which is usually much larger). In this paper we present long-lived and adaptive algorithms for collect in… (More)

- Yehuda Afek, Gideon Stupp, Dan Touitou
- Distributed Computing
- 2002

Long-lived and adaptive implementations of mutual exclusion and renaming in the read/write shared memory model are presented. An implementation of a task is adaptive if the step complexity of any operation in the implementation is a function of the number of processes that take steps concurrently with the operation. The renaming algorithm assigns a new… (More)

- Yehuda Afek, Gideon Stupp, Dan Touitou
- PODC
- 2000

Long-lived and adaptive to point contention implementations of snapshot and immediate snapshot objects in the read/write shared-memory model are presented. In [2] we presented adaptive algorithms for mutual exclusion, collect and snapshot. However, the collect and snapshot algorithms were adaptive only when the number of local primitive operations that a… (More)

This paper addresses the properties and design of long-lived adaptive algorithms in the read/write shared memory model. In particular we present adaptive and long-lived algorithms that adapt to the point contention of an operation while using only a bounded amount of memory. We believe the techniques and building blocks developed here to be of further use… (More)

- Gady Kozma, Zvi Lotker, Micha Sharir, Gideon Stupp
- PODC
- 2004

Some of the first routing algorithms for position-aware wireless networks used the Delaunay triangulation of the point-locations of the network's nodes as the underlying connectivity graph. Later on these solutions were considered impractical because the Delaunay triangulation may in general contain arbitrarily long edges and because calculating the… (More)

- Gideon Stupp
- DISC
- 2002

The switches and routers of large scale networks cannot manage a state per user session. The burden of memory management would overwhelm the network. Therefore, it is important to find distributed network algorithms which hold a state only at the initiating node. Termination detection algorithms are particularly interesting, since they can be used in the… (More)

- Gideon Stupp, Moshe Sidi
- Theor. Comput. Sci.
- 2004

We consider three range-free localization protocols for sensor networks and analyze their accuracy in terms of the expected area of uncertainty of position per sensor. Assuming a small set of anchor nodes that know their position and broadcast it, we consider at first the simple Intersection protocol. In this protocol a sensor assumes its position is within… (More)

- Yehuda Afek, Gideon Stupp
- J. Algorithms
- 1997

Though it is common practice to treat synchronization primitives for multiprocessors as abstract data types, they are in reality machine instructions on registers. A crucial theoretical question with practical implications is the relationship between the size of the register and its computational power. We wish to study this question and choose as a rst… (More)

- Gady Kozma, Zvi Lotker, Gideon Stupp
- Inf. Process. Lett.
- 2010