Possibility and the Impossibility of Reliable Broadcast: A 1-Safe and Reliable Broadcast Algorithm in the Presence of Arbitrary Initialization
Abstract
1. Introduction
2. Preliminaries
2.1. Arbitrary Initialization and Scalability
2.2. Broadcast Algorithms
2.3. Applications of Broadcast
3. Computational Model
- Each is a Boolean function of the variables of process i and the variables of its neighboring processes;
- Each is referred to as a guarded command [75], where a guard is a predicate over the variables of p and/or its neighbors that evaluates to a Boolean value, and a command consists of a sequence of statements that updates one or more local variables of the executing process.
- Each command reads and updates the variables of process i and reads its neighbors’ variables;
- corresponds to the repeated execution of the statement S while there exists an enabled guard.
- □ is called the nondeterminism symbol. One of the guarded commands separated by □ is selected nondeterministically in each iteration.
4. Specification of Asynchronous and Reliable Broadcast Algorithm
5. Algorithm
- (i)
- All the processes in the normal broadcast tree have received the broadcast directly or indirectly from root process r;
- (ii)
- All the neighbors of the processes in the broadcast phase in the tree that have not received a message from the root are in the cleaning phase, have assumed parents in the tree, and are locked;
- (iii)
- Each path in the tree from root r to a leaf is made up of zero or more processes in broadcast phases followed by zero or more processes in the feedback phases which are followed by zero or more processes in the cleaning phase.
5.1. Basis of the Algorithm
5.2. Detailed Algorithm Description
- : denotes i’s parent in the tree rooted at r and ⊥ if it is root r.
- : denotes the primary phase process i is in where states B, F and C denote the broadcast, the feedback, and the cleaning phases, respectively. In addition, = B denotes that process i has received message M directly or indirectly from root r. When and holds, it indicates that process i is involved in feedback, acknowledgment of the completion of the broadcast, and cleaning, clearing of the traces of the broadcast and phases, respectively.
- denotes the secondary wave phase process i is in where states f, b, and c denote the f-, b-, and c-phases, respectively. A process i is in state c () when it is in the c-phase of the secondary wave, indicating that the process is not currently involved in a secondary wave. If the state of a process is either F or C in a normal broadcast tree, a process i is always in state c. A process i is in state f () when it is in the f-phase of the secondary wave where, in a bottom-up manner, the collection of of the boundary, the leaf, and the neighbors of the boundary processes takes place. Similarly, process i is in state b () when it is in the b-phase of the secondary wave where the designated parenthood information decided by root process i (based on the collected information) is forwarded to the boundary and the level processes in a top-down manner.
- : denotes the distance of process i from root r.
- : denotes whether or not process i is locked.
- : contains the tuples containing the of the descendants of process i in the broadcast tree that are neighbors of the boundary, the leaves and boundary processes to be forwarded to the root using the bottom-up f-phase of the secondary wave where , , is a tuple of the form , where is the id of the leaf or the boundary process from which information is collected, L is the level of the process from which the information is collected, and is the neighbors ids if the process from which information is collected is a boundary process.
- : denotes the tuples with the designated parenthood information decided by the root process and is used to forward designated parenthood information to the boundary and level processes by the top-down secondary wave in the broadcast tree, where , , is a tuple of form <>.
Algorithm 1: Definitions for a 1-Safe and Reliable Broadcast Algorithm |
Constants denotes the normal root. Parameters each process with unique Id. |
Variables for each process . for each process . for each process . for each process . for each process , where , , is a tuple of form , where Id is the source of , L is the level of the source of and is the set of the neighbors of the source of for each process , where , , is a tuple of form , is id of the process that its parent needs to be corrected and process is the id of the process should be assigned as the parent of process. for each process . Predicates: {for root/internal/leaf process i} {for internal/leaf process i} Function if () | for each |
Algorithm 2: A 1-Safe and Reliable Broadcast Algorithm for Root Process | ||
Actions | ||
{Program for root process r} | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
Algorithm 3: A 1-Safe and Reliable Broadcast Algorithm for Internal/Leaf Process | ||
Actions | ||
{Program for internal/leaf process i } | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
⟶ | ||
where denotes the set of neighbors of i. returns the set of tuples in the children’s variables. Function denotes the computation |
6. Illustrative Example
6.1. Illustration of Premature Feedback
6.2. Illustration of Specification Violation and Semantics Change
6.3. Normal Execution
7. Proof of Correctness
- (i)
- Tree T is rooted at process r.
- (ii)
- Each internal process i in the normal tree satisfies and each leaf process i satisfies .
- (iii)
- For root r of tree T, holds and for any internal or leaf process i in T, if j is the parent for process i, then .
8. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Xu, P.; Zhang, J.; Lu, J.; Zhang, H.; Gao, T.; Chen, S. A prior knowledge-embedded reinforcement learning method for real-time active power corrective control in complex power systems. Front. Energy Res. 2022, 10, 1009545. [Google Scholar]
- Jady, Z.A.; Karaata, M.H. Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm. IEEE Trans. Dependable Secur. Comput. 2023, 20, 2174–2187. [Google Scholar]
- Anita, E.A.M.; Bai, V.T.; Raj, E.; Prabhu, B.R. Defending against worm hole attacks in multicast routing protocols for mobile ad hoc networks. In Proceedings of the 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), Chennai, India, 28 February–3 March 2011; pp. 1–5. [Google Scholar]
- Sharif, M.S.; Moein, M. An Effective Cost-Sensitive Convolutional Neural Network for Network Traffic Classification. In Proceedings of the 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Zallaq, Bahrain, 29–30 September 2021; pp. 40–45. [Google Scholar]
- Caballero, D.; González, F.J.M.; Islam, S.A. Analysis of Network Protocols for Secure Communication. In Proceedings of the 2021 9th International Symposium on Digital Forensics and Security (ISDFS), Elazig, Turkey, 28–29 June 2021; pp. 1–6. [Google Scholar]
- Ahmed, W.; Wu, Y.W. A Survey on Reliability in Distributed Systems. J. Comput. Syst. Sci. 2013, 79, 1243–1255. [Google Scholar]
- Kreps, J. Exactly-once Semantics Are Possible: Here’s How Apache Kafka Does It. 2017. Available online: https://www.confluent.io/blog/exactly-once-semantics-are-possible-heres-how-apache-kafka-does-it/ (accessed on 10 September 2023).
- Dwork, C.; Lynch, N.; Stockmeyer, L. Consensus in the presence of partial synchrony. J. ACM 1988, 35, 288–323. [Google Scholar]
- Xiao, Y.; Zhang, N.; Li, J.; Lou, W.; Hou, Y.T. Distributed consensus protocols and algorithms. Blockchain Distrib. Syst. Secur. 2019, 25, 40. [Google Scholar]
- Ma, Y.; Zhang, Y.; Cheng, X.; Huang, X.; Wang, X. Internet of things security: A survey. J. Netw. Comput. Appl. 2018, 88, 10–28. [Google Scholar] [CrossRef]
- Zhang, Y.; Wen, J.; Li, X.; Lin, C. Smart home energy management systems: Concept, configurations, and scheduling strategies. Renew. Sustain. Energy Rev. 2016, 56, 30–40. [Google Scholar] [CrossRef]
- Hayat, A.; Ahmed, M.; Al-Fuqaha, A. Internet of things (IoT): A review of enabling technologies, challenges, and open research issues. IEEE Internet Things J. 2016, 3, 1–27. [Google Scholar]
- García-García, L.; Jiménez, J.M.; Abdullah, M.T.A.; Lloret, J. Wireless Technologies for IoT in Smart Cities. Netw. Protoc. Algorithms 2018, 10, 23–64. [Google Scholar]
- Li, X.; Liu, S.; Wei, W. A review on the coordination of distributed energy resources in smart grid. Renew. Sustain. Energy Rev. 2018, 82, 387–399. [Google Scholar] [CrossRef]
- Bazm, M.M.; Lacoste, M.; Südholt, M.; Menaud, J.M. Isolation in cloud computing infrastructures: New security challenges. Ann. Telecommun. 2019, 74, 197–209. [Google Scholar]
- Chi, J.; Li, Y.; Huang, J.; Liu, J.; Jin, Y.; Chen, C.; Qiu, T. A secure and efficient data sharing scheme based on blockchain in industrial internet of things. J. Netw. Comput. Appl. 2020, 167, 102710. [Google Scholar]
- Arora, A.; Gouda, M. Distributed reset. IEEE Trans. Comput. 1994, 43, 1026–1038. [Google Scholar]
- Andersson, J. Modeling and Analyzing Runtime Properties of Complex Embedded Systems. 2004. Available online: https://www.ipr.mdh.se/pdf_publications/649.pdf (accessed on 10 September 2023).
- Kraft, J. Enabling Timing Analysis of Complex Embedded Software Systems; Mälardalen University: Västerås, Sweden, 2010. [Google Scholar]
- Kumar, C.S. Rollback Recovery and Checkpointing in Heterogenous Grid Computing. 2010. Available online: http://www.123seminarsonly.com/Seminar-Reports/005/44385199-Grid-Computing.pdf (accessed on 14 February 2023).
- Chatzidrossos, I. Live Streaming Performance of Peer-to-Peer Systems. Ph.D. Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, 2012. [Google Scholar]
- Majumdar, A. Problems of Distributed Systems. 2018. Available online: https://medium.com/@thisisananth/problems-of-distributed-systems-22fc22eec347 (accessed on 14 February 2023).
- Feng, X.; Wang, X.; Cui, K.; Xie, Q.; Wang, L. A distributed message authentication scheme with reputation mechanism for Internet of Vehicle. J. Syst. Archit. 2023, 145, 103029. [Google Scholar]
- Zhu, H.; Ling, Q. Byzantine-Robust Distributed Learning with Compression. IEEE Trans. Signal Inf. Process. Over Netw. 2023, 9, 280–294. [Google Scholar]
- Liu, C.; Xu, M.; Guo, H.; Cheng, X.; Xiao, Y.; Yu, D.; Gong, B.; Yerukhimovich, A.; Wang, S.; Lyu, W. TBAC: A Tokoin-based Accountable Access Control Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 2023, 23, 6133–6148. [Google Scholar] [CrossRef]
- Zhao, X.; Zhong, B.; Cui, Z. Design of a Decentralized Identifier-Based Authentication and Access Control Model for Smart Homes. Electronics 2023, 12, 3334. [Google Scholar] [CrossRef]
- Joseph, T.A.; Birman, K.P. Reliable Broadcast Protocols; Technical Report; Cornell University: Ithaca, NY, USA, 1989. [Google Scholar]
- Melliar-Smith, P.M.; Moser, L.E.; Agrawala, V. Broadcast protocols for distributed systems. IEEE Trans. Parallel Distrib. Syst. 1990, 1, 17–25. [Google Scholar]
- Livny, M.; Melman, M. Load balancing in homogeneous broadcast distributed systems. In Proceedings of the Computer Network Performance Symposium, College Park, MD, USA, 13–14 April 1982; pp. 47–55. [Google Scholar]
- Pedone, F.; Schiper, A. Generic broadcast. In Distributed Computing: 13th International Symposium, DISC’99, Bratislava, Slovak Republic, September 27–29, 1999; Proceedings 13; Springer: Berlin/Heidelberg, Germany, 1999; pp. 94–106. [Google Scholar]
- Segall, A. Distributed Network Protocols. IEEE Trans. Inf. Theory 1983, IT-29, 23–35. [Google Scholar]
- Cournier, A.; Devismes, S.; Villain, V. Light enabling snap-stabilization of fundamental protocols. ACM Trans. Auton. Adapt. Syst. 2009, 4, 1–27. [Google Scholar] [CrossRef]
- Cournier, A.; Datta, A.; Petit, F.; Villain, V. Enabling snap-stabilization. In Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, RI, USA, 19–22 May 2003. [Google Scholar] [CrossRef]
- Blin, L.; Tixeuil, S. Compact deterministic self-stabilizing leader election on a ring: The exponential advantage of being talkative. Distrib. Comput. 2017, 31, 139–166. [Google Scholar] [CrossRef]
- Nia, M.A.; Faghih, F. Probabilistic analysis of self-stabilizing systems: A case study on a mutual exclusion algorithm. In Proceedings of the 2018 Real-Time and Embedded Systems and Technologies (RTEST), Tehran, Iran, 9–10 May 2018. [Google Scholar] [CrossRef]
- Baronti, M.; Mari, F.D.; Putten, R.V.D.; Venturi, I. Maximum, Minimum, Supremum, Infimum. In UNITEXT Calculus Problems; Springer: Cham, Switzerland, 2016; pp. 41–51. [Google Scholar] [CrossRef]
- Blin, L.; Cournier, A.; Villain, V. An Improved Snap-Stabilizing PIF Algorithm. In Self-Stabilizing Systems; Lecture Notes in Computer Science Self-Stabilizing Systems; Springer: Berlin/Heidelberg, Germany, 2003; pp. 199–214. [Google Scholar] [CrossRef]
- Bein, D.; Datta, A.K.; Karaata, M.H. An Optimal Snap-Stabilizing Multi-Wave Algorithm. Comput. J. 2007, 50, 332–340. [Google Scholar] [CrossRef]
- da Silva, A.P.R.; Teixeira, F.A.; Lage, R.K.V.; Ruiz, L.B.; Loureiro, A.A.F.; Nogueira, J.M.S. Using a distributed snapshot algorithm in wireless sensor networks. In Proceedings of the The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, FTDCS 2003, San Juan, PR, USA, 28–30 May 2003; pp. 31–37. [Google Scholar]
- Satyanarayana, P.S.; Mahalakshmi, T.; Rao, P.R.K.; Sheeba, A.; Ravi, J.; Rao, D. Enhancement of Energy Efficiency and Network Lifetime Using Modified MPCT Algorithm in Wireless Sensor Networks. J. Interconnect. Netw. 2022, 22, 2144012:1–2144012:22. [Google Scholar]
- Bandyopadhyay, S.; Coyle, E.J. An energy efficient hierarchical clustering algorithm for wireless sensor networks. In Proceedings of the IEEE INFOCOM 2003—Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; Volume 3, pp. 1713–1723. [Google Scholar]
- Cournier, A.; Petit, F.; Villain, V.; Datta, A.K. Self-stabilizing PIF algorithm in arbitrary rooted networks. In Proceedings of the 21st International Conference on Distributed Computing Systems, Mesa, AZ, USA, 16–19 April 2001; pp. 91–98. [Google Scholar]
- Pluzhnik, E.; Nikulchev, E.; Payain, S. Concept of feedback in future computing models to cloud systems. arXiv 2014, arXiv:1402.4663. [Google Scholar]
- Agrawala, A.; Gong, L. Distributed reset for fault-tolerant systems. In Proceedings of the 13th International Conference on Distributed Computing Systems, Pittsburgh, PA, USA, 25–28 May 1993. [Google Scholar]
- Davis, A.J.J. Review of Distributed Reset. 2023. Available online: https://emptysqua.re/blog/review-distributed-reset/ (accessed on 14 February 2023).
- The Apache Software Foundation. Apache ZooKeeper Documentation. 2021. Available online: https://zookeeper.apache.org/doc/r3.5.4-beta/zookeeperOver.html (accessed on 14 February 2023).
- Ouyang, L.; Huang, Y.; Huang, B.; Wei, H.; Ma, X. Leveraging TLA+ Specifications to Improve the Reliability of the ZooKeeper Coordination Service. arXiv 2023, arXiv:2302.02703. [Google Scholar]
- Toasa, R.M.; Aldas, C.; Recalde, P.; Coral, R. Performance Evaluation of Apache Zookeeper Services in Distributed Systems. In Proceedings of the International Conference on Information Technology & Systems, Quito, Ecuador, 6–8 February 2019. [Google Scholar]
- Petrescu, M. Leader Election in a Cluster using Zookeeper. Stud. Univ.-Babeș-Bolyai Inform. 2021, 66, 104. [Google Scholar]
- Chang, E.J. Echo algorithms: Depth parallel operations on general graphs. IEEE Trans. Softw. 1982, SE-8, 391–401. [Google Scholar]
- Douligeris, C.; Kotsopoulos, S.N. Real-Time Broadcast-Based Coordination for Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 2004, 3, 125–139. [Google Scholar]
- Cho, J.H.; Lee, J.; Kim, H.; Kim, Y. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. IEEE Access 2020, 8, 187919–187941. [Google Scholar]
- Lee, J.; Kwon, Y.; Lee, K.; Lim, S. An Overview of Wireless Communications for Emergency Responders. IEEE Commun. Mag. 2002, 40, 88–96. [Google Scholar]
- Stein, J.C.; Kroening, M. Inventory Management in Supply Chain. Harv. Bus. Rev. 2002, 80, 104–113. [Google Scholar]
- Li, J.; Tan, X.; Wu, J.; Zhang, K. Smart Grid Communications and Networking. IEEE Trans. Smart Grid 2010, 1, 109–119. [Google Scholar]
- Coyle, J.J.; Bardi, E.J.; Langley, C.J., Jr. Supply Chain Management: A Logistics Perspective; Cengage Learning: Boston, MA, USA, 2017. [Google Scholar]
- Lee, J.; Kim, Y.; Lee, J. An Overview of Wireless Health Monitoring Systems. J. Med Syst. 2010, 34, 859–872. [Google Scholar]
- Mayne, M. Blockchain Adoption in Broadcast; IBC: Tokyo, Japan, 2022. [Google Scholar]
- Wah, B.W.; Lien, Y.N. Design of Distributed Databases on Local Computer Systems with a Multiaccess Network. IEEE Trans. Softw. Eng. 1985, SE-11, 606–619. [Google Scholar]
- Lien, Y.N. Distributed Databases on Local Multiaccess Computer Systems (Query Processing, File Allocation, Concurrency Control). Ph.D. Thesis, Purdue University, West Lafayette, IN, USA, 1986. [Google Scholar]
- Lin, Y.F.; Lim, E.P.; Ng, W.K. eBroker: An agent-based query routing system for distributed E-commerce databases. In Proceedings of the Seventh International Conference on Parallel and Distributed Systems (Cat. No.PR00568), Iwate, Japan, 4–7 July 2000; pp. 517–522. [Google Scholar]
- Borst, S.; Gupta, V.; Walid, A. Distributed Caching Algorithms for Content Distribution Networks. In Proceedings of the IEEE INFOCOM 2010, San Diego, CA, USA, 14–19 March 201; IEEE: Piscataway, NJ, USA, 2010; pp. 1–9. [Google Scholar]
- Nasiri, H.; Nasehi, S.; Goudarzi, M. Evaluation of distributed stream processing frameworks for IoT applications in Smart Cities. J. Big Data 2019, 6, 1–24. [Google Scholar]
- Castro, M.; Liskov, B. Practical byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation (OsDI), New Orleans, LA, USA, 22–25 February 1999; Volume 99, pp. 173–186. [Google Scholar]
- Ongaro, D.; Ousterhout, J. In search of an understandable consensus algorithm. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC 14), Philadelphia, PA, USA, 19–20 June 2014; pp. 305–319. [Google Scholar]
- Li, J.; Chen, Y.; Wang, P.; Chen, H.H. A Survey on Wireless Broadcast Algorithms. IEEE Commun. Surv. Tutorials 2015, 17, 976–996. [Google Scholar]
- Marabissi, D.; Mucchi, L.; Stomaci, A. IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning. Future Internet 2022, 14, 61. [Google Scholar]
- El Zouka, H.A.; Hosni, M.M. Secure Authentication and Session Key Management Scheme for Distributed Sensor Networks. In Proceedings of the 2022 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 17–18 August 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 77–83. [Google Scholar]
- Yang, Z.; Ma, H.; Ai, M.; Zhan, M.; Wu, G.; Zhang, Y. A Minimal Disclosure Signature Authentication Scheme Based on Consortium Blockchain. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, 22–25 August 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 516–521. [Google Scholar]
- Hunt, P.; Konar, M.; Junqueira, F.P.; Reed, B. ZooKeeper: Wait-free Coordination for Internet-scale Systems. SIGPLAN Not. 2010, 45, 1–13. [Google Scholar]
- Burrows, M. The Chubby lock service for loosely-coupled distributed systems. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, USA, 6–8 November 2006; pp. 335–350. [Google Scholar]
- Kakivaya, G.; Xun, L.; Hasha, R.; Ahsan, S.B.; Pfleiger, T.; Sinha, R.; Gupta, A.; Tarta, M.; Fussell, M.; Modi, V.; et al. Service Fabric: A Distributed Platform for Building Microservices in the Cloud. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; ACM: New York, NY, USA, 2018; pp. 1–15. [Google Scholar]
- Pandya, B.; Pourabdollah, A.; Lotfi, A.; Acampora, G. An Integrated Fuzzy Logic System under Microsoft Azure using Simpful. In Proceedings of the 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Padua, Italy, 18–23 July 2022; pp. 1–9. [Google Scholar]
- Evdemon, J. Microservices and Service Fabric—The Future Architecture? Available online: https://devblogs.microsoft.com/premier-developer/microservices-and-service-fabric-the-future-architecture/ (accessed on 25 January 2023).
- Dijkstra, E.W. Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM 1975, 18, 453–457. [Google Scholar]
- Dolev, S.; Israeli, A.; Moran, S. Uniform dynamic self-stabilizing leader election. IEEE Trans. Parallel Distrib. Syst. 1997, 8, 424–440. [Google Scholar]
Approach | Handling of Arbitrary Initialization | Scalability | 1-Safety (Handling of Spurious Message) | Requires Lock-Step Synchrony | Premature Feedback Safety | Time Complexity |
---|---|---|---|---|---|---|
Flooding Broadcast [27] | No | Low | No | No | No | |
PIF [31,32,50] | No | Low | No | No | No | |
PFC [37,38] | No | Low | No | No | No | |
Distributed Reset [44,45] | No | Low | No | No | No | |
Al-Jady & Karaata [2] | Yes | Moderate | Yes | Yes | Yes | |
Proposed Algorithm | Yes | High | Yes | No | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dabees, A.; Karaata, M.H. Possibility and the Impossibility of Reliable Broadcast: A 1-Safe and Reliable Broadcast Algorithm in the Presence of Arbitrary Initialization. Algorithms 2025, 18, 437. https://doi.org/10.3390/a18070437
Dabees A, Karaata MH. Possibility and the Impossibility of Reliable Broadcast: A 1-Safe and Reliable Broadcast Algorithm in the Presence of Arbitrary Initialization. Algorithms. 2025; 18(7):437. https://doi.org/10.3390/a18070437
Chicago/Turabian StyleDabees, Aisha, and Mehmet Hakan Karaata. 2025. "Possibility and the Impossibility of Reliable Broadcast: A 1-Safe and Reliable Broadcast Algorithm in the Presence of Arbitrary Initialization" Algorithms 18, no. 7: 437. https://doi.org/10.3390/a18070437
APA StyleDabees, A., & Karaata, M. H. (2025). Possibility and the Impossibility of Reliable Broadcast: A 1-Safe and Reliable Broadcast Algorithm in the Presence of Arbitrary Initialization. Algorithms, 18(7), 437. https://doi.org/10.3390/a18070437