Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joffroy Beauquier is active.

Publication


Featured researches published by Joffroy Beauquier.


international symposium on distributed computing | 2000

Self-Stabilizing Local Mutual Exclusion and Daemon Refinement

Joffroy Beauquier; Ajoy Kumar Datta; Maria Gradinariu; Frédéric Magniette

Refining self-stabilizing algorithms which use tighter scheduling constraints (weaker daemon) into corresponding algorithms for weaker or no scheduling constraints (stronger daemon), while preserving the stabilization property, is useful and challenging. Designing transformation techniques for these refinements has been the subject of serious investigations in recent years. This paper proposes a transformation technique to achieve the above task. The heart of the transformer is a self-stabilizing local mutual exclusion algorithm. The local mutual exclusion problem is to grant a process the privilege to enter the critical section if and only if none of the neighbors of the process has the privilege. The contribution of this paper is twolold. First, we present a bounded-memory self-stabilizing local mutual exclusion algorithm for arbitrary network, assuming any arbitrary daemon. After stabilization, this algorithm maintains a bound on the service time (the delay between two successive executions of the critical section by a particular process). This bound is n×(n-1)/2 where n is the network size. Second, we use the local mutual exclusion algorithm to design two scheduler transformers which convert the algorithms working under a weaker daemon to ones which work under the distributed, arbitrary (or unfair) daemon, both transformers preserving the self-stabilizing property. The first transformer refines algorithms written under the central daemon, while the second transformer refines algorithms designed for the k-fair (k ? (n - 1)) daemon.


principles of distributed computing | 1999

Memory space requirements for self-stabilizing leader election protocols

Joffroy Beauquier; Maria Gradinariu; Colette Johnen

We study the memory requirements of self-stabilizing leader election (SSLE) protocols. We are mainly interested in two types of systems: anonymous systems and id-based systems. We consider two classes of protocols: deterministic ones and randomized ones. We prove that a non-constant lower bound on the memory space is required by a SSLE protocol on unidirectional, anonymous rings (even if the protocol is randomized). We show that, if there is a deterministic protocol solving a problem on id-based systems where the processor memory space is constant and the id-values are not bounded then there is a deterministic protocol on anonymous systems using constant memory space that solves the same problem. Thus impossibility results on anonymous rings (i.e. one may design a deterministic SSLE protocol, only on prime size rings, under a centralized daemon) can be extended to those kinds of id-based rings. Nevertheless, it is possible to design a silent and deterministic SSLE protocol requiring constant memory space on unidirectional, id-based rings where the id-values are bounded. We present such a protocol. We also present a randomized SSLE protocol and a token circulation protocol under an unfair, distributed daemon on anonymous and unidirectional rings of any size. We give a lower bound on memory space requirement proving that these protocols are space optimal. The memory space required is constant on average. Keyword: self-stabilization, leader election, mutual exclusion, decidability, memory space requirement.


principles of distributed computing | 2010

On utilizing speed in networks of mobile agents

Joffroy Beauquier; Janna Burman; Julien Clement; Shay Kutten

Population protocols are a model presented recently for networks with a very large, possibly unknown number of mobile agents having small memory. This model has certain advantages over alternative models (such as DTN) for such networks. However, it was shown that the computational power of this model is limited to semi-linear predicates only. Hence, various extensions were suggested. We present a model that enhances the original model of population protocols by introducing a (weak) notion of speed of the agents. This enhancement allows us to design fast converging protocols with only weak requirements (for example, suppose that there are different types of agents, say agents attached to sick animals and to healthy animals, two meeting agents just need to be able to estimate which of them is faster, e.g., using their types, but not to actually know the speeds of their types). Then, using the new model, we study the gathering problem, in which there is an unknown number of anonymous agents that have values they should deliver to a base station (without replications). We develop efficient protocols step by step searching for an optimal solution and adapting to the size of the available memory. The protocols are simple, though their analysis is somewhat involved. We also present a more involved result - a lower bound on the length of the worst execution for any protocol. Our proofs introduce several techniques that may prove useful also in future studies of time in population protocols.


international conference on distributed computing systems | 1998

Self-stabilization with global rooted synchronizers

Luc Onana Alima; Joffroy Beauquier; Ajoy Kumar Datta; Sébastien Tixeuil

We propose a self-stabilizing synchronization technique, called the global rooted synchronization, that synchronizes processors in a tree network. This synchronizer converts a synchronous protocol for tree networks into a self-stabilizing version. The synchronizer requires only O(1) memory (other than the memory needed to maintain the tree) at each node regardless of the size of the network, stabilizes in O(h) time, where h is the height of the tree, and does not invoice any global operations. Applications of this technique are presented.


International Journal of Systems Science | 1997

Fault-tolerance and self-stabilization: impossibility results and solutions using self-stabilizing failure detectors

Joffroy Beauquier; Synnöve Kekkonen-Moneta

Abstract This paper focuses on protocols that are simultaneously resilient to permanent failures (crash faults) and transient failures (memory and message corruption). First, we show that asynchronous round-based and fault-tolerant protocols cannot be transformed into protocols that are simultaneously fault-tolerant and self-stabilizing (ftss), as is otherwise possible in the synchronous mode of computation. Secondly, we show that it is impossible to find the number of processes (i.e. the size) on a family of networks, as it has been proven for the ring network. Finally, we present a ftss protocol for solving ring size by assuming that each process accesses a failure detector. We also propose two self-stabilizing implementations for the failure detector that differ in their degree of tolerance to transient failures.


Distributed Computing | 2007

Transient fault detectors

Joffroy Beauquier; Sylvie Delaët; Shlomi Dolev; Sébastien Tixeuil

We present fault detectors for transient faults, (i.e., corruptions of the memory of the processors, but not of the code of the processors). We distinguish fault detectors for tasks (i.e., the problem to be solved) from failure detectors for implementations (i.e., the algorithm that solves the problem). The aim of our fault detectors is to detect a memory corruption as soon as possible. We study the amount of memory needed by the fault detectors for some specific tasks, and give bounds for each task. The amount of memory is related to the size and the number of views that a processor has to maintain to ensure a quick detection. This work may give the implementation designer hints concerning the techniques and resources that are required for implementing a task.


Theoretical Informatics and Applications | 1979

Quelques problèmes ouverts en théorie des langages algébriques

Jean-Michel Autebert; Joffroy Beauquier; Luc Boasson; Maurice Nivat

— We present hère some open questions about the context-free languages.


principles of distributed computing | 2007

Self-stabilizing counting in mobile sensor networks

Joffroy Beauquier; Julien Clement; Stéphane Messika; Laurent Rosaz; Brigitte Rozoy

Distributed computing has to adapt its techniques to mobile sensor networks and cope with constraints like small memory size or lack of computation power. In this paper we extend the results of Angluin et al (see [1,2,3,4]) by finding self-stabilizing algorithms to count the number of agents in the network. We focus on two different models of communication, with a fixed antenna or with pairwise interactions. In both models we decide if there exist algorithms (probabilistic, deterministic, with k-fair adversary) to solve the self-stabilizing counting problem.


Formal Language Theory#R##N#Perspectives and Open Problems | 1980

APPLICATION OF FORMAL LANGUAGE THEORY TO PROBLEMS OF SECURITY AND SYNCHRONIZATION

Joffroy Beauquier; Maurice Nivat

Publisher Summary This chapter discusses the application of formal language theory to the problems of security and synchronization. It discusses the use of language theory in the study of challenging new problems raised in the development of information systems. Todays computers manipulate structured objects that are supposed to carry some information. Such objects are trees, processes, tapes, and memory cells. For each type of object, there exists a finite set of distinct ways in which it can be manipulated. Each type of manipulation is called access. The security system is the finite set of rules that delimit the accesses that can be made during the progress of computation. The chapter discusses how the use of formal language theory allows one to analyze completely the behavior of a concrete security system. The security systems belong to the family of capability-based security systems. Real capability-based security systems sometimes allow a user to define its own security subsystem. This sub-system must be compatible with the main system.


international parallel and distributed processing symposium | 2007

A Model for Large Scale Self-Stabilization

Thomas Herault; Pierre Lemarinier; Olivier Peres; Laurence Pilard; Joffroy Beauquier

We introduce a new model for distributed algorithms designed for large scale systems that need a low-overhead solution to allow the processes to communicate with each other. We assume that every process can communicate with any other process provided it knows its identifier, which is usually the case in e.g. a peer to peer system, and that nodes may arrive or leave at any time. To cope with the large number of processes, we limit the memory usage of each process to a small constant number of variables, combining this with previous results concerning failure detectors and resource discovery. We illustrate the model with a self-stabilizing algorithm that builds and maintains a spanning tree topology. We provide a formal proof of the algorithm and the results of experiments on a cluster.

Collaboration


Dive into the Joffroy Beauquier's collaboration.

Top Co-Authors

Avatar

Janna Burman

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shay Kutten

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Peva Blanchard

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge