Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Leslie Lamport is active.

Publication


Featured researches published by Leslie Lamport.


Communications of The ACM | 1978

Time, clocks, and the ordering of events in a distributed system

Leslie Lamport

The concept of one event happening before another in a distributed system is examined, and is shown to define a partial ordering of the events. A distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events. The use of the total ordering is illustrated with a method for solving synchronization problems. The algorithm is then specialized for synchronizing physical clocks, and a bound is derived on how far out of synchrony the clocks can become.


ACM Transactions on Programming Languages and Systems | 1982

The Byzantine Generals Problem

Leslie Lamport; Robert E. Shostak; Marshall C. Pease

The ship control system for the U.S. Navys newest attack submarine, Seawolf; incorporates hardware modular redundancy both in its core processing and its input/output system. This paper provides a practical experience report on the redundancy management software services developed for this system. Introductory material is presented to provide contextual information regarding the overall ship control system. An overview of the systems processing platform is presented in sufficient detail to define the problems associated with redundancy management and to describe hardware functionality which supports the software services. Policies and procedures for detection and isolation of faults are discussed as are reconfiguration responses to faults.Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement. It is shown that, using only oral messages, this problem is solvable if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals. With unforgeable written messages, the problem is solvable for any number of generals and possible traitors. Applications of the solutions to reliable computer systems are then discussed.


Communications of The ACM | 1981

Password authentication with insecure communication

Leslie Lamport

A method of user password authentication is described which is secure even if an intruder can read the systems data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a microcomputer in the users terminal.


ACM Transactions on Computer Systems | 1985

Distributed snapshots: determining global states of distributed systems

K. Mani Chandy; Leslie Lamport

This paper presents an algorithm by which a process in a distributed system determines a global state of the system during a computation. Many problems in distributed systems can be cast in terms of the problem of detecting global states. For instance, the global state detection algorithm helps to solve an important class of problems: stable property detection. A stable property is one that persists: once a stable property becomes true it remains true thereafter. Examples of stable properties are “computation has terminated,” “ the system is deadlocked” and “all tokens in a token ring have disappeared.” The stable property detection problem is that of devising algorithms to detect a given stable property. Global state detection can also be used for checkpointing.


ACM Transactions on Computer Systems | 1998

The part-time parliament

Leslie Lamport

Recent archaeological discoveries on the island of Paxos reveal that the parliament functioned despite the peripatetic propensity of its part-time legislators. The legislators maintained consistent copies of the parliamentary record, despite their frequent forays from the chamber and the forgetfulness of their messengers. The Paxon parliaments protocol provides a new way of implementing the state machine approach to the design of distributed systems.


ACM Transactions on Programming Languages and Systems | 1994

The temporal logic of actions

Leslie Lamport

The temporal logic of actions (TLA) is a logic for specifying and reasoning about concurrent systems. Systems and their properties are represented in the same logic, so the assertion that a system meets its specification and the assertion that one system implements another are both expressed by logical implication. TLA is very simple; its syntax and complete formal semantics are summarized in about a page. Yet, TLA is not just a logicians toy; it is extremely powerful, both in principle and in practice. This report introduces TLA and describes how it is used to specify and verify concurrent algorithms. The use of TLA to specify and reason about open systems will be described elsewhere.


Journal of the ACM | 1980

Reaching Agreement in the Presence of Faults

Marshall C. Pease; Robert E. Shostak; Leslie Lamport

The problem addressed here concerns a set of isolated processors, some unknown subset of which may be faulty, that communicate only by means of two-party messages. Each nonfaulty processor has a private value of information that must be communicated to each other nonfaulty processor. Nonfaulty processors always communicate honestly, whereas faulty processors may lie. The problem is to devise an algorithm in which processors communicate their own values and relay values received from others that allows each nonfaulty processor to infer a value for each other processor. The value inferred for a nonfaulty processor must be that processors private value, and the value inferred for a faulty one must be consistent with the corresponding value inferred by each other nonfaulty processor. It is shown that the problem is solvable for, and only for, n ≥ 3m + 1, where m is the number of faulty processors and n is the total number. It is also shown that if faulty processors can refuse to pass on information but cannot falsely relay information, the problem is solvable for arbitrary n ≥ m ≥ 0. This weaker assumption can be approximated in practice using cryptographic methods.


Distributed Computing | 1986

On interprocess communication: Part I: Basic formalism

Leslie Lamport

A formalism for specifying and reasoning about concurrent systems is described. Unlike more conventional formalisms, it is not based upon atomic actions. A definition of what it means for one system to implement a higher-level system is given and justified. In Part II, the formalism is used to specify several classes of interprocess communication mechanisms and to prove the correctness of algorithms for implementing them.


Communications of The ACM | 1974

A new solution of Dijkstra's concurrent programming problem

Leslie Lamport

A simple solution to the mutual exclusion problem is presented which allows the system to continue to operate despite the failure of any individual component.


Proceedings of the IEEE | 1978

SIFT: Design and analysis of a fault-tolerant computer for aircraft control

John H. Wensley; Leslie Lamport; Jack Goldberg; Milton W. Green; Karl N. Levitt; P. M. Melliar-Smith; Robert E. Shostak; Charles B. Weinstock

SIFT (Software Implemented Fault Tolerance) is an ultrareliable computer for critical aircraft control applications that achieves fault tolerance by the replication of tasks among processing units. The main processing units are off-the-shelf minicomputers, with standard microcomputers serving as the interface to the I/O system. Fault isolation is achieved by using a specially designed redundant bus system to interconnect the proeessing units. Error detection and analysis and system reconfiguration are performed by software. Iterative tasks are redundantly executed, and the results of each iteration are voted upon before being used. Thus, any single failure in a processing unit or bus can be tolerated with triplication of tasks, and subsequent failures can be tolerated after reconfiguration. Independent execution by separate processors means that the processors need only be loosely synchronized, and a novel fault-tolerant synchronization method is described. The SIFT software is highly structured and is formally specified using the SRI-developed SPECIAL language. The correctness of SIFT is to be proved using a hierarchy of formal models. A Markov model is used both to analyze the reliability of the system and to serve as the formal requirement for the SIFT design. Axioms are given to characterize the high-level behavior of the system, from which a correctness statement has been proved. An engineering test version of SIFT is currently being built.

Collaboration


Dive into the Leslie Lamport's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nancy A. Lynch

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

K. Mani Chandy

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge