Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2016 | 49(4) Informatyka | 85-104

Article title

Mutual Exclusion in DSM Systems: A Protocol with Vectors of Timestamps; Demonstration of Control Flow by Cause/Effect Structures

Authors

Content

Title variants

PL
Wzajemne wykluczenie w systemach DSM: protokół z wektorami znaczników czasu; pokaz przepływu sterowania przez struktury przyczynowo-skutkowe

Languages of publication

PL EN

Abstracts

PL
Przedstawiono protokół oparty na wektorach znaczników czasu i zaprojektowany dla wzajemnego wykluczenia w systemach rozproszonej pamięci dzielonej (DSM). Jego przykładowe zachowanie jest ukazane jako gra z zastosowaniem żetonów w modelu struktur przyczynowo-skutkowych.
EN
A protocol based on vectors of timestamps and devised for mutual exclusion in Distributed Shared Memory (DSM) systems is presented. Its exampled behaviour is shown as a token game in the Cause/ Effect (C/E) structures model.

Year

Pages

85-104

Physical description

Contributors

author
  • Akademia Finansów i Biznesu Vistula. Wydział Inżynierski

References

  • Czaja L. (1988), Cause-effect structures, “Information Processing Letters”, No. 26.
  • Czaja L. (2002), Elementary Cause-Effect Structures, Warsaw University, Warsaw.
  • Dijkstra E.W. (1968), Cooperating sequential processes, (in:) Genuys F. (Ed.), Programming Languages: NATO Advanced Study Institute, “Academic Press”.
  • Dijkstra E.W. (2002), The Origin of Concurrent Programming, Springer Verlag, New York.
  • Kuz I., Chakravarty M.M.T., Heiser G. (2016), A course on distributed systems COMP9243.
  • Lamport L. (1978), Time, Clocks and the Ordering of Events in Distributed Systems, “Comm. of the ACM”, No. 21.
  • Lamport L. (1979), How to Make a Multiprocessor Computer That Correctly Executes Multiprocess Programs, “IEEE Trans. On Computers”, C-28.
  • Petri C.A. (1966), Communication with automata, Report, Vol. 1, Suppl. 1 RADC TR-65-377, Applied Data Research, Contract AF 30, Princeton N.J.
  • Ricart G., Agrawala A.K. (1981), An Optimal Algorithm For Mutual Exclusion in Computer Networks, “Comm. of the ACM”, No. 24(1).
  • Reisig W. (1985), Petri Nets. An Introduction, Springer-Verlag, Berlin, Heidelberg, New York, Tokyo.
  • Saxena P.C., Rai J. (2003), A survey of permission-based distributed mutual exclusion algorithms, “Computer Standards & Interfaces”, Vol. 25, Iss. 2, May.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-b122c697-8e41-41fb-9df0-39f93142b3a8
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.