Academia.eduAcademia.edu

critical-section problem

description386 papers
group209 followers
lightbulbAbout this topic
The critical-section problem refers to a challenge in concurrent programming where multiple processes or threads must access shared resources without causing data inconsistency or conflicts. It involves ensuring that only one process can enter its critical section at a time, thereby maintaining data integrity and synchronization among processes.
lightbulbAbout this topic
The critical-section problem refers to a challenge in concurrent programming where multiple processes or threads must access shared resources without causing data inconsistency or conflicts. It involves ensuring that only one process can enter its critical section at a time, thereby maintaining data integrity and synchronization among processes.
Karl Popper (1902-1994) is one of the most eminent philosophers of the 20th century which reconfigured the scientific method through the creation of the project (critical spirit) as an alternative to the model of certainty and traditional... more
The purpose of this research is not only to move beyond traditional concepts of knowledge but also to emphasize the significance of Kant’s critical philosophy. This philosophical approach constructs knowledge on critical foundations and... more
The Multiprocessor Bandwidth Inheritance (M-BWI) protocol is an extension of the Bandwidth Inheritance (BWI) protocol to symmetric multiprocessor systems. Similarly to Priority Inheritance, M-BWI lets a task that has locked a resource... more
In this paper we present an architecture design for supporting real time computing on Linux. This architecture focuses on improving the usability of real time capabilities for applications by providing a unified Application Programming... more
Abstract| W e present a self-stabilizing token passing algorithm for a tree network. The algorithm is based on the 4-state mutual exclusion algorithm of Dijkstra 5] and works under the distributed daemon model of execution.... more
Invalidation-based cache coherence protocols have been extensively studied in the context of large-scale shared-memory multiprocessors. Under a relaxed memory consistency model, most of the write latency can be hidden whereas cache misses... more
In Software Defined Radios FPGAs can be used as both an interconnect layer and a general-purpose computational fabric implementing hardware acceleration units. Typical implementations of software defined radio (SDR) modems include a... more
The amount of biosequence data being produced each year is growing exponentially. Extracting useful information from this massive amount of data efficiently is becoming an increasingly difficult task. There are many available software... more
In this paper, we investigate distributed mutual exclusion algorithms and delineate the features of a new distributed mutual exclusion algorithm. The basis of the algorithm is the logical ring structure employed in token-based mutual... more
This paper presents a simple mutual exclusion algorithm for ad hoc mobile networks. Our algorithm does not use the token circulation technique. A station which requests a Critical Section (CS) competes in order to be alone to use the... more
This paper presents a simple mutual exclusion algorithm for ad hoc mobile networks. Our algorithm does not use the token circulation technique. A station which requests a Critical Section (CS) competes in order to be alone to use the... more
In a distributed system, process synchronization is an important agenda. One of the major duties for process synchronization is mutual exclusion. In new algorithm, opposite the past algorithms fairness happens. This paper presents a new... more
Resource allocation is the problem that a process may enter a critical section CS of its code only when its resource requirements are not in conflict with those of other processes in their critical sections. For each execution of CS,... more
A mathematical algorithm is developed and presented for use in conjunction with the Imposed Rotation Method as reformulated by Kaneko as a (n * 2n) linear complementarity problem. The inelastic tri-linear moment rotation law which is... more
The MCS lock was the first mutual exclusion lock to support an arbitrary number of processes with unknown identities such that each process can acquire and release the lock in a constant number of RMRs on both Cache-Coherent and... more
The group mutual exclusion (GME) problem is an interesting generalization of the mutual exclusion problem. Several solutions of the GME problem have been proposed for message passing distributed systems. In this paper we present a new... more
Mutual exclusion is one of the mechanisms that can be used to solve concurrency problems in the operating system. In the operating system, there are resources that cannot be shared at the same time, such as printers. These kinds of... more
This paper considers the use of lock-free shared objects within hard r eal-time systems. As the name suggests, lock-free shared objects are distinguished by the fact that they are not locked. As such, they do not give rise to priority... more
The distributed k-mutual exclusion problem or, simply the k-mutex problem, is the problem of allowing at most k processes to access their critical sections simultaneously. This might be the consequence where k identical copies of a... more
In this paper a distributed algorithm is proposed that realises mutual exclusion among n nodes in a computer network. There is no common or global memory shared by the nodes and there is no global controller. The nodes of the network... more
In this paper a distributed algorithm is proposed that realises mutual exclusion among n nodes in a computer network. There is no common or global memory shared by the nodes and there is no global controller. The nodes of the network... more
Fire tests were performed to investigate the mechanics and capacity of steel beam-columns that develop a thermal gradient through their depth when exposed to fire. Wide-flanged specimens were loaded axially and tested vertically in a... more
In distributed shared memory multiprocessors, remote memory accesses generate processor-tomemory traffic which may result in a bottleneck. It is therefore important to design algorithms that minimize the number of remote memory accesses.... more
Transactional Memory (TM) is a promising new technology that makes it possible to ease writing multi-threaded applications. Many different TM implementations exist, unfortunately most of those TM systems are currently evaluated by using... more
This paper considers the use of lock-free shared objects within hard r eal-time systems. As the name suggests, lock-free shared objects are distinguished by the fact that they are not locked. As such, they do not give rise to priority... more
1. The new paradigm shift widens the definition of life to bio-environmental systems, while the environment-health relationship remains exclusively linked to (i) infections, (ii) pollution, (iii) geo-climatic alterations: few extend the... more
Distributed mutual exclusion is a fundamental problem of distributed systems that coordinates the access to critical shared resources. It concerns with how the various distributed processes access to the shared resources in a mutually... more
Mutual exclusion is a fundamental distributed coordination problem. Shared-memory mutual exclusion research focuses on local-spin algorithms and uses the remote memory references (RMRs) metric. To ensure the correctness of concurrent... more
As vehicular networking has recently been developed and commercialized, vehicular cloud computing has received much attention in various research areas, such as intelligent transportation systems and vehicular ad hoc networks. An... more
The lock set method and the partial order method are two main approaches to guarantee that dynamic data race prediction remains efficient. There are many variations of these ideas. Common to all of them is the assumption that the events... more
In this paper we present a solution to the 'Latest Gossip Problem' for a shared memory distributed system. The Latest Gossip Problem is essentially one of bounded timestamping in which processes must locally keep track of the 'latest'... more
In this paper we present a solution to the 'Latest Gossip Problem' for a shared memory distributed system. The Latest Gossip Problem is essentially one of bounded timestamping in which processes must locally keep track of the 'latest'... more
Expert systems for decision support have recently been successfully introduced in road transport management. These systems include knowledge on tra c problem detection and alleviation. The paper describes experiments in automated... more
This paper presents a fault-tolerant algorithm ensuring multiple resources sharing in mobile ad hoc networks (MANETs) that is able to handle the known K-mutual exclusion problem in such mobile environments. The proposed algorithm relies... more
This paper presents a fault-tolerant algorithm ensuring multiple resources sharing in mobile ad hoc networks (MANETs) that is able to handle the known K-mutual exclusion problem in such mobile environments. The proposed algorithm relies... more
To fully exploit the scaling performance in Chip Multiprocessors, applications must be divided into semi-independent processes that can run concurrently on multiple cores within a system. One major class of such applications,... more
In this paper we define the Weak Mutual Exclusion (WME) problem. Analogously to classical Distributed Mutual Exclusion (DME), WME serializes the accesses to a shared resource. Differently from DME, however, the WME abstraction regulates... more
In this paper, we design and analyze a mutual exclusion algorithm, based on the Token and Failure detector, in asynchronous distributed systems. A Failure Detector is an independent module that detects and reports crashes of other... more
A fuzzy neural network was implemented using a multithreading approach for detection of atrial fibrillation, bigeminy, and normal sinus rhythm in the MIT-BIH Arrhythmia Database. The feedforward multilayer perceptron neural network... more
Our work presents a self-stabilizing solution to the '-exclusion problem. This problem is a well-known generalization of the mutual-exclusion problem in which up to ', but never more than ', processes are allowed simultaneously in their... more
Composite such as Glass Fibre Reinforced Polymer (GFRP) is increasingly used as insulation in many industrial applications such as the steel pipelines in the oil and gas industry. Due to ageing and cyclic operation, many hidden defects... more
Resource allocation is the problem that a process may enter a critical section CS of its code only when its resource requirements are not in conflict with those of other processes in their critical sections. For each execution of CS,... more
Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.
Quorum-based distributed coordination protocols provide decentralized control of a shared resource in a distributed system. To guarantee mutually exclusive or mutually consistent access to a resource, each processor in a distributed... more
Modern network processors deliver a set of methods for implementing critical sections. A number of them rely on specific hardware support and capabilities, while software techniques are still available when hardware support is not... more
Download research papers for free!