1989
DOI: 10.1016/0020-0190(89)90211-1
|View full text |Cite
|
Sign up to set email alerts
|

A distributed algorithm for multiple entries to a critical section

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
5

Year Published

1991
1991
2012
2012

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(36 citation statements)
references
References 4 publications
0
31
0
5
Order By: Relevance
“…See, for example, [24,28] for other k-mutual exclusion algorithms. A quorum-based algorithm uses the concept of k-coterie [10,15,16].…”
Section: K-mutual Exclusion and Well-covered Graphsmentioning
confidence: 99%
“…See, for example, [24,28] for other k-mutual exclusion algorithms. A quorum-based algorithm uses the concept of k-coterie [10,15,16].…”
Section: K-mutual Exclusion and Well-covered Graphsmentioning
confidence: 99%
“…To facilitate fault tolerance without assuming failure detection, the general mutual exclusion problem has been extended to the k-mutual exclusion one [17], where at most k different processes can concurrently access the same resource; general strategies working in a failure-free environment have been adapted to solve this more general problem in an asynchronous message passing system (e.g. [14], [8]).…”
Section: Related Workmentioning
confidence: 99%
“…Examples of such algorithms in the context of distributed mutual exclusion are ( [14], [16], [17], [18]). A class of algorithms that satisfies the necessary condition of Lemma 1 is the one based on a rotating coordinator approach (also called perpetual circulating token [5], [15]) as shown in the next section.…”
Section: Solvability Issues For O-ma and So-ma Problemsmentioning
confidence: 99%
“…Unlike the solution by Fischer et al this solution does not use a powerful read-modified-write primitive. A number of k-exclusion algorithms have been also proposed in the asynchronous network setting [17,28]. The major paradigms for the resource allocation problem on the asynchronous network setting are the permission based ones and the token based ones.…”
Section: Introductionmentioning
confidence: 99%
“…The major paradigms for the resource allocation problem on the asynchronous network setting are the permission based ones and the token based ones. For example, the algorithm proposed by Kakugawa et al [17] and the algorithm proposed by Raymond [28] are permission based.…”
Section: Introductionmentioning
confidence: 99%