2006 International Conference on Emerging Technologies 2006
DOI: 10.1109/icet.2006.336002
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Distributed Mutual Exclusion Algorithm

Abstract: The problem of mutual exclusion has to be solved to prevent race condition and, as a result, prevent the possibility of a program producing an incorrect result. Providing deadlock-free distributed mutual exclusion algorithms is often difficult and it involves passing many messages. The two major types of these algorithms are token-based and permission-based algorithms. In this research, we propose a hybrid distributed mutual exclusion algorithm. By Hybrid, we mean that the algorithm uses both token-based and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…A unique non-zero identification number is assigned to each process. Every process can send messages directly to all other processes using their identification numbers, which are considered as their addresses (complete communication graph similar to [2,6,10,11,14,16]). …”
Section: Assumptionsmentioning
confidence: 99%
“…A unique non-zero identification number is assigned to each process. Every process can send messages directly to all other processes using their identification numbers, which are considered as their addresses (complete communication graph similar to [2,6,10,11,14,16]). …”
Section: Assumptionsmentioning
confidence: 99%
“…A unique non zero identification number is assigned to each process. Every process can send messages directly to all other processes using their identification numbers which are considered as their addresses (complete communication graph similar to [1,4,[9][10][11][12]15]). The logical structure of the interconnecting network is a wraparound two-dimensional array and the algorithm does not entail any specific physical interconnection topology.…”
Section: System Modelmentioning
confidence: 99%
“…However, the results of these algorithms have not been taken into account for environments with high probability of failure. The term "hybrid voting" differs from "hybrid mutual exclusion" (as used in [37,38]) which has the idea of both token-based and permission-based algorithms.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Studies in [37,38] introduce two forms of hybrid mutual exclusion algorithms as a combination of token-based and permission-based algorithms. The study in [37] uses Maekawa's quorums [24] for every site in the distributed system.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation