2005
DOI: 10.1016/j.ipl.2005.05.015
|View full text |Cite
|
Sign up to set email alerts
|

A mutual exclusion algorithm with optimally bounded bypasses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 13 publications
(16 reference statements)
0
12
0
Order By: Relevance
“…When p is competing and process q enters, q can indeed pass p when p executes push and therewith refreshes lwb [ p]. For q to reach CS, however, it seems that all j processes passed by q need to line up in turn [1] up to turn [ j] in such a way that they cannot be passed again by newcoming processes.…”
Section: Bounded Overtakingmentioning
confidence: 99%
“…When p is competing and process q enters, q can indeed pass p when p executes push and therewith refreshes lwb [ p]. For q to reach CS, however, it seems that all j processes passed by q need to line up in turn [1] up to turn [ j] in such a way that they cannot be passed again by newcoming processes.…”
Section: Bounded Overtakingmentioning
confidence: 99%
“…Through static code analysis, it is possible to determine the synchronisation algorithm's worst‐case execution time. This is because Alagarsamy's mutual‐exclusion algorithm promises bounded bypasses, limiting their number to n − 1 ,p. 36. This translates directly into the maximum number of times a compiled instruction will be executed.…”
Section: Discussionmentioning
confidence: 99%
“…A more direct generalisation of the two-process algorithm is provided by Peterson although he acknowledges that it requires more memory than other solutions and, most importantly, satisfies fewer constraints [10, p. 116]. In particular, his generalised algorithm does not satisfy the constraint of being free from starvation [11], despite some suggestions to the contrary [12, p. 20]. That is, the algorithm cannot guarantee that a process using it will not be perpetually denied resources.…”
Section: Generalisations Of Peterson's Two-process Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Surveys can be found in [3,15,16]. In particular, the solutions by Lamport [10] and Peterson [14] have inspired several variations [2,5,9,16].…”
Section: Introductionmentioning
confidence: 99%