1979
DOI: 10.1016/0020-0190(79)90151-0
|View full text |Cite
|
Sign up to set email alerts
|

Self-stabilization (in spite of distributed control) in tree-structured systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

1991
1991
2003
2003

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(20 citation statements)
references
References 1 publication
0
20
0
Order By: Relevance
“…Therefore, this protocol is a self-stabilizing, mutual-exclusion protocol in the strongest possible sense: There is a unique legitimate sequence of configurations, which is a suffix of every possible execution of the protocol. In a way, this protocol is well known and is a simplified version of protocols presented in [3,4,11,13].…”
Section: The Basic Protocolmentioning
confidence: 97%
See 1 more Smart Citation
“…Therefore, this protocol is a self-stabilizing, mutual-exclusion protocol in the strongest possible sense: There is a unique legitimate sequence of configurations, which is a suffix of every possible execution of the protocol. In a way, this protocol is well known and is a simplified version of protocols presented in [3,4,11,13].…”
Section: The Basic Protocolmentioning
confidence: 97%
“…Burns and Pachl in [2] present a uniform, self-stabilizing, mutual-exclusion protocol for rings with a prime numer of processors. A semiuniform, self-stabilizing protocol for some variant of the mutual-exclusion problem which runs on tree systems is presented by Kruijer in [11]. A self-stabilizing, mutualexclusion protocol for systems with arbitrary communication graphs is presented by Tchuente in [16].…”
mentioning
confidence: 99%
“…ception of [Kru79]. It took almost another decade before there was sufficient material 1 to warrant the survey by [Sch93].…”
Section: -2mentioning
confidence: 99%
“…Dijkstra [6,7], and Burns and Pachl [4] dealt with token circulation on ring networks; Brown et al [2], on linear array of processors; Kruijer [11 ], on tree networks. The proposed protocol however works on general networks.…”
Section: Introductionmentioning
confidence: 99%