Solution of a problem in concurrent programming control

@article{Dijkstra1965SolutionOA,
  title={Solution of a problem in concurrent programming control},
  author={E. Dijkstra},
  journal={Commun. ACM},
  year={1965},
  volume={8},
  pages={569}
}
A number of mainly independent sequential-cyclic processes with restricted means of communication with each other can be made in such a way that at any moment one and only one of them is engaged in the "critical section" of its cycle. 
Tutorial: Designing Distributed Software in mCRL2
TLDR
This tutorial shows how to create behavioural models of parallel software, how to specify requirements using modal formulas, and how to verify these and discusses the design of an evolution of well-known mutual exclusion protocols and how model checking helps guide their design. Expand
Understanding Control Flow
  • P. Buhr
  • Computer Science
  • Springer International Publishing
  • 2016
class, 380 abstraction, 28 accept-blocked, 281, 337 accepting daisy-chain,289 multiple,289 acceptor stack, 270 acceptor/signalled stack, 275, 281, 282, 339 Achermann, Wilhelm, 22 acquire, 190, 193Expand
Contextual Merged Processes
TLDR
This work integrates two compact data structures for representing state spaces of Petri nets: merged processes and contextual prefixes, and demonstrates on a number of benchmarks that CMPs are more compact than either of the original data structures. Expand
The SPIN Model Checker - primer and reference manual
TLDR
This is the most comprehensive reference guide to SPIN, written by the principal designer of the tool, and gives detailed advice on methods for tackling the most complex software verification problems. Expand
Adaptive and efficient mutual exclusion
TLDR
This paper shows how to make the space complexity of this algorithm depend solely on n, while preserving the other performance measures of the algorithm. Expand
Portable high-performance programs
TLDR
The work-first principle inspired Cilk''s novel ``two-clone'' compilation strategy and its Dijkstra-like mutual-exclusion protocol for implementing the ready deque in the work-stealing scheduler, and good asymptotic bounds on the execution time of Cilk programs that use location-consistent shared memory are proved. Expand
The arbiter: an active system component for implementing synchronizing primitives
  • H. Goeman
  • Mathematics, Computer Science
  • Fundam. Informaticae
  • 1981
An active system component, the arbiter, is proposed as a system struc-turing concept for the implementation of synchronizing primitives. The concept is illustrated by showing a new and very simpleExpand
A self‐stabilizing distributed algorithm for the local (1,|Ni|)‐critical section problem
TLDR
The necessary and sufficient conditions to solve the local (1,|Ni|)‐critical section (CS) problem without any deadlock detection are shown and an efficient self‐stabilizing algorithm is proposed under an additional assumption that the graph does not have a special matching, which is called unpreventable colorable maximal matching. Expand
Memory Reclamation for Recoverable Mutual Exclusion
TLDR
This work presents the first “general” recoverable algorithm for memory reclamation in the context of recoverable mutual exclusion, which can be plugged into any RME algorithm very easily and preserves all correctness property and most desirable properties of the algorithm. Expand
Formal Specification and Model Checking of the Walter-Welch-Vaidya Mutual Exclusion Protocol for Ad Hoc Mobile Networks
  • Yati Phyo, K. Ogata
  • Computer Science
  • 2018 25th Asia-Pacific Software Engineering Conference (APSEC)
  • 2018
TLDR
The lockout freedom property is interested in as one desired property for the protocol in this paper and can be expressed with the LTL leads-to connective. Expand
...
1
2
3
4
5
...