نتایج جستجو برای: generalized mutual exclusion constraint gmec

تعداد نتایج: 369331  

2007
James R. Curran Tara Murphy Bernhard Scholz

Iterative bootstrapping techniques are commonly used to extract lexical semantic resources from raw text. Their major weakness is that, without costly human intervention, the extracted terms (often rapidly) drift from the meaning of the original seed terms. In this paper we proposeMutual Exclusion bootstrapping (MEB) in which multiple semantic classes compete for each extracted term. This signi...

2008
Hagit Attiya Danny Hendler Philipp Woelfel

We investigate the remote memory references (RMRs) complexity of deterministic processes that communicate by reading and writing shared memory in asynchronous cache-coherent and distributed shared-memory multiprocessors. We define a class of algorithms that we call order encoding. By applying information-theoretic arguments, we prove that every order encoding algorithm, shared by n processes, h...

Journal: :IEEE Trans. Parallel Distrib. Syst. 2000
Sandeep Lodha Ajay D. Kshemkalyani

ÐThis paper presents a fair decentralized mutual exclusion algorithm for distributed systems in which processes communicate by asynchronous message passing. The algorithm requires between N ÿ 1 and 2…N ÿ 1† messages per critical section access, where N is the number of processes in the system. The exact message complexity can be expressed as a deterministic function of concurrency in the comput...

Journal: :Inf. Process. Lett. 1993
Michael Merritt Gadi Taubenfeld

A linked list is used to speed up a mutual exclusion algorithm. This optimization permits additional concurrency by allowing scans of the list to be concurrent with insertions and deletions of list entries.

1995
Shailaja Bulgannawar Nitin H. Vaidya

This report presents a token-based K-mutual exclusion algorithm. The algorithm uses K tokens and a dynamic forest structure for each token. This structure is used to forward token requests. The algorithm is designed to minimize the number of messages and also the delay in entering the critical section, at low as well as high loads. The report presents simulation results for the proposed algorit...

Journal: :CoRR 2012
Abhijeet Pareek Philipp Woelfel

Recent research on mutual exclusion for shared-memory systems has focused on local spinalgorithms. Performance is measured using the remote memory references (RMRs) metric. Ascommon in recent literature, we consider a standard asynchronous shared memory model withN processes, which allows atomic read, write and compare-and-swap (short: CAS) operations.In such a model, the asympt...

2017
Kasper Dokter Farhad Arbab

A concurrent application consists of a set of concurrently executing interacting processes. Although earlier we proposed work automata to specify both computation and interaction of such a set of executing processes, a detailed formal semantics for them was left implicit. In this paper, we provide a formal semantics for work automata, based on which we introduce equivalences such as weak simula...

Journal: :Artif. Intell. 2009
Yixin Chen Ruoyun Huang Zhao Xing Weixiong Zhang

Article history: Received 1 December 2007 Received in revised form 11 November 2008 Accepted 14 November 2008

2008
Martín Abadi

This paper provides an introduction to the Automatic Mutual Exclusion (AME) programming model and to its formal study, through the AME calculus. AME resembles cooperative multithreading; in the intended implementations, however, software transactional memory supports the concurrent execution of atomic fragments. This paper also studies simple dynamic and static mechanisms for atomicity checks i...

Journal: :J. Inf. Sci. Eng. 2002
Joffroy Beauquier Sébastien Cantarell Ajoy Kumar Datta Franck Petit

The group mutual exclusion (GME) problem deals with sharing a set of (m) mutually exclusive resources among all (n) processes of a network. Processes are allowed to be in a critical section simultaneously provided they request the same resource. We present three group mutual exclusion solutions for tree networks. All three solutions do not use process identifiers, and use bounded size messages....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید