1983
DOI: 10.1016/0020-0190(83)90089-3
|View full text |Cite
|
Sign up to set email alerts
|

A distributed solution of the distributed termination problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
30
0

Year Published

1984
1984
2006
2006

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(30 citation statements)
references
References 2 publications
0
30
0
Order By: Relevance
“…The algorithms in this area can be broadly classified as "symmetric" and "asymmetric" algorithms. In the symmetric algorithms [9,12,14,24,26] all the processes execute identical code and any process can detect the termination. The asymmetric algorithms [7,8,11,17,20,22,29] rely on a pre-designated process for termination detection.…”
Section: Other Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The algorithms in this area can be broadly classified as "symmetric" and "asymmetric" algorithms. In the symmetric algorithms [9,12,14,24,26] all the processes execute identical code and any process can detect the termination. The asymmetric algorithms [7,8,11,17,20,22,29] rely on a pre-designated process for termination detection.…”
Section: Other Workmentioning
confidence: 99%
“…Termination detection algorithms may also be divided into three classes depending upon the topology employed for the control communication, viz. Hamiltonian cycle [8,24,26], spanning tree [2,5,10,11,17,19,20,29] and general networks [7,9,12,14,15,21,22,27].…”
Section: Other Workmentioning
confidence: 99%
See 2 more Smart Citations
“…See, for example, [1,2,5,6,7,9,10,8,12,13,14]. Of these, the algorithm presented by Sinha, Kale, and Ramkumar [13] (henceforth, the SKR algorithm) is unique in its ability to adapt to the load conditions of the system on which it runs, thereby minimizing the impact of termination detection on performance.…”
Section: Introductionmentioning
confidence: 99%