1998
DOI: 10.1007/bfb0054186
|View full text |Cite
|
Sign up to set email alerts
|

A proof of burns N-process mutual exclusion algorithm using abstraction

Abstract: Abstract. Within the Input/Output Automata framework, we state and prove a general abstraction theorem giving conditions for preservation of safety properties from one automaton to another. We use our abstraction theorem to verify that Burns distributed mutual exclusion algorithm parameterized in the number of processes n satisfies the mutual exclusion property. The concrete n-process algorithm is abstracted by a simple 2-process algorithm which is property preserving with respect to the mutual exclusion prope… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0
2

Year Published

1999
1999
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 16 publications
0
11
0
2
Order By: Relevance
“…Cache Coherence: Following [22] we formalized and checked the described safety properties and deadlock-freedom of the following cache coherence protocols: Illinois, Berkeley, Synapse, Firefly, MESI, MOESI, and Dragon. Mutual Exclusion: We modelled and checked for deadlock-freedom and mutual exclusion Burns' [32], Dijkstra's and Szymanski's [3] algorithms as well as a formulation of Dijkstra's algorithm on a ring structure with token passing [28]. Furthermore, we check synchronization via a semaphore which is atomically aquired and by broadcasting to ensure everyone else is not in the critical section.…”
mentioning
confidence: 99%
“…Cache Coherence: Following [22] we formalized and checked the described safety properties and deadlock-freedom of the following cache coherence protocols: Illinois, Berkeley, Synapse, Firefly, MESI, MOESI, and Dragon. Mutual Exclusion: We modelled and checked for deadlock-freedom and mutual exclusion Burns' [32], Dijkstra's and Szymanski's [3] algorithms as well as a formulation of Dijkstra's algorithm on a ring structure with token passing [28]. Furthermore, we check synchronization via a semaphore which is atomically aquired and by broadcasting to ensure everyone else is not in the critical section.…”
mentioning
confidence: 99%
“…In these frameworks, correctness is typically shown with a proof assistant, while model checking is used as a debugger on small instances. Parameterized model checking is not a concern there, except one notable result [32].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Burns algorithm [22], [25, p. 294] guarantees exclusive access to a critical section for a set of n identical processes. Each process p can be in one of six different location states (i.e.…”
Section: Parameterized Burns Algorithmmentioning
confidence: 99%