2007
DOI: 10.1016/s1004-4132(07)60104-2
|View full text |Cite
|
Sign up to set email alerts
|

Ad hoc distributed mutual exclusion algorithm based on token-asking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Recently, the mutual exclusion problem received an interest for mobile ad hoc networks [3,4,9,18,20]. To the best of our knowledge, few algorithms have been proposed in the literature and all of them are token-based approaches.…”
Section: Expanding the Algorithm To New Applicationmentioning
confidence: 99%
“…Recently, the mutual exclusion problem received an interest for mobile ad hoc networks [3,4,9,18,20]. To the best of our knowledge, few algorithms have been proposed in the literature and all of them are token-based approaches.…”
Section: Expanding the Algorithm To New Applicationmentioning
confidence: 99%
“…The problem with mutual exclusion which occurs is when some two or more processes or devices try to work at same instant of time simultaneously [1]. When they compete for the critical section at the same time, no one of the devices get chance to share resources, and none of them can't use it fruitfully [2,3,4].So, to prevent from this issue, a distributed algorithms is designed to manage the critical region [5]. Critical section (CS) is a code in which sharing of resources is done or accessed.…”
Section: Introductionmentioning
confidence: 99%