Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing 2000
DOI: 10.1145/343477.343525
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive and efficient mutual exclusion (extended abstract)

Abstract: A distributed algorithm is adaptive if its performance depends on k, the number of processes that are concurrently active during the algorithm execution (rather than on n, the total number of processes). This paper presents adaptive algorithm for mutual exclusion using only read and write operations.The worst case step complexity cannot be a measure for the performance of mutual exclusion algorithms, because it is always unbounded in the presence of contention. Therefore, a number of different parameters are u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2001
2001
2010
2010

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…The following claim will be crucial to complete the proof of Claim 3. Now we will prove that S = (s, d, s) at p [6]. We will prove this by further two cases depending upon the value of S at p [5].…”
Section: Proof Of Theoremmentioning
confidence: 84%
See 2 more Smart Citations
“…The following claim will be crucial to complete the proof of Claim 3. Now we will prove that S = (s, d, s) at p [6]. We will prove this by further two cases depending upon the value of S at p [5].…”
Section: Proof Of Theoremmentioning
confidence: 84%
“…As S = (s, d, s) at t, we first claim that S = (s, d, s) throughout the interval (p [5.1], t). This is true because for S to change at some time during the interval (p [5.1] Hence, S = (s, d, s) at p [6]. This means that p will execute Line 6 and set Out[s] = d at Line 7.…”
Section: Proof Of Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…The ideal goal is to design locking algorithms whose RMR complexity-the worst case number of remote memory references made by a process to enter and exit the CS once-is a constant, independent of the numbers of readers/writers attempting to acquire the lock. Research in this direction over the last two decades led to many algorithms [3,4,9,10,11,12,13,14,15,16,17], lower bounds [18,19,20,21], and an understanding of the limitations of various shared memory primitives [18,19]. The highlight is the design of constant RMR complexity mutual exclusion algorithms: Anderson's algorithm achieves constant RMR complexity for CC machines [3] and Mellor-Crummey and Scott's algorithm, which was awarded the Dijkstra Prize in 2006, achieves constant RMR complexity for both CC and DSM machines [4].…”
Section: Introductionmentioning
confidence: 99%