2020
DOI: 10.1016/j.ipl.2020.105938
|View full text |Cite|
|
Sign up to set email alerts
|

Mutual exclusion in fully anonymous shared memory systems

Abstract: Process anonymity has been studied for a long time. Memory anonymity is more recent. In an anonymous memory system, there is no a priori agreement among the processes on the names of the shared registers. As an example, a shared register named A by a process p and a shared register named B by another process q may correspond to the very same register X, while the same name C may correspond to different register names for the processes p and q, and this remains unknown to the processes. This article introduces … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Finally, fully anonymous shared memory systems, where both processes and memory are anonymous, were recently investigated in [17,18].…”
Section: Motivation Content and Related Workmentioning
confidence: 99%
“…Finally, fully anonymous shared memory systems, where both processes and memory are anonymous, were recently investigated in [17,18].…”
Section: Motivation Content and Related Workmentioning
confidence: 99%
“…This constraint is equivalent to ensuring the active nodes form a distance d = 3 independent set from graph theory and is related to the more general (α, β)-ruling sets, originally introduced in [5] and more recently solved under the LOCAL and CONGEST models [33,44]; however, these distributed algorithms rely on static topologies, unique identifiers, and synchronous message delivery. The recent results on mutual exclusion for fully anonymous systems [42] are also related since, like our nodes and their neighborhoods, neither the processes nor the shared resources have unique identifiers. However, like the earlier classical results above and other recent models of weak finite automata [21,22], these do not extend to dynamic network topologies.…”
Section: Related Workmentioning
confidence: 99%
“…-There is a deadlock-free mutual exclusion algorithm in the process anonymous and memory anonymous RMW model made up of m registers if and only if m ∈ M (n). Moreover, there is no such algorithm in the fully anonymous RW communication model [23].…”
Section: Related Work On Anonymous Memoriesmentioning
confidence: 99%