2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA) 2017
DOI: 10.1109/inista.2017.8001193
|View full text |Cite
|
Sign up to set email alerts
|

Resolving classical concurrency problems using adaptive conflictless scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Regardless, Figure 5 exposes the overall picture. The equations describing the types of entities involved are Equation (22) for end devices (H), which accounts for more items than Equation ( 16), Equation (23) for edge nodes (F), whose difference with Equation ( 17) is that now an edge has k downlink ports, going from 0 to k − 1, and 1 uplink port identified by k, and also Equation (24) for fog devices (F), which is analogous to Equation (18).…”
Section: Extended Scenario: Multipleenddevice-edge-fogmentioning
confidence: 99%
See 1 more Smart Citation
“…Regardless, Figure 5 exposes the overall picture. The equations describing the types of entities involved are Equation (22) for end devices (H), which accounts for more items than Equation ( 16), Equation (23) for edge nodes (F), whose difference with Equation ( 17) is that now an edge has k downlink ports, going from 0 to k − 1, and 1 uplink port identified by k, and also Equation (24) for fog devices (F), which is analogous to Equation (18).…”
Section: Extended Scenario: Multipleenddevice-edge-fogmentioning
confidence: 99%
“…Generally speaking, FDT are mainly focused on studying distributed systems being run in a non deterministic fashion so as to check for abnormal conditions, leading to malfunction and degradation in system performance, thus posing a risk to system integrity. The most popular of those conditions is deadlock, which may be provoked by different circumstances such as mutual exclusion or circular wait, whereas other conditions may arise, such as livelock, data race or resource starvation [23].…”
Section: Introductionmentioning
confidence: 99%
“…Here, the ACP model of the entities are described, such as PUB i in Equation ( 9), EDGE m in Equation (10), FOG in Equation (11), CLOUD in Equation ( 12), and SUB j in Equation (13). In this framework, it is to be said that Equation ( 9) is analogous to Equation (1), as well as Equations (10) to Equation ( 2), and Equations (13) to Equation (4).…”
Section: Fog Scenariomentioning
confidence: 99%