- 1 American National Standard Programming Language PL/L X3.53, American Nat. Standards Inst., New York, 1976.Google Scholar
- 2 Boggs, D.R., et+ al. Pup: An internetwork architecture. IEEE Trans, on Communications 28, 4 (April 1980).Google Scholar
- 3 Brinch Hansen, P. Operating System Principles. Prentice-Hall, Englewood Cliffs, New Jersey, July 1973. Google ScholarDigital Library
- 4 Brinch Hansen, P. The programming language Concurrent Pascal. IEEE Trans. on Software Eng. 1, 2 (June 1975), 199-207.Google Scholar
- 5 Dijkstra, E.W. Hierarchical ordering of sequential processes. In Operating Systems Techniques, Academic Press, New York, 1972.Google Scholar
- 6 Gifford, D.K. Weighted voting for replicated data. Operating Systs. Rev. 13, 5 (Dec. 1979), 150-162.Google ScholarDigital Library
- 7 Gifford, D.K. Violet, an experimental decentralized system. Integrated Office Syst, Workshop, IRIA, Rocquencourt, France, Nov. 1979 (also available as CSL Rep. 79-12, Xerox Res. Ctr., Palo Alto, Calif.).Google Scholar
- 8 Hoare, C.A.R. Monitors: An operating system structuring concept. Comm. ACM 17, 10 (Oct. 1974), 549-557. Google ScholarDigital Library
- 9 Hoare, C.A.R. Communicating sequential processes. Comm. ACM 21, 8 (Aug. 1978), 666-677. Google ScholarDigital Library
- 10 Howard, J.H. Signaling in monitors. Second Int. Conf. on Software Eng., San Francisco, Calif., Oct. 1976, pp. 47-52. Google ScholarDigital Library
- 11 Israel, J.E., Mitchell, J.G., and Sturgis, H.E. Separating data from function in a distributed file system. Second Int. Symp. on Operating Systs., IRIA, Rocquencourt, France, Oct. 1978.Google Scholar
- 12 Keedy, J.J. On structuring operating systems with monitors. Australian Comptr. J. 10, 1 (Feb. 1978), 23-27 (reprinted in Operating Systs. Rev. 13, 1 (Jan. 1979), 5-9). Google ScholarDigital Library
- 13 Lampson, B.W., Mitchell, J.G., and Satterthwaite, E.H. On the transfer of control between contexts. In Lecture Notes in Computer Science 19, Springer-Verlag, New York, 1974, pp. 181-203. Google Scholar
- 14 Lauer, H.E., and Needham, R.M. On the duality of operating system structures. Second Int. Symp. on Operating Systems, IRIA, Rocquencourt, France, Oct. 1978 (reprinted in Operating Systs. Rev. 13, 2 (April 1979), 3-19). Google ScholarDigital Library
- 15 Lister, A.M., and Maynard, K.J. An implementation of monitors. Software--Practice and Experience 6, 3 (July 1976), 377-386.Google ScholarCross Ref
- 16 Metcalfe, R.M., and Boggs, D.G. Ethernet: Packet switching for local computer networks. Comm. ACM 19, 7 (July 1976), 395-403. Google ScholarDigital Library
- 17 Mitchell, J.G., Maybury, W., and Sweet, R. Mesa Language Manual. Xerox Res. Ctr., Palo Alto, Calif., 1979.Google Scholar
- 18 Redell, D., et. al. Pilot: An operating system for a personal computer. Comm. ACM 23, 2 (Feb. 1980). Google ScholarDigital Library
- 19 Saltzer, J.H. Traffic control in a multiplexed computer system. Th., MAC-TR-30, MIT, Cambridge, Mass., July 1966. Google ScholarDigital Library
- 20 Saxena, A.R., and Bredt, T.H. A structured specification of a hierarchical operating system. SIGPLAN Notices 10, 6 (June 1975), 310-318. Google ScholarDigital Library
- 21 Wirth, N. Modula: A language for modular multiprogramming. Software--Practice and Experience 7, 1 (Jan. 1977), 3-36.Google ScholarCross Ref
Recommendations
Static lock capabilities for deadlock freedom
TLDI '12: Proceedings of the 8th ACM SIGPLAN workshop on Types in language design and implementationWe present a technique --- lock capabilities --- for statically verifying that multithreaded programs with locks will not deadlock. Most previous work on deadlock prevention requires a strict total order on all locks held simultaneously by a thread, but ...
Lock elision for read-only critical sections in Java
PLDI '10It is not uncommon in parallel workloads to encounter shared data structures with read-mostly access patterns, where operations that update data are infrequent and most operations are read-only. Typically, data consistency is guaranteed using mutual ...
Lock elision for read-only critical sections in Java
PLDI '10: Proceedings of the 31st ACM SIGPLAN Conference on Programming Language Design and ImplementationIt is not uncommon in parallel workloads to encounter shared data structures with read-mostly access patterns, where operations that update data are infrequent and most operations are read-only. Typically, data consistency is guaranteed using mutual ...
Comments