skip to main content
Skip header Section
Algorithms for mutual exclusionSeptember 1986
Publisher:
  • MIT Press
  • 55 Hayward St.
  • Cambridge
  • MA
  • United States
ISBN:978-0-262-18119-8
Published:25 September 1986
Pages:
107
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Taubenfeld G (2022). Anonymous Shared Memory, Journal of the ACM, 69:4, (1-30), Online publication date: 31-Aug-2022.
  2. ACM
    Chen W, Kuo T and Hsiu P (2021). Heterogeneity-aware Multicore Synchronization for Intermittent Systems, ACM Transactions on Embedded Computing Systems, 20:5s, (1-22), Online publication date: 31-Oct-2021.
  3. Liu Y and Stoller S Assurance of Distributed Algorithms and Systems: Runtime Checking of Safety and Liveness Runtime Verification, (47-66)
  4. ACM
    Liu Y Logical Clocks Are Not Fair Proceedings of the 2018 Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating Algorithms for Distributed systems, (21-27)
  5. ACM
    Brandt J and Reisig W Modeling Erlang processes as Petri nets Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang, (61-66)
  6. ACM
    Golab W and Hendler D Recoverable Mutual Exclusion Under System-Wide Failures Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, (17-26)
  7. Taubenfeld G (2018). A Closer Look at Fault Tolerance, Theory of Computing Systems, 62:5, (1085-1108), Online publication date: 1-Jul-2018.
  8. ACM
    Taubenfeld G Coordination Without Prior Agreement Proceedings of the ACM Symposium on Principles of Distributed Computing, (325-334)
  9. Cicirelli F and Nigro L Modelling and Verification of Mutual Exclusion Algorithms Proceedings of the 20th International Symposium on Distributed Simulation and Real-Time Applications, (136-144)
  10. ACM
    Golab W and Ramaraju A Recoverable Mutual Exclusion Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (65-74)
  11. (2016). Fair synchronization, Journal of Parallel and Distributed Computing, 97:C, (1-10), Online publication date: 1-Nov-2016.
  12. Moses Y and Patkin K Under the Hood of the Bakery Algorithm Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (399-413)
  13. Wang J and Wang Z Mutual Exclusion Algorithms in the Shared Queue Model Proceedings of the 15th International Conference on Distributed Computing and Networking - Volume 8314, (29-43)
  14. Zhang D, Lynch B and Dechev D Fast and Scalable Queue-Based Resource Allocation Lock on Shared-Memory Multiprocessors Proceedings of the 17th International Conference on Principles of Distributed Systems - Volume 8304, (266-280)
  15. Taubenfeld G Fair Synchronization Proceedings of the 27th International Symposium on Distributed Computing - Volume 8205, (179-193)
  16. ACM
    Bansal N, Bhatt V, Jayanti P and Kondapally R Tight time-space tradeoff for mutual exclusion Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (971-982)
  17. Rodríguez C and Schwoon S Verification of petri nets with read arcs Proceedings of the 23rd international conference on Concurrency Theory, (471-485)
  18. Ateniese G, Baldoni R, Bonomi S and Di Luna G Oblivious assignment with m slots Proceedings of the 14th international conference on Stabilization, Safety, and Security of Distributed Systems, (187-201)
  19. ACM
    Lubowich Y and Taubenfeld G (2011). On the performance of distributed lock-based synchronization?, ACM SIGOPS Operating Systems Review, 45:2, (28-37), Online publication date: 18-Jul-2011.
  20. Kuznetsov P and Ravi S On the cost of concurrency in transactional memory Proceedings of the 15th international conference on Principles of Distributed Systems, (112-127)
  21. Raynal M On the implementation of concurrent objects Dependable and Historic Computing, (453-478)
  22. Lubowich Y and Taubenfeld G On the performance of distributed lock-based synchronization Proceedings of the 12th international conference on Distributed computing and networking, (131-142)
  23. ACM
    Bhatt V and Jayanti P Constant RMR solutions to reader writer synchronization Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (468-477)
  24. Joung Y (2010). On quorum systems for group resources allocation, Distributed Computing, 22:3, (197-214), Online publication date: 1-Mar-2010.
  25. ACM
    Guerraoui R and Kapalka M The semantics of progress in lock-based transactional memory Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (404-415)
  26. ACM
    Guerraoui R and Kapalka M (2009). The semantics of progress in lock-based transactional memory, ACM SIGPLAN Notices, 44:1, (404-415), Online publication date: 21-Jan-2009.
  27. Higham L and Kawash J (2008). Implementing sequentially consistent programs on processor consistent platforms, Journal of Parallel and Distributed Computing, 68:4, (488-500), Online publication date: 1-Apr-2008.
  28. ACM
    Raynal M and Taubenfeld G The notion of a timed register and its application to indulgent synchronization Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures, (200-209)
  29. ACM
    Fan R and Lynch N An Ω (n log n) lower bound on the cost of mutual exclusion Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, (275-284)
  30. Sánchez C, Sipma H, Gill C and Manna Z Distributed priority inheritance for real-time and embedded systems Proceedings of the 10th international conference on Principles of Distributed Systems, (110-125)
  31. Aiyer A, Alvisi L and Bazzi R Byzantine and multi-writer k-quorums Proceedings of the 20th international conference on Distributed Computing, (443-458)
  32. Higham L and Kawash J (2006). Tight Bounds for Critical Sections in Processor Consistent Platforms, IEEE Transactions on Parallel and Distributed Systems, 17:10, (1072-1083), Online publication date: 1-Oct-2006.
  33. Mishra S and Rao S (2006). Minimum monopoly in regular and tree graphs, Discrete Mathematics, 306:14, (1586-1594), Online publication date: 1-Jul-2006.
  34. Koprowski A and Zantema H Proving liveness with fairness using rewriting Proceedings of the 5th international conference on Frontiers of Combining Systems, (232-247)
  35. Delporte-Gallet C, Fauconnier H, Guerraoui R and Kouznetsov P (2005). Mutual exclusion in asynchronous systems with failure detectors, Journal of Parallel and Distributed Computing, 65:4, (492-505), Online publication date: 1-Apr-2005.
  36. ACM
    Bacon D, Konuru R, Murthy C and Serrano M (2004). Thin locks, ACM SIGPLAN Notices, 39:4, (583-595), Online publication date: 1-Apr-2004.
  37. Tarafdar A and Garg V (2004). Predicate control, Journal of Parallel and Distributed Computing, 64:2, (219-237), Online publication date: 1-Feb-2004.
  38. Anderson J, Kim Y and Herman T (2003). Shared-memory mutual exclusion, Distributed Computing, 16:2-3, (75-110), Online publication date: 1-Sep-2003.
  39. ACM
    Jayanti P Adaptive and efficient abortable mutual exclusion Proceedings of the twenty-second annual symposium on Principles of distributed computing, (295-304)
  40. ACM
    Alagarsamy K (2003). Some myths about famous mutual exclusion algorithms, ACM SIGACT News, 34:3, (94-103), Online publication date: 1-Sep-2003.
  41. Schröter C, Schwoon S and Esparza J The model-checking Kit Proceedings of the 24th international conference on Applications and theory of Petri nets, (463-472)
  42. Joung Y (2002). The congenial talking philosophers problem in computer networks, Distributed Computing, 15:3, (155-175), Online publication date: 1-Jul-2002.
  43. Ben-Asher Y and Podvolny D (2001). Y-Invalidate, International Journal of Parallel Programming, 29:6, (583-606), Online publication date: 1-Dec-2001.
  44. Developing and Refining an Adaptive Token-Passing Strategy Proceedings of the The 21st International Conference on Distributed Computing Systems
  45. Abraham U, Dolev S, Herman T and Koll I (2001). Self-stabilizing l-exclusion, Theoretical Computer Science, 266:1-2, (653-692), Online publication date: 6-Sep-2001.
  46. Ben-Asher Y and Stein E (2000). Basic Results in Automatic Transformations of Shared Memory Parallel Programs into Sequential Programs, The Journal of Supercomputing, 17:2, (143-165), Online publication date: 1-Sep-2000.
  47. Esparza J and Melzer S (2000). Verification of Safety Properties Using IntegerProgramming, Formal Methods in System Design, 16:2, (159-189), Online publication date: 1-Mar-2000.
  48. Jørgensen J and Kristensen L (1999). Computer Aided Verification of Lamport's Fast Mutual Exclusion Algorithm Using Colored Petri Nets and Occurrence Graphs with Symmetries, IEEE Transactions on Parallel and Distributed Systems, 10:7, (714-732), Online publication date: 1-Jul-1999.
  49. Joung Y and Smolka S (1998). Strong Interaction Fairness Via Randomization, IEEE Transactions on Parallel and Distributed Systems, 9:2, (137-149), Online publication date: 1-Feb-1998.
  50. ACM
    Bacon D, Konuru R, Murthy C and Serrano M Thin locks Proceedings of the ACM SIGPLAN 1998 conference on Programming language design and implementation, (258-268)
  51. ACM
    Bacon D, Konuru R, Murthy C and Serrano M (1998). Thin locks, ACM SIGPLAN Notices, 33:5, (258-268), Online publication date: 1-May-1998.
  52. ACM
    Joung Y Asynchronous group mutual exclusion (extended abstract) Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, (51-60)
  53. Naor M and Wool A (1998). Access Control and Signatures via Quorum Secret Sharing, IEEE Transactions on Parallel and Distributed Systems, 9:9, (909-922), Online publication date: 1-Sep-1998.
  54. Yan Y, Zhang X and Yang H (1996). A Fast Token-Chasing Mutual Exclusion Algorithm in Arbitrary Network Topologies, Journal of Parallel and Distributed Computing, 35:2, (156-172), Online publication date: 15-Jun-1996.
  55. ACM
    Naor M and Wool A Access control and signatures via quorum secret sharing Proceedings of the 3rd ACM conference on Computer and communications security, (157-168)
  56. ACM
    Peleg D and Wool A How to be an efficient snoop, or the probe complexity of quorum systems (extended abstract) Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing, (290-299)
  57. Chang H and Yuan S (1995). Performance Characterization of the Tree Quorum Algorithm, IEEE Transactions on Parallel and Distributed Systems, 6:6, (658-662), Online publication date: 1-Jun-1995.
  58. Yuan S and Chang H (1995). Message Complexity of the Tree Quorum Algorithm, IEEE Transactions on Parallel and Distributed Systems, 6:8, (887-890), Online publication date: 1-Aug-1995.
  59. ACM
    Cypher R The communication requirements of mutual exclusion Proceedings of the seventh annual ACM symposium on Parallel algorithms and architectures, (147-156)
  60. ACM
    Peleg D and Wool A Crumbling walls Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing, (120-129)
  61. ACM
    Bouabdallah A (1994). On mutual exclusion in faulty distributed systems, ACM SIGOPS Operating Systems Review, 28:1, (80-87), Online publication date: 1-Jan-1994.
  62. ACM
    Attiya H and Friedman R Programming DEC-Alpha based multiprocessors the easy way (extended abstract) Proceedings of the sixth annual ACM symposium on Parallel algorithms and architectures, (157-166)
  63. ACM
    Haro C and Proust C (1993). A multitasking executive for operating systems courses, ACM SIGOPS Operating Systems Review, 27:3, (97-107), Online publication date: 1-Jul-1993.
  64. ACM
    Attiya H and Friedman R A correctness condition for high-performance multiprocessors (extended abstract) Proceedings of the twenty-fourth annual ACM symposium on Theory of Computing, (679-690)
  65. ACM
    Plouzeau N and Raynal M (1992). Elements for a course on the design of distributed algorithms, ACM SIGCSE Bulletin, 24:2, (35-40), Online publication date: 1-Jun-1992.
  66. ACM
    Saeed F, George K and Samadzadeh M (1992). Implementation of classical mutual exclusion algorithms in Ada, ACM SIGAda Ada Letters, XII:1, (73-84), Online publication date: 1-Jan-1992.
  67. ACM
    Rogers P and Pitarys M Implementing distributed Ada Proceedings of the conference on TRI-Ada '92, (504-510)
  68. Frincke D, Archer M and Levitt K CTPLAN Proceedings of the 6th International Conference on Knowledge-Based Software Engineering, (151-160)
  69. ACM
    Raynal M (1991). A simple taxonomy for distributed mutual exclusion algorithms, ACM SIGOPS Operating Systems Review, 25:2, (47-50), Online publication date: 1-Apr-1991.
  70. ACM
    Lamport L (1991). The mutual exclusion problem has been solved, Communications of the ACM, 34:1, (110-ff.), Online publication date: 3-Jan-1991.
  71. ACM
    Seigh J (1990). A distributed solution to the reader - writer problem, ACM SIGOPS Operating Systems Review, 24:2, (66-68), Online publication date: 1-Apr-1990.
  72. ACM
    Rudolph B (1990). Self-assessment procedure XXI: a self-assessment procedure on concurrency, Communications of the ACM, 33:5, (563-576), Online publication date: 1-May-1990.
  73. ACM
    Hofri M (1990). Proof of a mutual exclusion algorithm—a classic example, ACM SIGOPS Operating Systems Review, 24:1, (18-22), Online publication date: 3-Jan-1990.
  74. ACM
    Robbins K, Wagner N and Wenzel D (1989). Virtual rings: an introduction to concurrency, ACM SIGCSE Bulletin, 21:2, (23-28), Online publication date: 1-Jun-1989.
  75. ACM
    Dolev D and Shavit N Bounded concurrrent time-stamp systems are constructible Proceedings of the twenty-first annual ACM symposium on Theory of computing, (454-466)
  76. ACM
    Szymanski B A simple solution to Lamport's concurrent programming problem with linear wait Proceedings of the 2nd international conference on Supercomputing, (621-626)
Contributors
  • Institute for Research in Computer Science and Random Systems

Recommendations

Reviews

Jerzy J. A. Klaczak

This is a textbook on algorithms for mutual exclusion, which documents the development of the algorithms on that subject. By no means is it a catalogue or case book, for many of the presented algorithms are of more theoretical than practical interest today. Although it is only a compilation of published algorithms, it will be very valuable to have them all collected in a single book. The book can be used both by teachers and students, since it requires almost no additional background. Chapter 1 introduces us to the fundamental terms and problems: process, competition, cooperation, sharing, communication, protocol, etc. The next four chapters describe in logical sequence the protocols for mutual exclusion: first in the presence of a common memory (both software and hardware solutions), then in its absence (using local state variables and message communication). Real effort was made to present all algorithms in a standardized way. Chapter 6 offers a new perspective, presenting some solutions to the producer-consumer problem and the concurrent reading-while-writing problem. The index adequately lists the names of scientists and algorithms. Nevertheless, it also includes many terms used only incidentally. Still worse, many heavily used terms are associated with a randomly chosen page. One algorithm, the final one of Chapter 5, is only sketched and is not formulated in the Ada-like language otherwise used to uniformly describe algorithms in this book. The author also suddenly (from p. 34 on) changes his style of writing delay loops; likewise he introduces a construct which, although self-evident, was not described in the Foreword. In general, it is hard to find anything in this book, as page headers contain neither current chapter/paragraph numbers nor paragraph names. (The title of the whole book and the chapter name are printed instead.) The style in the chapter concerning hardware solutions in a centralized environment doesn't match the other ones, yet its very presence is required from the point of view of logical completeness. It is also surprising that the problem of fault tolerance was totally omitted in the presentation of just the Ricart and Agrawala algorithm. The most important drawback, however, is the presence of bugs. About two dozen typos—half of them in the program texts—is too much for a book of this size. The book is surprisingly short, considering its thickness and the expectations raised. The book is an English translation of the first French edition [1]. There are, therefore, strange words obviously produced by the translator (mr, ou, bu, etc.); he is probably also responsible for “typical” errors in programs. But there are logical errors in at least three algorithms (pp. 24, p. 31, p. 92–93), evidently made by the original author. Two of them can be easily corrected, and the algorithm on p. 31 will not provide mutual exclusion anyhow. I expect a second edition—which is badly needed—will correct all the mistakes and also include the new algorithms published: (majority) voting, election of a coordinator, etc. It is very hard to recommend this book as a teaching supplement. It completely lacks exercises. Some proofs are not given in full; instead, Raynal has left it to the reader to investigate the Bibliography in order to check the answers. Fortunately the reference list is very exhaustive and most of the entries are widely available.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.