International audienceMutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their nonfunctional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional c...
International audienceIn this paper we settle an open question by determining the remote memory refe...
This paper presents new starvation-free hardware-assisted and software-only algorithms for the N-thr...
We present process-algebraic models of multi-writer multi-reader safe, regular and atomic registers....
International audienceMutual exclusion protocols are an essential building block of concurrent syste...
International audienceMutual exclusion protocols are an essential building block of concurrent share...
A new elegant and simple algorithm for mutual exclusion of N processes is proposed. It only requires...
In any system in which concurrent processes share resources, mutual exclusion refers to the problem ...
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusio...
In this paper, we apply acompositional proof technique to an automaticverification of the correctnes...
For years, the mutual exclusion algorithm of Lycklama and Hadzilacos (1991) [21] was the optimal mut...
International audienceThis article comprehensively surveys the work accomplished during the past dec...
International audienceThe Cache Coherent (CC) and the Distributed Shared Memory (DSM) models are sta...
Abstract A new elegant and simple algorithm for mutual exclusion of N processes is proposed. It only...
Dijkstra introduced mutual exclusion for an N-process system as the requirement “that at any moment ...
International audienceAsynchronous concurrency is becoming increasingly present in a large spectrum ...
International audienceIn this paper we settle an open question by determining the remote memory refe...
This paper presents new starvation-free hardware-assisted and software-only algorithms for the N-thr...
We present process-algebraic models of multi-writer multi-reader safe, regular and atomic registers....
International audienceMutual exclusion protocols are an essential building block of concurrent syste...
International audienceMutual exclusion protocols are an essential building block of concurrent share...
A new elegant and simple algorithm for mutual exclusion of N processes is proposed. It only requires...
In any system in which concurrent processes share resources, mutual exclusion refers to the problem ...
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusio...
In this paper, we apply acompositional proof technique to an automaticverification of the correctnes...
For years, the mutual exclusion algorithm of Lycklama and Hadzilacos (1991) [21] was the optimal mut...
International audienceThis article comprehensively surveys the work accomplished during the past dec...
International audienceThe Cache Coherent (CC) and the Distributed Shared Memory (DSM) models are sta...
Abstract A new elegant and simple algorithm for mutual exclusion of N processes is proposed. It only...
Dijkstra introduced mutual exclusion for an N-process system as the requirement “that at any moment ...
International audienceAsynchronous concurrency is becoming increasingly present in a large spectrum ...
International audienceIn this paper we settle an open question by determining the remote memory refe...
This paper presents new starvation-free hardware-assisted and software-only algorithms for the N-thr...
We present process-algebraic models of multi-writer multi-reader safe, regular and atomic registers....