In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek, Brown, and Merritt. The proof will follow a strategy of stepwise refinement, developing the distributed caching memory in five transformation steps from a specification of the serial memory, whilst preserving the sequential consistency in each step. The proof, in fact, presents a rationalized design of the distributed caching memory. We will carry out our proof using a simple process-algebraic formalism for the specification of the various design stages. We will not follow a strictly algebraic exposition, however. At some points the correctness will be shown using direct semantic arguments, and we will also employ higher-order constructs lik...
In this paper, we present an algorithm that can be used to implement sequential, causal, or cache co...
Abstract. The contribution of the paper is two-fold. We give a set of properties expressible as temp...
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of ...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In distributed shared memory architectures, memory usually obeys weaker constraints than that of ord...
The lazy caching algorithm of Afek et al. (ACM Trans. Program. Lang. Syst. 15, 182-206, 1993) is a p...
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of ...
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of ...
Recently distributed shared memory (DSM) systems have received much attention because such an abstra...
Recently distributed shared memory (DSM) systems have received much attention because such an abstra...
Recently distributed shared memory (DSM) systems have received much attention because such an abstra...
In this paper, we present an algorithm that can be used to implement sequential, causal, or cache co...
Abstract. The contribution of the paper is two-fold. We give a set of properties expressible as temp...
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of ...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek,...
In distributed shared memory architectures, memory usually obeys weaker constraints than that of ord...
The lazy caching algorithm of Afek et al. (ACM Trans. Program. Lang. Syst. 15, 182-206, 1993) is a p...
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of ...
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of ...
Recently distributed shared memory (DSM) systems have received much attention because such an abstra...
Recently distributed shared memory (DSM) systems have received much attention because such an abstra...
Recently distributed shared memory (DSM) systems have received much attention because such an abstra...
In this paper, we present an algorithm that can be used to implement sequential, causal, or cache co...
Abstract. The contribution of the paper is two-fold. We give a set of properties expressible as temp...
A model for shared-memory systems commonly (and often implicitly) assumed by programmers is that of ...