共查询到20条相似文献,搜索用时 15 毫秒
1.
Yuh-Jzer Joung 《Distributed Computing》2000,13(4):189-206
Abstract. Mutual exclusion and concurrency are two fundamental and essentially opposite features in distributed systems. However, in
some applications such as Computer Supported Cooperative Work (CSCW) we have found it necessary to impose mutual exclusion
on different groups of processes in accessing a resource, while allowing processes of the same group to share the resource.
To our knowledge, no such design issue has been previously raised in the literature. In this paper we address this issue by
presenting a new problem, called Congenial Talking Philosophers, to model group mutual exclusion. We also propose several criteria to evaluate solutions of the problem and to measure their
performance. Finally, we provide an efficient and highly concurrent distributed algorithm for the problem in a shared-memory
model where processes communicate by reading from and writing to shared variables. The distributed algorithm meets the proposed
criteria, and has performance similar to some naive but centralized solutions to the problem.
Received: November 1998 / Accepted: April 2000 相似文献
2.
Abstract. We present a deterministic distributed depth-first token passing protocol on a rooted network. This protocol uses neither
the processor identifiers nor the size of the network, but assumes the existence of a distinguished processor, called the
root of the network. The protocol is self-stabilizing, meaning that starting from an arbitrary state (in response to an arbitrary
perturbation modifying the memory state), it is guaranteed to reach a state with no more than one token in the network. Our
protocol implements a strictly fair token circulation scheme. The proposed protocol has extremely small state requirement
– only states per processor, i.e., bits per processor, where is the degree of the network. The protocol can be used to implement a strictly fair distributed mutual exclusion in any rooted
network. This protocol can also be used to construct a DFS spanning tree.
Received: July 1998 / Accepted: April 2000 相似文献
3.
Srdjan Petrovic 《Information Processing Letters》2005,95(2):343-350
In the group mutual exclusion problem [Y. Joung, Asynchronous group mutual exclusion, Distrib. Comput. 13 (2000) 189], which generalizes mutual exclusion [E. Dijkstra, Solution of a problem in concurrent programming control, Comm. ACM 8 (9) (1965) 569], a process chooses a session when it requests entry into the Critical Section. A group mutual exclusion algorithm must ensure that the mutual exclusion property holds: if two processes are in the Critical Section at the same time, then they request the same session. In addition to mutual exclusion, lockout freedom, bounded exit, and concurrent entering are basic properties that are desirable in any group mutual exclusion algorithm.Hadzilacos in [Proc. 20th Annual Symp. on Principles of Distributed Computing, 2001, pp. 100-106] first introduced a fairness condition, called first-come-first-served (FCFS), for group mutual exclusion. The only known FCFS group mutual exclusion algorithm is due to Hadzilacos [Proc. 20th Annual Symp. on Principles of Distributed Computing, 2001, pp. 100-106], and requires Θ(N2) bounded shared registers, where N is the number of processes. We present a FCFS group mutual exclusion algorithm that uses only Θ(N) bounded shared registers. (The existence of such an algorithm was posed as an open problem by Hadzilacos.) 相似文献
4.
Injong Rhee 《Distributed Computing》1998,11(3):157-168
This paper concerns resource allocation in distributed message passing systems, i.e., the scheduling of accesses to exclusive
system resources shared among concurrent processes. An efficient modular resource allocation algorithm is presented that uses
any arbitrary resource allocation algorithm as a subroutine. It improves the performance of the subroutine by letting each
process wait only for its currently conflicting processes, and therefore, allows more concurrency. For appropriate choices
of the subroutine, we obtain resource allocation algorithms with the minimum worst case response times. Simulation studies
were conducted which also indicate that on average, the obtained algorithms perform faster and require a smaller number of
messages than other previously known algorithms, especially when resource contention among processes is high and the average
time that a process remains in the critical region is large.
Received: May 1997 / Accepted: May 1998 相似文献
5.
Summary A variant of the drinking philosophers algorithm of Chandy and Misra is described and proved correct in a modular way. The algorithm of Chandy and Misra is based on a particular dining philosophers algorithm and relies on certain properties of its implementation. The drinking philosophers algorithm presented in this paper is able to use an arbitrary dining philosophers algorithm as a subroutine; nothing about the implementation needs to be known, only that it solves the dining philosophers problem. An important advantage of this modularity is that by substituting a more time-efficient dining philosophers algorithm than the one used by Chandy and Misra, a drinking philosophers algorithm withO(1) worst-case waiting time is obtained, whereas the drinking philosophers algorithm of Chandy and Misra hasO(n) worst-case waiting time (forn philosophers). Careful definitions are given to distinguish the drinking and dining philosophers problems and to specify varying degrees of concurrency.
Jennifer L. Welch received her B.A. in 1979 from the University of Texas at Austin, and her S.M. and Ph.D. from the Massachusetts Institute of Technology in 1984 and 1988 respectively. She has been a member of technical staff at GTE Laboratories Incorporated in Waltham, Massachusetts and an assistant professor at the University of North Carolina at Chapel Hill. She is currently an assistant professor at Texas A&M University. Her research interests include algorithms and lower bounds for distributed computing.Much of this work was performed while this author was at the Laboratory for Computer Science, Massachusetts Institute of Technology, supported by the Advanced Research Projects Agency of the Department of Defense under contract N00014-83-K-0125, the National Science Foundation under grants DCR-83-02391 and CCR-86-11442, the Office of Army Research under contract DAAG29-84-K-0058, and the Office of Naval Research under contract N00014-85-K-0168. This author was also supported in part by NSF grant CCR-9010730, an IBM Faculty Development Award, and NSF Presidential Young Investigator Award CCR-9158478This author was supported by the Office of Naval Research under contract N00014-91-J-1046, the Advanced Research Projects Agency of the Department of Defense under contract N00014-89-J-1988, and the National Science Foundation under grant CCR-89-15206. The photograph and autobiography of Professor N.A. Lynch were published in Volume 6, No. 2, 1992 on page 121 相似文献
6.
Data placement in shared-nothing parallel database systems 总被引:4,自引:0,他引:4
Manish Mehta David J. DeWitt 《The VLDB Journal The International Journal on Very Large Data Bases》1997,6(1):53-72
Data placement in shared-nothing database systems has been studied extensively in the past and various placement algorithms
have been proposed. However, there is no consensus on the most efficient data placement algorithm and placement is still performed
manually by a database administrator with periodic reorganization to correct mistakes. This paper presents the first comprehensive
simulation study of data placement issues in a shared-nothing system. The results show that current hardware technology trends
have significantly changed the performance tradeoffs considered in past studies. A simplistic data placement strategy based
on the new results is developed and shown to perform well for a variety of workloads.
Edited by M. Adiba. Received May 11, 1993 / Accepted April 24, 1996 November 1, 1995 相似文献
7.
Summary. In this paper, we prove a lower bound on the number of rounds required by a deterministic distributed protocol for broadcasting
a message in radio networks whose processors do not know the identities of their neighbors. Such an assumption captures the
main characteristic of mobile and wireless environments [3], i.e., the instability of the network topology. For any distributed
broadcast protocol Π, for any n and for any D≦n/2, we exhibit a network G with n nodes and diameter D such that the number of rounds needed by Π for broadcasting a message in G is Ω(D log n). The result still holds even if the processors in the network use a different program and know n and D. We also consider the version of the broadcast problem in which an arbitrary number of processors issue at the same time an identical message that has to be delivered to the other processors. In such a case we prove that, even assuming that the processors
know the network topology, Ω(n) rounds are required for solving the problem on a complete network (D=1) with n processors.
Received: August 1994 / Accepted: August 1996 相似文献
8.
Ted Herman 《Distributed Computing》2000,13(1):1-17
Summary. A superstabilizing protocol is a protocol that i is self-stabilizing, meaning that it can recover from an arbitrarily severe transient fault; and ii can recover from a local transient fault while satisfying a passage predicate during recovery. This paper investigates the possibility of superstabilizing protocols for mutual exclusion in a ring of
processors, where a local fault consists of any transient fault at a single processor; the passage predicate specifies that
there be at most one token in the ring, with the single exception of a spurious token colocated with the transient fault. The first result
of the paper is an impossibility theorem for a class of superstabilizing mutual exclusion protocols. Two unidirectional protocols
are then presented to show that conditions for impossibility can independently be relaxed so that superstabilization is possible
using either additional time or communication registers. A bidirectional protocol subsequently demonstrates that superstabilization
in O(1) time is possible. All three superstabilizing protocols are optimal with respect to the number of communication registers
used.
Received: August 1996 / Accepted: March 1999 相似文献
9.
Bogdan S. Chlebus Leszek Gasieniec Alan Gibbons Andrzej Pelc Wojciech Rytter 《Distributed Computing》2002,15(1):27-38
We consider the problem of distributed deterministic broadcasting in radio networks of unknown topology and size. The network
is synchronous. If a node u can be reached from two nodes which send messages in the same round, none of the messages is received by u. Such messages block each other and node u either hears the noise of interference of messages, enabling it to detect a collision, or does not hear anything at all, depending on the model. We assume that nodes know neither the topology nor the size of
the network, nor even their immediate neighborhood. The initial knowledge of every node is limited to its own label. Such
networks are called ad hoc multi-hop networks. We study the time of deterministic broadcasting under this scenario.
For the model without collision detection, we develop a linear-time broadcasting algorithm for symmetric graphs, which is
optimal, and an algorithm for arbitrary n-node graphs, working in time . Next we show that broadcasting with acknowledgement is not possible in this model at all.
For the model with collision detection, we develop efficient algorithms for broadcasting and for acknowledged broadcasting
in strongly connected graphs.
Received: January 2000 / Accepted: June 2001 相似文献
10.
Heuristic and randomized optimization for the join ordering problem 总被引:11,自引:0,他引:11
Michael Steinbrunn Guido Moerkotte Alfons Kemper 《The VLDB Journal The International Journal on Very Large Data Bases》1997,6(3):191-208
Recent developments in database technology, such as deductive database systems, have given rise to the demand for new, cost-effective
optimization techniques for join expressions. In this paper many different algorithms that compute approximate solutions for
optimizing join orders are studied since traditional dynamic programming techniques are not appropriate for complex problems.
Two possible solution spaces, the space of left-deep and bushy processing trees, are evaluated from a statistical point of
view. The result is that the common limitation to left-deep processing trees is only advisable for certain join graph types.
Basically, optimizers from three classes are analysed: heuristic, randomized and genetic algorithms. Each one is extensively
scrutinized with respect to its working principle and its fitness for the desired application. It turns out that randomized
and genetic algorithms are well suited for optimizing join expressions. They generate solutions of high quality within a reasonable
running time. The benefits of heuristic optimizers, namely the short running time, are often outweighed by merely moderate
optimization performance. 相似文献
11.
Jan Friso Groote Wim H. Hesselink Sjouke Mauw Rogier Vermeulen 《Distributed Computing》2001,14(2):75-81
Summary. The problem of using P processes to write a given value to all positions of a shared array of size N is called the Write-All problem. We present and analyze an asynchronous algorithm with work complexity , where (assuming and ). Our algorithm is a generalization of the naive two-processor algorithm where the two processes each start at one side of
the array and walk towards each other until they collide.
Received: October 1999 / Accepted: September 2000 相似文献
12.
Summary. Long-lived and adaptive implementations of mutual exclusion and renaming in the read/write shared memory model are presented.
An implementation of a task is adaptive if the step complexity of any operation in the implementation is a function of the number of processes that take steps concurrently
with the operation. The renaming algorithm assigns a new unique id in the range to any process whose initial unique name is taken from a set of size N, for an arbitrary N and where k is the number of processes that actually take steps or hold a name while the new name is being acquired. The step complexity
of acquiring a new name is , while the step complexity of releasing a name is 1. The space complexity of the algorithm is where n is an upper bound on the number of processes that may be active at the same time (acquiring or holding new names), which
could be N in the worst case.
Both the system response time and the worst case number of operations per process in the presented mutual-exclusion algorithm
are adaptive. Both algorithms rely on the basic building block of a long-lived and adaptive splitter. While the adaptive-splitter
satisfies a slightly different set of properties than the Moir-Anderson splitter [MA95], it is adaptive and long-lived. In
addition, the new splitter properties enable the construction of a non-blocking long-lived (2k-1)-renaming algorithm (which is optimal in the size of the new name space). We believe that the mechanisms introduced in
our splitter implementation are interesting on their own, and might be used in other adaptive and long-lived constructions.
Received: March 2000 / Accepted July 2001 相似文献
13.
Jehn-Ruey Jiang 《Information Processing Letters》2011,111(8):379-384
The resource allocation problem is a fundamental problem in Grid and Cloud computing environments. This paper focuses on constructing nondominated (ND) local coteries to solve the problem in a distributed way. Distributed algorithms using coteries usually incur low communication overheads and have high degrees of fault-tolerance, and ND coteries are candidates for the algorithms to achieve the highest degree of fault-tolerance. A new type of coteries, called p-coteries, is defined to aid the construction of local coteries. Theorems about the nondomination of p-coteries are then developed, and an operation, called pairwise-union (p-union), is proposed to help generate ND p-coteries, which in turn can be used to generate ND local coteries for solving the resource allocation problem. 相似文献
14.
Summary. In a Distributed System with N sites, the precise detection of causal relationships between events can only be done with
vector clocks of size N. This gives rise to scalability and efficiency problems for logical clocks that can be used to order
events accurately. In this paper we propose a class of logical clocks called plausible clocks that can be implemented with
a number of components not affected by the size of the system and yet they provide good ordering accuracy. We develop rules
to combine plausible clocks to produce more accurate clocks. Several examples of plausible clocks and their combination are
presented. Using a simulation model, we evaluate the performance of these clocks. We also present examples of applications
where constant size clocks can be used.
Received: January 1997 / Accepted: January 1999 相似文献
15.
A variational way of deriving the relevant parameters of a cellular neural network (CNN) is introduced. The approach exploits
the CNN spontaneous internal-energy decrease and is applicable when a given problem can be expressed in terms of an optimisation
task. The presented approach is fully mathematical as compared with the typical heuristic search for the correct parameters
in the literature on CNNs. This method is practically employed in recovering information on the three-dimensional structure
of the environment, through the stereo vision problem. A CNN able to find the conjugate points in a stereogram is fully derived
in the proposed framework. Results of computer simulations on several test cases are provided.
Received: 1 August 1997 / Accepted: 29 September 1999 相似文献
16.
Vidyasankar introduced a combined problem of k-exclusion and group mutual exclusion, called the group k-exclusion problem, which occurs in a situation where philosophers with the same interest can attend a forum in a meeting room, and up to k meeting rooms are available. We propose an improvement to Vidyasankar's algorithm. Waiting times in the trying region in the original algorithm and in our algorithm are bounded by n(n−k)c+O(n3(n−k))l and (n−k)c+O(n(n−k)2)l, respectively, where n is the number of processes, l is an upper bound on the time between successive two atomic steps, and c is an upper bound on the time that any philosopher spends in a forum. 相似文献
17.
Abstract. In this paper we study the ability of shared object types to implement Consensus in asynchronous shared-memory systems where
at most one process may crash. More specifically, we consider the following question: Let and be a set of object types that can be used to solve one-resilient Consensus among n processes. Can always be used to solve one-resilient Consensus among n - 1 processes? We prove that for n = 3 the answer is negative, even if consists only ofdeterministic types. (This strengthens an earlier result by the first author proving the same fact for nondeterministic types.) We also prove that, in contrast, for the answer to the above question is affirmative.
Received: July 1997 / Accepted: May 2000 相似文献
18.
A network that offers deterministic, i.e., worst case, quality-of-service guarantees to variable-bit-rate (VBR) video must
provide a resource reservation mechanism that allocates bandwidth, buffer space, and other resources for each video stream.
Such a resource reservation scheme must be carefully designed, otherwise network resources are wasted. A key component for
the design of a resource reservation scheme is the traffic characterization method that specifies the traffic arrivals on a video stream. The traffic characterization should accurately describe the
actual arrivals, so that a large number of streams can be supported; but it must also map directly into efficient traffic-policing
mechanisms that monitor arrivals on each stream. In this study, we present a fast and accurate traffic characterization method
for stored VBR video in networks with a deterministic service. We use this approximation to obtain a traffic characterization
that can be efficiently policed by a small number of leaky buckets. We present a case study where we apply our characterization
method to networks that employ a dynamic resource reservation scheme with renegotiation. We use traces from a set of 25–30-min
MPEG sequences to evaluate our method against other characterization schemes from the literature. 相似文献
19.
facial animation (FA) will be. We have undertaken experiments on 190 subjects in order to explore the benefits of FA. Part of the experiment
was aimed at exploring the objective benefits, i.e., to see if FA can help users to perform certain tasks better. The other
part of the experiment was aimed at subjective benefits. At the same time comparison of different FA techniques was undertaken.
We present the experiment design and the results. The results show that FA aids users in understanding spoken text in noisy
conditions; that it can effectively make waiting times more acceptable to the user; and that it makes services more attractive
to the users, particularly when they compare directly the same service with or without the FA. 相似文献
20.
Some simple distributed algorithms for sparse networks 总被引:1,自引:0,他引:1
Summary. We give simple, deterministic, distributed algorithms for computing maximal matchings, maximal independent sets and colourings.
We show that edge colourings with at most colours, and maximal matchings can be computed within deterministic rounds, where is the maximum degree of the network. We also show how to find maximal independent sets and -vertex colourings within deterministic rounds. All hidden constants are very small and the algorithms are very simple.
Received: August 2000 / Accepted: November 2000 相似文献