DISTRIBUTED DEADLOCK DETECTION ALGORITHM

被引:80
|
作者
OBERMARCK, R
机构
来源
关键词
D O I
10.1145/319702.319717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:187 / 208
页数:22
相关论文
共 50 条
  • [1] THE DISTRIBUTED DEADLOCK DETECTION ALGORITHM
    BADAL, DZ
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1986, 4 (04): : 320 - 337
  • [2] Deadlock models and a general algorithm for distributed deadlock detection
    Brzezinski, J
    Helary, JM
    Raynal, M
    Singhal, M
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1995, 31 (02) : 112 - 125
  • [3] A DISTRIBUTED DEADLOCK DETECTION ALGORITHM FOR THE AND MODEL
    DEMENDIVIL, JRG
    ALASTRUEY, CF
    GARITAGOITIA, JR
    [J]. MICROPROCESSING AND MICROPROGRAMMING, 1993, 38 (1-5): : 385 - 392
  • [4] DISTRIBUTED ALGORITHM FOR COMMUNICATION DEADLOCK DETECTION
    RONTOGIANNIS, P
    PAVLIDES, G
    LEVY, A
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 1991, 33 (07) : 483 - 488
  • [5] A DISTRIBUTED DEADLOCK DETECTION ALGORITHM - DISTRIBUTED GRAPH RECONSTRUCTION ALGORITHM
    SONG, GY
    PARK, DY
    LEE, DM
    PARK, KH
    KIM, MW
    [J]. INFORMATION PROCESSING LETTERS, 1989, 30 (05) : 245 - 252
  • [6] A PARTIALLY DISTRIBUTED DEADLOCK DETECTION ALGORITHM
    ELMAGARMID, AK
    SHETH, AP
    LIU, MT
    [J]. INTERNATIONAL JOURNAL OF COMPUTER & INFORMATION SCIENCES, 1985, 14 (05): : 307 - 330
  • [7] A PRIORITY BASED DISTRIBUTED DEADLOCK DETECTION ALGORITHM
    SINHA, MK
    NATARAJAN, N
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1985, 11 (01) : 67 - 80
  • [8] AN ALGORITHM FOR RESOURCE DEADLOCK DETECTION IN DISTRIBUTED SYSTEMS
    JAVAGAL, RD
    DATTA, AK
    GHOSH, S
    [J]. COMPUTING SYSTEMS, 1992, 7 (04): : 257 - 264
  • [9] PRIORITY BASED DISTRIBUTED DEADLOCK DETECTION ALGORITHM.
    Sinha, Mukul K.
    Natarajan, N.
    [J]. IEEE Transactions on Software Engineering, 1985, SE-11 (01) : 67 - 80
  • [10] An Efficient Distributed Deadlock Detection and Prevention Algorithm by Daemons
    Soleimany, Alireza
    Giahi, Zahra
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (04): : 150 - 155