Self stabilization
S Dolev - Journal of Aerospace Computing, Information, and …, 2004 - arc.aiaa.org
AULT tolerance and reliability are important issues for flight vehicles such as aircraft, space-
shuttles, and satellites. A self-stabilizing system recovers automatically following …
shuttles, and satellites. A self-stabilizing system recovers automatically following …
Shared-memory mutual exclusion: major research trends since 1986
Shared-memory mutual exclusion: major research trends since 1986 Page 1 Digital Object
Identifier (DOI) 10.1007/s00446-003-0088-6 Distrib. Comput. (2003) 16: 75–110 c Springer-Verlag …
Identifier (DOI) 10.1007/s00446-003-0088-6 Distrib. Comput. (2003) 16: 75–110 c Springer-Verlag …
Nesting-safe recoverable linearizability: Modular constructions for non-volatile memory
We presents a novel abstract individual-process crash-recovery model for non-volatile
memory, which enables modularity, so that complex recoverable objects can be constructed …
memory, which enables modularity, so that complex recoverable objects can be constructed …
RGLock: Recoverable mutual exclusion for non-volatile main memory systems
A Ramaraju - 2015 - uwspace.uwaterloo.ca
Mutex locks have traditionally been the most popular concurrent programming mechanisms
for inter-process synchronization in the rapidly advancing field of concurrent computing …
for inter-process synchronization in the rapidly advancing field of concurrent computing …
[PDF][PDF] Self-stabilization bibliography: Access guide
T Herman - University of Iowa, December, 2002 - Citeseer
This document, a companion to the bibliography on self-stabilization, is intended as a high-
level aid to searching the literature. Not intended to be a survey of the eld, the document …
level aid to searching the literature. Not intended to be a survey of the eld, the document …
Secure and resilient peer-to-peer e-mail design and implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail
employs a server-centric design, in which the user is critically dependent on her mail server …
employs a server-centric design, in which the user is critically dependent on her mail server …
A logic of events
M Bickford, RL Constable - 2003 - ecommons.cornell.edu
There is a well-established theory and practice for creating correct-by-construction functional
programs by extracting them from constructive proofs of assertions of the form" For all x: A …
programs by extracting them from constructive proofs of assertions of the form" For all x: A …
Dijkstra's self-stabilizing algorithm in unsupportive environments
The first self-stabilizing algorithm published by Dijkstra in 1973 assumed the existence of a
central daemon, that activates one processor at time to change state as a function of its own …
central daemon, that activates one processor at time to change state as a function of its own …
A New efficient tool for the design of self-stabilizing ℓ-exclusion algorithms: the controller
R Hadid, V Villain - International Workshop on Self-Stabilizing Systems, 2001 - Springer
In this paper, we present the first self-stabilizing protocols for ℓ-exclusion problem in the
message passing model. The ℓ-exclusion problem is a generalization of the mutual …
message passing model. The ℓ-exclusion problem is a generalization of the mutual …
Strategies for healthcare information systems
It is widely recognized that the healthcare industry does not use information technology to its
full potential. This book uncovers many of the reasons why large-scale implementation of …
full potential. This book uncovers many of the reasons why large-scale implementation of …