Self stabilization

S Dolev - Journal of Aerospace Computing, Information, and …, 2004 - arc.aiaa.org
AULT tolerance and reliability are important issues for flight vehicles such as aircraft, space-
shuttles, and satellites. A self-stabilizing system recovers automatically following …

Shared-memory mutual exclusion: major research trends since 1986

JH Anderson, YJ Kim, T Herman - Distributed computing, 2003 - Springer
Shared-memory mutual exclusion: major research trends since 1986 Page 1 Digital Object
Identifier (DOI) 10.1007/s00446-003-0088-6 Distrib. Comput. (2003) 16: 75–110 c Springer-Verlag …

Nesting-safe recoverable linearizability: Modular constructions for non-volatile memory

H Attiya, O Ben-Baruch, D Hendler - … of the 2018 ACM Symposium on …, 2018 - dl.acm.org
We presents a novel abstract individual-process crash-recovery model for non-volatile
memory, which enables modularity, so that complex recoverable objects can be constructed …

RGLock: Recoverable mutual exclusion for non-volatile main memory systems

A Ramaraju - 2015 - uwspace.uwaterloo.ca
Mutex locks have traditionally been the most popular concurrent programming mechanisms
for inter-process synchronization in the rapidly advancing field of concurrent computing …

[PDF][PDF] Self-stabilization bibliography: Access guide

T Herman - University of Iowa, December, 2002 - Citeseer
This document, a companion to the bibliography on self-stabilization, is intended as a high-
level aid to searching the literature. Not intended to be a survey of the eld, the document …

Secure and resilient peer-to-peer e-mail design and implementation

J Kangasharju, KW Ross… - … Conference on Peer-to …, 2003 - ieeexplore.ieee.org
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail
employs a server-centric design, in which the user is critically dependent on her mail server …

A logic of events

M Bickford, RL Constable - 2003 - ecommons.cornell.edu
There is a well-established theory and practice for creating correct-by-construction functional
programs by extracting them from constructive proofs of assertions of the form" For all x: A …

Dijkstra's self-stabilizing algorithm in unsupportive environments

S Dolev, T Herman - Self-Stabilizing Systems: 5th International Workshop …, 2001 - Springer
The first self-stabilizing algorithm published by Dijkstra in 1973 assumed the existence of a
central daemon, that activates one processor at time to change state as a function of its own …

A New efficient tool for the design of self-stabilizing ℓ-exclusion algorithms: the controller

R Hadid, V Villain - International Workshop on Self-Stabilizing Systems, 2001 - Springer
In this paper, we present the first self-stabilizing protocols for ℓ-exclusion problem in the
message passing model. The ℓ-exclusion problem is a generalization of the mutual …

Strategies for healthcare information systems

TAM Spil, RA Stegwee - Effective Healthcare Information Systems, 2002 - igi-global.com
It is widely recognized that the healthcare industry does not use information technology to its
full potential. This book uncovers many of the reasons why large-scale implementation of …