Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








321 Hits in 6.2 sec

Provide a New Mapping for Deadlock Detection and Resolution Modeling of Distributed Database to Colored Petri Net

Masoomeh Ghodrati, Ali Harounabadi
2014 International Journal of Computer Applications  
Deadlock problem for a distributed database system that uses locking as a concurrency control algorithm, as there are inherent.  ...  In the model proposed the new rules for mapping TWFG with colored Petri nets for modeling the deadlocks detection and resolve.  ...  Kawazu Algorithm This algorithm [8] is based on two-phase locking protocol. In first phase local deadlock and in second phase global in the absence of local deadlock are diagnosed.  ... 
doi:10.5120/16587-6289 fatcat:awwkcbzl5jfehod6bdlq5h2e4y

Modeling and Verification of Deadlock Potentials of a Concurrency Control Mechanism in Distributed Databases Using Hierarchical Colored Petri Net

Saeid Pashazadeh
2012 International Journal of Information and Education Technology  
In this paper, a novel model of CCM based on two phase locking (2PL) using CPN has presented.  ...  Colored Petri net (CPN) has high modeling capabilities and is one of the best methods for formal analysis and verification of CCMs.  ...  Modeling two phase commit protocol for transaction management in distributed environment is studied using time Petri net [5] .  ... 
doi:10.7763/ijiet.2012.v2.86 fatcat:ysir5ybdbvcvnlf2b6zfsxni7q

Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs

Yin Wang, Terence Kelly, Manjunath Kudlur, Stéphane Lafortune, Scott A. Mahlke
2008 USENIX Symposium on Operating Systems Design and Implementation  
Existing approaches to deadlock impose onerous burdens on developers, entail high runtime performance overheads, or offer no help for unmodified legacy code.  ...  Deadlock is an increasingly pressing concern as the multicore revolution forces parallel programming upon the average programmer.  ...  Finally we thank our shepherd, Remzi Arpaci-Dusseau, and the anonymous OSDI reviewers for many helpful suggestions.  ... 
dblp:conf/osdi/WangKKLM08 fatcat:7k4vgpinlfbc3nsvzxgoghhsji

An efficient deadlock prevention approach for service oriented transaction processing

Feilong Tang, Ilsun You, Shui Yu, Cho-Li Wang, Minyi Guo, Wenlong Liu
2012 Computers and Mathematics with Applications  
A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach.  ...  Locking resources is widely used in distributed transaction management (e.g., two phase commit, 2PC) to keep the system consistent.  ...  [12] proposed a Petri net based deadlock prevention policy based on the liveness or the reachability of Petri nets.  ... 
doi:10.1016/j.camwa.2011.07.063 fatcat:tj7xxky2irdehp4yu54msf45dm

The theory of deadlock avoidance via discrete control

Yin Wang, Stéphane Lafortune, Terence Kelly, Manjunath Kudlur, Scott Mahlke
2008 Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '09  
Our method furthermore guarantees that the control logic is maximally permissive: it postpones lock acquisitions only when necessary to prevent deadlocks, and therefore permits maximal runtime concurrency  ...  At run time, the control logic avoids deadlocks by postponing lock acquisitions. Discrete Control Theory guarantees that the program instrumented with our synthesized control logic cannot deadlock.  ...  Acknowledgments We thank Eric Anderson, Hans Boehm, Pramod Joisha, Hongwei Liao, Spyros Reveliotis, and the anonymous reviewers for many helpful comments.  ... 
doi:10.1145/1480881.1480913 dblp:conf/popl/WangLKKM09 fatcat:s6t3pn53mfdxrnllmaguxxvqpa

The theory of deadlock avoidance via discrete control

Yin Wang, Stéphane Lafortune, Terence Kelly, Manjunath Kudlur, Scott Mahlke
2009 SIGPLAN notices  
Our method furthermore guarantees that the control logic is maximally permissive: it postpones lock acquisitions only when necessary to prevent deadlocks, and therefore permits maximal runtime concurrency  ...  At run time, the control logic avoids deadlocks by postponing lock acquisitions. Discrete Control Theory guarantees that the program instrumented with our synthesized control logic cannot deadlock.  ...  Acknowledgments We thank Eric Anderson, Hans Boehm, Pramod Joisha, Hongwei Liao, Spyros Reveliotis, and the anonymous reviewers for many helpful comments.  ... 
doi:10.1145/1594834.1480913 fatcat:ecuks66hanfyrbjmo75sffzxse

Using Petri nets to introduce operating system concepts

John M. Jeffrey
1991 Proceedings of the twenty-second SIGCSE technical symposium on Computer science education - SIGCSE '91  
Examples of models for the concept of deadlocks, for the deadlock detection algorithm, and the fork/'oin and parbegin/parend concurrency constructs are shown, In addition, discussion of how Petri net models  ...  In this paper the use of the graphical aspects of Petri net theory as a tool to introduce operating system concepts is given.  ...  For the graphical "does the net deadlock?" A Petri net is deadlocked if no transitions are enabled.  ... 
doi:10.1145/107004.107074 dblp:conf/sigcse/Jeffrey91 fatcat:f6nywmrfyvgczm2554mw6dqp3a

Using Petri nets to introduce operating system concepts

John M. Jeffrey
1991 ACM SIGCSE Bulletin  
Examples of models for the concept of deadlocks, for the deadlock detection algorithm, and the fork/'oin and parbegin/parend concurrency constructs are shown, In addition, discussion of how Petri net models  ...  In this paper the use of the graphical aspects of Petri net theory as a tool to introduce operating system concepts is given.  ...  For the graphical "does the net deadlock?" A Petri net is deadlocked if no transitions are enabled.  ... 
doi:10.1145/107005.107074 fatcat:tx3poabnq5bhhejnni323uuj3u

Simulation analysis of multithreaded programs under deadlock-avoidance control

Hongwei Liao, Hao Zhou, Stephane Lafortune
2011 Proceedings of the 2011 Winter Simulation Conference (WSC)  
The programs are modeled by a special class of Petri nets, called Gadara nets. We propose a formal simulation methodology for Gadara nets.  ...  We discuss the implications of the above results on the practical implementation of control strategies that prevent deadlocks in multithreaded programs.  ...  Ricardo Lüders, and the anonymous reviewers for many helpful comments.  ... 
doi:10.1109/wsc.2011.6147798 dblp:conf/wsc/LiaoZL11 fatcat:nrapjujwyra5loesoe3mtimdmy

Taming Confusion for Modeling and Implementing Probabilistic Concurrent Systems [chapter]

Joost-Peter Katoen, Doron Peled
2013 Lecture Notes in Computer Science  
We provide a distributed scheduling algorithm for implementing a system that allows distributed probabilistic choice.  ...  We use the model of Petri nets to demonstrate the modeling and implementation problem. The proposed solution involves adding sequential observers called agents to the Petri net structure.  ...  The authors thank Barbara Jobstmann and Gadi Taubenfeld for valuable discussions.  ... 
doi:10.1007/978-3-642-37036-6_23 fatcat:mbzbnkiwhff3vm77wwzumbbmre

A pipeline-based approach for long transaction processing in web service environments

Feilong Tang, Ilsun You, N.A. Li, Cho Li Wang, Zixue Cheng, Song Guo
2011 International Journal of Web and Grid Services  
Furthermore, we design a time-stamp-based deadlock A pipeline-based approach for long transaction processing 191 prevention mechanism for the control of multiple concurrent transactions.  ...  In web service environments, long transactions need to lock resources -often database services -for a long time during their long execution duration.  ...  His research interests are in the areas of protocol design and performance analysis for communication networks, with a special emphasis on wireless ad hoc and sensor networks. Acknowledgements  ... 
doi:10.1504/ijwgs.2011.040448 fatcat:fih32a5pqrhq5bs22zsye3il5y

Model-Based Adaptation of Behavioral Mismatching Components

C. Canal, P. Poizat, G. Salaun
2008 IEEE Transactions on Software Engineering  
Urbano for their participation to the implementation of Adaptor, as well as Bernard Berthomieu, Frédéric Lang, Massimo Tivoli, and François Vernadat for their help on external tool support, interesting  ...  The authors are also grateful to the anonymous referees whose comments helped a lot to improve this article. This work is partially supported by the  ...  The first one is based on synchronous products, and the second one is based on Petri net encodings.  ... 
doi:10.1109/tse.2008.31 fatcat:5dsjw7lrjjglzjv5dwl2j5lv2a

Design, Validation, Simulation and Parametric Evaluation of a Novel Protocol for Locating Mobile Agents in Multiregion Environment

Rama Sushil, Kumkum Garg, Rama Bhargava
2008 Journal of Computer Science  
The technique named as Broadcasting with Search by Path Chase (BSPC). We used the tool time Petri net analyzer TINA to model, analyze and to simulate BSPC.  ...  The cost of location management strategies mainly depends on the cost of search and update. We concentrated on reducing the cost of update and improving the speed of processing of the agents.  ...  For Petri nets, these abstractions help prevent combinatorial explosion, relying on partial order techniques such as covering steps and/or persistent sets.  ... 
doi:10.3844/jcssp.2008.256.271 fatcat:xoraqmew7fbndhfr4bupkbsymy

Timestamp-based orphan elimination

M.P. Herlihy, M.S. McKendry
1989 IEEE Transactions on Software Engineering  
The method ensures that orphans are detected and eliminated in a timely manner, and it prevents them from observing inconsistent states.  ...  This paper proposes a new method for managing orphans created by crashes and by aborts.  ...  The refresh protocol is a two-phase protocol similar to the two-phase commit protocol [6].  ... 
doi:10.1109/32.29482 fatcat:5ejeax6birgqfksn4pufuhsete

The Unfolding: Origins, Techniques, and Applications within Discrete Event Systems

Younes Rouabah, Zhiwu Li
2022 Mathematics  
In this paper, we aim to provide a comprehensive review on the history of net unfoldings, the methods that are based on these unfoldings, and how they are used in discrete event systems for automatic verification  ...  Based on the findings of concurrency theory, interleaving semantics are replaced with a unique partially ordered occurrence net.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/math11010047 fatcat:fewzzrpkljesfldsttbbvjnnay
« Previous Showing results 1 — 15 out of 321 results